Back to Library
Glossary
21007 terms defined across 42 textbooks
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
#
"12 Factor App"
— [12factor.net](https://12factor.net/). The twelve-factor methodology for building software-as-a-serv…
"21 Fairness Definitions and Their Politics"
— Arvind Narayanan, tutorial at FAT* (2018) A detailed walk-through of different mathematical definiti…
"A Machine Learning Approach to March Madness"
— Huang & Hsu - Ensemble methods for tournament prediction - Handling small sample sizes - MIT Sloan S…
"A Network Science Approach to Football"
— Various authors - Graph-based analysis - Pass xT weighting - Structural insights
"A new study shows..."
— A single study, especially unpublicated or not yet peer-reviewed, provides very weak evidence. Wait …
"A New Way to Measure Clutch" by Bill Barnwell
— Application of z-scores to performance evaluation - ESPN Analytics methodology
"A Survey of Text Classification Algorithms"
— Aggarwal & Zhai (2012) - Comprehensive overview of text classification methods - Feature extraction …
"A Win Probability Model for Football"
— Burke (2010) - Foundation of modern WP models - Feature selection methodology - Calibration approach…
"Actions Speak Louder than Goals"
— Decroos et al. (2019) - KU Leuven Research - VAEP (Valuing Actions by Estimating Probabilities) - Ac…
"Add Anaconda3 to my PATH environment variable"
— The installer recommends against this, but for beginners, checking this box can make things easier. …
"Add Python to PATH"
— this is critical. Alternatively, install via the Windows Store or use the `winget` package manager:
"Affrilachian"
— a blend of "African," "Appalachian," and the suffix "-ian" — named something that had existed for ce…
"AI software engineer"
— an autonomous AI agent that handles complex software engineering tasks end-to-end with minimal human…
"Algorithmic redlining"
— systematic patterns in which modeled persuasion or contact priority scores are lower for voters in m…
"Algorithmic Trading and DMA" by Barry Johnson
— The definitive reference on execution quality, order types, and market microstructure. While focused…
"All Blues"
— A 6/4 blues (instead of the standard 4/4) that retains more functional harmonic motion than "So What…
"All of Statistics" by Larry Wasserman
— Comprehensive coverage of statistical methods - More mathematical rigor - Good reference for advance…
"All you need to do is..."
— Interventions in complex systems like human psychology rarely produce guaranteed outcomes.
"American paradox"
— the coexistence of slavery and freedom, where the freedom of white people was psychologically and po…
"An Introduction to Statistical Learning"
— James, Witten, Hastie, Tibshirani - Excellent ML introduction with R examples - Free online at: stat…
"Analytics FC Podcast"
— Industry-focused discussions - Career advice for aspiring analysts
"Analyzing Baseball Data with R"
— Marchi & Albert - While baseball-focused, visualization principles transfer - Excellent spatial anal…
"And what else?"
— Possibly the most powerful question in the set. Used after any answer, it signals that you expect th…
"and" pattern
— the program does everything it did before AND puts a message on the queue. During the parallel-run p…
"Any and all methods and means"
— this phrase, which a mountain farmer in 1887 would have understood to mean a hole dug in a hillside,…
"Any population"
— it doesn't matter if the population is uniform, skewed, bimodal, or any other shape. The magic works…
"Apache Kafka: Getting Started"
— Fundamentals of event streaming. - **"Building Real-Time Applications with WebSockets"** - Client-se…
"Apache Parquet format"
— [parquet.apache.org](https://parquet.apache.org/). Documentation for the Parquet columnar storage fo…
"API Design Patterns" by JJ Geewax
— Google engineer's guide to API patterns.
"Applied Data Science with Python"
— University of Michigan (Coursera) - Practical Python ML skills - Includes sports examples in assignm…
"Applied Logistic Regression"
— Hosmer & Lemeshow - Logistic regression theory - Calibration assessment - Model diagnostics
"Applied Predictive Modeling"
— Authors: Kuhn & Johnson - Relevance: Building outcome prediction models
"Applied Text Analysis with Python"
— Bengfort, Bilbro & Ojeda - scikit-learn integration - Production-ready code - Feature engineering
"Art AI Gallery"
— An online exhibition space that curates AI-generated and AI-assisted artwork with critical commentar…
"as extreme as or more extreme than"
— We're not asking "what's the probability of getting exactly 63 heads?" We're asking "what's the prob…
"As n increases"
— with small samples (n=2, n=5), the bell shape is approximate. By n=30, it's usually quite good. This…
"assuming the null hypothesis is true"
— This is the crucial caveat. The p-value is computed in a hypothetical world where the null is true. …
"Astroball" by Ben Reiter
— Documents the Houston Astros' analytics-driven rebuild. Shows how analytics departments function wit…
"Automatic Player Detection and Tracking"
— Lu, W.L. et al. (2013) - Computer vision techniques for sports - Object detection and tracking metho…
"Bad Data Handbook" edited by Q. Ethan McCallum
— Essays on handling problematic data - Industry practitioners' perspectives - Covers many edge cases …
"Basketball on Paper"
— Dean Oliver - Sports analytics methodology - Transferable concepts - Data-driven decisions
"Batch Job Restart/Recovery Patterns"
— IBM Redbook chapter on checkpoint/restart techniques for long-running batch COBOL programs.
"Batch Processing Best Practices on z/OS"
— IBM Redbooks. Comprehensive coverage of batch architecture, performance tuning, and operational cons…
"Bayesian Data Analysis"
— Gelman et al. - Hierarchical modeling - Prior selection - Uncertainty quantification
"Bayesian Methods for Sports Analytics"
— Focus: Prior-informed estimation - Key Contribution: Practical Bayesian implementations
"Become a data scientist in 30 days!"
— Real data science competence takes months to years. Anyone promising mastery in 30 days is selling d…
"Best Practices for COBOL Error Handling"
— IBM Systems Magazine article on production error handling patterns used by major financial instituti…
"Bet The Process"
— Sports betting analytics 2. **"PFF NFL Podcast"** - Advanced statistics 3. **"The Analytics Edge"** …
"Beyond Expected Goals"
— William Spearman (2018) - MIT Sloan Sports Analytics Conference - Introduces Expected Possession Val…
"Big Data Baseball"
— Travis Sawchik - Analytics implementation - Projection in decision-making - Organizational adoption
"big data"
— datasets with millions or billions of observations — carries an almost magical aura. More data sound…
"Blue in Green"
— A 10-bar form (not the standard 12 or 32) with a fluid, ambiguous harmonic language that floats betw…
"brain drain"
— has been one of the most consequential demographic forces in the region's modern history. When the y…
"briar"
— a slur directed at Appalachian migrants — was common in Cincinnati schools and workplaces. Appalachi…
"Building an Expected Rushing Model"
— Kaggle Notebook - Full ML pipeline - Feature importance analysis - Model comparison
"Building Custom GPTs: A Practical Guide"
— OpenAI Community Forum https://community.openai.com
"Building Microservices" by Sam Newman
— Comprehensive guide to microservices architecture. Useful when scaling beyond monolithic designs.
"Building the Expected Points Model"
— nflfastR Documentation - Technical implementation details - Model calibration and validation - `http…
"Building with Claude Projects"
— Anthropic Help Center https://support.anthropic.com
"Calculating Rush Yards Over Expected"
— Open Source Football - Step-by-step RYOE implementation - Feature engineering examples - Model evalu…
"Calibration of Probabilistic Predictions"
— Gneiting & Raftery - Calibration theory - Proper scoring rules - Evaluation metrics
"Calibration of Probabilities"
— Niculescu-Mizil & Caruana (2005) - ICML Conference Paper - Definitive guide to Platt scaling and iso…
"Can AI-generated text be reliably detected?"
— various papers, 2023-2025
"Can Forecasters Forecast?" by Tetlock
— Limits of prediction 2. **"Market Efficiency in Gambling Markets"** - Sportsbook mechanics 3. **"The…
"Can I make this funnier than most people will?"
— Tests whether she has a competitive advantage with this specific trend 2. **"Does this connect to so…
"Carried by those who've learned."
— Frames the audience as experienced people whose choices are the product of accumulated learning, not…
"Causal Inference in Sports"
— Attribution challenges - Separating skill from luck - Methodology for player evaluation
"Changes to be committed: modified: storage.py"
— `storage.py` has been modified and staged with `git add`. It will be included in the next commit. - …
"ChatGPT Enterprise Privacy FAQ"
— OpenAI https://openai.com/enterprise-privacy
"check-off"
— that was deducted from every miner's paycheck whether the miner wanted the service or not. The check…
"Checkpoint/Restart in Enterprise COBOL"
— Search IBM Developer for articles on implementing checkpoint/restart with both VSAM and DB2.
"Chemistry in Football"
— Various research - Passer-shooter combinations - Network analysis applications - Team cohesion metri…
"chiefing"
— earning tips by performing an identity that was not authentically Cherokee but that matched the tour…
"Choking Under Pressure"
— Focus: Psychological factors in high-stakes moments - Relevance: Penalty psychology
"CICS Dispatcher: Under the Hood"
— IBM Developer article explaining the QR TCB, open TCB model, and task dispatching in detail. Include…
"CICS Performance Analysis Using SMF 110 Records"
— SHARE conference presentation covering SMF 110 record extraction, field interpretation, and common p…
"CICS Recovery: Myths and Reality"
— SHARE Conference presentation. Addresses common misconceptions about CICS recovery, including the my…
"CICS Region Design Patterns"
— IBM Systems Magazine archives. A series of articles by CICS architects covering common topology patt…
"Clean Architecture" by Robert C. Martin
— Principles for structuring code that remains maintainable as systems grow. Particularly relevant for…
"CNN effect"
— the idea that real-time television images could drive foreign policy decisions — became a subject of…
"COBOL and DB2: Developing Applications on z/OS"
— Step-by-step guide for COBOL-DB2 development including JCL setup, precompilation, and binding. - **"…
"COBOL Copybook Parsing for Data Integration"
— Technical article on building parsers that read COBOL copybook definitions and generate equivalent s…
"COBOL Sequential File Processing Patterns"
— Survey of common patterns including copy, filter, split, merge, match-update, and control break.
"Coded Bias"
— Documentary directed by Shalini Kantayya (2020) A feature-length documentary following Joy Buolamwin…
"Comparing Human and AI Writing Evaluations"
— several studies available via academic search
"Comparing Multiple Groups: ANOVA."
— ## 20.17 Chapter Summary
"competitive authoritarianism"
— a hybrid regime that maintains the form of democracy while hollowing out its substance. Elections co…
"Consistency and the NFL" by Chase Stuart
— Analysis of game-to-game variation - Football Perspective archives
"Copying Is Not Theft" principle
— In music and art education, students are routinely assigned to copy or imitate the work of masters a…
"Corner Kick Analysis in Elite Football"
— Focus: Delivery patterns and outcome modeling - Key Contribution: Framework for corner classificatio…
"Could I do this if the problem looked different?"
— This tests for flexible, transferable knowledge versus rigid procedural memory. 3. **"If this were o…
"Coverage Metrics and Predictive Value"
— Compares stability of coverage metrics - Analyzes what predicts future performance - Recommends targ…
"CREATE FUNCTION (external table)"
— Covers the complete syntax for scalar and table UDFs, including SCRATCHPAD, FINAL CALL, and DISALLOW…
"CREATE PROCEDURE (external)"
— The definitive reference for all CREATE PROCEDURE options. Pay particular attention to the interacti…
"Cross Claiming and Aerial Dominance Models"
— Focus: Claiming probability models - Key Contribution: Expected claim success framework
"Cruyff's Football Total Football"
— Focus: Foundational pressing concepts - Relevance: Theoretical basis for modern pressing
"culture of poverty" framing
— the assumption that Appalachian poverty was at least partly a cultural problem requiring cultural so…
"culture of poverty" thesis
— the idea that poverty is caused by the cultural characteristics of the poor rather than by structura…
"culture wars"
— the framing of American politics as a conflict between traditional values and secular liberalism — c…
"Data Analysis with ChatGPT Code Interpreter"
— various tutorials on Towards Data Science https://towardsdatascience.com
"Data Cleaning 101"
— Various tutorials *Foundational tutorials on handling missing data, outliers, and errors.*
"Data Matching" by Peter Christen
— Practical entity resolution techniques - Quality measures and evaluation - ISBN: 978-3642311635
"Data Visualization with Python" - Coursera
— IBM certification course - Matplotlib, seaborn, folium basics - Includes spatial visualization modul…
"DB2 for z/OS RUNSTATS: Best Practices"
— IBM Support technical note. Covers statistics profile design, frequency statistics selection criteri…
"DB2 for z/OS: Diagnosis Guide and Reference"
— Includes detailed information on catalog and directory structures as they relate to problem diagnosi…
"db2pd — A Practical Guide"
— IBM Developer. Comprehensive walkthrough of db2pd options with real-world examples and output interp…
"deaths of despair"
— deaths driven not by a specific pathogen or toxin but by the cumulative destruction of the economic …
"Decomposing the Immeasurable Sport"
— Fernández & Bornn (2018) - Expected Possession Value framework - Advanced tracking data methodology
"Deep Learning for Natural Language Processing"
— Goldberg - Neural network approaches - Word embeddings - Modern architectures
"Deep Learning for Sports Analytics"
— MIT Sloan Conference - Neural network applications - Tracking data integration - State-of-the-art me…
"Deep Learning for Sports Prediction"
— Recent arXiv preprints - Neural network architectures - Sequence modeling for sports - State-of-the-…
"Deep Reinforcement Learning in Sports"
— Silver et al. - Neural network approaches to decision making - Sequential decision problems in sport…
"Deep Soccer Analytics"
— Decroos & Davis (2020) - Neural network approaches to action valuation - Comparison with tree-based …
"deepfake"
— a portmanteau of "deep learning" and "fake" — originally referred specifically to AI-generated face-…
"Defensive EPA: Methodology and Application"
— Adapts EPA framework for defense - Discusses play-type splits - Compares to traditional metrics
"Defensive Set Piece Organization"
— Focus: Zonal vs. man-marking effectiveness - Key Contribution: Comparative analysis of defensive sys…
"DFSORT Performance Tips"
— IBM Support article with specific recommendations for SORTWK placement, MAINSIZE/HIPRMAX settings, a…
"disappearance of disappearance"
— the progressive elimination of spaces and activities that are not subject to any form of monitoring.…
"Disrupt the incumbents"
— The survivors disrupted. Many failures also tried to disrupt and were destroyed. Disruption is a str…
"Distribution Networks: Goalkeepers as Playmakers"
— Focus: Passing network analysis including goalkeepers - Key Contribution: Quantifying goalkeeper dis…
"Docker and Kubernetes: The Complete Guide"
— Container deployment.
"Docker Deep Dive" by Nigel Poulton
— Accessible Docker introduction.
"drive-by research"
— mirrors the broader extraction pattern that has defined the region's history (see the recurring them…
"DVC (Data Version Control)" Documentation
— Git for data and ML projects - Track data changes - https://dvc.org/ - Essential for reproducibility
"Elo Ratings: A System's Perspective"
— Arpad Elo (1978) - Original Elo rating system paper - Mathematical foundations - Chess rating implem…
"enchanted world"
— a world in which the boundary between the natural and the supernatural was porous, in which signs, o…
"energy"
— a perceptual measure that reflects the intensity and activity of a track, correlated with loudness, …
"Ensemble Methods for Sports Forecasting"
— Combining multiple models - Weight optimization - Stacking approaches
"Estimating the Effect of Fourth Down Decisions"
— Various authors *Example of academic research using play-by-play data.*
"exactly!" response
— the moment when the viewer thinks "that's EXACTLY what it's like" or "finally someone said it." This…
"Excel Never Dies"
— Various essays A genre of writing arguing that Excel's dominance is not a failure of the status quo …
"Expected Goals and Support Vector Machines"
— Mark Eastwood (2014) - Explores machine learning approaches to xG - Early application of SVM to shot…
"Expected Goals"
— Tippett, J. (2023) - Bloomsbury Sport - The first book-length treatment dedicated to xG - Covers his…
"Expected Points and Expected Points Added"
— Brian Burke - Original framework development - Foundational concepts for modern EPA - `https://www.a…
"Expected Possession Value in Basketball"
— Cervone et al. (2014) - Spatial models for play value - Real-time prediction systems - MIT Sloan Spo…
"Expected Rushing Yards: A New Framework"
— Sports Analytics Conference - Details methodology for expected rushing models - Feature selection fo…
"Expected Threat in Soccer"
— Karun Singh (2019) - Introduces spatial value models applicable to football - Methodology for positi…
"Expected Threat"
— Karun Singh (2018) - Spatial value model for soccer positions - Conceptual framework applicable to f…
"Exposing COBOL as REST APIs with z/OS Connect"
— IBM Developer tutorials with step-by-step instructions.
"Facebook's Emotions Research"
— deeper reporting on the emotional contagion findings and the broader context of Facebook's internal …
"Fairness in Machine Learning" interactive course
— Google's Machine Learning Crash Course A free, interactive module on fairness in ML, including hands…
"Famous Set Piece Goals in History"
— Focus: Historical analysis of memorable set pieces - Relevance: Understanding tactical evolution
"Fast.ai Practical Deep Learning"
— Jeremy Howard - Modern deep learning practices - Top-down learning approach - Free at: fast.ai
"fat-tailed"
— distributions where catastrophic outcomes are more likely than your model suggests because the model…
"Feature Engineering and Selection"
— Max Kuhn & Kjell Johnson - Comprehensive feature engineering - Selection methods - Sports analytics …
"Flamenco Sketches"
— The most completely modal track, consisting of five scales that each soloist moves through at their …
"Flask Web Development" by Miguel Grinberg
— Comprehensive Flask guide if choosing that framework.
"Follow your passion"
— The survivors followed their passion. So did the failures. Passion is not a differentiating factor; …
"food desert"
— a place where access to affordable, nutritious food requires a car and a long drive, which not every…
"Fooled by Randomness" by Nassim Nicholas Taleb
— Essential reading on the human tendency to mistake noise for signal. Critical for maintaining discip…
"Football Analytics with Python & R" by Eric Eager
— Direct application to football - NFL data sources and cleaning - Modern analytical techniques - ISBN…
"Football Analytics with Python and R"
— Eric Eager & George Chahrouri - Modern computational approaches - Code examples for special teams me…
"Football Analytics with Python"
— (Hypothetical title) - Applied network methods - Code examples - Case studies
"Football Analytics: Unlocking Performance"
— Chapter on running game analysis - Blocking metrics and attribution - Team-level rushing evaluation
"Football Hackers"
— Christoph Biermann (2019) - History of analytics adoption in soccer - Profiles of analysts and their…
"Forecasting Individual Player Performance"
— MIT Sloan - Machine learning approaches - Feature engineering - Evaluation methods
"forty acres and a mule"
— is one of the most consequential policy decisions in American history. The promise originated in Spe…
"Fourth Down Decisions: Is the Math Wrong?"
— Carter & Machol (1978) - Early quantitative fourth-down analysis - Expected value calculations - His…
"Freddie Freeloader"
— The most harmonically conventional track, using a standard twelve-bar blues form with fairly simple …
"Free Kick Trajectory Modeling"
— Focus: Physics of free kick ball flight - Key Contribution: Technical analysis of shooting technique
"Friends of Tracking" YouTube Channel
— Free lectures by academics and practitioners - Covers xG, tracking data, and advanced metrics - http…
"From Key Passes to xA"
— Industry evolution - Metric development timeline - Provider adoption - Current standards
"Fundamentals of Data Visualization"
— Claus O. Wilke - Essential principles for effective data visualization - Color theory, annotation, c…
"Game Theory and Penalty Kicks"
— Authors: Various economics researchers - Focus: Mixed strategy equilibrium in penalty situations - K…
"Game Theory and Strategic Behavior"
— Relevance: Understanding mixed strategies in penalties
"Garbage in, garbage out"
— No analysis can overcome fundamentally flawed data.
"Generation Data Groups (GDG) Best Practices"
— IBM Redbook chapter on managing sequential file generations for archival and audit purposes.
"Generative AI at Work"
— Brynjolfsson, Li, and Raymond (2023) https://www.nber.org/papers/w31161
"ghost work"
— the hidden human labor that makes AI systems function — is particularly relevant here. The marketing…
"Git for Data Science" (Various Resources)
— Using git with data projects - .gitignore for data files - Large file handling with Git LFS
"given that..."
— $P(\text{illness} \mid \text{smoker})$ = "Among smokers, what's the probability of illness?" - $P(\t…
"Goalkeeper Training: Modern Methods"
— Focus: Training approaches with data integration - Relevance: Connecting analysis to development
"Gradient Boosting for Win Probability"
— MIT Sloan - Advanced model architectures - Feature engineering - Comparison to baselines
"Great Expectations" Documentation
— Python library for data validation - Declarative data quality rules - https://greatexpectations.io/ …
"handle"
— Most vague; could mean catch, log, retry, suppress, re-raise, etc. 2. **"improve"** — Vague; improve…
"Hands-On Machine Learning with Scikit-Learn"
— Aurélien Géron - Python-focused practical guide - Industry-standard practices - O'Reilly publication
"Hands-On Machine Learning"
— Aurélien Géron (2022, 3rd Ed.) - Scikit-learn and TensorFlow applications - Model building and evalu…
"happy path" code
— code that works correctly when all inputs are valid and nothing goes wrong. They generally do not ad…
"Heat Pump Thermostat Wiring Explained"
— hvac-for-beginners.com A homeowner-oriented walkthrough of heat pump thermostat wiring, including O …
"hillbilly" stereotype
— the image of Appalachians as ignorant, dirty, lazy, violent, and culturally backward. This stereotyp…
"Holding other variables constant"
— the conceptual leap of controlling for confounders statistically. This connects to the entire course…
"How can I help?"
— Also rarely asked in conflict. Most conflict conversations involve two people trying to get the othe…
"How the DB2 Optimizer Estimates Filter Factors"
— IBM developerWorks technical article by Terry Purcell. Provides the exact formulas DB2 uses for filt…
"How to Detect Outliers in Machine Learning"
— Jason Brownlee, Machine Learning Mastery A clear, practical walkthrough of IQR and z-score outlier d…
"How to Lie with Statistics"
— Darrell Huff (W. W. Norton, 1954, reprint)
"How to Write a Great README" by Danny Guo
— A widely referenced post at dguo.github.io/blog/how-to-make-a-readme that covers the elements of an …
"httpx" library documentation
— [www.python-httpx.org](https://www.python-httpx.org/). Documentation for `httpx`, the async-capable …
"I feel [emotion word]"
— not "I feel like," not "I feel that" — an actual emotion: hurt, frustrated, anxious, disappointed, c…
"I looked this up" transparency
— Citing sources and mentioning research signals "this person does research" and is honest about where…
"I'm just being direct"
— Competing people often don't experience themselves as running over others. If people consistently de…
"I've Fixed My Dad's Printer 47 Times."
— Specific number (47) creates credibility and feels personally lived-in - "My Dad" creates immediate …
"if you know, you know" moments
— comedy that was funniest if you were part of a specific group. A video about the specific frustratio…
"Improving Simple Models with Confidence Profiles"
— Baseball Research Journal - Confidence interval construction - Sample size adjustments - Applicable …
"In Machines We Trust"
— MIT Technology Review podcast series Multiple episodes exploring AI bias, fairness, and accountabili…
"Interactive Data Visualization for the Web"
— Scott Murray - D3.js fundamentals (concepts apply to any interactive viz) - Web-based visualization …
"Introducing Expected Threat (xT)"
— Karun Singh (2019) - Original blog post introducing the xT concept - Clear explanation with visualiz…
"Inverting the Pyramid"
— Author: Jonathan Wilson - Relevance: Historical context for goalkeeper positioning
"IPIC vs. SNA: Choosing the Right ISC Protocol"
— IBM CICS Blog. Comparison of IPIC and SNA/APPC for inter-system communication, including performance…
"ISO 20022 Implementation on CICS"
— IBM Systems Magazine archives. Case study of a European bank implementing ISO 20022 payment messagin…
"It made the cut."
— Simple, direct, uses hiking/outdoor language. The product is not recommended; it was evaluated and e…
"It's Not the Printer."
— Creates a curiosity gap — if not the printer, then what? - Implies a punchline or reveal - The perio…
"JSON Processing in Enterprise COBOL"
— IBM presentations from SHARE conferences demonstrating JSON GENERATE and PARSE with real-world examp…
"JSON Transformation Performance in CICS TS 5.6"
— IBM Developer. Benchmark data for DFHJSON transformation at various payload sizes. Includes tuning r…
"junk DNA"
— sequences that appeared to serve no function. The human genome is roughly 98 percent non-coding. If …
"just before mainstream"
— when: - The enabling infrastructure is in place - Early adopters have validated the demand - Positio…
"just transition"
— originally developed in the context of environmental policy to describe how workers in fossil fuel i…
"Kicker Evaluation Using Expected Points"
— Burke (2013) - Expected points framework for kicker assessment - Field goals over expected methodolo…
"Kubernetes Up & Running" by Kelsey Hightower
— Standard Kubernetes reference.
"La Roja: How Soccer Conquered Spain"
— Author: Jimmy Burns - Focus: Spanish passing-based defensive approach
"Latent Dirichlet Allocation"
— Blei, Ng, & Jordan (2003) - Foundational paper on topic modeling - Mathematical framework
"leaderless coordination" problem
— how does a community coordinate action without acknowledged leaders? — is partially solved in ARMY t…
"Learning Bayesian Statistics"
— General Bayesian methods - Occasional sports applications - Good for advanced learners
"Lex Fridman Podcast"
— Extended conversations with AI researchers and creators. The episodes with artists working with AI t…
"liar's dividend"
— the ability of bad actors to dismiss authentic evidence as fabricated. A politician caught on video …
"locks in" the tonic
— it converts the tentative tonal center into a fully committed, massive (stable, harmonically weighty…
"Long Context: the Next Challenge for AI Systems"
— Google Research Blog https://research.google/blog/
"Machine Learning A-Z" - Udemy
— Comprehensive ML - Sports examples - Practical focus
"Machine Learning for Defensive Player Evaluation"
— Focus: ML approaches to defender assessment - Key Contribution: Feature engineering for defensive me…
"Machine Learning"
— Andrew Ng (Coursera/Stanford) - Industry-standard introduction - Theory and implementation - Free to…
"Managing COBOL Copybooks at Scale"
— IBM Systems Magazine article on copybook governance in large enterprises. Discusses naming conventio…
"Managing WLM application environments"
— The z/OS WLM documentation covering VARY WLM commands, application environment lifecycle, and monito…
"Margin of Victory and NFL Game Predictions"
— Journal of Quantitative Analysis in Sports - Incorporating margin into ratings - Optimal K-factor se…
"Mathletics"
— Wayne Winston - Football chapters on EP/EPA - Mathematical foundations - Practical examples
"Mathletics" by Wayne Winston
— Comprehensive sports analytics textbook - Covers multiple sports including football - Strong quantit…
"Matplotlib documentation"
— [matplotlib.org/stable](https://matplotlib.org/stable/). The official documentation includes tutoria…
"Matter Standard for Smart Home Devices"
— The CSA (Connectivity Standards Alliance) Matter is the emerging unified smart home standard that re…
"Measuring Ball Progression in Football"
— Various analysts - Multiple blog posts on progression metrics - Different definitions and implementa…
"Measuring Progress in Reducing AI Sycophancy"
— various academic papers available via Google Scholar
"Migrating from SOAP to REST in CICS"
— IBM CICS Blog. Practical guide to running SOAP and REST services side-by-side during migration. Cove…
"miners' phthisis"
— a progressive lung condition found exclusively in men who worked underground in coal mines. By the e…
"Mining Opinions from the Web"
— Liu (2012) - Opinion extraction techniques - Entity-level sentiment
"Moneyball"
— Michael Lewis - Market inefficiency exploitation - Data-driven decision making - Applicable concepts
"Moneyball" by Michael Lewis
— The classic that introduced sports analytics to mainstream audiences. Essential background for under…
"Moneyball: The Art of Winning an Unfair Game"
— Various platforms - Business of analytics - Historical perspective - Case study format
"Monitoring stored procedures"
— Covers IFCID 0170 (stored procedure detail), SMF 101 subtype 3 (stored procedure statistics), and DS…
"Move fast and break things"
— The survivors moved fast. So did Theranos, WeWork, FTX, and thousands of other companies that moved …
"MQ Programming in COBOL"
— IBM MQ Knowledge Center includes COBOL-specific examples for all MQ API calls.
"Multi-Row FETCH and INSERT in DB2 for z/OS"
— IBM developerWorks (archived). This technical article walks through the complete conversion process …
"Naked Statistics" by Charles Wheelan
— Accessible, entertaining introduction to statistics - Real-world examples throughout - Great for und…
"Natural Language Processing with Python"
— Bird, Klein & Loper - Practical NLTK guide - Hands-on exercises - Good for beginners
"Navigating AI Privacy in the Workplace"
— International Association of Privacy Professionals (IAPP) https://iapp.org
"Net Gains"
— Ryan O'Hanlon (2022) - Modern soccer analytics landscape - Player evaluation methods - Industry appl…
"Network Analysis of Basketball"
— Clemente et al. - Multi-sport methodology - Temporal network analysis - Performance correlation
"Network Science"
— Albert-László Barabási - Comprehensive introduction - Free online: http://networksciencebook.com/ - …
"Networks: An Introduction"
— Mark Newman - Mathematical foundations - Algorithm details - Real-world examples
"Never Eat Alone" by Keith Ferrazzi
— Networking strategies that work in any industry, including sports.
"NFL Coaching Trees and Success"
— MIT Sloan - Coaching network analysis - Success propagation - Hiring pattern prediction
"NOEMPTY. Always."
— One wrong parameter can delete 30 days of data. 3. **"The right block size is free performance."** —…
"Not everything gets a second trip."
— Evokes the experience of trying gear and leaving it behind. This product comes back on every trip. S…
"Not Just Analytics"
— Soccer analytics discussions - Statistical methodology episodes - Industry perspectives
"NumPy documentation"
— [numpy.org/doc](https://numpy.org/doc/stable/). The official NumPy documentation, including the user…
"Object-Oriented COBOL: A Practical Approach"
— Various Micro Focus white papers on adopting OO COBOL in enterprise environments. - **"Modernizing C…
"obstetric deserts"
— geographic areas where there are no hospital-based obstetric services within a reasonable travel dis…
"On Writing Well" by William Zinsser
— The classic guide to clear, concise nonfiction writing. Applicable to blog posts, technical articles…
"Optimal Defensive Positioning in Football"
— Fernandez & Bornn (2018) - Introduces spatial control models for football - Foundational work on pit…
"Optimizing DB2 Queries with IBM Data Studio"
— Relevant for post-migration query performance validation and optimization hint management.
"Oracle to DB2 Conversion Guide"
— IBM has published multiple Redbooks on Oracle-to-DB2 migration. Search for the most current edition.…
"owed my soul to the company store"
— immortalized in Merle Travis's 1946 song "Sixteen Tons" and later made famous by Tennessee Ernie For…
"P-value explained properly"
— fully delivered in Sections 13.5-13.6 - ✅ **"What 'statistically significant' means"** — fully deliv…
"Pandas documentation"
— [pandas.pydata.org/docs](https://pandas.pydata.org/docs/). Comprehensive documentation including the…
"Pandera" Documentation
— DataFrame validation for pandas - Schema-based data validation - https://pandera.readthedocs.io/ - I…
"Parallel Sysplex Batch Processing Patterns"
— IBM Systems Magazine article series covering real-world parallel batch implementations at banking, i…
"Passing Networks in Soccer"
— Pena & Touchette - Foundation of sports network analysis - Centrality metrics interpretation - Team …
"Pattern Recognition and Machine Learning"
— Christopher Bishop - Deeper theoretical treatment - Mathematical foundations - Springer publication
"Peak Performance in High-Pressure Situations"
— Focus: Mental preparation for set pieces - Relevance: Player preparation
"People who X are more likely to Y"
— This is almost always a correlational claim presented without the confounders, effect sizes, or samp…
"Pep Confidential"
— Author: Marti Perarnau - Focus: Guardiola's defensive pressing philosophy
"perceptual readiness"
— the degree to which a concept or category is primed for use in perception. Frequently activated cate…
"Persistence is the key to success"
— The survivors persisted and eventually succeeded. But so did the failures — they persisted and event…
"Physics-Based Modeling of Pass Probabilities"
— Spearman et al. (2017) - Introduces pitch control concepts - Foundation for position-based xG
"Player Valuation in Professional Sports"
— Contract evaluation - Projection accuracy importance - Economic implications
"PostgreSQL: Up and Running" by Regina Obe
— Practical PostgreSQL administration and development.
"Practical Monitoring" by Mike Julian
— Actionable monitoring guidance.
"Predicting the Winner of NFL Football Games"
— Warner (2010) - Logistic regression for game outcomes - Point spread prediction - Journal of Quantit…
"Presenting to Win" by Jerry Weissman
— Techniques for presenting technical information to non-technical audiences. Directly applicable to t…
"Pressure and Performance in Penalty Shootouts"
— Focus: Psychological factors affecting conversion - Key Contribution: Quantification of pressure eff…
"primarily mid-market accounts"
— No breakdown of customer additions by segment in the source data. 4. **"a 12% increase from the prio…
"Probabilistic Machine Learning"
— Kevin Murphy - Probabilistic prediction - Bayesian approaches - Uncertainty quantification
"Python for Data Analysis"
— Wes McKinney - pandas creator's guide to data manipulation - Essential for data preparation before v…
"Python Machine Learning"
— Sebastian Raschka - scikit-learn deep dive - Model evaluation - Feature engineering
"Python Packaging User Guide"
— [packaging.python.org](https://packaging.python.org/). The official guide to packaging Python projec…
"Python Testing with pytest" by Brian Okken
— Essential for Python testing.
"Python Virtual Environments: A Primer"
— Real Python realpython.com/python-virtual-environments-a-primer/ The most comprehensive beginner-fri…
"python-dotenv documentation"
— [pypi.org/project/python-dotenv](https://pypi.org/project/python-dotenv/). Documentation for the `py…
"Quantifying Route Quality"
— Deshpande, S. & Evans, K. (2020) - NFL Big Data Bowl winning approach - Route running evaluation fra…
"Quantifying Route Running in the NFL"
— NFL Big Data Bowl Submissions - Various approaches to measuring route quality - Separation metrics a…
"Random Forests"
— Breiman (2001) - Foundation of ensemble learning - Feature importance - Out-of-bag estimation
"Range" by David Epstein
— Makes the case for diverse skill sets over early specialization. Relevant for career changers.
"Real-Time Analytics with Apache Spark Streaming"
— UC San Diego course on stream processing. - **"Cloud Computing Concepts"** - University of Illinois …
"Real-Time Systems" by Jane W.S. Liu
— Academic treatment of real-time computing fundamentals, scheduling algorithms, and latency guarantee…
"Recruiting Networks in College Football"
— Journal of Sports Economics - Geographic patterns - Pipeline identification - Competitive analysis
"Redesign Your Learning System"
— 4 phases across 28 chapters - Phase 1 (Ch 1–7): Self-assessment — inventory current habits, take MAI…
"redneck"
— which in modern usage has been appropriated as a class-based slur or a self-deprecating badge of ide…
"Regression to the Mean in Sports Analytics"
— Sample size considerations - When metrics stabilize - Proper inference techniques
"Reinforcement Learning: An Introduction"
— Sutton & Barto - Value iteration theory - Markov Decision Processes - Foundation for xT mathematics
"requests" library documentation
— [docs.python-requests.org](https://docs.python-requests.org/). The official documentation for the `r…
"Resource Limit Facility (RLF)"
— Setting CPU time limits for dynamic SQL, including special considerations for queries that invoke UD…
"RESTful API Design" by various authors
— Understanding REST API conventions helps you integrate with prediction market platforms more effecti…
"RESTful Web APIs" by Leonard Richardson
— Comprehensive REST API design guide.
"ruin porn"
— the practice of photographing and sharing images of abandoned, decaying, or visually dramatic spaces…
"S0C7 Prevention Guide"
— Technical note on preventing data exception ABENDs through input validation and NUMERIC testing.
"sacrifice zone"
— a place whose people and environment are sacrificed for the benefit of others — was not invented for…
"Sang digging"
— the colloquial term, from the shortened pronunciation "sang" — was hard, skilled work. A digger need…
"Sargable Predicates and Index Design"
— IBM developerWorks (archived) Classic article explaining the relationship between predicate form and…
"scale-free networks"
— networks that look statistically similar regardless of scale. They arise naturally from a simple gro…
"Scientists have discovered..."
— Science discovers rarely. Science accumulates evidence, refines estimates, and occasionally overturn…
"Seaborn documentation"
— [seaborn.pydata.org](https://seaborn.pydata.org/). Documentation for seaborn, including its tutorial…
"Securing CICS Web Services with OAuth 2.0"
— IBM Developer. Integration pattern for OAuth2 token validation in CICS web service pipelines. Covers…
"Self-Tuning Memory Manager: Under the Hood"
— IBM Data Magazine An insider's view of how STMM makes redistribution decisions, including the benefi…
"Semi-automatic rifle restriction"
— same policy, different frames - **"Pro-life"** vs. **"Anti-abortion"** — describing the same movemen…
"Sentiment Analysis in Sports Social Media"
— Yu & Wang (2015) - Domain-specific sentiment challenges - Fan community analysis
"Separation Analysis in the NFL"
— MIT Sloan Sports Analytics Conference - Correlation between separation and completion - Value of rec…
"Set Piece xG: Building Specialized Models"
— Focus: Why separate xG models improve set piece evaluation - Key Contribution: Model comparison and …
"Shape Up" by Basecamp
— Alternative approach to software project management. Free at basecamp.com/shapeup.
"Ship and let ship" norms
— formal or informal prohibitions on attacking other ships and their communities — are among the most …
"Sigma / sqrt(n)"
— the standard deviation of sample means (called the **standard error**) gets smaller as n grows. Larg…
"Simpson's Paradox in Real Life"
— Eric Topol, Nature Medicine (and numerous blog adaptations) The Berkeley admissions case (the most f…
"Site Reliability Engineering" by Google
— Free online book covering operational excellence for production systems. Available at sre.google/boo…
"Slightly"
— conveys effect size, preventing misinterpretation of small effects as large. 3. **"Heavy smokers"** …
"SMF Type 30: A Deep Dive"
— Search IBM Z Content Solutions for detailed technical articles on parsing and analyzing SMF type 30 …
"smoke test"
— does the thing turn on without catching fire?
"So Good They Can't Ignore You" by Cal Newport
— Argues for skill development over "following passion." Highly applicable to building sports analytic…
"So What"
— The album's most purely modal track. It consists of two modes: D Dorian (sixteen bars) and E♭ Dorian…
"Soccermatics"
— David Sumpter (2016) - Mathematical modeling in soccer - Passing patterns and network analysis - Aca…
"Soccermatics" Online Course
— David Sumpter - Uppsala University offering - Mathematical foundations with Python - Available on Yo…
"Social Network Analysis in Sports"
— Lusher et al. - Theoretical foundations - Team dynamics modeling - Communication networks
"Social Network Analysis"
— Wasserman & Faust - Classic reference - Method details - Statistical approaches
"sociolinguistic gratuity"
— the principle that linguists who study a community have an obligation to give something back. His ou…
"solastalgia"
— coined by the Australian philosopher Glenn Albrecht to describe the distress caused by environmental…
"Speech and Language Processing"
— Jurafsky & Martin - Comprehensive NLP textbook - Free online draft available - Chapters on text clas…
"Sports Analytics" - Coursera
— University of Michigan - Prediction fundamentals - Python implementation
"Sports Performance Analytics"
— University of Michigan (Coursera) - Motion analysis and prediction - Sports-specific applications - …
"SQL PL Best Practices for DB2"
— IBM developerWorks article covering coding standards, error handling patterns, and performance consi…
"SQLite documentation"
— [sqlite.org/docs.html](https://sqlite.org/docs.html). The official SQLite documentation. The "SQL As…
"Statistical Learning"
— Stanford Online - Companion to ISL textbook - Free video lectures - edX platform
"Statistical Rethinking"
— Author: Richard McElreath - Relevance: Practical Bayesian inference
"Statistical Sports Models in Excel"
— Andrew Mack - Practical spreadsheet implementations - Step-by-step tutorials - Football-specific exa…
"Success Rate vs. EPA"
— Ben Baldwin - Comparison of metrics - When to use each - Complementary analysis
"Superforecasting"
— Philip Tetlock - Probability calibration - Expert prediction improvement - Uncertainty quantificatio…
"surveillant assemblage"
— not a single watchtower but a network of interconnected systems that together produce a comprehensiv…
"Sweeper-Keeper: The Revolution"
— Focus: Neuer and the modern goalkeeper - Relevance: Understanding style evolution
"System Design Interview" by Alex Xu
— While interview-focused, provides excellent patterns for designing scalable systems like analytics p…
"System Prompt Design Patterns"
— Lilian Weng, OpenAI (various posts) https://lilianweng.github.io/lil-log/
"Take Your Eye Off the Ball 2.0"
— Pat Kirwan - Tactical context for analytics - Understanding what metrics measure - Complementary to …
"Take Your Eye Off the Ball"
— Pat Kirwan - Understanding football positions - Physical requirements by position - Evaluation funda…
"Taxes for Creatives" by various accountants
— Search for accountants who specialize in creative industry clients and publish educational content. …
"Technical Writing Fundamentals" from Google
— A free technical writing course available at `developers.google.com/tech-writing`. Covers clarity, p…
"Test-Driven Development" by Kent Beck
— Classic TDD methodology book.
"Text Analytics for Sports"
— Alamar (2013) - Sports analytics applications - Scouting report analysis concepts
"the anointing"
— a felt sense of God's presence and direction that tells the believer it is time to take up the serpe…
"The Anxious Planner"
— plans everything obsessively, panics when anything deviates from the plan. Based on himself. - Voice…
"The Art of Execution" by Lee Freeman-Shor
— Based on real portfolio manager data, this book examines how execution decisions (when to cut losses…
"The Art of Indexing" by Craig Mullins
— A series of articles on index design strategies for DB2, covering B-tree internals, clustering, part…
"The Art of JCL"
— Multiple community articles on mainframe forums covering advanced JCL techniques for batch job manag…
"The Art of MAXT Diagnosis"
— IBM Support technical document describing the common causes of MAXT conditions, the diagnostic metho…
"The Art of Monitoring" by James Turnbull
— Comprehensive monitoring systems design.
"The Art of Smart Football"
— Chris B. Brown - Strategic foundations - Scheme understanding - Context for efficiency analysis
"The Art of SQL Tuning in DB2 for z/OS"
— IDUG Technical Conference proceedings Annual conference presentations from IBM and customer DBAs sha…
"The Art of Statistics" by David Spiegelhalter
— Modern approach to statistical thinking - Focuses on interpretation and communication - Excellent da…
"The Art of Statistics: How to Learn from Data"
— David Spiegelhalter (Basic Books, 2019)
"The Art of the Cross"
— Various authors - Cross effectiveness studies - Type and location analysis - xA implications
"The Balanced Line Algorithm"
— Classic algorithm description for merging and match-updating sorted sequential files. Foundational f…
"The Ball-Playing Center-Back"
— Various analytics blogs - xT for defender evaluation - Progressive defender metrics - Scouting appli…
"The Book: Playing the Percentages in Baseball"
— Tango, Lichtman, Dolphin - Marcel projection system origin - Regression methodology - Transferable c…
"The Book: Playing the Percentages"
— Tango, Lichtman, Dolphin - Win probability in baseball - Transferable concepts - Decision analysis f…
"The Business of Being a Creator"
— no single definitive book on this exists yet, but the following titles together cover the territory:
"The Case Against Hiperpool on Modern z/OS"
— IBM Support Technical Exchange IBM's own analysis of why hiperpool should be disabled on modern z/OS…
"The Checklist Manifesto" by Atul Gawande
— While not about trading, this book makes a compelling case for using checklists in high-stakes opera…
"The Coded Gaze: Bias in Artificial Intelligence"
— Joy Buolamwini, TEDx talk (2016) A concise and compelling introduction to facial recognition bias, f…
"The Complete Goalkeeper"
— Focus: Technical and tactical development - Relevance: Framework for evaluation criteria
"The Complete Guide to Open Source" by GitHub
— A free guide available at `opensource.guide` covering how to contribute to open source, including ho…
"The Confident Wrong Guy"
— answers every question with absolute certainty, is always wrong. Based on a friend who once confiden…
"The Cool Older Sibling"
— pretends to be above everything but is secretly invested in everything. Based on his sister. - Voice…
"The Cost of a Stored Procedure Call"
— An IBM performance engineer's analysis of the CPU and elapsed time components of a stored procedure …
"The Daily Trading Coach" by Brett Steenbarger
— 101 practical lessons for building psychological resilience in trading. Useful for developing self-a…
"The Data Warehouse Toolkit" by Ralph Kimball
— Classic text on dimensional modeling, still relevant for analytics schema design.
"The Determinants of NFL Field Goal Success"
— Berry & Berry (2015) - Statistical analysis of FG make probability - Weather, distance, and situatio…
"The Double Pivot"
— Data-focused soccer analysis - xG discussions and debates
"The Elements of Statistical Learning"
— Hastie, Tibshirani, Friedman - Graduate-level treatment - Comprehensive coverage - Free online at: s…
"The Evolution of the NFL Passer Rating"
— Pro Football Reference *History of how the traditional passer rating was developed and its limitatio…
"The Expected Goals Philosophy"
— James Tippett (2019) - Accessible introduction to xG concepts - Includes xA discussion and applicati…
"The Expected Points and Win Probability of Punts"
— Yurko et al. (2019) - Comprehensive punt valuation - Net punting vs gross punting - Field position e…
"The Extra 2%"
— Jonah Keri - Building successful sports organizations - Analytics implementation - Talent evaluation
"The Football Fanalytics Podcast"
— Deep dives into analytical methods - Guest experts from clubs and media - Accessible explanations
"The founder's vision was key"
— Every founder has a vision. The difference between a "visionary founder" and a "delusional founder" …
"The Future of the DBA"
— Various articles and conference presentations on this topic are available through IDUG, IBM Develope…
"The Future of Work with Google Workspace"
— Google Workspace thought leadership blog https://workspace.google.com/blog/
"The Games That Changed the Game"
— Ron Jaworski - Football scheme evolution - Position value changes - Strategic context
"The Goalkeeper: A Biography"
— Focus: Historical evolution of the position - Relevance: Context for modern analysis
"The Gradient" podcast
— Interviews with AI researchers and practitioners, including episodes on AI art, creativity, and the …
"The Hidden Game of Football"
— Carroll, Palmer & Thorn - Pioneer work in football analytics - Expected points development - Special…
"The History of Assists in Soccer Statistics"
— From basic counts to expected metrics - Provider methodology evolution - Standardization challenges
"The Hype-Reality Gap"
— Distinguishing genuine AI capability from marketing hype 2. **"Human-in-the-Loop"** — The boundary b…
"The Impact of Generative AI on Knowledge Workers"
— McKinsey Global Institute, 2024 https://www.mckinsey.com/mgi
"The Inspection Paradox is Everywhere"
— Allen Downey, Probably Overthinking It blog A related statistical trap not covered in this chapter: …
"The Long Throw-In: A Statistical Examination"
— Focus: Quantifying long throw effectiveness - Key Contribution: Economic value of throw-in specialis…
"The Mixer: The Story of Premier League Tactics"
— Author: Michael Cox - Focus: Evolution of English defensive tactics
"The Numbers Game"
— Anderson & Sally (2013) - Statistical analysis of soccer - Foundation for advanced metrics - Accessi…
"The Overachiever"
— Does everything at 150%, organizes color-coded study schedules, has a 5-year plan at 16 2. **"The Un…
"The pack doesn't lie."
— The pack is the most honest expression of what a hiker trusts. What's in it has been tested, not jus…
"The Phoenix Project" by Gene Kim
— Novel format introduction to DevOps thinking.
"the probability of observing..."
— It's about the data, not about the hypothesis. The p-value is a property of the *data given the null…
"The probability of WHAT given WHAT?"
— Identify which direction the conditional goes. - [ ] **"What's the base rate?"** — How common is thi…
"The Problem with Expected Goals"
— Spearman (2017) - Critical analysis of xG limitations - Implications for xA interpretation - OptaPro…
"The Pyramid Principle" by Barbara Minto
— A framework for structuring business communication that starts with the conclusion and supports it w…
"the right to be let alone"
— a right rooted not in property but in personality, in what they called "inviolate personality."
"The right to remove any timber"
— the company could cut the family's trees to shore up mine tunnels. Timber that the family might have…
"The SaaS CTO Security Checklist"
— Aaron Bedra (updated annually, publicly available) While addressed to CTO practitioners, this checkl…
"The Science of Set Piece Goals"
— Focus: Quantifying set piece contribution to goal scoring - Key Contribution: Comprehensive breakdow…
"The Set Piece Revolution"
— Focus: How data changed set piece preparation - Relevance: Industry context
"The Signal and the Noise"
— Nate Silver - Chapter on sports prediction - Probability thinking frameworks - Model building best p…
"The Signal and the Noise" by Nate Silver
— While broader than sports, Silver's chapter on baseball forecasting provides valuable perspective on…
"The Two Cultures of Computing"
— Various Essays exploring the divide between statistical computing (R culture) and general programmin…
"The Value of an Elite Pass Rusher"
— MIT Sloan Sports Analytics - Quantifies impact of pressure on offensive efficiency - Develops framew…
"The Value of an Elite Running Back"
— Football Outsiders Research - Analyzes replacement-level theory applied to RBs - Quantifies marginal…
"The Value of College Football Recruiting"
— Journal of Sports Economics - Correlation between recruiting rankings and team success - Statistical…
"The Value of Progressive Passes"
— Ligue 1 analysis - Quantifying forward passes - Build-up contribution metrics - Link: Various analyt…
"The Visual Display of Quantitative Information"
— Edward Tufte - Classic text on information design - Principles of clarity and data-ink ratio - Highl…
"The xG Philosophy"
— StatsBomb (2019) - StatsBomb's explanation of their xG methodology - Details their feature engineeri…
"Thinking Basketball"
— Analytics discussion (basketball but transferable) 2. **"The Analytics Edge"** - Sports analytics po…
"Thinking in Bets" by Annie Duke
— A former professional poker player applies decision-making frameworks to situations of uncertainty. …
"Thinking, Fast and Slow"
— Daniel Kahneman - Cognitive biases in decision-making - Risk aversion and probability assessment - A…
"This treatment cured 90% of patients"
— but the 10% who died weren't tracked, or the patients who were too sick to participate were excluded…
"Three Sisters"
— maize, beans, and squash planted together in a symbiotic combination. The cornstalks provided poles …
"Tifo Football Podcast"
— Regular analytics segments - Accessible explanations of complex concepts
"Tracking Data Analysis in Football"
— Bornn, L., Cervone, D., & Fernandez, J. (2018) - Comprehensive overview of tracking data application…
"Trading in the Zone" by Mark Douglas
— The classic text on trading psychology. Covers the mental framework needed to execute a probabilisti…
"TRANCLASS Best Practices for Production CICS"
— IBM CICS blog post covering TRANCLASS design patterns for financial services environments. Includes …
"Transformers for Natural Language Processing"
— Rothman - BERT, GPT, and modern models - Practical implementations
"trusted traveler" program
— Global Entry, TSA PreCheck, NEXUS — which allows approved travelers to move through expedited proces…
"Types of [people] at [place/situation]"
— playing 3-4 characters in quick succession, each responding to the same scenario differently. The fo…
"Understanding CICS Storage Domains"
— IBM Systems Magazine article providing a visual guide to DSA, EDSA, and GCDSA sub-pools, with practi…
"Understanding CICS Two-Phase Commit"
— IBM CICS Blog. A practical walkthrough of the 2PC protocol in CICS with sequence diagrams and failur…
"Understanding DB2 Access Paths"
— IDUG (International DB2 Users Group) presentation series. IDUG's annual conferences include sessions…
"Understanding DB2 Memory Allocation on Linux"
— IBM developerWorks (archived) Detailed article on how DB2 LUW interacts with Linux memory management…
"Understanding DB2 Optimizer Behavior"
— IBM developerWorks article series covering filter factors, join methods, and access path selection w…
"Understanding DB2 Query Parallelism"
— IBM Developer article explaining the internals of I/O, CP, and Sysplex parallelism, including how DB…
"Understanding MSU and Software Pricing on IBM Z"
— IBM Z Content Solutions publishes periodic articles explaining MSU calculation, SCRT mechanics, and …
"Understanding Success Rate"
— Football Outsiders - Conceptual explanation - Historical development - Application examples
"unified development"
— the idea that a region's problems were interconnected and had to be solved together. You could not c…
"Unto These Hills"
— the outdoor drama that has been performed every summer since 1950 in a mountainside amphitheater in …
"User-Defined Functions: A Performance Guide"
— Analysis of UDF overhead, when to use DETERMINISTIC vs. NOT DETERMINISTIC, and the performance impac…
"Valuing Midfield Contributions with xT"
— Role-specific analysis - Build-up contribution measurement - Comparison frameworks
"Valuing On-the-Ball Actions in Soccer"
— Decroos et al. (2019) - Introduces VAEP framework for valuing all on-ball actions including passes -…
"voodoo death"
— documented across multiple cultures and reviewed by the physician Walter Cannon in a 1942 paper — de…
"VS Code for Python Beginners"
— YouTube / Microsoft Search "VS Code Python beginners Microsoft" — several official video tutorials f…
"Water weighs. Doubt doesn't."
— Plays on the functional language of serious hiking (ounce-counting, weight optimization) while using…
"Web Application Security" by Andrew Hoffman
— Modern web security practices.
"What do I actually need?"
— Instead of "Why won't they give me what I'm asking for?" — **"What might they actually need?"** - In…
"What do you want?"
— Startlingly simple; rarely asked. Most conflict conversations involve each person advocating for pos…
"What is Football Success Rate?"
— Football Outsiders - Original success rate definition - Application to team evaluation - Historical …
"What was most useful for you?"
— A closing question that helps the other person consolidate what mattered. In conflict contexts, it's…
"What would a non-ML solution achieve here?"
— If the gap between the simple solution and ML is small, the simple solution wins.
"What's on your mind?"
— The opening question that invites the other person to name what matters most to them. In conflict, t…
"What's the real challenge here for you?"
— This question explicitly moves toward depth. It signals that you've noticed the surface account and …
"Why Your pandas Code is Slow"
— Matt Harrison blog posts *Practical advice on common performance mistakes.*
"Wide Open Spaces"
— Fernandez, J. & Bornn, L. (2018) - Pitch control models - Space occupation metrics
"WLM Tuning for Stored Procedures: Beyond NUMTCB"
— Covers advanced WLM configuration including service class goals, importance levels, and the interact…
"Work Trend Index"
— Microsoft (also relevant) https://www.microsoft.com/en-us/worklab/work-trend-index
"Working with Large CSVs in Python"
— Various tutorials *Techniques for handling files that don't fit in memory.*
"Workload Management for CICS: A Practical Guide"
— IBM Developer Works. Covers the interaction between z/OS WLM service classes and CICSPlex SM routing…
"Would you keep watching?"
— Tests basic hook effectiveness (binary pass/fail) 2. **"What do you think this video is about?"** — …
"Writing external stored procedures"
— The programming guide section covering COBOL, PL/I, and C stored procedure implementation patterns, …
"Writing user-defined functions"
— Covers the PARAMETER STYLE SQL contract, scratchpad usage for table functions, and the OPEN/FETCH/CL…
"XGBoost: A Scalable Tree Boosting System"
— Chen & Guestrin (2016) - Gradient boosting advances - Regularization techniques - System optimizatio…
"YAC Analysis in Python"
— Sports Analytics Tutorial - Python implementation - Visualization techniques - Comparative analysis …
"Yellow Dog Democrat"
— meaning someone who would vote for a yellow dog before they would vote Republican — was coined in th…
"z/OS Sequential File Processing Performance"
— IBM technical note on optimizing blocking factors, buffer allocation, and I/O scheduling for sequent…
"z/OS VSAM Demystified"
— IBM Redbook (SG24-6105). Chapter on VSAM return codes and file status mapping. Essential for underst…
"Zonal Marking"
— Author: Michael Cox - Relevance: Tactical context for set piece strategies
$-mc^2\alpha^2/(2n^2) = -13.6\,\text{eV}/n^2$
— the familiar Bohr/Schrodinger energy levels from Chapter 5! This is the non-relativistic result, ind…
$1,000/year
— Heat pump (COP 3.0): 80,000,000 ÷ 3.0 = 26.7 million BTU electrical input; in kWh: 26,700,000 ÷ 3,41…
$1,454 expected loss
— Exchange: 200 x $0.82 = **$164 expected loss** - Decentralized: 200 x $6.24 = **$1,248 expected loss…
$109,250
— Position B (Data Scientist): $130,000 + (0.10 x $130,000) = $130,000 + $13,000 = **$143,000**
$120.00
— Maximum profit (DeSantis wins): 500 x ($1.00 - $0.24) = **$380.00** - Maximum loss (DeSantis loses):…
$13.5 million
— at the time, one of the largest disaster settlements in American history. Divided among the more tha…
$180,000 in ARR was lost last quarter to churn
— **The model identifies 82% of churning accounts in advance** (based on held-out validation) - **The …
$2,000/year
— **Heat pump water heaters:** 30% of installed cost, up to $2,000/year (combined with space heating) …
$240/month
— With insurance: Expected cost = **$380/month**
$240/year
— 20 SEER unit: 24,000,000 ÷ 20,000 = 1,200 kWh × $0.13 = **$156/year** - Annual savings from higher e…
$29,300
— **0.5:** (60 x $480) + (80 x -$20) + (40 x -$500) = $28,800 - $1,600 - $20,000 = **$7,200** - **0.7:…
$5,880
— the difference between the actual profit ($4,638) and the no-shopping loss (-$1,242). Put differentl…
$50,000.00
— the exact total of the subledger detail.
$6,774 in total tax savings
— Plus the investment grows tax-deferred until retirement
$950
— Payback: **0.9 years**
$960.00
— Guaranteed payout: 1,000 x $1.00 = **$1,000.00** (one outcome always wins) - Guaranteed profit: **$4…
$\mu_0$ is NOT in the 95% CI
— **Fail to reject $H_0: \mu = \mu_0$ at $\alpha = 0.05$** $\iff$ **$\mu_0$ IS in the 95% CI**
$mc^2$
— the rest energy. Subtract this to get the binding energy.
$R^2$ measures model fit
— the proportion of variability in $y$ explained by $x$. It's the regression analogue of $\eta^2$ from…
(+1)
— The next generation to be created. This reference creates a new generation dataset. Within a single …
(-1)
— One generation back from current. After (+1) is cataloged, (-1) refers to what was previously (0).
(0)
— The current (most recent) generation. Before any (+1) is cataloged in the current job, (0) refers to…
(1) Book Reviews
— **Standard schema:** Creator talks to camera, discusses plot summary, gives opinion, rating. - **Twi…
(2 points)
— 1960s player: z = (30 - 20) / 8 = 10/8 = 1.25 - Modern player: z = (28 - 15) / 6 = 13/6 = 2.17 - **T…
(2) Cooking Videos
— **Standard schema:** Ingredients → prep → cook → plate → taste → "mmm, so good." - **Twist:** Everyt…
(3) Study/Productivity Tips
— **Standard schema:** Creator explains tip → demonstrates → summary. Often listicle format ("5 tips f…
(32, 64)
— (n_out, n_in) - **a**^[l-1] has shape **(64, 16)** --- (n_in, batch_size) - **b**^[l] has shape **(3…
(a)
— Precision = TP / (TP + FP) = 180 / (180 + 1,000) = 180 / 1,180 = 15.3%.
(a) Daily work:
— A data analyst's typical day involves pulling data from databases using SQL, creating dashboards and…
(a) Data split:
— Seasons 1-3 (3,690 games): Walk-forward training and validation. - Season 4 (1,230 games): Model sel…
(a) Definitions
— Define the key terms that the schedule will use: Demographic Parity Ratio, Four-Fifths Violation, Pr…
(A) Distortions present:
— **Catastrophizing:** The chain runs from "say one word" to "drop out of school" — escalating through…
(a) Ethical issues:
— **Harm to users:** The algorithm may be promoting content that causes anxiety, outrage, political po…
(a) Means:
— Player A: $(20+22+19+21+20+23+18+21)/8 = 164/8 = 20.5$ - Player B: $(15+18+20+22+25+20+28+12)/8 = 16…
(a) Scope and Inventory
— What information should a firm capture about each algorithmic system in scope? List the minimum data…
(a) Sentiment Analysis:
— Text A: Compound approximately -0.5 (injury + uncertainty terms dominate) - Text B: Compound approxi…
(a) Transform
— build new functionality that replaces a specific piece of the old system. **(b) Coexist** -- run bot…
(a) True
— A stationary series has constant statistical properties (mean, variance, autocorrelation structure) …
(Applied)
— Misleading Axes: Recreating the Deception
(b)
— The model may simply be predicting the majority class for all instances, which would also achieve 96…
(b) Edge calculations:
— KC -3: Implied = 51.92% (from -108). Edge = 0.5405/0.5192 - 1 = **+4.10%** - Over 47.5: Implied = 52…
(b) False
— The MA component in ARIMA models the relationship between the current value and *past forecast error…
(B) Forward branch
— This is an early-exit pattern. It can be restructured with a PERFORM-through or by wrapping the rema…
(b) Injury Parsing:
— Text A: {player: "Jayson Tatum", injury: "right ankle soreness", status: "questionable", body_part: …
(b) Metrics and Thresholds
— For each of the three system types (KYC verification, credit decisioning, fraud monitoring), specify…
(b) Most relevant skills from this book:
— For data analyst: pandas data wrangling (Chapters 7-12), visualization (Chapters 14-18), descriptive…
(b) Reporting Obligations
— Specify VantageDecision's reporting obligations, including: frequency; the demographic attributes fo…
(b) Standard deviations:
— Player A: $s \approx 1.60$ - Player B: $s \approx 5.07$ - Player C: $s \approx 10.00$
(c)
— In medical screening for serious diseases, missing a true case (false negative) can be life-threaten…
(c) Alternative approaches:
— Optimize for "time well spent" rather than "time spent" — measure user satisfaction, not just engage…
(c) Event Detection:
— Text A: INJURY_UPDATE, significance 0.7, star player modifier 1.5x = expected line move ~3.0 pts - T…
(c) Governance and Escalation
— Design an escalation pathway for fairness findings. Who should receive findings at different severit…
(c) Model Integration:
— Starting pitcher: Feature = pitcher's season ERA, WHIP, expected win-share value. This is the highes…
(c) Quarter-Kelly stakes:
— KC -3: b = 0.926, f* = (0.5405*0.926 - 0.4595)/0.926 = 0.0443, quarter = 1.11%, stake = **$222** - O…
(c) Violation Thresholds and Notification
— Define what constitutes a reportable fairness event and what VantageDecision must do when one is ide…
(Coding)
— Creating Honest Visualizations
(d)
— The chapter discusses AUC, expected profit, interpretability, compute costs, and operations team tru…
(d) Remediation Process
— Specify the process that must follow a confirmed four-fifths violation, including: root cause analys…
(d) Vendor Engagement
— For each vendor-supplied system, what information should the firm request from the vendor as part of…
(e)
— P1: Some conspiracy theories turn out to be true. - P2: This claim is a conspiracy theory. - C: This…
(e) Documentation and Regulatory Reporting
— What records should the monitoring programme generate? Under what circumstances should findings be r…
(e) Meridian's Rights
— Specify Meridian's rights in the event of: (i) a four-fifths violation that persists for more than 1…
(f) Cooperation Obligations
— Specify each party's obligations to cooperate with: regulatory investigations; Meridian's own fairne…
(i) NLP Social Media Monitoring:
— **How it works:** NLP models continuously scan Twitter/X, Instagram, team accounts, and news feeds f…
(ii) Reinforcement Learning for Line Adjustment:
— **How it works:** An RL agent learns optimal pricing strategies through trial-and-error interaction …
(iii) Behavioral Segmentation:
— **How it works:** ML classification models analyze each bettor's activity in real time: bet types, t…
(iv) Computer Vision Pre-Game Analysis:
— **How it works:** Cameras in stadiums and training facilities capture player movements during warmup…
(Research)
— GDP and Human Wellbeing
+$5.43
— Game 2: Over 45.5 at -105. EV = 0.55 x 95.24 - 0.45 x 100 = 52.38 - 45.00 = **+$7.38** - Game 3: BUF…
+0.120
— QB B: 38 / 320 = **+0.119**
+0.13
— Turnover: 0.52 - 0.65 = **-0.13** - Made FT: 0.73 - 0.70 = **+0.03** - Missed shot: 0.48 - 0.55 = **…
+1 if we have possession
— **-1 if opponent has possession** - **0 if neutral (between plays)** - Captures ~1 point expected va…
+2.20%
— **Probability of profit**: 42% (if C, D, or F wins) - **Probability of loss**: 58% (if anyone else w…
+\$7.38
— This is a **positive EV bet**. Your model's 55% probability exceeds the implied probability of 51.22…
, or
— 10%** of the stake. This is a **negative EV** bet.
-1.38%
— EV: (0.51 x $90.91) - (0.49 x $100) = $46.36 - $49.00 = **-$2.64** - This bet *feels* like a winner …
-\$14.09
— This is a negative EV bet. Your model's 45% probability falls well below the implied probability thr…
.iloc[]
— Integer-location-based indexing. Selects rows and columns by their integer position, like Python lis…
.loc[]
— Label-based indexing. Selects rows and columns by their index label.
0 min
— **Job B:** Longest path through B is Path 4 (135 min). Slack = 160 - 135 = **25 min** - **Job C:** O…
0.04%
— not the 99.9999986% implied by the prosecution.
0.6875
— below 0.8 threshold. **Flagged.** - Hispanic applicants: 22.0 / 32.0 = **0.6875** — below 0.8 thresh…
0.875 (87.5%)
— **Sensitivity** = 35 / (35 + 10) = 35/45 = **0.778 (77.8%)** - **Specificity** = 140 / (140 + 15) = …
0.897 (about 90%)
— P(H2|meow) = 0.03 / 0.468 = **0.064 (about 6%)** - P(H3|meow) = 0.006 / 0.468 = **0.013 (about 1%)**
0.904
— Black African/Caribbean: 67.0% / 83.0% = **0.807** - Mixed/Other: 76.2% / 83.0% = **0.918**
01:55
— Rob restarts CNBGL300 with REGION=2000M. Abends S80A RC=04 at 01:58. - **02:05** — Rob escalates to …
03:47 AM
— Rob Calloway, batch operations lead, notices ACCTRCN7 has been running for 88 minutes. Normally it w…
03:52 AM
— Rob calls Lisa Tran, senior DBA. She's been at CNB for eleven years and has seen hundreds of inciden…
03:55 AM
— Lisa connects to LPAR DB2A (the production DB2 subsystem where ACCTRCN7 runs) from her home workstat…
04:22 AM
— Lisa restarts ACCTRCN7 from the beginning (it has built-in checkpoint/restart, so she can restart fr…
04:48 AM
— ACCTRCN7 completes. 26 minutes. Within SLA.
05:15 AM
— All downstream jobs complete. The batch window holds. Audit gets their reconciliation report on time…
08:00-09:30
— Normal processing. PNCLAJ25 handled approximately 40-60 concurrent tasks per AOR. Working storage co…
08:00-12:00 UTC
— The UK's National Health Service (NHS) is severely impacted. 80 NHS trusts (approximately one-third …
08:14 AM
— CICS AOR CNBAO03 on CNBPROD1: Transaction XVAL (account validation) abends with **U4038**. The CEEDU…
08:14-08:16
— 43 additional U4038 abends in CNBAO03 as users retry the failed transaction. - **08:17** — CICSPlex …
08:26
— Kwame instructed the build team to recompile CNBVAL50 with Enterprise COBOL V6.3. - **08:34** — Reco…
09:22
— A strong signal fires for Market B. The bot submits a BUY order for 45 contracts at 0.38. (Risk chec…
09:23
— The order is submitted to the exchange but does not fill immediately.
09:25
— Another strong signal fires for Market B (the price has moved further in the favorable direction). T…
09:27
— Both orders fill within seconds of each other. The bot now has a position of 87 contracts (45 + 42),…
09:30
— A third signal fires. The bot submits a BUY order for 40 contracts. Risk check: - Position limit: cu…
09:52
— Three more AORs enter SOS: PNCAO02, PNCAO05, PNCAO06. - **09:55** — Diane Okoye receives automated a…
1 million Canadian Social Insurance Numbers
— **Personal information** for approximately 100 million US and 6 million Canadian customers, includin…
1,000 therms/year
— 96% AFUE furnace gas required: 80,000,000 ÷ 0.96 = 83,333,333 BTU input = **833 therms/year** - Annu…
1,200 families
— between 5,000 and 6,000 people — were displaced. Some elderly residents were allowed to remain on th…
1-800-662-4357 (HELP)
— Free, confidential, 24/7 - samhsa.gov/find-help/national-helpline
1-800-950-NAMI (6264)
— Text: NAMI to 741741 - nami.org
1-866-488-7386
— Text: START to 678-678 - thetrevorproject.org
1. Autonomy
— the experience of choice and volition; feeling that one's actions are self-determined rather than co…
1. B
— Multi-row FETCH reduces thread switches between the application and DB2 address spaces. The SQL exec…
1. C
— SEC=YES is the master switch that enables CICS to use the External Security Manager for all security…
1. Choice of scoring rule:
— Brier score: Easy to explain, bounded, decomposable -- good for educational settings - Log score: St…
1. Churn prediction model.
— *Function:* Predicts which customers are likely to stop purchasing, triggering retention campaigns (…
1. Client Profile (300–400 words)
— Who is your client? (Use a pseudonym for privacy.) - What were they trying to learn? - What did your…
1. CNBGDGMGR
— GDG management exec. Monitored GDG bases nightly, extended any base within 5 generations of its limi…
1. Collect baseline metrics (Month 1 of quarter)
— Peak TPS per AOR (from SMF 110 aggregates) - Average and P95 response time per transaction type - Pe…
1. Compute Costs
— **Training compute:** GPU/CPU time for training and retraining models. Costs scale with model comple…
1. Cover Page
— Report title (e.g., "External and Internal Penetration Test Report") - Client name and engagement id…
1. Crowd Noise (0.5-1.0 points)
— Communication disruption for offense - False start inducement - Momentum effects - Measured at 100+ …
1. Data Costs
— Data acquisition (purchasing third-party data, API costs) - Data labeling (manual labeling, crowdsou…
1. Data team (Monday):
— **Format:** Jupyter notebook shared via repository, discussed in meeting - **Level of detail:** Full…
1. Database separation
— PostgreSQL moves to a managed cloud database (AWS RDS or equivalent) with automatic backups, failove…
1. Delft (Hensen et al., Nature 526, 682, 2015)
— System: Nitrogen-vacancy (NV) centers in diamond, 1.3 km apart - Detection loophole closed: Near-uni…
1. Detect
— An alert fires or a stakeholder reports anomalous behavior. Determine: Is this a data issue, a model…
1. DFHJS2LS (JSON Schema to Language Structure)
— Takes a JSON schema and generates a COBOL copybook that maps to it. Use this when the JSON schema is…
1. Electron lines (solid lines with arrows):
— Arrow indicates the direction of the fermion number flow - An electron moving forward in time = a po…
1. Executive Summary (1-2 pages)
— Engagement overview and scope - Overall risk rating (Critical/High/Medium/Low) - Key findings in bus…
1. Identify intersection points:
— Cooking + science ("The chemistry behind why caramelization happens at exactly 338°F") - Cooking + b…
1. Informational Surprise
— "I didn't know that." A fact, statistic, or piece of knowledge that violates the viewer's existing u…
1. Insight Problem Solving
— Insight occurs through three phases: **impasse** (getting stuck), **restructuring** (reorganizing ho…
1. Intrinsic Load
— The inherent difficulty of the material itself. Some concepts are simple (a recipe for toast) and so…
1. Introduction
— Objective of the assessment - Scope (exam machines and/or lab machines) - Methodology overview
1. Introduction (400–600 words)
— What strategy did you test and why? - What does the research literature say about this strategy? (Ci…
1. Is preprocessing inside the pipeline?
— [ ] Scaling, encoding, and imputation are all pipeline steps - [ ] No `fit_transform` on the full da…
1. James's transfer was primarily near transfer
— within the same broad domain (medicine), between related subdomains (cardiology and pulmonology). Th…
1. Job displacement fear.
— *Mitigation:* Be honest about what will change. Invest in reskilling. Create transition plans. Ident…
1. Kolb's Experiential Learning Cycle
— Four phases: concrete experience, reflective observation, abstract conceptualization, active experim…
1. Legal vs. Beneficial Ownership
— Legal owner: the person or entity whose name appears on the share register or title - Beneficial own…
1. Load Management:
— Reduced regular season minutes (32 vs. 35) - More rest games (currently ~0 planned rest) - Minutes l…
1. Matching engine sharding
— Markets are distributed across 4 matching engine shards using consistent hashing. - Each shard handl…
1. Meeting summary
— Weak: "Summarize the meeting" - Strong: "Summarize this meeting transcript in three sections: Key de…
1. ML/AI Research Scientist
— Focus: Advance the state of the art through novel algorithms and architectures. - Skills: Deep mathe…
1. Multiple Regimes, Multiple Lists
— OFAC (US): SDN List, Consolidated Sanctions List, FSE List, SSI List - OFSI/HM Treasury (UK): UK Con…
1. Near Transfer vs. Far Transfer
— **Near transfer:** Applying knowledge to a similar situation (same domain, similar format, familiar …
1. Paivio's Dual Coding Theory
— The verbal system processes language sequentially (word by word) - The imagery system processes visu…
1. Participants
— Who are your participants? (Yourself + 2–3 peers minimum; 4–6 is ideal) - Are they roughly similar i…
1. Parties and Property
— Full legal names of both parties (your full name as homeowner; the contractor's legal business name)…
1. Platform Audit
— Which platforms do you use for political and civic information, and which of those platforms use rec…
1. Pre-work (weeks or months before framing):
— Complete all moisture testing and addressing (dry season observation) - Radon test and mitigate if n…
1. Predictive Performance
— AUC, F1, expected profit at optimal threshold. This is necessary but not sufficient. A model that do…
1. Privatization
— assigning control of information spaces to private entities who then have incentives to maintain qua…
1. Product Description Generator
— Template with placeholders for product name, category, features, price, and available colors/sizes -…
1. Record (30 minutes to set up):
— Create a Google Sheet with one row per bet and columns: Date, Sport, Selection, Odds, Stake, Bankrol…
1. Replication
— the desire to recreate the sound of existing acoustic instruments accurately enough that listeners c…
1. Risk Rating Drives Proportionality
— Low risk → standard CDD; longer review cycles (24–36 months); standard transaction monitoring thresh…
1. Scaffolding
— **Teaching version:** When introducing the French Revolution to 10th graders, Marcus didn't start wi…
1. Score Data Is Highly Reliable
— Final scores agreed 100% across all sources - Scores are the most verified/visible statistic - **Rec…
1. Share ratio
— What percentage of viewers shared the video? - If share ratio > 5% AND the shares drove significant …
1. Storage Class
— Defines *performance* characteristics: - Availability (standard, continuous, continuous preferred) -…
1. Storage Strength vs. Retrieval Strength
— Storage strength: how deeply embedded, how well-connected a memory is at a fundamental level. Does n…
1. System Description
— What does the system do? - What decisions does it make or inform? - What data does it use? - Who bui…
1. Talent
— The local job market (a mid-sized city in the southeastern United States) had limited AI/ML talent. …
1. Technical risks:
— Model performance falls short of requirements - Data quality issues discovered after deployment - In…
1. The Basel Definition and Capital Framework
— Operational risk = loss from inadequate/failed internal processes, people, systems, OR external even…
1. The Dreyfus Model of Skill Acquisition
— Five stages: novice, advanced beginner, competent, proficient, expert. - The critical transition is …
1. The Duet/Stitch
— *Best use case:* Quick, low-commitment introduction to collaboration chemistry; testing whether audi…
1. The Legal Filing Standard
— US: "knows, suspects, or has reason to suspect" — a relatively low bar; covers objective indicators …
1. The Modernization Board
— Meets monthly. Includes architecture lead (Sandra), business representatives, operations, finance. R…
1. The Monday Report
— The automated regional margin report that started everything. It has run reliably for forty-one cons…
1. The Optimizer
— Uses AI primarily for cost reduction and efficiency. Deploys predictive maintenance, process automat…
1. The Ramp
— Emotion builds steadily from low to high. ``` 😐 → 🙂 → 😊 → 😃 → 🤩 ``` Best for: Transformation videos,…
1. The subject
— Who is involved? What is their known identity? What is their account relationship with the instituti…
1. Validity Assessment
— What does the tool claim to measure? - What independent validation evidence exists? - Rate the valid…
1. What is the latency requirement?
— Real-time (sub-second): API - Near-real-time (seconds to minutes): Message - Batch (hours): File
1. Who benefits and who is harmed?
— Benefits: Students who are correctly identified as at-risk and receive helpful advising. The univers…
1.05:
— American: -100 / (1.05 - 1) = -100 / 0.05 = **-2000** - Fractional: (1.05 - 1) = 0.05 = **1/20**
1.1 Data Collection
— Collect raw domain text from at least two different sources. - Document each source: URL, license/te…
1.1 Document Parsing
— Support at least three document formats: PDF, HTML, and Markdown. - Use appropriate parsing librarie…
1.1 Image Understanding Pipeline
— Implement image captioning using a vision-language model. Recommended models: - LLaVA 1.6 (open sour…
1.11 points per shot
— ### Question 24 A player has 340 assists on the season. If the average value of an assisted shot is …
1.2 Chunking Strategy
— Implement at least two chunking strategies: - Fixed-size chunking with configurable overlap (e.g., 5…
1.2 Data Cleaning and Filtering
— Remove duplicates (exact and near-duplicate using MinHash or similar). - Filter for quality using at…
1.2 Document Processing Pipeline
— Process complex documents (PDFs, Word documents) that contain: - Running text paragraphs. - Tables (…
1.3 Embedding Generation
— Generate dense embeddings using a sentence transformer model (e.g., `all-MiniLM-L6-v2` for prototypi…
1.3 Instruction Dataset Creation
— Create an instruction-tuning dataset in the conversational format expected by your chosen base model…
1.3 Multimodal Embedding
— Generate embeddings for both text and images in a shared embedding space. - Use a model such as CLIP…
1.4 Data Format
— Store data in JSONL format with the following schema: ```json { "messages": [ {"role": "system", "co…
1.4 Input Validation
— Validate all inputs: - Images: Check file format, size limits (e.g., max 20MB), resolution limits, c…
1.4 Metadata Storage
— Store document-level metadata in a relational database (SQLite for development, PostgreSQL for produ…
1.47 points
— ### Question 23 Calculate the weighted transition defense efficiency: - Transition possessions: 18% …
1.5% structural advantage per bet
— enough to turn a breakeven strategy into a profitable one.
1.50:
— American: Since decimal < 2.00, it's a favorite: -100 / (1.50 - 1) = -100 / 0.50 = **-200** - Fracti…
1.91:
— American: -100 / (1.91 - 1) = -100 / 0.91 = **-110** (rounded) - Fractional: (1.91 - 1) = 0.91 = app…
1.931
— identical DCG in this case because positions 1 and 3 have symmetric contributions in this particular…
1/f law
— the power at frequency f was proportional to 1/f. This means that pitch variations at slow rates wer…
10
— This is the AT END condition. It means no more records are available to read. This is a normal condi…
10 million Americans
— about one in every twelve adults in the country. The mailing list was drawn from three sources:
10-year rule
— not ten years of playing, but ten years of the kind of intensive, feedback-rich, deliberate practice…
10. A
— `pool_pre_ping=True` runs a lightweight "SELECT 1" test query before giving a connection to your cod…
10. B
— `FOR SYSTEM_TIME AS OF` returns the version that was active at the specified timestamp. Since the ro…
10. C
— After -911, DB2 rolls back the entire unit of work to the last COMMIT point. All uncommitted changes…
10. Key Research Findings
— False news spreads 70% faster and further than true news on Twitter (Vosoughi, Roy, and Aral, 2018) …
10. Personal Reflection
— How has your understanding of this system changed over the course? What surprised you most? What que…
10.1
— 10.7 append mode, **10.2** `open()`, **10.1** read mode, **10.1** `read()`, **10.1** `readline()`, *…
100 hours per year
— for one person. If Priya can write the script in 4 hours, the ROI is a 25:1 ratio in the first year …
103.5
— ### Question 22 A rim protector contests 7.5 shots per 36 minutes at the rim and holds opponents to …
105.4
— Projected Opp PPG: 104.1 * (91.1/99.3) = **95.5**
107.3 DRtg
— ### Question 24 A defender's on-off differential shows the team has a 106.2 DRtg when they're on cou…
108.6
— ### Question 25 Calculate the expected points from second chances: - Opponent ORB: 12 per game - Sec…
10: B
— Typosquatting involves publishing malicious packages or images with names similar to popular legitim…
10:00 AM
— Opens python.org, downloads the Python 3.12 installer. Runs it. Remembers to check "Add Python to PA…
10:04 PM
— Jordan is home. The apartment key fob logs an entry event. Jordan's phone connects to the home WiFi …
10:05 AM
— Opens Command Prompt. Types `python --version`. Gets `Python 3.12.0`. Types `pip --version`. Both wo…
10:07 AM
— Downloads and installs VS Code. Opens it. Installs the Python extension from the Extensions marketpl…
10:08
— Diane's reaction (later described to Kwame Mensah at a cross-company architecture forum): "I saw 2.4…
10:15 AM
— Creates a folder: `C:\Users\priya\Documents\acme-analytics`. Opens it in VS Code (File → Open Folder…
10:17 AM
— Opens VS Code's integrated terminal (Ctrl+`). Creates a virtual environment: ```bash python -m venv …
10:18 AM
— Activates it: ```bash venv\Scripts\activate ``` Notices the `(venv)` prefix. Something about seeing …
10:20 AM
— Installs the core packages: ```bash pip install pandas matplotlib seaborn openpyxl requests ``` Watc…
10:22 AM
— Creates a new file: `hello_business.py`. Types the code from Section 2.5 (she types it rather than c…
10:28 AM
— Stares at the output. It worked. She wrote something and the computer did exactly what she told it t…
10:30 AM
— Runs `verify_environment.py`. All libraries present.
10:45 PM --- Race Called
— The overall election is called. One final surge of trading. - Peak order volume: 6,800/second (excee…
11. A
— Allport's scale: antilocution (prejudiced talk) → avoidance → discrimination → physical attack → ext…
11. B
— IFCID 0172 contains deadlock trace records. IFCID 0044 tracks lock suspensions. IFCID 0196 tracks lo…
11. C
— Each UPDATE on a temporal table requires DB2 to INSERT the old row into the history table before app…
11. False
— A `.env` file contains real credentials and must never be committed to version control. Commit a `.e…
11. Methodological Challenges
— **Operationalization**: Definition determines what gets measured; different definitions yield differ…
11.1
— 11.5; definition, 11.1; composite systems, 11.2; *tensor.py* Time evolution, **7.1**--7.5; operator,…
115.3
— ### Question 22 A team's effective field goal percentage is 54.5% on 85 FGA with 11 three-pointers m…
11: A
— Models, particularly deep neural networks, memorize features and patterns from their training data. …
11: B
— An unauthenticated kubelet API allows listing all pods on the node and executing commands in any pod…
11:02
— The bot has positions in 5 markets, all of which are correlated with the political event: - Market C…
11:05
— The event resolves contrary to the bot's positions. All five markets move against the bot simultaneo…
11:06
— The daily loss limit is -$200. The combined loss of $34.80 does not trigger it. But the bot's effect…
11:08
— The bot's signal generator sees the price drops as mean-reversion opportunities. It generates BUY si…
11:10
— Some of the new orders fill, increasing the bot's exposure to the same correlated risk.
11:15
— Alex sees the alerts (daily P&L is now -$42 after the new positions also lose). Alex manually cancel…
11:30
— After unwinding, the total realized loss is $58.40.
11:30 PM --- Cooldown
— Traffic drops to 20x normal. - HPA begins scaling down. - Team reviews the 90-second SLO breach.
12 slices
— far too many for a pie chart. The smallest slices are indistinguishable. 3. **Gradient fills** add v…
12,000 vs. 3,000 req/sec
— COBOL vs. Java for SecureFirst's balance inquiry - **0.8ms vs. 14ms** — p99 latency, COBOL vs. Java …
12. B
— A recursive CTE requires an anchor member (the initial query) and a recursive member (the query that…
12. C
— Accessing resources in the same order eliminates the possibility of circular waits, which is the def…
12. D
— Integration — maintaining heritage culture while fully participating in the new culture — is consist…
12. False
— `load_dotenv()` does NOT override existing environment variables by default. This is intentional: pr…
12.1
— 12.5 `__name__`, **12.3** `__main__`, **12.3** multiple inheritance, **15.6** mutable, **8.1**, 8.7,…
120V circuits:
— Circuit 5: 20A → Shop lighting (new LED strip fixtures replacing fluorescents) - Circuit 6: 20A → Wa…
127 unnecessary dependencies
— jobs that were predecessors only because "they were always run in that order" with no actual data de…
12: B
— Full probability distributions give attackers precise information about decision boundaries, enablin…
12: C
— Docker Bench for Security is the official automated CIS Docker Benchmark checking tool. Trivy scans …
12:00-18:00 UTC
— The attack spreads globally. Telefonica in Spain, Deutsche Bahn in Germany, FedEx in the United Stat…
13. A
— The chapter states: "Two failure modes: excessive caution (no real bets, only safe incremental steps…
13. B
— XUSER=YES enables surrogate user checking in the CICS SIT. When enabled, CICS checks the SURROGAT cl…
13. C
— DB2 does not automatically detect cycles in recursive CTEs. Without a depth limit or cycle detection…
13. E
— All listed strategies are valid. Frequent COMMIT (A) keeps lock count below LOCKMAX. Increasing LOCK…
13. False
— R-squared measures how well the trend explains historical variation, not how accurately it will fore…
13. True
— AWS Lambda functions have a maximum execution time of 15 minutes (900 seconds). If your task require…
13. Why Visual Propaganda Works
— **Speed**: Images processed before conscious evaluation can intervene - **Indexicality**: Cultural a…
13.1
— 13.5 time complexity, **17.2**, 19.1-19.6 Timsort, **19.6** traceback, **11.1**, 11.2, 13.3 tracing …
13.4 squares
— Add 10–15% for waste and overlaps at edges: approximately **14.7–15.4 squares** of materials needed.
13.8 points per game
— ## True/False Questions
13: B
— The IP 169.254.169.254 is the cloud provider's Instance Metadata Service (IMDS). On AWS, this path r…
13: C
— Research has shown that AI-generated spear phishing emails achieved approximately 60% higher click-t…
14
— multiplication before addition. 2. `(2 + 3) * 4` = `5 * 4` = **20** --- parentheses override precede…
14 with no significant findings
— the AI agreed with the human reviewer that the changes were safe - **4 with low-risk observations** …
14. B
— ROW_NUMBER() assigns sequential integers starting at 1 within each partition. PARTITION BY ACCT_NUM …
14. C
— SMF Type 110 is the CICS-specific SMF record. It contains transaction performance data (subtype 1) a…
14. Classic Visual Techniques
— Juxtaposition: Enemy imagery alongside disgust/danger imagery — no explicit claim needed - Selective…
14. Legal Framework Implications
— US First Amendment significantly limits government regulation of false speech (*United States v. Alv…
14. True
— Service accounts have their own Google identity (an email address). The sheet must be explicitly sha…
14.1
— 16.5 Observer pattern, **16.3**, 16.4 off-by-one error, **5.5**, 8.1 `open()`, **10.1**, 10.2 Open/C…
14.2
— 14.4; tables, Appendix D; *clebsch_gordan.py* Coherent states, **4.6**, **27.3**; properties, 27.3; …
1450
— Gutenberg's printing press reaches practical operation in Mainz. The technology that will make mass …
14: C
— gVisor (runsc) implements an application kernel in user space that intercepts and handles system cal…
14:27
— Lisa initiates the DB2 REORG on tablespace DSNDB04.GENLGR01. The REORG begins with an initial drain …
14:28
— The drain lock is acquired. All SQL access to GENLGR01 is suspended during the drain phase. The drai…
14:29
— The drain lasts longer than expected because of the tablespace's size (45 GB after recent growth fro…
14:30
— CNBAORB1's active task count rises from its normal 160 to 220. Tasks are not completing because they…
14:31
— Active task count on CNBAORB1 reaches 248. Rob Calloway's monitoring console shows an amber alert.
14:32
— CNBAORB1 hits MXT (250). DFHZC0101 message appears on the system log. New transactions begin queuing…
14:33
— CNBAORB2, now receiving the combined load of both AORs, hits MXT (250). Both AORs are in MAXT. The T…
14:34
— Rob pages Kwame, who is in the capacity planning meeting. "Both B-region AORs are in MAXT. No volume…
14:35
— Kwame pulls up CICS statistics remotely. He sees the task wait breakdown: 89% of active tasks are in…
14:36
— Lisa confirms the REORG. She pauses it immediately: `TERM UTILITY(DSNUTIL.GENLGR01)`. The drain lock…
14:37
— The backlog of 500+ waiting transactions (across both AORs) begins draining. Tasks that were blocked…
14:38
— Active task counts return to normal (160 per AOR). Response times normalize. ATM terminals recover.
14:42
— The platform's API begins returning stale data. Price quotes are 10 minutes old, but the response fo…
14:48
— Marcus verifies the scope of the damage:
14:49
— Marcus checks whether the DELETE has been committed:
14:50
— Marcus declares a P1 incident and contacts the operations center. The online banking application is …
14:51
— Marcus begins the recovery procedure. He pulls up the recovery runbook (Section 3: Point-in-Time Rec…
14:55
— More stale-data signals fire. The bot submits three more orders in other markets, all based on stale…
15 employees
— managers, loan officers, tellers, and relationship managers - **8 account types** covering checking,…
15 points each, allocated as:
— Accurate identification and application of patterns (4 points) - Quality and specificity of examples…
15%
— 0.2-0.4: 52/150 = **34.7%** - 0.4-0.6: 102/200 = **51%** - 0.6-0.8: 132/180 = **73.3%** - 0.8-1.0: 1…
15-Week MBA Course (AI Ethics for Managers):
— Weeks 1–2: Part 1 (Foundations) — Chapters 1–3 - Weeks 3–4: Part 1 continued — Chapters 4–6 - Weeks …
15. B
— RANK() assigns the same rank to ties but skips subsequent ranks (1, 2, 2, 4). DENSE_RANK() assigns t…
15. C
— PCI-DSS Requirement 10.7 mandates a minimum of one year of audit trail history, with at least three …
15. D
— The three mechanisms are social comparison (discovering others hold even stronger positions), one-si…
15. False
— The computation runs on actual server hardware in AWS or Google data centers. "Serverless" means you…
15. Platform Governance Implications
— Platforms apply different mechanisms to different types: removal (fabricated content), labeling (dis…
15. True
— `statsmodels.tsa.holtwinters.Holt` has an `optimized=True` parameter (the default) that uses maximum…
15.1
— 15.6 Incompatible observables, 6.6, 6.7 Infinite square well, **3.2**; energy levels, 3.2; wave func…
150 million tax filings per year
— a number that includes individual income tax returns, corporate tax filings, value-added tax (VAT) s…
150 stable relationships
— what became known as **Dunbar's Number**. Within that 150, the research suggests a nested structure:
1517
— Martin Luther distributes his *Ninety-Five Theses*, which spread rapidly via the printing press acro…
152x improvement
— through systematic profiling, targeted optimization, and strategic caching.
1588
— The Spanish Armada defeat and the English propaganda campaign that followed demonstrate the State's …
15: A
— This is a two-step vulnerability: first, prompt injection causes the LLM to generate malicious HTML/…
15: B
— Rejecting the `latest` tag enforces explicit image versioning. The `latest` tag is mutable and can b…
15:00 UTC
— Marcus Hutchins, a 22-year-old British security researcher operating under the alias MalwareTech, di…
15:10
— The platform resolves the data issue. Fresh prices flow in. The bot's EMA updates, and the "deviatio…
15:15
— One of the four stale-data orders fills. A seller hits the 0.42 bid in Market A (perhaps also using …
15:20
— Alex (the bot operator) returns from lunch and notices the position. The unrealized P&L is +$1.20 (8…
15:29
— Rollforward complete. The MERIDIAN_RECOVERY database is at its state as of 14:47:00, with all 6,047,…
15:30
— Alex reviews the logs and discovers the stale data issue. The other three orders are still open and …
15:43
— Import complete. Production TRANSACTION table row count: 6,047,293 — exactly the pre-DELETE count.
16. B
— The third argument to LAG() is the default value returned when there is no row at the specified offs…
16. c
— Neuroticism is the strongest Big Five predictor of relationship satisfaction and stability. High neu…
16. False
— `os.environ.get("MY_KEY")` returns `None` silently, not an error. The error will typically occur lat…
16. True
— Template inheritance is specifically designed for this: the base template defines the shared structu…
162.8 ≈ 163 alerts closed at triage
— Escalated for full investigation: 185 × 12% = **22.2 ≈ 22 full investigations per week** - SAR decis…
1622
— *Congregatio de Propaganda Fide* established by Pope Gregory XV. Neutral usage: the spread of doctri…
1640s
— English Civil War produces one of history's most intense pamphlet wars. Royalist and Parliamentarian…
1640s-1650s
— English Civil War pamphlet explosion: thousands of titles published arguing constitutional, religiou…
16: B
— `nsenter` enters existing namespaces. By targeting PID 1 (the host's init process) with all namespac…
16: D
— Making the model's architecture public does not defend against extraction—it actually makes extracti…
17. A
— Echo chambers and group polarization: like-minded people in echo chambers encounter primarily conten…
17. B
— Account 200 is the lower number and must be locked first, regardless of whether it's the source or t…
17. C
— `ROWS BETWEEN UNBOUNDED PRECEDING AND CURRENT ROW` accumulates from the first row of the partition t…
17. False
— For a 12-element series with `rolling(window=4).mean()`, the result will have NaN for the first 3 po…
17. Plandemic (Case Study 1)
— A single piece of health misinformation can contain elements of all three categories simultaneously …
17. True
— A worksheet created via the API is a standard Google Sheets worksheet. Other users with access to th…
1765-1783
— American Revolutionary press. Colonial newspapers, almanacs, and pamphlets (notably Thomas Paine's *…
1780s–1790s
— The French Revolutionary press transforms political communication. Newspapers multiply; radical pamp…
1795–1815
— French Revolutionary and Napoleonic eras see the term used for political communication across Europe…
1799–1815
— Napoleon Bonaparte becomes one of history's most deliberate managers of his own image. He commission…
17: B
— AI-enhanced fuzzing uses ML models to learn the structure of valid inputs, identify code paths that …
17: C
— SHA256 digest references are immutable and cannot be overwritten. Combined with image signing (cosig…
18 percent reduction in overstock costs
— worth approximately $2.2 million annually.
18-gauge thermostat wire
— thin, multi-conductor cable that runs through your walls from the thermostat to the furnace or air h…
18.
— `{{ expression }}` outputs the value of an expression into the rendered document. Use it to display …
18. A
— ROWS operates on physical row positions. RANGE operates on the logical value of the ORDER BY column.…
18. B
— AUTHENTICATE(CERTIFICATE) causes CICS to request the client's digital certificate during the TLS han…
18. c
— The four effects Bandura identifies are: choice, effort, persistence, and resilience. Accuracy (c) i…
18. D
— The convergence across multiple independent research traditions is the most powerful answer. The Har…
18. Operation Secondary Infektion (Case Study 2)
— State-sponsored disinformation can run for years (six-plus years) before comprehensive identificatio…
18. Structural Complements to Individual Literacy
— Platform algorithmic transparency requirements - Dark ad disclosure mandates for political advertisi…
180 degrees out of phase
— one reaches its positive peak precisely when the other reaches its negative trough — their sum is ze…
1833
— Benjamin Day founds the *New York Sun* as the first "penny press" — cheap, mass-market newspaper sol…
1891
— After Arthur Conan Doyle kills Sherlock Holmes in "The Final Problem" (published in The Strand Magaz…
1893
— The Strand Magazine publishes "The Final Problem." Reader response — including letters, petitions, a…
1895
— Multiple "Sherlock Holmes" fan clubs and correspondence groups form in England and the United States…
1895-1898
— Yellow journalism era peaks with Hearst-Pulitzer circulation war over coverage of Cuba. The Spanish-…
1895–1898
— The era of "yellow journalism" in the United States, centered on the competition between William Ran…
18: B
— Without encryption at rest, etcd stores Secrets in plaintext on disk. Anyone with access to the etcd…
18: C
— The EU AI Act establishes a risk-based framework where high-risk AI systems (used in areas like heal…
19 percentage points
— one of the worst polling failures in recorded history.
19. A
— Single-row: 10M rows × 3 SQL statements × 0.03ms = 900,000ms = 15 minutes. Multi-row (rowset 500): 1…
19. B
— When a transaction is routed via MRO, the user's ACEE (security token) is propagated from the TOR to…
19. c
— Reappraisal: revising the interpretation of the stressor toward the most accurate available framing.…
19. D
— Both B and C. Deadlocks can occur even with frequent commits if online and batch access rows in diff…
19.1
— 19.4; ground state, 19.1; excited states, 19.3; helium, 19.2; *variational.py* Vector potential, 29.…
1906
— Nickelodeons proliferate across American cities. Early film audiences develop enthusiastic relations…
1910
— The first motion picture fan magazines appear, including *Photoplay* (1911). These publications — cu…
1913
— Fan mail becomes institutionalized in Hollywood studios, which hire staff to manage the volume of le…
1914-1918
— WWI propaganda campaigns at industrial scale. Committee on Public Information (CPI, known as the "Cr…
1914–1918
— World War I. All major powers run organized propaganda bureaus. British propaganda targeting U.S. ne…
1920
— Radio broadcasting begins public regular service in the United States. Radio creates new parasocial …
1920s
— The term solidifies as pejorative in public usage. Bernays responds by coining "public relations" (1…
1923
— *Weird Tales* magazine launches, becoming the primary venue for science fiction and horror short fic…
1926
— Hugo Gernsback founds *Amazing Stories*, the first magazine dedicated exclusively to science fiction…
1930
— *The Comet*, widely considered the first science fiction fanzine, is published by the Science Corres…
1932
— The Science Fiction League forms, one of the first organized science fiction fan organizations. The …
1933
— Joseph Goebbels appointed Reich Minister of Public Enlightenment and Propaganda. The word's associat…
1933 (January)
— Hitler appointed Chancellor. Nazi seizure of German press begins immediately. Joseph Goebbels appoin…
1933 (March 12)
— FDR delivers the first Fireside Chat on the banking crisis. Radio establishes itself as the primary …
1933-1939
— Volksempfänger produced and distributed; German radio penetration reaches over 70 percent of househo…
1934
— *Fantasy Magazine* begins publication as one of the first fanzines to achieve wide distribution, wit…
1936
— The Futurians, a New York fan group, begins meeting. The group includes figures who will become majo…
1939-1945
— WWII radio propaganda at global scale. BBC World Service, Voice of America, Radio Moscow, Reich broa…
1939: July 2–4
— The first World Science Fiction Convention (Worldcon) is held in New York City. Approximately 200 fa…
1940s
— Fan clubs organized around film stars, particularly teenage girl fan clubs for Frank Sinatra ("bobby…
1944
— Frank Sinatra's performances at the Paramount Theater in New York trigger "the Columbus Day Riot" — …
1945–1960
— The post-WWII period sees propaganda studies institutionalized as an academic field. The Institute f…
1946
— Nuremberg trials: Julius Streicher convicted and executed for crimes against humanity based solely o…
1947
— Science fiction fan communities develop the "Worldcon Hugo Award," awarded to excellence in science …
1948
— U.S. Congress passes the Smith-Mundt Act, prohibiting the domestic use of U.S. government propaganda…
1949
— Radio Free Europe founded. FCC adopts the Fairness Doctrine, requiring balanced coverage of controve…
1950-1954
— McCarthy era. Senator Joseph McCarthy's Red Scare campaign demonstrates both the power and the fragi…
1950s
— The "beatnik" and literary fan communities form around Beat Generation writers. Fan "scenes" organiz…
1954
— The Comics Code Authority is established following widespread moral panic about comic books, driven …
1960
— The Beatles form in Liverpool (initially as The Quarrymen, renamed The Beatles in 1960). Beatlemania…
1962
— *Fantastic Four* #1 (Marvel Comics) launches the Marvel superhero universe. Stan Lee's "Marvel Metho…
1963
— Doctor Who debuts on BBC television. The program and its fan community — the Doctor Who Appreciation…
1965
— Jacques Ellul publishes *Propagandes*, the most theoretically ambitious treatment of the subject. Ar…
1966
— *Star Trek* premieres on NBC (September 8). The program is canceled after three seasons but generate…
1967
— *Spockanalia*, the first dedicated Star Trek fanzine, is published by Devra Langsberg and Sherna Com…
1968–1969
— Fan letter-writing campaigns attempt to save Star Trek from NBC cancellation. The network receives o…
1969
— Red Lion Broadcasting Co. v. FCC: Supreme Court upholds the constitutionality of the Fairness Doctri…
1970
— MediaWest Con, a fan-run convention focused on media fandom (as opposed to science fiction literary …
1970s
— Slash fiction emerges in Star Trek fandom, with Kirk/Spock (K/S) stories circulating in zines. Slash…
1971
— Frank Wisner and other CIA officials acknowledge publicly for the first time that Radio Free Europe …
1974
— The first Star Wars film is not yet released, but science fiction fandom has developed the zine infr…
1974: National Research Act
— Created the National Commission for the Protection of Human Subjects - **1979: Belmont Report** — Es…
1976
— *Star Wars* novelization published in advance of the 1977 film. The novelization is one of the first…
1977
— *Star Wars* (Episode IV: A New Hope) is released (May 25). The film's enormous success and its disti…
1980
— VCR technology becomes consumer-accessible, transforming fan relationships to media texts. Fans can …
1981
— MTV launches. Music video as a form creates new fan engagement with music performers through visual …
1983–1984
— The first US anime fan clubs begin forming around Japanese animation available through tape trading.…
1986
— The Cartoon/Fantasy Organization (CFO) at UCLA is often cited as the first formally organized anime …
1987
— *Star Trek: The Next Generation* premieres, creating a new focal point for Star Trek fandom and demo…
1987-88 Michael Jordan:
— 35.0 PPG, 5.5 RPG, 5.9 APG - 53.5% FG, 84.1% FT - 82 games, 40.4 MPG - League Pace: ~100 possessions…
1988
— Rush Limbaugh begins national syndication of his radio talk show. Within five years it is the most-l…
1990s Player:
— BPM: +6.0 - League pace: 92 possessions/game - League TS%: 0.520
1991
— The World Wide Web is publicly released by Tim Berners-Lee. Fan communities begin building online pr…
1993
— *The X-Files* premieres on Fox. Its fan community is among the first major media fan communities to …
1994
— Early fan web pages appear across multiple fandoms. Fans begin building dedicated websites for fan f…
1995
— Amazon.com launches, establishing e-commerce as an infrastructure. Fan merchandise, zine orders, and…
1996
— *Buffy the Vampire Slayer* is released as a film (the television series will premiere in 1997). The …
1997
— *Harry Potter and the Philosopher's Stone* published in the UK (US publication 1998). The Harry Pott…
1998
— FanFiction.net is founded by Xing Li. The site provides a simple interface for fan fiction hosting a…
1999
— LiveJournal launches, providing blogging tools with social networking features. Fan communities migr…
1: B
— Namespaces provide isolation of system resources (PIDs, network, mounts, etc.). Cgroups limit resour…
1:00 AM --- Markets Suspended
— Election markets suspended pending official certification. - Traffic at 3x normal. - HPA scaled down…
1d assessment notes:
— ORD-0341: 13.2 bps arrival slippage. Within the ±15 bps tolerance band — no exception. - ORD-0342: F…
2,401 adults
— more than double the estimate-based approach. This is why having a prior estimate of $p$ matters: it…
2-Week Review:
— Which strategy felt hardest to use? ___________________________________ - Which strategy produced th…
2. Adverse Impact Profile
— What protected groups are at risk of adverse impact? - What adverse impact data has the vendor publi…
2. Aggregation across questions:
— Simple average: Each question has equal weight - Weighted average: More important or more difficult …
2. Analyze (15 minutes to set up):
— Add a "Summary" tab to the Google Sheet with formulas for: total bets, win rate, total P&L, ROI, and…
2. Application server scaling
— The Django application runs in Docker containers behind an application load balancer. - Two instance…
2. B
— With XTRAN=YES, CICS checks whether users are authorized to execute transactions. With XFCT=NO, CICS…
2. Basic Inspection
— Shape (rows x columns) - Column names and types - First and last 5 rows - Unique values for categori…
2. Biomechanical Intervention:
— Landing mechanics training - Neuromuscular training programs - Jump landing assessment - Fatigue mon…
2. C
— SQLCODE 100 means end of result set. SQLERRD(3) = 283 means 283 rows were placed in the host variabl…
2. CNBSPOOLMGR
— Spool management exec. Purged spool output older than 7 days (14 days for financial reports), alerte…
2. Coaching Plan Summary (400–500 words)
— What interventions did you choose and why? - How did your plan connect to what you learned about you…
2. Competence
— the experience of effectiveness; feeling capable and able to meet challenges. Competence need is sat…
2. Compute Costs
— Training compute (GPU/TPU time for model training) - Experimentation compute (dozens or hundreds of …
2. Customer Email Responder
— Templates for five common scenarios (order inquiry, complaint, return request, product question, com…
2. D
— Both A and C create valid routes, but C provides automatic type conversion. If you visit `/client/42…
2. Dedicated WebSocket service
— WebSocket handling is separated into its own service, subscribed to Redis Pub/Sub for price updates.…
2. DFHLS2JS (Language Structure to JSON Schema)
— Takes a COBOL copybook and generates a JSON schema that maps to it. Use this when the COBOL copybook…
2. Dissolve
— B. Create shock/contrast → **3. Smash cut** - C. Draw a visual parallel → **4. Match cut** - D. Cont…
2. Document Control
— Version history (draft, review, final) - Distribution list (who receives this report) - Confidential…
2. Efficient Map Handling
— Use `DATAONLY` instead of sending the full map when only data changes - Minimize the number of field…
2. Extension
— the desire to take the physics of real instruments and push it beyond physical constraints. What if …
2. Extraneous Load
— Cognitive effort wasted on poorly designed presentation. This is the *unnecessary* difficulty: confu…
2. Feedback Loop Recognition
— Can you identify moments when a platform's recommendations seemed to track your emotional state or r…
2. Five dimensions organize platform analysis.
— *Persistence:* How long content remains accessible — shapes community memory - *Searchability:* Who …
2. Formative Assessment
— **Teaching version:** Marcus didn't wait until the unit test to find out whether students understood…
2. High-Level Summary
— Overview of testing activities - Key findings summary - Recommendations
2. Hypotheses:
— H0: _______________________________ (null — status quo, no effect, no difference)
2. Infrastructure
— No GPU compute infrastructure existed. - The data warehouse was a traditional SQL Server-based syste…
2. Interpretability
— Can the model's decisions be explained to stakeholders, customers, and regulators? Logistic regressi…
2. Is the data representative?
— Using family income and zip code as predictors means the model will disproportionately flag low-inco…
2. Key Accomplishments This Period:
— [Bullet 1] - [Bullet 2] - [Bullet 3]
2. Loss of professional autonomy.
— *Mitigation:* Design AI systems as *decision support*, not *decision replacement*. Involve professio…
2. Management Class
— Defines *lifecycle* management: - Backup frequency and number of versions - Migration eligibility (d…
2. Materials
— What will participants study? Choose a topic that is: - Unfamiliar to all participants (so prior kno…
2. Method (500–700 words)
— Participants: Who, how many, what were their relevant characteristics? - Materials: What did they st…
2. Methodology
— Tools used and versions - Scan configurations and credentials - Date and time of scanning - Limitati…
2. ML/AI Engineer
— Focus: Build and deploy production ML systems. - Skills: Software engineering, MLOps, system design,…
2. Organizational risks:
— Insufficient executive sponsorship (the "air cover" evaporates after a leadership change) - Talent s…
2. Pattern analysis:
— What platform consumed the most time? - What time of day was your heaviest use period? - Were your h…
2. Performance review feedback
— Weak: "Help me write feedback for my employee" - Strong: "Draft constructive feedback for a junior a…
2. Photon lines (wavy lines):
— No arrow (photons are their own antiparticles) - Each external photon contributes a polarization vec…
2. Product recommendation engine.
— *Function:* Recommends products to customers based on browsing history, purchase history, and simila…
2. Project growth (Month 2)
— Business forecast: projected transaction growth (from business unit, typically 10–15% annually for C…
2. Purpose and Necessity
— What problem does this system address? - Could the same objective be achieved without algorithmic de…
2. Referential Connections
— Mental links between the verbal code and the visual code for the same concept - They run in both dir…
2. Regulation
— external rules limiting uses of the epistemic commons that degrade its quality (truth-in-advertising…
2. Rough-in — before walls close:
— Rough plumbing (drain relocations, wet bar sink, bathroom rough-in) - Rough electrical (new circuits…
2. Rules-Based Systems: Transparent but Limited
— A scenario is a combination of rules defining a suspicious pattern: conditions applied to transactio…
2. School principal (Wednesday):
— **Format:** 8-10 slide presentation with one-page executive summary handout - **Level of detail:** M…
2. Stakeholder Identification
— Who is affected by the system's decisions? - Are there populations that are disproportionately affec…
2. Storage Costs
— Model artifacts (each version of each model) - Feature store data (online and offline) - Training da…
2. Surface Similarity vs. Structural Similarity
— **Surface similarity:** How much two situations look alike on the outside — the characters, settings…
2. The activity
— What happened? What transactions occurred? Over what time period? What amounts?
2. The Architecture Review Board
— Meets weekly during active modernization. Reviews every significant design decision. Ensures consist…
2. The Core Mechanism
— The lower the retrieval strength when you successfully retrieve a memory, the more that retrieval in…
2. The Customer Dashboard
— The Flask application showing account concentration, tier breakdown, and at-risk accounts. Used by S…
2. The Differentiator
— Uses AI to create customer-facing differentiation. Deploys personalization, recommendation engines, …
2. The Feature/Crossover
— *Best use case:* Direct audience introduction, especially the double crossover (each creator appears…
2. The Incubation Effect
— Stepping away from a problem after genuine effort reliably increases the likelihood of solving it. -…
2. The Key Thresholds
— US CDD Rule, EU AMLD5, UK MLRs: **25% ownership** threshold for identifying BO by equity stake - Sec…
2. The Roller Coaster
— Alternating peaks and valleys of different emotions. ``` 😊 → 😂 → 😢 → 😂 → 🥹 ``` Best for: Storytimes,…
2. The Three-Factor Framework
— **Customer factors**: entity type, PEP status, adverse media, industry/occupation - **Geographic fac…
2. The Tipping-Off Prohibition
— Institutions that file a SAR are prohibited from disclosing the SAR's existence to the subject - Thi…
2. Three Levels of Practice (Ericsson)
— **Naive practice:** Repeating at your current level without specific improvement goals. Maintains bu…
2. Travel Fatigue (0.3-0.8 points)
— Sleep disruption for away team - Circadian rhythm effects - Physical recovery constraints - Particul…
2. Triage
— Assess severity. Is the model serving incorrect predictions? Is it serving no predictions? Is the im…
2. Velocity pattern
— How did views accumulate over time? - If sharp exponential spike in first 12 hours, then rapid decli…
2. Vienna (Giustina et al., PRL 115, 250401, 2015)
— System: Entangled photons from SPDC, 58 m fiber separation - Detection loophole closed: SNSPDs with …
2. Visual Surprise
— "I didn't see that coming." An unexpected visual — a reveal, a transformation, a sudden appearance, …
2. What Changes in Expert Brains
— **Chunking:** Experts group individual pieces of information into meaningful clusters, effectively e…
2. What is the volume?
— Low (< 1,000 records/hour): API or Message - Medium (1,000 - 100,000 records/hour): Message - High (…
2. Will the data change after you create it?
— If yes → **list** (mutable sequences) or **dict** (mutable key-value pairs) - If no → **tuple** (imm…
2. Yardage Statistics Have Minor Discrepancies
— ~11% of yardage comparisons showed differences - Most differences were small (<5 yards) - Difference…
2.1 Base Model Selection
— Choose an open-source base model. Recommended options: - **Llama 3.1 8B Instruct**: Strong baseline,…
2.1 Knowledge Base Ingestion
— Build an ingestion pipeline that processes a collection of documents and images into the multimodal …
2.1 Query Processing
— Implement query rewriting using an LLM: given a potentially ambiguous user query, generate an improv…
2.2 Cross-Modal Retrieval
— Implement the following retrieval modes: - **Text-to-text**: Standard text search (dense + BM25 hybr…
2.2 Hybrid Retrieval
— Implement dense retrieval using the vector database (cosine similarity or dot product). - Implement …
2.2 LoRA Configuration
— Implement fine-tuning using the HuggingFace `peft` and `trl` libraries. - Configure LoRA with the fo…
2.3 Multi-Modal Fusion
— When a query involves both text and images (e.g., "Find documents similar to this one" with an uploa…
2.3 Re-Ranking
— Implement a cross-encoder re-ranker (e.g., `cross-encoder/ms-marco-MiniLM-L-6-v2`) that scores each …
2.3 Training Configuration
— Optimizer: AdamW with weight decay 0.01. - Learning rate: Sweep over {5e-6, 1e-5, 2e-5, 5e-5} with c…
2.30x
— the true cost is 2.3 times the initial development estimate. This is consistent with the chapter's f…
2.4 Experiment Tracking
— Track all experiments using Weights & Biases (wandb) or MLflow. - For each run, log: hyperparameters…
2.4 Retrieval Evaluation
— Implement retrieval evaluation using a manually curated set of at least 25 query-document relevance …
2.5 Training Best Practices
— Implement early stopping based on validation loss. - Save checkpoints at regular intervals. - Use gr…
2.75:
— American: Since decimal >= 2.00, it's an underdog: (2.75 - 1) x 100 = **+175** - Fractional: (2.75 -…
20
— the defined length of the PIC X(20) field, regardless of its content. The field contains "HELLO WORL…
20 tokens per parameter
— an order of magnitude more data-intensive than Kaplan's recommendation.
20% Refactor means modernizing on the mainframe
— API access for mobile/web consumers, CI/CD pipelines for faster delivery, automated testing for qual…
20-minute recovery window
— Gottman's research finding that physiological arousal from flooding takes a minimum of 20 minutes to…
20. A
— Overround = yes_price + no_price - 1.0. Market A: 0.55 + 0.50 - 1.0 = 0.05 (5%). Market B: 0.62 + 0.…
20. B
— The recommended order is: multi-row FETCH (mechanical, low risk, immediate gain) → multi-row INSERT …
20. c
— The five-factor structure has been replicated across dozens of cultures in large-scale studies, maki…
20.1
— 20.4; connection formulas, 20.2; tunneling, 20.3; quantization condition, 20.1; *wkb.py* Work functi…
200
— Successful inquiry - **400** -- Client error (missing account ID) - **401** -- Authentication failur…
200 (OK)
— The request was processed successfully and the response contains the requested data.
200 OK
— The COBOL program executed successfully and returned valid data. Triggered by normal program complet…
200,960
— Layer 2: 256 * 128 weights + 128 biases = 32,768 + 128 = **32,896** - Layer 3: 128 * 10 weights + 10…
2000
— The dot-com boom creates significant investment in fan community infrastructure, including early soc…
2001
— Wikipedia is founded (January 15). The Wikipedia model — open, collaborative knowledge production — …
2002
— LiveJournal fandom reaches critical mass. The Harry Potter and Lord of the Rings fandoms (fueled by …
2003
— Friendster launches, followed by MySpace (2003). These early social networks provide infrastructure …
2003-2006: The Amateur Revolution
— **Football Outsiders** launches (2003), introducing DVOA (Defense-adjusted Value Over Average) and b…
2004
— OkCupid founded by Chris Coyne, Sam Yagan, Max Krohn, and Christian Rudder, all Harvard alumni. The …
2004 (Bush vs. Kerry):
— InTrade's final price gave Bush approximately a 55% chance of winning. - On election night, InTrade …
2005
— Reddit launches. The upvote/downvote voting system is a core feature from the beginning, though the …
2006
— Twitter is founded (March 21). The platform's combination of brevity, public address, and real-time …
2006-2010
— Reddit's karma system evolves from a simple content quality signal to a form of social capital withi…
2006-2010: NFL Takes Interest
— Teams begin hiring dedicated analytics staff - The New England Patriots, under Bill Belichick, becom…
2007
— The Organization for Transformative Works (OTW) is founded by Naomi Novik, Francesca Coppa, and othe…
2008
— Archive of Our Own (AO3) opens beta testing. The archive — operated by the OTW, hosted on fan-mainta…
2008 (Obama vs. McCain):
— InTrade correctly predicted the winner of every state except Indiana (Obama won by 1%) and Missouri …
2008-2012 (full newsroom):
— Average Commission meeting attendance by press: 1.2 reporters per meeting - Average meeting length: …
2008-2012: The analytics pioneers at clubs
— Arsenal's acquisition of StatDNA in 2012 brought sophisticated analytics in-house. StatDNA, founded …
2009
— Foursquare launches at SXSW with check-in, mayorship, and badge mechanics. Immediate adoption among …
2010
— Foursquare reaches 1 million users. The mayorship competition intensifies in major cities; users che…
2010s onward:
— Comprehensive play-by-play - Pre-calculated advanced metrics - Better player attribution
2011
— Foursquare reaches 10 million users. Academic researchers begin publishing studies on Foursquare's g…
2011-2015
— Reddit grows rapidly, crossing 100 million monthly users. Karma gaming intensifies as the user base …
2012
— Foursquare reaches approximately 25 million users. Check-in frequency peaks. The company begins expl…
2012 (Obama vs. Romney):
— InTrade's final price gave Obama approximately a 67% chance of winning. - This was less confident th…
2012-13 Season (Age 28):
— 28.7 PPG (Scoring champion) - 6.9 RPG - 2.6 APG - 56.0% TS - 5.4 Win Shares - 3.0 BPM
2013
— Foursquare begins research into user behavior that reveals a bifurcation: heavy users who treat Four…
2013-14 Season (Age 29):
— 27.4 PPG - 8.1 RPG - 3.1 APG - 56.1% TS - 7.1 Win Shares - 3.0 BPM
2014
— Foursquare splits into two applications: Foursquare (a venue discovery and review app, Yelp competit…
2014-15 RAPM:
— Total: +6.8 (top 15 in NBA) - O-RAPM: +2.1 - D-RAPM: +4.7 (top 5 in NBA)
2015
— Snapchat introduces the streak mechanic. Initial adoption is gradual; the mechanic does not immediat…
2015 Contract Negotiation:
— Traditional stats suggested ~$10M annually - RAPM suggested elite value (~$18-20M) - Green signed 5-…
2015 onward
— The OkCupid case is regularly cited in academic and policy discussions about platform experimentatio…
2015-16 Statistics:
— 16.9 PPG, 7.7 RPG, 4.3 APG - PER: 18.8 - Win Shares: 4.0 - Age: 21
2015-16 Stephen Curry:
— 30.1 PPG, 5.4 RPG, 6.7 APG - 50.4% FG, 90.8% FT, 45.4% 3PT - 79 games, 34.2 MPG - League Pace: ~96 p…
2015-2016
— Swarm reintroduces coins and stickers as gamification elements, attempting to rebuild the engagement…
2016
— Streak culture accelerates as Snapchat use among teenagers reaches critical mass. Social science res…
2016–present
— "Disinformation," "misinformation," and "influence operations" largely replace "propaganda" in journ…
2017
— The "streak sitter" phenomenon is first documented in academic literature. Researchers conducting et…
2017-18 Season:
— Expected FG%: 48.2% - Actual FG%: 49.1% - Shot-making above expected: +0.9%
2018
— Snap publishes its first report on platform wellbeing, acknowledging concerns about streak anxiety b…
2018 onward
— Foursquare completes its transition to a B2B data company. The consumer social network is largely do…
2019
— A study by Kelly Burchell and colleagues finds that over 60% of teenagers who report significant str…
2019-20 with Portland (Age 35):
— 15.4 PPG - 52.8% TS - 1.3 Win Shares (per 82 games pace)
2019-2022 (skeleton newsroom):
— Average Commission attendance by press: 0.1 reporters per meeting (essentially none) - Average meeti…
2020
— Researchers begin studying streak behavior during COVID-19 pandemic restrictions, when school closur…
2020 Season:
— Home record: 5-3 - Home margin: +3.5 - Away record: 7-1 - Away margin: +7.0
2020-2021
— "Reddit Coins" become the currency through which awards are purchased. The awards economy generates …
2020s Player:
— BPM: +6.0 - League pace: 100 possessions/game - League TS%: 0.570
2021
— Increasing academic and journalistic attention to the mental health implications of streak culture c…
2021-2023:
— Home record: 12-13 - Home margin: +0.5 - Away record: 10-15 - Away margin: -2.0
2022
— Snap introduces "streak restoration" features allowing users to restore accidentally lost streaks, s…
2022-2023
— Reddit introduces significant changes to its awards system, removing some award types, simplifying t…
2023
— Ongoing research continues to document streak anxiety, with longitudinal studies beginning to examin…
2023 Context:
— League average: ~58% pass rate - High-pass teams: 62-68% - Run-heavy teams: 50-55%
2023+ International Schedule:
— 5+ games in London - Games in Germany (Frankfurt, Munich) - Potential future expansion
2024
— TikTok faces potential ban in the United States (legislation passes in April 2024, requiring ByteDan…
2025
— BTS members complete military service and begin reunion activity. ARMY reunion campaigns — some of t…
20:15 — Pre-test verification.
— Metro Mirror: all pairs in-sync (verified by Maria Santos) - Raleigh LPARs: IPLed and in standby (ve…
20:30 — Quiesce primary site.
— CICS: drain online transactions. Verify transaction count drops to zero. - Batch: hold all pending j…
20:42 — 20:45: MQ and network (3 minutes)
— MQ queue managers started, shared queues available - MQ channels started automatically (previous tes…
21. b
— The four steps are: generate candidates, group and prioritize, examine the gap (espoused vs. enacted…
21. c
— Very high agreeableness is associated with difficulty asserting one's own needs, chronic conflict av…
21. d
— Bonanno found that the most common trajectory was resilience — stable functioning throughout, grief …
21. Nazi Propaganda (Case Study 1)
— Propaganda requires total information environment control to achieve totalitarian effects - Dehumani…
22%
— **After captions:** Sound-off completion was **51%** — a **+132% improvement**
22. b
— Temperament is the biologically based, early-appearing foundation from which personality develops ac…
22. c
— McAdams distinguishes personality (broad tendencies) from narrative identity (the subjective story t…
22. Cambridge Analytica (Case Study 2)
— The data harvest violated privacy norms and platform policies for tens of millions of people - The c…
22.1
— 22.5 `findall()`, **22.3** `match()`, **22.2** `search()`, **22.2** `sub()`, **22.4** read mode (fil…
22.4
— 22.5; phase shifts, 22.4; *scattering.py* Path integral, **31.1**--31.4; free particle, 31.2; harmon…
23 indexes were redundant
— their leading columns were a subset of another index on the same table. For example, the POLICY tabl…
23 percent increase in average order value
— from $67 to $82, driven by cross-category recommendations that surfaced complementary products custo…
23% defect rate
— 23,000 defective bearings out of 100,000. The factory would hemorrhage money on rework and rejected …
23. b
— Research consistently finds that self-compassion is associated with greater motivation after failure…
23. c
— Heritability estimates for Big Five traits are typically in the 40–60% range across twin and adoptio…
23.08%
— only 23% of flagged transactions are actually fraud.
23:30
— CA-7 triggers the EOD batch chain. Jobs 1-31 complete normally. - **01:32** — Job 32: CNBGL300 (Gene…
24% power
— meaning there was only a 24% chance of detecting Daria's improvement, even if it's real. Sam would n…
24. A
— `.concat()` stacks DataFrames vertically or horizontally
24. b
— Values alignment is an ongoing practice because values do not automatically produce aligned behavior…
24. c
— Psychopathy is a spectrum dimension (not categorical) characterized by lack of empathy, interpersona…
24. D
— Big Data Bowl provides raw tracking data
24.1
— 24.4 `while` loop, **5.4**, 5.5 `with` statement, **10.1**, 10.2 write mode (file), **10.2**
24.96
— Player B: 25.71 * (99 / 96) = **26.52**
24/7 availability
— no planned or unplanned outages - **High throughput** — 15,000 CICS transactions per second at peak …
240V circuits:
— Circuit 1: 20A double-pole → Table saw outlet (NEMA 6-20R) - Circuit 2: 20A double-pole → Dust colle…
247Sports
— Composite rankings methodology - https://247sports.com/ - Class calculator tools
247Sports Composite
— Historical rankings - Class compositions - API access (unofficial)
24a. B
— EPA per play: Overall passing efficiency (points added per attempt)
24a. C
— ADOT: Target depth (average air yards)
24b. A
— YBC: Run blocking quality (yards before contact)
24b. C
— CPOE: Accuracy above expectation (completion % vs expected)
24c. A
— ADOT: Passing depth tendency (average air yards)
24c. B
— EPA/target: Receiving efficiency (value per opportunity)
24c. D
— Success rate: Consistency (% of positive plays)
24d. C
— Explosive run rate: Big play ability (10+ yard runs)
24d. D
— Success rate: Consistency of positive outcomes (% of plays with positive EPA)
25% of the critical bandwidth
— producing beat rates in the roughness zone (roughly 25–40 Hz)
25. A
— PFF provides player grades and evaluations
25. B
— Cialdini's central argument is that these principles evolved or were culturally selected because the…
25. C
— Stereotype threat's mechanism: divided cognitive attention between task performance and managing the…
25.1
— 25.5 `git add`, **25.2** `git branch`, **25.3** `git checkout`, **25.3** `git clone`, **25.5** `git …
25.71
— Player B: (1,500 / 2,100) * 36 = **25.71**
255.85 assist points produced
— ### Question 25 Calculate passes per possession and ball movement efficiency for a team with: - Tota…
25a. B
— Box plot: Comparing distributions across groups (compact summary of median, quartiles, outliers)
25b. A
— Histogram: Showing distribution of a single continuous variable (reveals shape, center, spread)
25c. D
— Scatter plot: Showing relationship between two continuous variables (reveals correlation, patterns)
25d. C
— Bar chart: Showing categorical variable frequencies (easy to compare counts/percentages across categ…
26.1
— 26.5 `self`, **14.2**, 14.3 selection sort, **19.3**, 19.6 Selenium, 24.5 semantic versioning, **23.…
26.2
— 26.3; gaps, 26.3; metals vs. insulators, 26.4 Band theory of solids, **26.1**--26.6 Basis: orthonorm…
27% of total lending
— a concentration significantly above the UK banking sector average of approximately 15%. The PRA's an…
27a. C
— Type I Error: Rejecting a true null hypothesis (false positive)
27b. B
— Type II Error: Failing to reject a false null hypothesis (false negative)
27c. A
— Statistical Inference: Using sample data to make conclusions about a population
27d. D
— Power: Probability of correctly rejecting a false null hypothesis
28.1
— 28.5; repeated, 6.5; sequential Stern-Gerlach, 6.5, 13.4; *measurement.py* Mixed state, **23.2** Mom…
2800–3200 Hz range
— This provides 15–20 dB enhancement in the orchestra's natural **spectral gap** - Mechanism: lowered …
2: B
— The `--privileged` flag disables almost all containment mechanisms, granting the container full acce…
2: C
— FGSM generates adversarial examples in a single step by computing the sign of the gradient of the lo…
2:40 → 6:15
— CNB's regulatory batch window expansion (mainframe → cloud) due to I/O architecture difference - **8…
2:50 PM
— The rolling deployment of the old code completed. Health checks passed. Marcus watched the error rat…
2:54 PM
— Jordan leaves the warehouse, clocking out via the biometric system. Jordan's phone reconnects to the…
2:55 PM
— Marcus posted a status update in Slack: "Checkout v2 has been rolled back. Checkout is working norma…
3 Architecture Decision Records
— **A user guide** with tutorial, how-to guides, and reference sections - **A reconstructed changelog*…
3 standard deviations above the mean
— very unusual. By the Empirical Rule, only about 0.15% of patients would have readings this high or h…
3-6 charts
— Use **consistent colors and scales** - Include **filters** for different user needs - Add **data sou…
3. Account governance:
— RPTUSER account was replaced with individual named accounts for each analyst - Each account was mapp…
3. AI Infrastructure Engineer
— Focus: Build the platforms, frameworks, and tooling that ML teams depend on. - Skills: Distributed s…
3. Analogical Reasoning
— The cognitive process that bridges surface and structure — recognizing that two situations share the…
3. Are related observations separated?
— [ ] If the data has natural groups (patients, users, companies), all observations from the same grou…
3. Avoid Common Bottlenecks
— **Enqueue contention**: Keep exclusive locks on shared resources for the minimum time - **File I/O c…
3. B
— The U lock prevents conversion deadlocks. Without it, two programs holding S locks on the same resou…
3. Bias and Fairness Analysis
— Has the system been tested for disparate impact across demographic groups? - Which fairness metrics …
3. C
— DB2 doesn't know the size of your COBOL arrays. It will write 1,000 rows' worth of data starting at …
3. CNBDSKRPT
— DASD space report. Generated a daily report of DASD utilization by storage group, flagging volumes a…
3. Code explanation
— Weak: "Explain this code" - Strong: "Explain this Python function to a junior developer who understa…
3. Competitive Analysis Template
— Role: Athena's competitive intelligence analyst - Structured output with standardized sections (posi…
3. Cooperation through norms and institutions
— developing shared epistemic norms and institutions maintained through social rather than governmenta…
3. Corporate Opacity Mechanisms
— Nominee shareholders: legal title holder obscures actual owner - Bearer shares: largely eliminated b…
3. Creation
— the desire to generate sounds with no acoustic referent whatsoever: timbres that no physical instrum…
3. Cross-Region Testing (MRO Security)
— Verify security context propagates correctly from TOR to AOR - Verify that directly connecting to an…
3. Customer service chatbot.
— *Function:* Handles initial customer inquiries, resolves common issues, escalates complex cases to h…
3. D
— Both `~=1.24.0` (compatible release, allows >=1.24.0, <1.25.0) and `>=1.24.0,<2.0.0` are acceptable,…
3. Data Class
— Defines *data characteristics*: - RECFM, LRECL, BLKSIZE (defaults if not specified in JCL/program) -…
3. Decide (30 minutes to set up):
— Write a one-page "Rules Card" (physical index card or phone note) containing: minimum edge threshold…
3. Distrust of algorithmic decisions.
— *Mitigation:* Invest in explainability (Chapter 26). Show stakeholders *why* the model made a recomm…
3. Divergent and Convergent Thinking
— **Divergent thinking:** generating many possible ideas — fluency, flexibility, originality, elaborat…
3. Diversity Audit
— How many of the accounts you follow on each platform represent political or cultural perspectives th…
3. Does each item have named fields?
— If yes → **dict** or **named tuple** - If no (just a value, not a record) → **list**, **tuple**, or …
3. DORA: The EU Technology Risk Standard
— Five pillars: ICT risk management, ICT incident reporting, resilience testing, third-party risk, inf…
3. Emotional patterns:
— Looking across all your mood-before vs. mood-after entries: did social media use, on average, improv…
3. ESPN Tends to Show Higher Passing Yards
— Consistent pattern across multiple games - Likely includes yards differently (sack treatment) - **Re…
3. Ethical risks:
— Algorithmic bias produces unfair outcomes (Chapter 25) - Lack of explainability undermines trust (Ch…
3. Event sourcing adoption
— The `events` table is formalized into a proper event store with aggregate versioning and optimistic …
3. Familiarity (0.3-0.5 points)
— Knowledge of stadium quirks - Field surface familiarity - Sight lines and dimensions - Weather accli…
3. Findings Summary
— Vulnerability count by severity - Findings by category (missing patches, misconfigurations, default …
3. Germane Load
— Cognitive effort spent on actually understanding and integrating the material. This is the *good* co…
3. In-Game Management:
— Real-time fatigue monitoring - Mandatory rest in decided games - Substitution based on load metrics …
3. Infrastructure Costs
— ML platform licensing (SageMaker, Vertex AI, Databricks) - Monitoring tools (Arize, Evidently) - Con…
3. Insulation and air sealing:
— Rim joist insulation - Foundation wall insulation (continuous foam) - Air sealing at all penetration…
3. Latency and Scalability
— How fast does the model produce predictions, and how does that speed change at scale? A model that t…
3. Legal Compliance
— Does the tool appear to comply with Title VII, ADA, and ADEA requirements? - Does it meet NYC Local …
3. Message queue backbone
— All inter-service communication goes through a message queue (RabbitMQ or AWS SQS). - Priority queue…
3. Misconception Detection
— **Teaching version:** Marcus knew that students didn't arrive as blank slates. They came with pre-ex…
3. Mitigate
— Take immediate action to limit damage. Options include: - Rollback to the previous model version - P…
3. Model and validate (Month 3)
— Apply growth projections to baseline metrics - Identify bottlenecks: which resource hits its limit f…
3. Name Matching Is the Core Technical Challenge
— Exact matching: appropriate for document IDs; insufficient for names - Levenshtein/edit distance: go…
3. Narrative Surprise
— "I didn't expect the story to go there." A plot twist, an unexpected ending, a revelation that refra…
3. Optimize inference.
— Model compression (reduce model size without significant accuracy loss) - Model quantization (use lo…
3. Organizational Readiness
— Business stakeholders had vague expectations ("We need AI") without specific, well-defined use cases…
3. Parents (Thursday):
— **Format:** 4-5 slides with large, simple charts, plus a one-page handout to take home - **Level of …
3. Point Estimate:
— Symbol: __________ - Value: __________
3. Practice Design (3 sessions per week, minimum):
— What specific component will you work on in each session? - What will the practice look like? (Descr…
3. Procedure
— **Between-subjects design** (simpler): Half your participants use Strategy A, half use Strategy B, o…
3. Reach multiplier
— How many views relative to followers? - If > 10x → content broke well beyond existing audience - But…
3. Relatedness
— the experience of genuine connection with others; feeling cared for and caring for others. Not merel…
3. Results (400–600 words)
— Present your data in at least one table - Report the key numbers: means, ranges, differences between…
3. Risk Assessment
— What harms could the system cause? - What is the likelihood and severity of each harm? - Are there d…
3. SAR Quality Is as Important as SAR Volume
— The annual global SAR volume has grown to millions — not all are actionable - A high-quality SAR nar…
3. Significance Level:
— alpha = _________ (set BEFORE looking at results)
3. Simulation-Based Learning
— Simulations replicate the cognitive demands of real performance while removing real consequences. - …
3. Summary Statistics
— Overall coverage: count, min, max, mean, median - Coverage by region - Coverage by vaccine type
3. Table of Contents
— Auto-generated from headings - Include page numbers
3. Talent Costs
— Data scientists (median US salary: $130,000-$170,000, 2025) - ML engineers (median US salary: $150,0…
3. The Cognitive Load Connection
— Working memory has two channels: the phonological loop (verbal) and the visuospatial sketchpad (visu…
3. The Innovator
— Uses AI to create new products, services, or revenue streams. Deploys AI-native offerings that would…
3. The Inventory Alert
— A script that monitors stock levels in Acme's inventory database and emails Marcus and the warehouse…
3. The Metrics Dashboard
— Published weekly. Shows: - MIPS trend (should be declining as dead code is retired) - API endpoint c…
3. The Seven Desirable Difficulties
— **Spacing:** Gaps between study sessions reduce retrieval strength; effortful re-retrieval builds st…
3. The suspicious pattern
— Why is this suspicious? What specific indicators made the analyst conclude suspicion rather than exp…
3. The Twist
— Steady in one direction, then a sharp pivot. ``` 😂 → 😂 → 😂 → 😂 → 😢 ``` Best for: Comedy that turns s…
3. Timing and updates:
— Score at each update: Rewards early movers but penalizes experimentation - Score at close only: Simp…
3. Use bridge-friendly formats:
— Collaborate with creators from adjacent niches (a science creator, a budget creator) - Create duet-f…
3. Was there a control group?
— Without a baseline comparison, you can't tell whether the treatment had an effect or whether the out…
3. What are the failure modes?
— False positives: Students wrongly labeled as at-risk are subjected to mandatory advising they do not…
3. What happens when the consumer is down?
— Must not lose data: File or Message (persistent) - Can retry: API with retry logic - Can tolerate lo…
3.1 Automated Evaluation
— Evaluate on the held-out test set using: - **Perplexity**: Compare base model vs. fine-tuned model o…
3.1 Intent Classification and Routing
— Implement an intent classifier that categorizes user requests into types: - **Question answering**: …
3.1 Prompt Engineering
— Design a system prompt that instructs the LLM to: - Answer based only on the provided context. - Cit…
3.2 Domain-Specific Benchmark
— Create or adapt a domain-specific benchmark with at least 100 questions spanning: - Factual recall (…
3.2 LLM Integration
— Support at least two LLM backends: - A cloud API (OpenAI GPT-4, Anthropic Claude, or equivalent). - …
3.2 Tool Integration
— Define and implement at least four tools that the agent can invoke: - `search_knowledge_base(query, …
3.2 Warning system.
— First offense (minor): warning logged to member record - Second offense or first major offense: temp…
3.3 Citation Generation
— Each answer must include inline citations referencing specific retrieved chunks. - After the answer,…
3.3 Human Evaluation
— Conduct human evaluation on at least 50 test examples. - For each example, a human rater (you, a tea…
3.3 Multi-Step Reasoning
— Implement a ReAct-style agent loop: 1. **Think**: The LLM reasons about what to do next. 2. **Act**:…
3.33
— the digits beyond the second decimal place are discarded.
3.4 Context Window Management
— Implement intelligent context truncation: when retrieved chunks exceed the model's context window, p…
3.4 Conversation Management
— Maintain conversation state across multiple turns. - Support multimodal conversation history: the ag…
3.4 Safety and Robustness Evaluation
— Test for: - Hallucination rate: Fraction of responses containing fabricated information. - Refusal a…
3.5 Error Analysis
— Manually categorize errors from the test set into types: - Factual errors (wrong information). - Inc…
3.5 Error Handling and Recovery
— When a tool call fails, the agent should: - Log the error. - Attempt an alternative approach (differ…
3/8 inch
— the lightest panel, rarely used in new construction; sometimes used for curved surfaces or in repair…
30 points
— **Player B:** (12 x 2) + (0 x 3) + (7 x 1) = 24 + 0 + 7 = **31 points** - **Player C:** (4 x 2) + (6…
32.3 completions
— Version B: 100 viewers × 68% × 72% = **49.0 completions**
3270 terminals
— 500 branch teller stations 2. **ATM network** — 2,000 ATMs 3. **Mobile API** — RESTful API for mobil…
33.1
— 33.5 Operator: adjoint, 6.4; commutator, 6.3; Hermitian, 6.4; linear, 6.1; projection, 8.3; unitary,…
33.2
— 33.4; timescales, 33.3; pointer basis, 33.3; and measurement, 33.4 Degeneracy, **3.4**, 5.5; acciden…
34.3 Hz
— Next axial mode (length): f = 2×34.3 = **68.6 Hz** - Lowest axial mode (width): f = 343/(2×4) = **42…
34.7%
— **Error rate gap:** Up to 34.4 percentage points between best- and worst-performing subgroup
35-45%
— but still well below semantic encoding.
36% produced statistically significant results
— The average effect size in the replications was **roughly half** the average effect size in the orig…
362
— making it the deadliest mine disaster in American history. The actual toll was almost certainly high…
37a. Role Structure:
— **TELLER:** SELECT, INSERT, UPDATE on accounts and transactions (restricted to own branch via RCAC).…
39.7% of total weekly cost
— the single largest cost driver. Stage 2 (full investigation) accounts for £2,791/week = 39.6%.
3: B
— The Docker socket provides full control over the Docker daemon. An attacker can create new container…
3: C
— This is an adversarial evasion attack (also called an inference-time attack). The attacker crafts a …
3:00 PM
— Mia opens the chapter. She reads the chapter title and glances at the introductory paragraph. She st…
3:03 PM
— She encounters the term "transcription factor" in bold. She highlights it. She reads the definition.…
3:08 PM
— A complex diagram shows the lac operon regulatory system. Mia looks at it for about four seconds, de…
3:14 PM
— She's midway through a section on promoters and enhancers. She realizes she doesn't remember what a …
3:15 PM
— Jordan rides the bus to campus. A mounted camera in the bus reads license plates of vehicles passing…
3:19 PM
— She highlights a sentence about chromatin remodeling. She's not sure what it means, but it seems imp…
3:25 PM
— Her phone buzzes. She checks it. A friend has posted something on Instagram. She scrolls for 90 seco…
3:30 PM
— Full recovery confirmed. Marcus posted the final status update: "All clear. Checkout is working norm…
3:31 PM
— She reaches a section on epigenetics. She's heard the term before and thinks she knows what it means…
3:40 PM
— She's in the last section. She reads it at the same pace as everything else.
3:47 PM
— She reads the chapter summary. She nods along — everything in the summary sounds familiar.
3:52 PM
— She closes the book. She feels ... okay. Not great, not terrible. She could probably tell you the ch…
3a. Scope Definition
— Which instruments will the rule apply to? Justify your selection. - Which trader populations will be…
3Blue1Brown
— Mathematical intuition - Excellent visualizations - https://www.youtube.com/c/3blue1brown
3Blue1Brown (YouTube)
— Beautiful mathematical visualizations - Probability and Bayes' theorem videos - Builds deep intuitio…
3c. Client-Side Optimization
— **Speculative prefetch**: The IDE plugin prefetched completions as the user typed, predicting likely…
3c. Phase 2 Parameters: Price Impact Measurement
— How will you measure the relevant mid-price at the time of cluster placement and at the time of canc…
3D Tune-In Toolkit
— 3d-tune-in.eu Open-source library for binaural audio rendering with HRTF personalization. Includes i…
3d. Phase 3 Parameters: Cancellation Measurement
— What fraction of the clustered orders must be cancelled (rather than executed) to trigger the rule? …
3e. Composite Scoring and Alert Severity
— How will you weight the components (Phase 1 severity, Phase 2 impact, Phase 3 cancellation rate) int…
3f. False Positive Mitigations
— List at least three specific adjustments to the rule design that reduce false positives. For each, e…
3g. Governance and Calibration
— How frequently should this rule's thresholds be reviewed? - What backtesting methodology would you u…
3–4 years
— before formal music instruction typically begins, suggesting rapid implicit learning from ambient mu…
4 points each, allocated as:
— Accurate definition/explanation of the concept (1.5 points) - Concrete, specific example (1 point) -…
4. Accommodation Adequacy
— What accommodation pathways are documented? - Are they proactively communicated to candidates? - Are…
4. AI Product Manager
— Focus: Translate AI capabilities into user-facing products. - Skills: Product sense, technical liter…
4. Answer these questions in text cells:
— How many observational units are in your dataset? - How many variables are there? How many are numer…
4. Appendices
— Tool output - Additional evidence
4. B
— Under CS, read locks are held only while the cursor is positioned on the row/page. When the cursor m…
4. Boundary Testing
— Test with expired passwords - Test with revoked userids - Test with userids at maximum password-fail…
4. C
— SQLCODE +252 indicates partial completion of a non-atomic multi-row INSERT. Check SQLERRD(3) for the…
4. CFBD and Sports Reference Usually Agree
— When there are differences, they're typically small - Both likely use similar underlying sources - *…
4. CNBJOBMON
— Job monitoring exec. Ran every 5 minutes during the batch window, checking for jobs that had been ex…
4. Could it be misused?
— The risk labels could be used for purposes beyond advising — e.g., admissions committees could use t…
4. Cover letter
— Weak: "Write a cover letter for this job" - Strong: "Write a cover letter for a senior product manag…
4. CQRS introduction
— The write path (order placement, matching) uses the event store as its source of truth. - Read model…
4. Creativity as Combinatorial
— Every creative idea in history has been a new combination of existing elements. Nobody creates from …
4. Cross-platform presence
— Did the video appear on other platforms? - If the same video (or screenshots/clips) appeared on Twit…
4. Data Quality Assessment
— Missing values by column - Any values outside expected ranges - Consistency checks on categorical co…
4. Deliberate Practice (Ericsson's Criteria)
— Targets a specific skill component (not a general goal like "get better") - Designed to improve perf…
4. Diagnose
— Investigate the root cause. Common causes: upstream data change, data pipeline failure, feature engi…
4. Discussion (500–800 words)
— Did your results support your hypothesis? Be specific. - How do your findings compare to the publish…
4. EDD Elements Beyond Standard CDD
— **Source of wealth**: how the customer accumulated their overall wealth — requires corroborated docu…
4. Emotional Surprise
— "I didn't expect to feel this way." Content that starts with one emotional tone and shifts to anothe…
4. Enforce (15 minutes to set up):
— Write three non-negotiable rules at the top of the Rules Card: daily loss limit (e.g., 5% of bankrol…
4. Ensemble Methods for Imbalanced Data
— **BalancedRandomForest:** Random forest variant that balances each bootstrap sample. - **EasyEnsembl…
4. Executive Summary (1-2 pages)
— High-level overview for non-technical leadership - Overall risk assessment - Key findings summarized…
4. Fairness and Compliance
— Does the model treat different demographic groups equitably? Does it comply with relevant regulation…
4. False Positive Rates Are Systematically High
— Common names from populations frequently represented on sanctions lists (e.g., Arabic, Persian, Russ…
4. Framing:
— Build interior partition walls - Frame around mechanical areas (utility room) - Frame soffits to con…
4. Handling missing forecasts:
— If a forecaster skips a question, assign the prior (e.g., community median or base rate) - Or exclud…
4. HR screening model (rebuilt post-Chapter 25).
— *Function:* Assists in screening job applications by scoring candidates against role requirements - …
4. Hybrid Architecture: The Practical Solution
— Most sophisticated programs use a layered approach: - Rules-based layer: known typologies, regulator…
4. Infrastructure Costs
— ML platforms (SageMaker, Vertex AI, Databricks) - Experiment tracking tools (MLflow, Weights & Biase…
4. Is the performance realistic?
— [ ] The model's AUC or accuracy is in a plausible range for the problem domain - [ ] Performance doe…
4. Malinformation: True Content Used to Harm
— The most counterintuitive category: factually accurate information can cause serious harm when deplo…
4. Mayer's Multimedia Learning Principles
— **Multimedia Principle:** Words + pictures > words alone - **Spatial Contiguity:** Place related wor…
4. Measurement
— Design your test *before* anyone studies. This keeps you honest. - Include at least 10 questions (mo…
4. Mitigation Measures
— What steps have been taken to reduce identified risks? - Are there human oversight mechanisms? - Is …
4. Monitor and eliminate waste.
— Identify and shut down unused model endpoints - Archive old model versions and their associated arti…
4. Multi-level caching
— L1: In-process LRU cache (1-second TTL) for the hottest data. - L2: Redis cluster for shared cache (…
4. Network and apply.
— Attend local meetups or virtual data science communities - Contribute to open-source data analysis p…
4. Project-Based and Problem-Based Learning
— **Project-based learning:** Learning by building something tangible. Forces integration of multiple …
4. Proving Value
— The board expected tangible ROI within 18 months. - Without quick wins, the initiative risked losing…
4. Query governance:
— The analytics team was provided a read replica for heavy queries instead of the production database …
4. Referee Bias (0.2-0.4 points)
— Documented home penalty advantage - Crowd influence on close calls - Review booth tendencies - Has d…
4. Regulatory risks:
— New AI regulations impose requirements the organization is not prepared for (Chapter 28) - Privacy v…
4. Results (300–400 words)
— Post-assessment results compared to baseline - Your client's self-reported changes in their learning…
4. Social Media Caption Writer
— Separate templates for Instagram, LinkedIn, and email newsletter - Platform-specific constraints (ch…
4. Source Tracing
— When you see a piece of political content in your feed, can you trace it to its original source? Is …
4. Storage Group
— Defines *where data goes*: - Pool of volumes eligible for dataset placement - Volume selection crite…
4. Storage Optimization
— Keep COMMAREA as small as possible - Release unused storage promptly using `EXEC CICS FREEMAIN` - Us…
4. Talent Costs
— ML engineers (the most significant ongoing cost) - Data scientists (for model improvement and retrai…
4. The Challenge
— *Best use case:* Creating viral participation potential; pre-arranged launch wave ensures critical m…
4. The context
— What do we know about the customer that makes this activity inconsistent? What was their declared bu…
4. The Curse of Knowledge
— **Teaching version:** Marcus learned early in his career that being an expert in history didn't auto…
4. The Global Registry Gap
— No single global corporate registry exists - Registry quality varies dramatically: UK Companies Hous…
4. The Hypercorrection Effect
— High-confidence errors are corrected more thoroughly than low-confidence errors. - The surprise of b…
4. The Loop
— Ends at the same emotional note where it began. ``` 🤔 → 😲 → 😊 → 😌 → 🤔 ``` Best for: Thought-provokin…
4. The ORM Framework Components
— **RCSA**: Business units identify and assess risks in their processes; inherent vs. residual risk; c…
4. The Sales Forecast
— A compound growth model with three scenarios (optimistic, base, conservative) updated monthly. Sandr…
4. The Transformer
— Uses AI to fundamentally redesign the business model. Moves from product-based to platform-based, fr…
4. Track cross-cluster signals:
— Monitor analytics for new-audience spikes - When cross-cluster content works, create more at that sp…
4. Transfer-Appropriate Processing
— Memory performance depends on the match between encoding processes (how you study) and retrieval pro…
4. Transparency and Explainability
— Can affected individuals obtain a meaningful explanation of how decisions about them were made? - Is…
4. Trigger patterns:
— What percentage of your sessions began with a genuine, intentional purpose? - What percentage began …
4. Was blinding used?
— Single-blind? Double-blind? Unblinded? The less blinding, the more room for bias.
4. Who initiates the exchange?
— Consumer pulls when ready: API or File - Producer pushes when available: Message or File - Changes d…
4.05
— AMLPro Enterprise: (5×0.25) + (4×0.20) + (4×0.15) + (3×0.15) + (2×0.10) + (5×0.10) + (3×0.05) = 1.25…
4.1 Input Guardrails
— **Query validation**: Reject empty queries, queries exceeding maximum length, and queries that consi…
4.1 Merge and Export
— Merge the LoRA adapter weights into the base model to create a standalone model. - Save the merged m…
4.1 Text Guardrails
— Implement the following (reusing and extending techniques from Capstone 1 where applicable): - Input…
4.2 Image Guardrails
— Implement content moderation for uploaded images: - NSFW detection using a pre-trained classifier (e…
4.2 Output Guardrails
— **Faithfulness check**: Implement a check that verifies the generated answer is supported by the ret…
4.2 Quantization Methods
— Apply at least two of the following quantization methods: - **GPTQ** (4-bit, 128 group size): Use th…
4.3 Fallback Behavior
— When guardrails are triggered, return a graceful, informative error message rather than a generic er…
4.3 Multimodal Safety
— Address cross-modal attacks: - Images with hidden text designed to manipulate the vision-language mo…
4.3 Quality-Speed Tradeoff Analysis
— Create a plot showing: x-axis = inference speed (tokens/sec), y-axis = quality metric (e.g., average…
4.4 Bias Monitoring
— Implement basic bias monitoring for the vision-language pipeline: - Track whether image descriptions…
4.5
— Upper fence = 24.5 + 1.5(8) = 24.5 + 12 = **36.5**
4.5 Privacy
— Implement data retention policies: configurable auto-deletion of uploaded content after a specified …
4.D1
— Jake Rourke argues that his 25 years of campaign experience give him better political judgment than …
4.D2
— The chapter argues that intellectual humility — expressing calibrated uncertainty — is a professiona…
4.D3
— We noted that the ecological fallacy — drawing individual-level conclusions from aggregate data — ha…
4.D4
— The chapter distinguishes prediction and explanation as different analytical goals requiring differe…
40.0 PPG equivalent
— Assists: 10.4 * (126/99.6) = **13.2 APG equivalent**
40.825 (approximately 41 field goals made)
— ### Question 23 Calculate the expected value of the following shot distribution: - 30 rim attempts a…
400 (Bad Request)
— The client sent a request that the server cannot process due to malformed syntax.
404 (Not Found)
— The requested resource (account) does not exist. This maps directly to the CICS DFHRESP(NOTFND) cond…
450 Hz
— 5th harmonic: 5 × 150 Hz = **750 Hz** - 7th harmonic: 7 × 150 Hz = **1050 Hz**
47 active monitoring scenarios
— several variations of the same typology, accumulated over years as new scenarios had been added with…
47.3 tonnes CO2
— Transatlantic flights: 47,293 / 1,600 = approximately **29.6 flights**
48 Hours Before:
— Temperature: 28°F - Wind: 15 mph - Light snow expected
4: B
— Docker images use a union filesystem with additive layers. Deleting a file in a later layer only add…
4:00 PM to 5:45 PM
— Jordan attends Dr. Osei's seminar on social theory. Jordan's phone is in their bag. It continues to …
4:30 PM Thursday: Line opens at Pinnacle
— Seahawks +6 (-104) / Cardinals -6 (-108) - Market is quiet; a few recreational bets trickle in.
4–5 years
— even before incentives. Section 23.7 covers this decision in more detail.
5 = Extremely true of me
— | # | Statement | Rating (1–5) | |---|---|---| | 1 | I fear others have more rewarding experiences t…
5% threshold
— The minimum national vote share required for a party to receive proportional representation seats in…
5. A
— R-squared = 0.25 means the linear trend accounts for 25% of the total variation in revenue. The rema…
5. AI Safety and Alignment Researcher
— Focus: Ensure AI systems behave as intended and do not cause harm. - Skills: Formal methods, game th…
5. Appendices
— Full host/port inventory - Complete vulnerability list - Scan configuration details - Tool output fi…
5. Audit Verification
— Execute test transactions and verify SMF 110 records are generated - Attempt unauthorized access and…
5. b
— Introversion and shyness are distinct constructs. Introversion is a preference for lower stimulation…
5. Board and finish:
— Hang drywall on framed walls and ceilings - Tape, mud, sand, prime - Prime and paint
5. Budget Status:
— Planned spend to date: $___ - Actual spend to date: $___ - Variance: $___ (___ %) - Forecast at comp…
5. C
— `WITH ROWSET POSITIONING` enables the cursor for multi-row FETCH operations. Without this clause, `F…
5. Can you think of a confounding variable?
— If you can think of a plausible third variable that explains the association, be cautious. If the st…
5. Climate Factors (0.0-1.5 points)
— Cold weather for dome teams visiting - Altitude (Denver) - Heat acclimation - Covered in Chapter 24
5. CNBPREFLT
— First-generation pre-flight check. Validated input dataset availability before the GL batch stream b…
5. Comprehensive monitoring and alerting
— Custom Prometheus metrics for prediction-market-specific concerns: - `market_spread` (bid-ask spread…
5. Constraints and Creativity
— **Productive constraints** enhance creativity by: reducing the search space (preventing paralysis of…
5. Controls
— What are you holding constant? (Study time, materials, test difficulty, delay between study and test…
5. d
— Power and Universalism are on opposite ends of the Self-Enhancement vs. Self-Transcendence axis and …
5. Desirable vs. Undesirable Difficulties
— A difficulty is desirable when: the learner can engage with it, it triggers productive processing, a…
5. Does the exchange require a response?
— Synchronous request-reply: API - Fire-and-forget: File or Message - Asynchronous request-reply: Mess…
5. Emotional Signal Awareness
— The Haugen documents showed that the "angry" reaction generates 5x more distribution than "like." Be…
5. Engagement Monitoring
— **Teaching version:** Marcus was always reading his students. Are they paying attention? Are they co…
5. Enhanced monitoring:
— A new alert was added for any single application reading more than 5 million rows in a 5-minute wind…
5. Financial Risk
— Overpaying relative to market value - Long contracts for aging players - High wage demands relative …
5. Fix
— Implement the fix. This may be a pipeline code change, a data source update, a model retraining, or …
5. Graph Analytics for SAR Investigation
— Transaction networks: nodes = accounts; edges = money flows weighted by amount - Betweenness central…
5. Graph Traversal Is the Core Technical Approach
— Ownership structures are directed graphs: nodes = entities; edges = ownership links with percentages…
5. High Road and Low Road Transfer
— **Low road:** Automatic, reflexive, triggered by surface similarity and extensive practice. Handles …
5. Human Oversight
— Is there a human decision-maker who can override the system's output? - Under what circumstances is …
5. Improve (15 minutes to set up):
— Add a "Lessons" tab to the Google Sheet. After each weekly review, write one sentence: "This week I …
5. Is it transparent?
— Can students see their risk score? Can they understand why they were flagged? Can they challenge the…
5. Maintenance Costs
— Ongoing monitoring and incident response - Periodic retraining (new data, updated features) - Model …
5. Monitoring
— Prometheus collects metrics from all services. - Grafana dashboards show the four golden signals: la…
5. Monitoring Plan
— How will the system's performance be tracked after deployment? - What metrics will be monitored? - W…
5. Organizational Fit
— Does the team have the skills to maintain the model? Does the infrastructure support it? Will the bu…
5. Personal Reflection (400–600 words)
— What did you learn about the research process itself? - How has designing and conducting this study …
5. Prior contact or investigation
— Has law enforcement been contacted? Has the institution filed prior SARs on this subject? Are there …
5. Recommendation
— Deploy / Deploy with conditions / Do not deploy - If deploying with conditions: what conditions? - I…
5. Reflection (500–700 words)
— What did you learn about coaching that you couldn't have learned from reading about it? - What was h…
5. Reflection-in-Action vs. Reflection-on-Action
— **Reflection-on-action:** Analyzing your performance after the fact. Essential, and accessible to be…
5. Sales email
— Weak: "Write an email to a potential customer" - Strong: "Write a cold outreach email to a VP of Ope…
5. Scope and Methodology
— What was tested (IP ranges, applications, domains) - What was not tested (explicit exclusions) - Tes…
5. Software and Licensing
— **AI platform licenses**: Commercial AutoML platforms, enterprise AI suites - **Open-source support*…
5. Source of Wealth ≠ Source of Funds
— SOF: where did this money come from? (transaction-level) - SOW: how did this customer build their we…
5. Test Information:
— Test name: ___________________________________ - Test statistic formula: ___________________________…
5. The Churn Predictor
— Priya's most technically ambitious project: a logistic regression model trained on 18 months of cust…
5. The Expert Blind Spot
— As expertise develops, it becomes harder to remember what it was like to not have that expertise. - …
5. The False Positive Problem Is a Compliance Risk
— False positive rates of 90–98% are common in rule-based programs — meaning most analyst time is spen…
5. The Peak
— Builds to one intense emotional moment, then resolves. ``` 😐 → 😟 → 😰 → 🤯 → 😌 ``` Best for: Suspense,…
5. The Swap/Guest Exchange
— *Best use case:* Deep mutual exposure — each creator's voice reaches the other's audience directly; …
5. Third-Party Risk Is Now a Primary Risk Category
— US: 2023 Interagency Guidance covers the full third-party relationship lifecycle - DORA: Register of…
5. Timing relative to trend
— When was the video posted vs. when the trend peaked? - If posted at the start of the trend and views…
5.1
— 5.7; Bohr model, 1.5; degeneracy, 5.5; energy levels, 5.5; fine structure, 18.2; ground state, 5.5; …
5.1 API Design
— Build the API using FastAPI with the following endpoints: - `POST /query` -- Submit a question and r…
5.1 Serving Engine Setup
— Deploy the model using vLLM (recommended) or HuggingFace Text Generation Inference (TGI). - Configur…
5.1 User Interface
— Build a web-based user interface using Streamlit, Gradio, or React. - The UI must support: - Text in…
5.2 API Design
— Implement a complete REST API (FastAPI) with the following endpoints: - `POST /chat` -- Send a messa…
5.2 API Layer
— Build a FastAPI wrapper around the serving engine with endpoints: - `POST /generate` -- Single compl…
5.2 Observability
— Log every request with: request ID, timestamp, query, retrieval latency, generation latency, total l…
5.3 Containerization
— Provide a `Dockerfile` for the application. - Provide a `docker-compose.yml` that launches the API, …
5.3 Infrastructure
— Provide Docker Compose configuration that launches all services: - Application server (FastAPI + age…
5.3 Performance Optimization
— Benchmark the serving setup: - Latency: Time to first token (TTFT) and inter-token latency (ITL) at …
5.4 Monitoring and Logging
— Log every request: timestamp, input length, output length, latency, tokens/second, model parameters …
5.4 Performance
— Benchmark end-to-end latency for common operations: - Text-only question: target < 5 seconds. - Imag…
5.4%
— still above the 4.5% regulatory minimum but with a substantially reduced buffer - The Capital Planni…
5.5 Containerization
— Create a `Dockerfile` for the complete serving stack. - Provide a `docker-compose.yml` if multiple s…
5.5 Monitoring
— Implement structured logging for all operations. - Track and report: - Request volume by type. - Lat…
500 (Internal Server Error)
— An unexpected error occurred on the server side. The client's request was valid, but the server enco…
500 families
— between 2,000 and 3,000 people — from the Blue Ridge. The removals were conducted over several years…
500,000 acres of abandoned mine land
— land that was mined, used, and left without adequate reclamation. These lands include open mine port…
5: B
— Model extraction aims to create a substitute model that functionally replicates the target model's b…
5: C
— etcd stores all cluster state, including Secrets. Directly accessing etcd bypasses all RBAC controls…
5:00 PM --- Pre-Event
— Cache warmer activated for all election markets. - Kubernetes HPA minimum raised from 4 to 15 pods. …
5:47 AM
— Jordan's iPhone sends a background signal to Apple's servers, confirming the device is active and re…
5:52 PM
— Jordan searches Google Maps for the address of a friend's apartment. Google records the search query…
5a. Automation change management:
— Change request template (what information is required) - Approval chain (who approves automation cha…
5a. Case Identification
— Name of the case and date of the enforcement action - Respondent(s) — individual, firm, or both - Ma…
5b. Behavioral Pattern
— What specific behavior was alleged? Describe the mechanism of the manipulation. - How was the behavi…
5b. Testing requirements:
— Unit testing standards (isolated rule testing) - Negative testing requirements (what must be tested)…
5c. Evidence and Intent
— What type of evidence did the CFTC cite to establish intent? - Was there communications evidence (ch…
5c. Operational safeguards:
— Rate limiting policy (maximum rule execution frequency) - Mutual exclusion rules (which rules cannot…
5d. Monitoring and review:
— Automation activity logging requirements - Monthly review process (what to review, who reviews) - An…
6 out of 53
— an 11% replication rate.
6 points each, allocated as:
— Accurate definition/explanation of the concept (2 points) - Concrete, specific example (2 points) - …
6. Adaptive vs. Routine Expertise
— **Routine expertise:** efficient within familiar parameters but breaks down with novelty. Knows *wha…
6. AI Ethics and Policy Specialist
— Focus: Navigate the regulatory, ethical, and societal dimensions of AI. - Skills: Law, policy analys…
6. Appendices (not counted toward word count)
— Completed assessment protocol (interview notes, strategy audit) - Your coaching plan (the filled-in …
6. B
— With XDFTRAN=YES and no generic default profile, when RACF finds no matching profile, it returns "re…
6. C
— SQLCODE -788 means the source of the MERGE contains duplicate values for the columns used in the ON …
6. CI Formula:
— Formula: point estimate +/- (critical value) x (standard error) - Standard error formula: __________…
6. Decision:
— [ ] Reject H0 (p-value <= alpha) - [ ] Fail to reject H0 (p-value > alpha)
6. Disaster recovery
— Database: continuous WAL archiving to object storage, point-in-time recovery tested monthly. - Event…
6. Findings Summary
— Risk rating summary table (Critical/High/Medium/Low/Informational count) - Findings organized by sev…
6. Flooring:
— Install subfloor system if using (DRIcore or similar) - Install finish flooring - Transition strips …
6. How was the sample selected?
— Random sample → results may generalize to the population - Convenience sample → results may only app…
6. Key Decisions Needed:
— [Decision 1 — deadline, options, recommendation]
6. Key Properties of the Seven Techniques
— **Not mutually exclusive**: Most propaganda combines multiple techniques simultaneously - **Not inhe…
6. Model Risk Management (SR 11-7)
— All models require: model inventory entry, conceptual soundness assessment, independent validation, …
6. Organizational Costs
— **Change management**: Training end users, redesigning workflows, managing resistance - **Governance…
6. Public Reporting
— What information about the system will be made publicly available? - How will affected individuals b…
6. Real-Time vs. Batch Have Different Requirements
— Payment screening must be integrated before transaction execution — milliseconds to seconds - SWIFT …
6. Recourse and Redress
— Can affected individuals challenge algorithmic decisions? - Is the appeals process accessible, timel…
6. References
— Cite at least 3 chapters from this textbook - If you consulted any outside sources, cite those too
6. Review
— Conduct a blameless post-mortem. Document: What happened? When was it detected? What was the impact?…
6. Routine and Comfort (0.2-0.4 points)
— Home facilities and beds - Family presence (positive/negative) - Reduced logistical stress
6. Slide content
— Weak: "Give me content for my presentation slide" - Strong: "Write the content for one PowerPoint sl…
6. Trust Structures Are the Hardest Case
— Settlor (creates trust), trustees (legal title, management control), beneficiaries (economic benefit…
6.1 End-to-End Evaluation
— Create a test set of at least 50 questions with ground-truth answers and source documents. - Evaluat…
6.2 Ablation Study
— Measure the impact of each component by disabling it and re-evaluating: - Without query rewriting. -…
6.2 Human Evaluation
— Recruit 2-3 evaluators (can be teammates or volunteers). - Have each evaluator interact with the sys…
6.2 Live Demo
— Demonstrate the deployed model answering domain-specific questions. - Show side-by-side comparison w…
6.3 Code Repository
— All code in a clean, well-organized repository. - README with setup instructions. - Requirements fil…
6.3 Comparative Analysis
— Compare your system's performance to: - A text-only baseline (same system without image understandin…
6.3 Documentation
— System architecture document with diagrams. - API reference (auto-generated plus any additional note…
6.3 Platform strategy
— Primary platform and rationale - Secondary platform (if any) and content adaptation plan - How you w…
6.4 Model Card and System Documentation
— Produce a model card for the overall system including: - Intended use cases and users. - Input types…
6.4% click rate
— nearly three times the Standard tier's 1.1%, and three times the overall average. Gold customers who…
6.6 hops
— or about 6.6 degrees of separation.
6.6 Presentation and Demo
— Prepare a 20-minute presentation covering the key aspects of the project. - Include a live demo show…
60 amps
— Very old homes, pre-1950s. Completely inadequate by modern standards. These homes almost always need…
60%
— The effective sample size is $\alpha + \beta = 6 + 4 = 10$ (equivalent to having observed 6 wins in …
60-70% evergreen content
— the foundation that provides consistent value and represents your expertise - **20-30% trend-respons…
61% replicated
— better than psychology but far from reassuring for a field that claims scientific rigor.
63.1
— ## True/False Questions
64.29%
— Profit if win: \$100 x (100/180) = \$55.56 - EV = (0.62 x \$55.56) - (0.38 x \$100) = \$34.44 - \$38…
68.89%
— Fighter B: 32.26% / 103.69% = **31.11%** - Check: 68.89% + 31.11% = 100.00%
6: B
— `kubectl auth can-i --list` shows all permissions for the current user or service account. This is t…
6:00 PM --- Polls Close in East Coast States
— Traffic increases 5x above normal. - HPA scales API pods from 15 to 22. - All systems green. Latency…
6:12 AM
— Jordan opens Instagram. The app records the time, the device identifier, the account, and the locati…
6:15 PM Thursday: Sharp syndicate acts
— A well-known sharp group has identified Cardinals -6 as mispriced. Their models say the fair line is…
6:17 PM Thursday: Pinnacle moves
— Pinnacle moves to Cardinals -6.5 (-106). - Other sharp books follow within minutes.
6:18 AM
— Jordan's apartment WiFi logs a connection handshake, timestamp, device identifier. The apartment bui…
6:23 PM
— Jordan arrives at the friend's apartment building. A Ring doorbell camera on the building entrance c…
6:23 PM to 9:17 PM
— Dinner. Jordan's phone is in a pocket or on a table. The friend's Alexa device is in the kitchen. Th…
6:25 PM Thursday: Market-wide adjustment
— DraftKings, FanDuel, and BetMGM --- which monitor sharp book movements --- adjust their lines from C…
6:41 AM
— Jordan leaves the apartment. The building's electronic key fob system logs an exit event: Unit 4B, t…
6:45 AM
— Arrives early. Opens the network folder.
6:45 PM Thursday: Line settles
— The entire market is now at Cardinals -6.5 or -7. - The steam move is complete. Total elapsed time: …
6:47 AM
— Your phone alarm goes off. Your phone has recorded that you slept until 6:47, that you were in your …
6:50 AM
— Opens each of the four CSV files. Notes immediately that Nashville exported with column headers in a…
7. A
— When the ON clause evaluates to true (match), only the WHEN MATCHED branch executes. The branches ar…
7. AI-Assisted SAR Drafting
— Appropriate for: data synthesis (extracting transactions from case data), pattern description, typol…
7. B
— Lock escalation replaces the individual page/row locks with a single tablespace-level (or table-leve…
7. c
— Neff's three components are self-kindness, common humanity, and mindful awareness. "Self-improvement…
7. Cybersecurity Risk Has Its Own Reporting Regime
— US SEC: Material cyber incidents disclosed within 4 business days of materiality determination - DOR…
7. d
— Identity Foreclosure: commitment without exploration. The person has adopted an identity (often from…
7. Detailed Technical Findings
— Individual finding write-ups (the bulk of the report) - Each finding follows a consistent template (…
7. How large was the sample?
— Larger samples give more precise estimates (we'll formalize this in Chapter 11) - But sample *qualit…
7. Ongoing Monitoring
— How will the system be monitored for drift, degradation, and emergent bias? - What triggers a re-ass…
7. Opportunity Costs
— **Foregone projects**: Every AI project you pursue is a project you don't pursue; the opportunity co…
7. Policy document
— Weak: "Write a remote work policy" - Strong: "Draft a remote work policy for a 50-person technology …
7. The SAR Filing Obligation Is the Central Output
— The entire monitoring system exists to generate qualified referrals for SAR (US) or STR (internation…
7. Trim-out:
— Electrical — outlets, switches, fixtures - Plumbing fixtures - HVAC registers - Baseboard trim and d…
7. Types Map Differently to Categories
— Satire/Parody (Type 1) typically produces misinformation (no harmful intent) - Fabricated Content (T…
75 percent of the regrets named were inactions
— roads not taken, opportunities not pursued, relationships not cultivated, words not said.
76 working days
— 244 hours of reading, at an estimated economic cost of $781 billion in lost productivity nationally.…
7: B
— Indirect prompt injection involves planting malicious instructions in external data sources (webpage…
7: C
— Wildcards in apiGroups, resources, and verbs grant unrestricted access to all Kubernetes API operati…
7:00 AM
— Opens the "master" Excel workbook, which she built by hand six months ago. Copies the data from each…
7:00 PM --- First Major Call
— A key state is called for a candidate. Traffic spikes to 30x normal within 2 minutes. - Order volume…
7:00-7:04 PM
— Marcus watches the video. The instructor defines a function. Marcus follows along. So far, so good.
7:03 AM
— Jordan stops at a coffee shop. The phone detects the coffee shop's WiFi network (the phone does not …
7:04 PM
— His phone vibrates. Text from Maya: *"can I go to Amber's house Friday after school?"* Marcus picks …
7:08 PM
— Phone vibrates again. Maya: *"yes 🙄"* Marcus types: *"Ok. Home by 8."* Maya: *"9?"* Marcus: *"8:30. …
7:14 AM
— Jordan boards a city bus. The transit authority's card reader logs the fare payment (SmartTrip card,…
7:14 PM
— Marcus is re-engaged. The instructor is now explaining default parameter values. Marcus pauses the v…
7:16 PM
— His phone lights up. Not a buzz — just the screen illuminating with an ESPN notification: "NBA Trade…
7:20 AM
— Fixes the Nashville data: manually reorders the columns to match the expected format.
7:22 PM
— The sound of Denise laughing at the cooking show in the living room. Marcus catches a fragment: "...…
7:25 AM
— Refreshes the pivot tables. One of them breaks — the pivot table source range needs to be extended t…
7:28 PM
— His email tab, which has been open in the background, makes a soft chime. The tab title now reads "(…
7:31 AM
— Jordan arrives at the warehouse. The employer's biometric timeclock scans Jordan's fingerprint (or h…
7:31 AM to 2:47 PM
— Jordan works. The warehouse's security cameras capture Jordan's movements through the facility appro…
7:35 AM
— Checks the week-over-week totals manually against last week's numbers. They're $47,000 higher than e…
7:35 PM
— Marcus is frustrated. He feels like he's been studying for over half an hour and has accomplished al…
7:45-8:00 PM
— Marcus watches the scope section. Without the phone, without email, without the TV fragments, someth…
7:55 AM
— Makes a judgment call: emails Marcus to flag the data issue, manually excludes the order from this w…
8 bytes per value
— extremely efficient. - String columns (`object`) use **roughly 50–200 bytes per value** — much more …
8-15 cuts per minute
— perceived as moderate pacing. This rate gives viewers enough visual variety to maintain engagement w…
8. A
— RESSEC(YES) on a transaction definition tells CICS to perform resource-level security checks for res…
8. B
— System-period temporal tables have their timestamps (SYS_START, SYS_END) managed automatically by DB…
8. c
— Moratorium is active exploration without settled commitment. It is uncomfortable but productive — th…
8. d
— Thomas and Chess's three categories were: easy, difficult, and slow-to-warm-up (plus a mixed categor…
8. Effect Size and Practical Significance:
— Effect size measure: _______________ Value: ___________ - Is the effect practically meaningful? ____…
8. Has the finding been replicated?
— A single study is a single data point. Replication by independent researchers strengthens confidence…
8. Remediation Roadmap
— Prioritized remediation plan - Quick wins vs. long-term improvements - Dependencies between remediat…
8. Risk Costs
— **Model failure costs**: The financial impact when models produce wrong predictions (e.g., a demand …
8. Social media post
— Weak: "Write a post for LinkedIn" - Strong: "Write a LinkedIn post from the CEO's perspective announ…
8.00:
— American: (8.00 - 1) x 100 = **+700** - Fractional: (8.00 - 1) = 7.00 = **7/1**
8.1
— 8.8 comprehension, **8.5**, 8.6 methods, see `append()`, `extend()`, `insert()`, `pop()`, `remove()`…
85% improbable
— This means historically, only 15% of teams in that situation win - The team overcame 85% odds agains…
864 kWh
— Electric water heater (4,500 watts, thermostat cycles): about 3 hours per day. 4.5 kW × 90 hours = *…
8: C
— Kubernetes Secrets are base64-encoded, not encrypted. This is a common misconception; base64 is an e…
8:00-8:05 PM
— His mind wanders. He catches it after about 20 seconds. He notices that the wandering is about the N…
8:05 AM
— Updates the charts. The summary chart requires manual data entry into a lookup table.
8:05-8:25 PM
— Marcus enters what might be the beginnings of a flow state. The instructor introduces the concept of…
8:15 PM --- Surprising Result
— An unexpected result in a major state causes a massive trading surge. - Traffic hits 80x normal. Ord…
8:20 AM
— Formats the report: column widths, number formats, color coding for regions that hit quota (green) v…
8:25-8:45 PM
— Marcus works through practice problems. He gets some wrong. But instead of feeling frustrated (as he…
8:40 AM
— Sends the report to Sandra and the regional VPs, with a note about the Chicago data anomaly.
8:45 PM
— Marcus stops. Not because he's exhausted, but because he wants to end on a high note. He closes his …
9. A
— The integration paradox occurs when two frameworks that are individually valid produce contradictory…
9. Appendices
— Detailed tool output (Nmap scans, vulnerability scanner results) - Full evidence documentation - Met…
9. B
— SQLCODE -911 indicates deadlock (reason 00C90088) or timeout (reason 00C9008E). -913 also indicates …
9. C
— The maximum timestamp value in SYS_END indicates the row is currently active (it has not yet been su…
9. d
— Both `page-break-before: always` (the older CSS2 property) and `break-before: page` (the newer CSS3 …
9. Soviet Dezinformatsiya Techniques
— Document forgery and black propaganda (falsely attributed) - Media laundering: plant stories in deve…
9. Synthesis and Recommendations
— What are the system's greatest strengths? Its most significant risks? What specific changes would yo…
90-Day Bridge Plan:
— Target 1: [Name/description] — First move: _______ — By: [date] - Target 2: [Name/description] — Fir…
90-Day Success Definition
— What process metric will I use to evaluate month 3? _______________ - What does "success" look like …
90.0%
— the model catches 90% of actual fraud.
95 percent believed they were self-aware
— but based on behavioral assessments and corroborating feedback from others, only **10 to 15 percent*…
95% CI:
— p = 0.84, n = 50 - SE = √(0.84 × 0.16 / 50) = 0.0518 - z = 1.96 for 95% - CI = 0.84 ± 1.96 × 0.0518 …
97.1 PPG
— 107.0 ORtg at 93.9 pace = **100.5 PPG**
9: B
— This is a physical-world adversarial patch attack. The sticker is optimized to cause targeted miscla…
9: C
— Without NetworkPolicies, Kubernetes allows all pod-to-pod communication by default. There is no netw…
9:30 PM --- Peak Traffic
— Multiple states called simultaneously. - Traffic: 110x normal. Order volume: 5,500/second. - HPA at …
9:31 PM
— Jordan's Uber ride home is requested. Uber logs: the request time, the pickup location (to the meter…
@armystats_global's multilingual outputs
— the data analytics account publishes its charts with text in English as the primary language (reflec…
@benbbaldwin
— nflfastR creator 2. **@thomasmock** - Sports data visualization 3. **@PFF** - Pro Football Focus 4. …
[ AUDIENCE PERSONA ]
— **Name** (fictional): - **Age:** - **Occupation:** - **Income range:** - **Where they live:** - **Wh…
[ COMMUNITY PLAN ]
— **Community platform:** - **Community name:** - **Who is this community for** (specific description …
[ CONTENT PRODUCTION BATCH SCHEDULE ]
— I will film/record content on: [day(s)] - I will edit on: [day(s)] - I will write email/newsletter o…
[ EMAIL LIST — REQUIRED ]
— **Email platform:** (e.g., ConvertKit, Mailchimp, Beehiiv) - **Lead magnet / opt-in offer:** - **Ema…
[ ENTITY SELECTION ]
— **Chosen entity type:** (Sole proprietorship / LLC / S-Corp / other) - **Reason for this choice:** -…
[ PRIMARY PLATFORM ]
— **Platform:** - **Why this platform for your audience:** - **Publishing cadence:** [e.g., 3 videos/w…
[ PRIMARY REVENUE STREAM ]
— **Stream:** - **Why this stream first** (connection to current audience size and type): - **Minimum …
[ SECONDARY PLATFORM ]
— **Platform:** - **Role this platform plays** (discovery? community? direct revenue?): - **Publishing…
[ TAX STRUCTURE ]
— **Do you make quarterly estimated tax payments?** Yes / No / Not yet required - **Estimated quarterl…
[ YOUR DIVERSIFICATION INDEX ]:
— ### Step 4: 12-Month Revenue Trajectory
[ YOUR MONTHLY VIEWS ]:
— ### Step 3: Calculate Monthly Ad Revenue
[Conceptual]
— Tests your understanding of the core concepts. - **[Scenario]** — Asks you to analyze or respond to …
[GnuCOBOL]
— Information specific to the GnuCOBOL open-source compiler running on Windows, macOS, or Linux.
[IBM Enterprise COBOL]
— Information specific to the IBM Enterprise COBOL compiler running on z/OS.
[KALOSVERSE]
— MCU thread - **[ARMY FILES]** — BTS thread - **[ARCHIVE & OUTLIER]** — Supernatural thread
[MUST]
— This must be changed before merge (bugs, security issues) - **[SHOULD]** — Strongly recommended but …
[z/OS]
— This section covers DB2 for z/OS (the mainframe platform). It will reference JCL, TSO/ISPF, DSNZPARM…
`(election_date - df["date"]).dt.days`
— This subtracts the poll date from the election date, producing a `timedelta` object. The `.dt.days` …
`(simulated_margins > 0).mean()`
— This is a vectorized computation that converts the array of simulated margins to a Boolean array (Tr…
`--ar [width:height]`
— Aspect ratio. `--ar 16:9` for landscape video/presentation format, `--ar 2:3` for portrait/phone, `-…
`--chaos [0-100]`
— Controls variation between generated images. Low chaos (0-10) produces four similar variations. High…
`--cref [URL]`
— Character reference. Attempts to maintain the appearance of a character from the reference image in …
`--no [concept]`
— Negative prompt. `--no hands` significantly reduces deformed hand frequency in images with people.
`--q`
— Controls generation quality and time. `--q .5` is faster and cheaper; `--q 1` uses full quality. For…
`--seed [number]`
— Reproducibility. Using the same seed with the same prompt produces the same image. Useful for consis…
`--sref [URL]`
— Style reference. Applies the style of the referenced image to your prompt.
`--style [value]`
— Applies aesthetic variation. `--style raw` turns off Midjourney's automatic aesthetic enhancement, g…
`--v [version]`
— Model version. `--v 6.1` (current) for highest quality photorealism. `--v 5` for some users' prefere…
`--weird [0-3000]`
— Introduces unusual, experimental aesthetic qualities. Useful for finding unexpected creative directi…
`.copy()`
— When you filter a DataFrame with boolean indexing, you receive a "view" rather than a copy. If you m…
`.dt` Accessor
— A pandas object that provides date/time component extraction and manipulation methods for datetime S…
`.env` file
— used for local development 3. **Default values in code** (lowest priority) — fallbacks
`.fillna(method="ffill")` vs `.interpolate()`:
— `"ffill"` — repeats the last known value (use for categorical or stepwise data) - `"interpolate()"` …
`.fit(X, y)`
— Train the model. Give it your training data (features `X` and labels `y`). The model learns from thi…
`.fit_transform(X)`
— Fit and transform in one step. Common shorthand for preprocessing on training data.
`.map()` vs `.replace()`:
— `.map()` — strict: unmapped values → `NaN` (use for complete recoding) - `.replace()` — lenient: unm…
`.predict(X)`
— Make predictions. Give it new data (features only). The model applies what it learned to generate pr…
`.predict_proba(X)`
— For classifiers: return probabilities for each class rather than a hard prediction. This is often mo…
`.resample()`
— Like `.groupby()` but specifically for time-indexed Series or DataFrames. Supports resampling to any…
`.score(X, y)`
— Evaluate the model. Returns a default metric (accuracy for classifiers, R² for regressors).
`.str` Accessor
— A pandas object that provides vectorized string methods for Series with string dtype.
`.transform(X)`
— For preprocessing steps: transform data into a new form (scale it, encode it, fill missing values). …
`@app.route("/")`
— this is a **decorator**, a Python feature that wraps a function with additional behavior. Here, it r…
`__pycache__/`
— contains compiled bytecode files that Python generates automatically. They're machine-specific and r…
`age`
— **Type:** Integer - **Range:** 18–65 - **Description:** User's self-reported age at time of profile …
`alpha_decay(Z, A, E_alpha, R=None)`
— Compute the Gamow factor and estimated half-life for alpha decay.
`app = Flask(__name__)`
— creates an instance of the Flask application. The `__name__` argument tells Flask where to find temp…
`append([4, 5])` vs. `extend([4, 5])`
— append adds one element (the list itself); extend adds each element
`ARITH(COMPAT)`
— Compatible mode. Maximum 18 digits for intermediate results. This is the traditional limit. - **`ARI…
`avg_message_length`
— **Type:** Float - **Range:** 0–300 (characters) - **Description:** Average length of messages sent b…
`beam_splitter(state_in, theta)`
— Apply a beam splitter transformation with mixing angle $\theta$ to a two-mode input state. Return th…
`bio_word_count`
— **Type:** Integer - **Range:** 0–500 - **Description:** Number of words in the user's written biogra…
`bloch_sphere(states, labels)` function
— 3D visualization of one or more states on the Bloch sphere using matplotlib.
`bohr_sommerfeld(V, x_grid, n_max)`
— Find the first $n_{\max}$ energy levels using the WKB quantization condition.
`brand-voice-principles.pdf`
— The ten pages of the brand guide specifically about voice (extracted and reformatted). Section heade…
`catplot()`
— Categorical plots. Box, violin, swarm, strip, bar, count, point plots. Use when asking "How does Y v…
`chsh_value(rho, a1, a2, b1, b2)`
— Computes the CHSH parameter $S$ for a given two-qubit density matrix $\rho$ and measurement settings…
`client_tier` has 2 missing values
— Two clients have no tier assigned. Maya checks which ones:
`code/ml_workflow.py`
— Complete end-to-end ML workflow: data loading, splitting, training, evaluation, and interpretation f…
`coherent_state(alpha, n_max)`
— Construct a coherent state $|\alpha\rangle$ in the Fock basis up to $n_{\max}$ photons. Return the s…
`daily_swipes`
— **Type:** Float - **Range:** 0–200 (right-swipes per day) - **Description:** Average number of right…
`data_only=True`
— A `load_workbook` argument that makes openpyxl return the last cached formula result (a number) rath…
`dates_per_month`
— **Type:** Float - **Range:** 0–20 - **Description:** Self-reported average number of in-person dates…
`DeadlineTask`
— a task with a due date that can be overdue 2. **`RecurringTask`** — a task with a frequency (daily, …
`def index(): return "..."`
— a standard Python function that returns a string. Flask sends that string back as the response body.…
`def`
— The keyword that tells Python "I'm defining a function." Short for *define*. - **`greet`** — The fun…
`describe()`
— summary statistics for all numeric columns:
`displot()`
— Distribution plots. Histograms, KDEs, ECDFs, rug plots. Use when asking "What does the distribution …
`dtypes`
— the data type of each column:
`education`
— **Type:** Categorical (ordinal) - **Categories:** `HS` (high school diploma or less), `Some_College`…
`eigensolve()`
— A general eigenvalue solver that takes a Hermitian matrix and returns eigenvalues, eigenstates, and …
`end_date`: 72 non-null out of 87
— 15 projects have no end date. This is actually expected: active and in-progress projects do not have…
`False`
— d) `True and True and False` → **`False`** (the last `False` makes the whole thing false) - e) `Fals…
`feature/audit-logging`
— A comprehensive audit logging system for HIPAA compliance (led by 2 developers, one from each team).…
`feature/billing-overhaul`
— A complete rewrite of the billing module (led by the India team, 3 developers). 3,100 lines of chang…
`feature/patient-portal`
— A new patient-facing portal (led by the US team, 3 developers). 2,400 lines of new code across 45 fi…
`flatten_list`
— Recursively flatten a nested list into a single flat list. 2. **`merge_sorted`** --- Merge two sorte…
`for`
— Are you waiting for something to happen? → **`while`** - Iterating over a collection (string, list, …
`fourier_transform()`
— Numerical Fourier transform between position and momentum representations using FFT.
`from flask import Flask`
— imports the Flask class from the flask package.
`gamow_exponent(V, E, x_grid)`
— Compute the Gamow tunneling exponent $\gamma = \hbar^{-1}\int_{x_1}^{x_2}\sqrt{2m(V-E)}\,dx$.
`gender`
— **Type:** Categorical (string) - **Categories:** `M` (man), `F` (woman), `NB` (nonbinary), `Other` -…
`good first issue`
— Specifically chosen as approachable for new contributors - **`help wanted`** — The maintainers would…
`head()`
— the first few rows (default: 5):
`hong_ou_mandel(tau_range, tau_c)`
— Simulate the Hong-Ou-Mandel dip: compute and plot the coincidence probability as a function of relat…
`hours_logged`: 81 non-null out of 87
— 6 projects have no hours logged. This is a problem. Every project should have hours recorded. She su…
`if __name__ == "__main__": app.run(debug=True)`
— runs the development server when this file is executed directly. The `debug=True` parameter enables …
`if`/`elif`/`else` statements
— how to make your code take different paths based on data values (like categorizing vaccination rates…
`income_bracket`
— **Type:** Categorical (ordinal) - **Categories:** `Under_30K`, `30K_50K`, `50K_75K`, `75K_100K`, `Ov…
`info()`
— a concise summary of the DataFrame:
`lhv_simulation(n_trials, settings)`
— Simulates a local hidden variable model for $n$ trials and computes $S$, demonstrating $|S| \leq 2$.
`lifetimes`
— BG/NBD and Gamma-Gamma CLV models. The statistical upgrade to this chapter's simple CLV calculation.…
`loc`
— uses labels (index values and column names) - **`iloc`** — uses integer positions (like list indices…
`location_type`
— **Type:** Categorical (string) - **Categories:** `Urban`, `Suburban`, `Rural` - **Distribution (appr…
`main`
— the development branch for the next major release - **`3.12`**, **`3.13`**, etc. — maintenance branc…
`match_rate`
— **Type:** Float - **Range:** 0–100 (percentage of right-swipes that result in a match) - **Descripti…
`maya_clients.xlsx`
— An Excel workbook with two sheets: "Active Clients" and "Client Notes." She created this manually in…
`maya_projects.csv`
— A CSV file she has maintained in a spreadsheet and periodically exports. Contains all client project…
`message_response_rate`
— **Type:** Float - **Range:** 0–100 (percentage of received messages that the user responds to) - **D…
`months_on_platform`
— **Type:** Integer - **Range:** 0–60 - **Description:** Number of months the user has been active on …
`np.random.normal(0, poll_avg_sd, n_simulations)`
— This generates `n_simulations = 100,000` draws from a Normal distribution centered at 0 with standar…
`np.random.seed(42)`
— Setting the random seed makes the simulation reproducible: every time you run the code with the same…
`oda_congress.csv`
— Congressional district results, 2000–2024
`oda_demographics.csv`
— County demographics by year (Census-aligned)
`oda_economics.csv`
— County economic indicators by year
`oda_elections.csv`
— Core election results
`oda_media.csv`
— Media environment proxies by market and year
`oda_polling.csv`
— State-level polling averages, 2000–2024
`off-brand-examples.md`
— Ten annotated examples with before/after comparisons. The "before" shows the off-brand version; the …
`on-brand-examples.md`
— Fifteen annotated examples of on-brand content — blog introductions, email subject lines, social pos…
`on_bad_lines`
— A `pd.read_csv` parameter controlling behavior for lines with incorrect field counts. `"error"` rais…
`Operator` class
— Represents quantum operators as matrices, supports addition, multiplication, and adjoint. 2. **`comm…
`os.environ.get("KEY")` vs. `os.environ["KEY"]`:
— `.get()` returns `None` if the variable is not set (use for optional variables) - `["KEY"]` raises a…
`pauli_matrices()` function
— Return a dictionary of Pauli matrices as numpy arrays.
`pd.crosstab()`
— A convenience wrapper around `pd.pivot_table()` that automatically counts co-occurrences. Useful for…
`pd.cut()` and `pd.qcut()`
— Bin continuous variables into discrete categories. `pd.cut()` uses fixed bin edges; `pd.qcut()` uses…
`pd.to_datetime(race_df["date"], errors="coerce")`
— The `errors="coerce"` argument converts any value that cannot be parsed as a date to `NaT` (Not a Ti…
`perf`
— Performance improvement (the index does not change functionality, it improves speed). b) **`style`**…
`photos_count`
— **Type:** Integer - **Range:** 0–10 - **Description:** Number of photos in the user's profile at the…
`plotly`
— Interactive versions of the charts built in this chapter. Particularly effective for the cohort heat…
`prepare_transactions()` as a reusable function
— applying it to both weeks kept the logic consistent and the code DRY (Don't Repeat Yourself). 2. **L…
`processing_metadata.json`
— a machine-readable record of the run:
`profile_completeness`
— **Type:** Float - **Range:** 0–100 (percent) - **Description:** Percentage of optional profile field…
`pyjanitor`
— A pandas extension that provides cleaner, more readable data transformation syntax. Particularly use…
`pymc`
— Bayesian statistical modeling. For teams that want to move beyond frequentist p-values toward probab…
`q1_master_sales.csv`
— all records from all four regional files, sorted by region, then rep name, then month. Priya can sen…
`race_df['pollster'].value_counts()`
— This diagnostic output is intentional. Before any analysis, you want to know which pollsters contrib…
`race_ethnicity`
— **Type:** Categorical (string) - **Categories:** `White`, `Black`, `Latino`, `Asian`, `MENA` (Middle…
`range_color=[-30, 30]`
— centers the diverging colormap at zero and caps at 30 points. Counties won by more than 30 points al…
`read_csv`
— One-line CSV loading with automatic type detection and `NaN` for missing values. Replaces `csv.DictR…
`relationship_goal`
— **Type:** Categorical (string) - **Categories:** `Casual` (casual sex / no commitment), `Relationshi…
`relplot()`
— Relational plots. Scatter and line plots. Use when asking "How are X and Y related?"
`reported_satisfaction`
— **Type:** Float - **Range:** 1–10 (self-report Likert-type scale) - **Description:** User's overall …
`requests`
— The classic synchronous HTTP library. Simple, well-documented, widely used. - **`httpx`** -- A moder…
`robots.txt`
— A standard text file at a website's root that specifies which paths automated bots may or may not ac…
`scikit-learn`
— K-Means and other clustering algorithms used in this chapter. Also includes silhouette scoring for c…
`scipy.stats`
— You used this in the chapter. It is worth exploring the full documentation. The `norm`, `chi2_contin…
`seaborn`
— The `heatmap()` function used for cohort visualization. Also useful for distribution plots of RFM sc…
`search_tasks`
— searches tasks in the current category, then recurses into every subcategory. It doesn't need to kno…
`sexuality`
— **Type:** Categorical (string) - **Categories:** `Het` (heterosexual), `Gay` (gay/lesbian), `Bi` (bi…
`shape`
— the dimensions, as a tuple of (rows, columns):
`simulate_coin_flips()`
— Demonstrates the law of large numbers and builds intuition for probability convergence. - **`OddsCon…
`spectral_decompose()`
— Constructs the spectral decomposition $\hat{A} = \sum a_n|a_n\rangle\langle a_n|$ and verifies recon…
`SpinState` class
— Represents an arbitrary spin-1/2 state as a spinor $(\alpha, \beta)^T$. Methods: - `from_angles(thet…
`Stack` and `Queue` classes
— the ones you built in this chapter. 2. **`UndoableAction` class** — a record that stores what was do…
`statsmodels`
— Python's most comprehensive statistical modeling library. Includes robust implementations of power a…
`stern_gerlach(state, axis, select)` function
— Simulate a Stern-Gerlach apparatus: given an input state, a measurement axis, and a selection (up or…
`subscription_tier`
— **Type:** Categorical (ordinal) - **Categories:** `Free`, `Basic`, `Premium`, `Gold` - **Distributio…
`Task` is a dataclass
— clean, minimal boilerplate, auto-generated `__repr__` and `__eq__` - **Observer pattern** — `TaskMan…
`teleportation_protocol(chi, bell_pair)`
— Simulates the full quantum teleportation protocol, performing a Bell measurement and returning the t…
`time.sleep(delay)`
— Rate limiting. Don't hammer the server (Section 24.5). 2. **A descriptive `User-Agent` header** -- T…
`time_evolve(psi, H, t)`
— Apply the time-evolution operator to evolve state `psi` under Hamiltonian `H` for time `t` - **`wave…
`tunneling_rate(V, E, x_grid)`
— Return $T = e^{-2\gamma}$.
`turning_points(V, E, x_grid)`
— Given a potential function and energy, find the classical turning points.
`user_id`
— **Type:** String (anonymized) - **Format:** `USR_XXXXXX` where X is a 6-digit zero-padded integer - …
`vocabulary-guide.md`
— A Markdown table organized by category: "Opening sentence patterns we use," "Phrases we never use an…
`wkb_wavefunction(V, E, x_grid, region='allowed')`
— Compute the WKB wavefunction in allowed or forbidden regions.
`WLM ENVIRONMENT`
— specifies the WLM application environment where the procedure runs. This determines the address spac…
`zip_code` is stored as `int64`
— pandas thinks it's a number, but it's actually a nominal categorical variable. You can't calculate t…
|
— 51% MIPS** | **$22.3M** |
| | 4 | 4 - 6 =
— 2** | | 6 | 6 - 6 = **0** | | 8 | 8 - 6 = **+2** | | 10 | 10 - 6 = **+4** | | **Sum** | **0** |
| .0013 | .0013 | .0012 | .0011 | .0010 | |
— 2.5** | .0062 | .0059 | .0055 | .0052 | .0049 | | **-2.0** | .0228 | .0217 | .0207 | .0197 | .0188 |…
| Addition | A + B | |
— ** | Subtraction | A - B | | Unary **+** / **-** | Sign | -A |
| |
— 10.2%** | **91.1%** | | Positions that gained (E4, E6) | 2 | +1.0% | -8.9% (offset) | | **Net portfo…
£36.25/hour
— Senior AML Analyst: £72,000 / 1,600 hours = **£45.00/hour** - Compliance Manager: £88,000 / 1,600 ho…
† = Recommended for class discussion or group work
— ## Foundational Exercises (⭐)
† = Recommended for graded assessment
— ## Part A: Foundational Knowledge
⚖️ Equity Lens
— A structural equity analysis: where does this topic intersect with race, gender, class, or other dim…
⚠️ Common Pitfall
— A mistake to avoid, with explanation of why it's wrong.
⚠️ Watch Out
— A common mistake, misconception, or risk. These blocks flag the places where creators most frequentl…
⚡ Quick Reference
— Compact summary for future reference.
✅ Best Practice
— A recommended approach, framework, or technique that has documented evidence or strong practitioner …
🌍 Global Perspective
— How this differs across cultures or regions.
🎓 Advanced
— Graduate-level extension. Skip on first reading.
🏃 Fast Track
— For readers with some background in AI or technology. Tells you which sections to skim and which exe…
💡 Intuition
— A mental model or analogy to build understanding.
💡 Key Concept
— A foundational idea, definition, or framework being introduced for the first time. If you are review…
📊 By the Numbers
— Data, statistics, or quantitative evidence. These blocks always cite sources in the text or endnotes…
📊 Real-World Application
— How this concept plays out in practice.
📐 Project Checkpoint
— Your contribution to the Epistemic Audit progressive project.
📖 Standard Path
— The default. Read every chapter in order, complete the exercises and quizzes, and work on the progre…
📜 Historical Context
— How this concept evolved over time.
📝 Note
— Additional context or nuance.
🔄 Check Your Understanding
— Retrieval practice: try to answer without looking back.
🔍 Why Does This Work?
— Prompts you to explain the mechanism, not just the result.
🔗 Connection
— Link to another chapter's concept.
🔗 Cross-Reference
— A pointer to another chapter, appendix, or capstone project where the current topic is developed fur…
🔬 Deep Dive
— For motivated learners who want more. Points you to advanced case studies, extension exercises, and …
🔴 Platform Risk
— A specific platform policy, algorithm behavior, or terms-of-service issue that creators need to unde…
🔵 Creator Story
— An extended example from one of the three running threads or from a real creator referenced in the c…
🚪 Threshold Concept
— An idea that, once understood, irreversibly transforms how you see the subject.
🧩 Productive Struggle
— A problem posed *before* the technique is taught. The attempt primes learning.
🧪 Try This Now
— Immediate, actionable exercises. Most have a time estimate. These are designed to be done, not read.…
🪞 Learning Check-In
— Metacognitive reflection on your learning process.
A
A 300-bed hospital
— an extraordinary investment for a community of 10,000, rivaling the healthcare infrastructure of muc…
A brief description of the notebook's purpose
— one or two sentences explaining what question the notebook addresses, what data it uses, or what pro…
A cell body
— the metabolic center - **Dendrites** — branch-like extensions that receive signals from other neuron…
A charcoal yard
— the area where timber was converted to charcoal. Charcoal production was a major operation in itself…
A comprehensive college-level textbook
— ### About This Textbook
A Comprehensive Textbook for College Students
— > *"The quality of our conversations determines the quality of our lives."*
A comprehensive undergraduate textbook
— ## About This Textbook
A defined identity
— the configured system is not a general-purpose AI assistant; it is a specific tool with a specific p…
A detailed project specification
— what the finished product should contain 3. **A milestone checklist** — how to break the work into m…
A diagnostic for what goes wrong
— the patterns of inflammatory language, including the most common errors (absolutes, loaded words, di…
A distribution strategy
— how would you get this resource to the students who need it? Consider: where they are, what media th…
A feedback channel
— a shared Slack thread where anyone can post examples of GPT assessments they thought were wrong, wit…
A few more common patterns:
— **Sum of squared values:** $\sum x_i^2$ means square each value, then add them up. - **Sum of square…
A five-minute team walkthrough
— not training, just a live demo using a real piece of content so everyone could see what the output l…
A format conversion module
— Reusable COBOL subprogram that converts between internal COBOL data formats and the canonical model.…
A four-pillar ethical framework
— transparency, consent and agency, proportionality, and fairness --- should guide all data collection…
A GDG-based extract process
— JCL that creates a daily account extract with control records, record counts, and hash totals. Use G…
A growing community of non-traditional builders
— designers, product managers, entrepreneurs, students — had begun using AI to build software without …
A Home Assessment Summary Sheet
— a single-page overview of every system with a condition rating and notes 2. **A Repair Priority Matr…
A local meetup
— find one on Meetup.com, Eventbrite, or your local tech community calendar 2. **An online community**…
A mathematical object
— the wave function $\psi(x,t)$ — that encodes everything knowable about a quantum system. 2. **An equ…
A mid-conversation apology sounds like:
— "I think I just said that in a way that sounded like an attack. That's not what I meant, and I'm sor…
A model card
— a standardized document describing the model's purpose, performance, limitations, training data, and…
A personal role assignment library
— saved, ready-to-use prompts for your most common review and evaluation needs — is among the highest-…
A professional pentest report typically includes:
— **Executive summary:** A non-technical overview for senior leadership, explaining the overall risk p…
A reconciliation batch job
— JCL and COBOL program that compares the current VSAM file state against the data warehouse's last re…
A regulated relationship with the inner life
— not the absence of negative emotion, but the ability to experience difficult emotions without being …
A revision of his overall claim
— the core argument of the original video (that platforms are designed to capture attention in ways th…
A rowset-positioned cursor
— declared with the `WITH ROWSET POSITIONING` clause 2. **Host variable arrays** — COBOL tables (OCCUR…
A running Db2 environment
— whether via Docker (the recommended approach), native Linux installation, or Windows installation on…
A schedule
— "Run this every Monday at 6 AM" via Amazon EventBridge - **An S3 event** — "A new file was uploaded …
A sensor
— something that measures the current state of the system (the thermometer). 2. **A reference signal**…
A startup procedure name
— the cataloged JCL procedure that starts the SPAS - **The number of TCBs** — how many concurrent stor…
A step-out sounds like:
— "I want to stop for a second, because I notice this conversation has gotten tense, and I don't think…
A syndrome
— the list of eigenvalues $(\pm 1, \pm 1, \ldots, \pm 1)$ of the stabilizer operators.
A synthesis conclusion (1,000-1,500 words)
— An essay that draws the interviews together, identifies the common threads and the contradictions, a…
A Taxonomy of Failures:
— **Wrong answers** (Type 1): Standard errors within the system's domain - **Hallucinations** (Type 2)…
A tool registry service
— MCP server that manages a registry of all available tools across the organization 2. **Access contro…
A transaction is a promise
— either all operations complete or none do. Transaction boundaries must align with business operation…
A typical model container includes:
— The serialized model artifact - The serving code (a Flask/FastAPI app, or a model-serving framework …
A water-power system
— a dam, millrace, and waterwheel that powered the bellows supplying the air blast. Most furnaces were…
A weak analogy typically:
— Maps only labels, not relationships ("A CEO is like a brain") - Generates no predictions - Breaks do…
A) +1.2
— EPA = EP_after - EP_before = 2.4 - 1.2 = 1.2
A) 0.35 (most consistent)
— QBs have the lowest week-to-week variance.
A) 1
— EVENTMSGTYPE 1 represents a made shot; 2 represents a missed shot.
A) 20% toward the mean
— Volume is more stable than efficiency metrics.
A) 3PT: 1.08, Mid-range: 0.96
— Calculate as (point value × percentage): 3×0.36=1.08 and 2×0.48=0.96.
A) < 100 milliseconds
— Broadcast requires near-real-time visualization.
A) Affective polarization roughly doubled
— Iyengar and colleagues documented that the gap between how partisans feel about their own party vers…
a) Calculations:
— 100 PPG: 0.32 × 100 = 32.0 marginal points per win - 110 PPG: 0.32 × 110 = 35.2 marginal points per …
A) Connecting mentions to database records
— Entity linking resolves text mentions to specific entities in a knowledge base.
a) Data needed:
— Play-by-play data filtered to rushing plays - Fields: game_id, team, down, distance, yards_gained, E…
A) Elite (both metrics above average)
— 4.6 seconds is excellent hang time; 42 yards is solid distance.
A) Excellent punting with poor coverage
— 5.7 yards difference between gross and net indicates significant return yardage allowed.
a) FACTS Framework:
— **F — Function:** The system analyzes user data (purchase history, browsing, social media, location)…
A) High EPA, high success rate
— Both efficient and explosive = elite.
a) Hypotheses:
— H₀: p₁ = p₂ (home win rates are equal in both periods) - H₁: p₁ ≠ p₂ (home win rates differ between …
a) Implied probabilities and overround:
— Fighter A (-250): 250 / (250 + 100) = 250 / 350 = **71.43%** - Fighter B (+210): 100 / (210 + 100) =…
A) Individual INSERT with autocommit ON
— Most log volume. Each of the 1 million INSERTs generates a log record AND a commit record. The commi…
A) Many short gains, few big plays
— Consistent but limited upside.
a) Positions:
— Colleague A's position: "I should lead the presentation." - Colleague B's position: "I should lead t…
A) Red for offense, blue for defense
— This is the most common convention, though team colors are also used.
A) Score differential and time remaining
— Onside kicks are almost exclusively used when trailing late.
A) Successful (more than half)
— 5 yards > 50% of 8 = 4 yards.
A) The team is trailing late in the game
— Trailing teams should be more aggressive to maximize win probability.
A, C, D
— The observing ego (A), self-soothing/reality-correcting statements (C), and preparation (D) are all …
a. Reconnaissance (ATT&CK Tactic: Reconnaissance)
— Passive intelligence gathering: OSINT on employees, technology stack, third-party vendors. - Active …
A/B Test
— An experiment in which two versions of a piece of content or product are shown to randomly divided a…
A/B testing
— A randomized experiment comparing two (or more) versions of a communication (email subject lines, di…
A11y Creator Community
— A community of creators who focus on accessibility in their own content production (captioning, audi…
A=415–430 Hz
— roughly a half-tone to a full tone below modern A=440. - Some Baroque organs in Germany were tuned a…
AAPOR
— American Association for Public Opinion Research. The primary professional organization for survey r…
Abandoned:
— Mirrorless camera → back to iPhone (phone looked more "creator," less "production") - Green screen →…
Abatement Cost Ranges:
— Floor tile removal (per square foot): $3–$10 - Pipe insulation removal (per linear foot): $10–$30 - …
ABCs of z/OS System Programming, Volume 1
— Chapters 1-3 (z/OS fundamentals) 3. **z/OS Parallel Sysplex Overview** (SA22-7661) — Complete docume…
ABCs of z/OS System Programming, Volume 2
— Storage management chapters 3. **z/OS Language Environment Programming Guide** (SA38-0682) — Storage…
abelian group
— the order does not matter:
ABEND
— Abnormal end. The termination of a program or task due to an unrecoverable error. ABENDs are identif…
ABEND code
— A hexadecimal or decimal code that identifies the cause of an *ABEND*. System ABEND codes begin with…
Ability
— can the person perform the new behaviors?
Abnormal disposition (third subparameter)
— what to do if the step abends:
ABORTED
— ATM feed corruption | | Thu | 2,301,445 | 41 | 0.002% | Normal — sorted successfully | | Fri | 2,567…
About cross-market relationships:
— Do related markets move together? - Does one market lead another? - Are there arbitrage relationship…
About data quality:
— Are there missing observations or gaps in the time series? - Are there obviously erroneous prices (e…
About monitoring:
— The firm has no real-time compliance monitoring. The monthly transaction monitoring review is the on…
About price behavior:
— Is the price trending or mean-reverting? - Are there sudden jumps or gradual drifts? - Does the pric…
About reporting:
— The last MIFID II transaction report contained three errors identified by the FCA's data quality rep…
About the 71st percentile
— above average, but not as far above as it might seem from the raw score.
About the claim:
— Does the headline claim match what the study actually found? - Is causal language being used for cor…
About the firm's compliance technology:
— Client onboarding documentation is collected through a third-party document portal, but risk ratings…
About the market itself:
— What is being predicted? What is the resolution criterion? - How long has the market been active? Wh…
About the media coverage:
— Was the press release written by the university's communications office rather than the researchers …
About the study:
— What was the sample? (Size, demographics, cultural context) - Was the study experimental or correlat…
About volume and participation:
— When do people trade? Are there time-of-day or day-of-week patterns? - Do volume spikes correspond t…
About your own reaction:
— Does this finding confirm what you already believed? If so, be extra cautious — confirmation bias is…
Above Break 3 (245)
— bimodal distribution.
absentee ownership
— the pattern of land and mineral wealth being owned by distant individuals and corporations who extra…
Absorption (deep learning)
— The process of immersing oneself deeply in a domain to build the pattern libraries that enable exper…
Absorption coefficient
— A dimensionless number between 0 and 1 expressing the fraction of incident sound energy absorbed by …
Abstract
— a brief summary (like the executive summary, but with more technical detail) 2. **Introduction** — b…
Abstract Base Class (ABC)
— A class that cannot be instantiated directly and is designed to be subclassed. In Python, created us…
abstract data type
— which separates *what* a data structure does from *how* it does it.
abstract data types
— separating what a data structure does from how it's implemented.
abstract schema
— a mental template that captures the relational structure of a problem type, stripped of its specific…
Abstract the process
— strip away domain-specific details and describe the reasoning in general terms.
abstraction
— one of the four pillars from Chapter 1. Python abstracts away the details of memory management (you …
Abstraction ladder
— A hierarchy of representations ranging from concrete details to highly general principles; moving up…
abstraction through functions
— is a shift in thinking that will affect everything you write from here on. You're no longer writing …
AC bias
— adding a high-frequency (typically 50-150 kHz) oscillation to the audio signal before it reaches the…
Academic / Research Careers:
— Career capital = research methodology depth + specific domain contributions + writing and communicat…
Academic and think tank research.
— Follow academic publications on AI and copyright, including journals like the Stanford Technology La…
Academic demonstration
— researchers show that markets outperform alternatives in a controlled setting. 2. **Pilot deployment…
Academic injury research
— Deep methodological understanding 2. **Causal inference methods** - Isolating true injury impact 3. …
Academic Journals:
— *Journal of Sports Analytics* (IOS Press) - *Journal of Quantitative Analysis in Sports* (De Gruyter…
Academic Literature
— Google Scholar (scholar.google.com) — broad academic coverage, free - PubMed (pubmed.ncbi.nlm.nih.go…
Academic market efficiency papers
— Theoretical foundations 2. **Advanced statistical texts** - Modeling improvements 3. **CLV and sharp…
Academic Papers:
— Kahneman and Tversky (1979) Prospect Theory: Available via JSTOR (free with library access) or Googl…
Academic Path
— Statistics, data science, or computer science degree - Sports analytics research (MIT Sloan, etc.) -…
Academic research
— Statistical foundations 2. **Projection systems** - Building your own model 3. **Historical analysis…
Academic route:
— Degree in statistics, computer science, sports science, mathematics, physics, or related field - Res…
Academic travel research
— Deep mechanism understanding 2. **Causal inference methods** - Proper effect isolation 3. **Machine …
Academy of Management Journal
— Research on sponsorship, career advancement, and promotion decisions. Hewlett's underlying research …
ACAMS CGSS (Certified Global Sanctions Specialist)
— The primary professional certification focused on sanctions compliance. acams.org.
acceleration levers
— variables that can be deliberately changed to speed up correction.
Accelerometer
— A sensor that measures the rate of change of velocity, commonly embedded in GPS vests to track playe…
ACCEPT
— A COBOL statement that retrieves data from an external source, typically the system date/time or a u…
Accept this
— it brings over your Python extension, themes, and keybindings.
Acceptance criteria:
— `electron_config(26)` returns `"[Ar] 3d^6 4s^2"` (iron) - `term_symbols(2, 1)` returns `['1S_0', '3P…
Acceptance Testing
— Testing that verifies a system meets its business requirements and is acceptable for delivery. Often…
Access Control (164.312(a)):
— RACF user authentication (unique user identification) - RACF session management (automatic logoff af…
Access control testing:
— Proxmark3: RFID/NFC research and cloning tool - Flipper Zero: Multi-tool for hardware security testi…
Access Method
— A component of the operating system that manages the transfer of data between an application program…
ACCESS MODE
— A FILE-CONTROL clause that specifies how records in a file are retrieved: SEQUENTIAL (one after anot…
ACCESS MODE IS SEQUENTIAL
— Specifies sequential access. For sequential files, this is the only option and is usually omitted.
Access Now
— *Focus:* Digital rights globally, particularly for vulnerable communities - *Notable work:* RightsCo…
access path
— a specific method of retrieving data from a table. DB2 supports numerous access path types, and each…
Access Path Review:
— EXPLAIN all high-impact SQL statements - Compare to previous quarter's access paths - Investigate an…
Access to SMF/RMF data
— without it, you're guessing 2. **A seat at the business planning table** — without business input, y…
Access:
— Website: stats.nfl.com - Limited API access
Accessibility
— [ ] Passes colorblind simulation test - [ ] Text meets contrast requirements - [ ] Can be understood…
Accessible
— the student has some legitimate relationship to or knowledge of this community - **Appropriately sca…
Accessible after drywall:
— The fixtures and devices at the endpoints (outlets, switches, toilets, faucets) - The main shutoffs …
Accessing items
— Lists are zero-indexed, meaning the first item is at position 0:
Accidental Cartesian product
— Missing or incorrect ON clause produces m x n rows 2. **Wrong outer join direction** — Preserving th…
Accion Opportunity Fund
— accionopportunityfund.org A CDFI specifically focused on providing affordable loans and business coa…
accommodating
— he yields his preference ("whatever you think") to satisfy Kiara, framing his own need as secondary.…
Accommodation:
— What alternative assessment pathways are available for candidates who cannot use the primary tool du…
ACCOUNT
— Supertype for all financial accounts.
ACCOUNT (supertype)
— ACCOUNT_ID (PK) - ACCOUNT_NUMBER - CUSTOMER_ID (FK) - BRANCH_ID (FK) - CURRENT_BALANCE - OPEN_DATE -…
Account Balance
— Signed monetary amount up to $999,999,999.99. Must be stored in packed decimal (COMP-3) for efficien…
Account Balance Inquiry
— Score: 14. Multiple access paths (CICS, web service, IVR), but data intensity is low (one table). Ke…
Account Balance: DISPLAY vs. COMP-3
— `PIC S9(9)V99 DISPLAY` = 12 bytes (one byte per digit, including sign as overpunch) - `PIC S9(9)V99 …
Account Events:
— `FundsDeposited` --- a trader adds funds to their account - `FundsWithdrawn` --- a trader removes fu…
Account features (context):
— `account_age_days` — tenure (longer = more loyal on average) - `plan_type` — enterprise customers ch…
Account inquiry
— read-only, high frequency (simulates online banking). 2. **Fund transfer** — read-write, medium freq…
Account Number
— A 10-digit numeric identifier. Must support direct comparison and sorting. Leading zeros are signifi…
Account opening
— Validate customer, create account record, set initial balance, create audit trail, send welcome noti…
Account test data:
— Accounts of every type (checking, savings, money market, CD, loan). - Accounts in every status (acti…
Account Type
— A single-character code: C (checking), S (savings), M (money market), D (certificate of deposit), L …
ACCOUNT_HOLDER
— Junction: M:N between CUSTOMER and ACCOUNT.
ACCOUNT_TYPE
— Lookup: product types for accounts.
Accountability gap
— The structural condition in which surveillance systems collect, process, and act on data while remai…
Accountability mechanism:
— City council review of the system at defined intervals, with community input processes preceding eac…
Accountability repairs:
— "You're right, I didn't handle that well." - "I hear that what I said landed badly, even if that's n…
Accountability:
— Who was responsible for a Taylor-era foreman's unfair decision? - Who is responsible when an algorit…
Accounting Class 1
— CPU time is attributed to the stored procedure's own work. - **Accounting Class 2** — CPU time inclu…
Accreditation:
— CREST certifies individuals and companies for penetration testing - CHECK authorizes testing of UK g…
Accrued Interest Calculation
— Given a bond's last coupon date, next coupon date, settlement date, face value, and coupon rate, cal…
ACCT-MAINT
— Account maintenance (opens/closes accounts, updates customer information) - **TXN-PROC** — Transacti…
ACCT-REC
— Account master record layout 2. **TXN-REC** — Transaction record layout 3. **IO-STATUS** — Generic f…
Acculturation
— The process of psychological and cultural change that occurs when individuals from one cultural back…
Acculturative stress
— The elevated psychological distress experienced during the process of adapting to a new cultural env…
accumulator
— starting with zero and adding to it on each iteration:
accumulator pattern
— initialize before the loop, update inside, use after — is the fundamental technique for building res…
Accumulators (running totals):
— Total amount requested, approved, denied - Total fees generated - Average loan amount, average credi…
Accuracy
— Scores sum correctly - Yard line progressions make sense - Play results align with descriptions
Accuracy by Range
— Raw make percentages segmented by distance 2. **Pressure Performance** - Accuracy in high-leverage s…
Accuracy discernment
— The ability to distinguish credible from non-credible content; the outcome measure used in Roozenbee…
Accuracy nudge
— A brief intervention that primes accuracy-seeking orientation in users before content-sharing decisi…
Accurate threat assessment (Chapter 32 link):
— Actual signal: partner is quiet after a difficult conversation - Interpreted signal (attachment patt…
ACE score
— Adverse Childhood Experiences score; a measure of early traumatic experiences (abuse, neglect, house…
ACH
— Automated Clearing House. An electronic funds transfer network used for direct deposits, bill paymen…
ACH Inbound Processing
— triggered programs that start when ACH file messages arrive, rather than polling on a timer 2. **Wir…
Achieve complete domain compromise
— Every user, every system, every service account.
achievement hunter
— A player who focuses on earning in-game achievements or trophies, often as a form of completionism a…
Acid mine drainage
— the flow of acidic, heavy-metal-laden water from abandoned mines into streams and rivers — is one of…
Acknowledge the likely perception
— name the concern the other person is likely to have; (2) **Name why you understand that concern** — …
Acknowledging complexity
— "This isn't as simple as it looks" signals depth 2. **Showing your work** — "Here's how I reached th…
ACL (Association for Computational Linguistics)
— Premier NLP conference - Research papers
ACL design decisions:
— How do you handle monetary value precision (packed decimal → JSON)? ________________________________…
ACM KDD Sports Analytics Workshop
— Data mining approaches to sports
Acme Corp
— A mid-sized regional distributor of office supplies. We'll use their sales data, inventory records, …
acme_inventory.db
— The SQLite database from Chapter 23, containing current stock levels, reorder parameters, and suppli…
acoustic brief
— a document that specifies the intended uses of the space and the acoustic targets those uses require…
Acoustic impedance
— The opposition that a medium or structure presents to the flow of acoustic energy, defined as the ra…
Acoustic masking
— the phenomenon by which one sound reduces the audibility of another — operates pervasively in everyd…
Acoustic roughness
— the percept of dissonance produced by amplitude modulations (beating) when two frequency components …
Acoustical Society of America (ASA)
— asa.scitation.org The professional society for acoustic science. Their Acoustics Today publication c…
Acoustics
— The branch of physics concerned with the generation, transmission, and reception of mechanical waves…
Acquiescence bias
— The tendency of survey respondents to agree with any proposition presented to them, regardless of it…
Acquire
— recording the source of data 3. **Communicate** — presenting findings in a readable format 4. **Clea…
Acquire locks as late as possible
— do validation and preparation before locking 2. **Release locks as early as possible** — commit prom…
Acquiring Player Profile:
— Traditional stats: 15 PPG, 45% FG - xFG%: 43.5% (takes difficult shots) - Actual FG%: 45.0% - Shot-M…
Acquisition:
— Source: Independiente del Valle (Ecuador) - Age at signing: 19 - Fee: Approximately GBP 4.5 million …
ACSM Annual Meeting
— American College of Sports Medicine - Sports science and medicine research presentations
Act of God
— A legal and colloquial term for events caused by natural forces beyond human control, such as floods…
action
— looking up data, making calculations, calling APIs, sending notifications, updating databases. This …
Action 1 (Network):
— What specifically: - Why highest-leverage: - First step and date:
Action 2 (Visibility/Digital Presence):
— What specifically: - Why highest-leverage: - First step and date:
Action 3 (Career Capital):
— What specifically: - Why highest-leverage: - First step and date:
Action Checklist: Becoming a ChatGPT Power User
— [ ] Set up Custom Instructions with detailed context about your role and preferences - [ ] Enable or…
Action Checklist: Getting the Most from Gemini
— [ ] Verify your organization uses Google Workspace at a tier that includes Gemini features - [ ] Ena…
Action Checklist: Starting Your First Chain
— [ ] Identify a recurring complex task with three or more distinct phases - [ ] Map the expert proces…
Action Classification
— Automatic play type identification - Pick-and-roll detection - Post-up recognition
Action items:
— What specific improvements will you make next week? - Are there patterns emerging that require a pro…
action potential
— an electrical signal that travels down the axon when stimulated sufficiently. When the action potent…
Action regrets tend to "ameliorate"
— they reduce in intensity over time, because: - The act generated learning and information (you now k…
Action Valuation
— A framework for assigning a numerical value to every on-ball action (pass, carry, shot, tackle) base…
Action:
— Supporting implementation of decisions - Monitoring outcomes - Learning from results
Actionable output
— the final deliverable is a prioritized list with probabilities, not a metric summary
Actions Required:
— [ ] Action item 1 - [ ] Action item 2
Actions:
— `GO TO label` — Branch to the specified paragraph - `CONTINUE` — Take no automatic action; let the p…
Activation energy (romantic)
— The psychological and situational effort required to initiate a romantic or sexual interaction; used…
ACTIVE
— Running normally - **STOPPED** — Stopped, can be restarted - **TERMINATED** — Terminated, must be re…
Active Directory Attacks & Pentesting
— Various (multiple resources). See SpecterOps blog and ired.team wiki. Complements Chapter 17.
Active Directory attacks:
— Kerberoasting and AS-REP roasting - DCSync for credential harvesting - Golden and Silver ticket atta…
Active inoculation
— Inoculation that requires participants to generate their own counterarguments or actively engage wit…
Active learning practices:
— **Paper reimplementation**: Implementing a paper from scratch forces understanding that reading alon…
Active listening
— A set of behaviors and orientations that signal genuine attention to and engagement with what anothe…
active log data sets
— VSAM linear data sets (LDS) that DB2 writes to sequentially.
Active Manipulation:
— Inject malicious content into web pages (e.g., JavaScript keyloggers, exploit kit redirects) - Modif…
Active reattribution practice
— consciously generating situational explanations for non-matches (the other person isn't very active;…
Active social media use
— messaging, commenting, creating; less consistently associated with negative outcomes
active title
— a title that states the finding, not just the topic.
Active vs. passive social media use
— The distinction between active use (messaging, commenting, creating content) and passive use (scroll…
Active-active configurations
— both sites serve read/write traffic - **Geographic distribution** — users connect to the nearest sit…
Actively seek disconfirming evidence
— **Update beliefs with new information** — neither anchoring stubbornly to prior beliefs nor overreac…
Actively used (daily, in production):
— A transaction monitoring platform deployed in 2021 (used by 6 analysts) - A KYC document collection …
Actual malice standard
— The *New York Times v. Sullivan* (1964) requirement that a public official or figure must prove know…
Actual Results:
— Team went 3-6 remainder - Average margin: -4.2 points - Model predicted margin shift: -8.0 points - …
Actuarial surveillance
— The use of statistical profiles derived from population-level data to make predictions and decisions…
Acute:Chronic Workload Ratio (ACWR)
— The ratio of a player's recent training load (typically 7-day rolling average) to their longer-term …
ad hoc auxiliary hypotheses
— additional assumptions added to a theory not because they're independently motivated but specificall…
Ad Rank
— In Google's advertising system, the combined score that determines ad placement, calculated from bid…
Ad Revenue
— Income generated when a platform serves advertisements against a creator's content and shares a perc…
Adaptation strategies:
— **Start with Part VII (Modernization), then backfill.** Corporate learners are motivated by immediat…
Adapter Pattern
— A **design pattern** that allows objects with incompatible interfaces to work together by wrapping o…
Adapting for Your Data:
— Export your YouTube Studio data as CSV (Creator Studio → Analytics → Export) - Parse CSV rows into `…
adaptive
— its performance depends on how much disorder exists in the input. For each element, the inner `while…
Adaptive landscape
— A metaphorical surface where peaks represent high-fitness solutions and valleys represent low-fitnes…
ADATA
— Compiler-associated data produced when the ADATA compiler option is specified. Contains detailed sym…
Add
— Insert a new record - **Change** -- Modify fields of an existing record - **Delete** -- Remove a rec…
Add a gate if:
— The next step uses the current output as a foundation for significant work (if step 3's output shape…
Add a GUI
— Use `tkinter` (built-in) or `PyQt` to give TaskFlow a graphical interface 2. **Add a web interface**…
Add to your audit report:
— A section on visual processing capabilities (or their absence) - At least two potential failure scen…
Added
— New features - **Changed** — Changes in existing functionality - **Deprecated** — Features that will…
Added comprehensive error handling
— the 9000-ERROR-HANDLING section handled file errors, data validation errors, and unexpected conditio…
Adding new circuits
— running new wire from the panel to a new outlet, switch, or fixture location — requires an electrica…
Adding new circuits inside the panel
— connecting new wires to breakers — is work inside the panel. As established in Chapter 13, the panel…
Adding tasks
— verify a task is added with correct fields 2. **Deleting tasks** — verify deletion by index, handle …
Additional Components:
— **CoreDNS** — Cluster DNS for service discovery - **Ingress Controllers** — Handle external HTTP/HTT…
Additional context:
— The market mid-price at 09:00:12 was 133.505. At 09:00:16, it was 133.498. - The market mid-price at…
Additional data you've discovered:
— Migration project estimated at $380,000 (vendor says $180,000) - Batch window expansion from 3 hours…
Additional Details
— Nadia and Francesca have a formally cordial relationship. They are not friends. They rarely speak ab…
Additional Notes:
— Long: 54 yards (made) - Three blocked kicks in career - Consistent operation time (1.28 seconds aver…
Additional Practices:
— Pre-commit hooks for linting, formatting, and secret detection. - Commit-msg hooks to validate conve…
Additional recommended locations:
— Living rooms and family rooms (especially if a kitchen is adjacent) - At the top of stairways (smoke…
Additional rules:
— Volume discounts: 2% for 10–24 units, 5% for 25–49 units, 8% for 50+ units - The combined tier + vol…
ADDR
— An address constant or the ADDRESS OF special register in COBOL, which provides the memory address o…
Address
— Street (up to 30 characters), city (up to 20 characters), state (2-character code), ZIP code (5-digi…
ADDRESS OF
— A COBOL special register that yields the memory address of a *linkage section* item or any level-01 …
Address privately when:
— You have a real relationship with the person and the conflict reflects a real issue - The public con…
Address the impact without naming the tactic when:
— You are uncertain whether the behavior is strategic or defensive - The relationship is fragile or yo…
Address the performance threat:
— Lower the bar explicitly: commit to a rough draft that no one will see, purely for his own thinking …
Adena culture
— a complex of burial practices, ceremonial architecture, and long-distance trade that flourished in t…
adequacy decision
— a formal determination by the European Commission that a third country's data protection framework p…
Adiabatic approximation
— Ch 32.1 When external parameters of a Hamiltonian change slowly compared to the system's internal dy…
Adjacency Matrix
— A matrix representation of a graph where entry (i,j) represents the number of passes from player i t…
Adjacent possible
— The set of all things that are one step away from what currently exists; coined by Stuart Kauffman i…
Adjoint (Hermitian conjugate)
— Ch 6.4 The adjoint of an operator $\hat{A}$, written $\hat{A}^\dagger$, is defined by $\langle\phi|\…
Adjusted Value (accounting for risk):
— Fultz: 54 × (1 - 0.32 × 0.5) = 45.4 risk-adjusted WS - Tatum: 55 × (1 - 0.22 × 0.5) = 49.0 risk-adju…
Adjustment rules:
— Recall rating 4–5: Extend the next interval by 50–100% - Recall rating 3: Keep the next interval the…
Admin Dashboard (12 AI-atomic tasks)
— Feedback queue with bulk actions - Category management (create, edit, merge) - Priority assignment a…
Administrative Science Quarterly
— Ibarra's career pivot research and Burt's structural holes work both appear here. Essential for read…
Administrative surveillance
— The routine collection and processing of personal information by governments and institutions for bu…
Admitting complexity
— Saying "this is a simplification" increases trust because viewers sense reality is more complicated.…
adolescence
— the period in which the individual must integrate their changing body, emerging sexual maturity, cog…
Adoption metrics:
— Number of business units actively using CoE services - Number of models in production across the org…
Adoption:
— PyPI downloads increased 40% in the three months following the documentation launch - GitHub stars g…
ADR (Architecture Decision Record)
— A document that captures an important architectural decision, including the context, options conside…
AdSense
— Google's advertising program that enables YouTube creators to earn revenue from ads placed on their …
ADSR envelope
— A four-stage model describing the time-varying amplitude of a musical sound: Attack (the initial ris…
advanced
— ## Running Examples (Anchor Examples)
Advanced Analysis
— [ ] Build play type efficiency breakdowns - [ ] Calculate shot quality (xPTS) for all attempts - [ ]…
Advanced Course (assumes Part I-II completed):
— Focus on Part III (Chapters 15-21) and selected Part IV chapters - Emphasis on projects and case stu…
Advanced Lab:
— Multi-forest Active Directory - Cloud environment (AWS free tier, Azure for Students) - CI/CD pipeli…
Advanced Metrics:
— True Shooting Percentage (TS%) - Player Efficiency Rating (PER) - Usage Rate (USG%) - Win Shares - B…
Advanced pandas
— You have learned the fundamentals. The next level includes MultiIndex DataFrames, advanced groupby o…
Advanced Practitioner Course (12 weeks):
— Full Parts 1–3 (Weeks 1–4) - Selected chapters from Part 4 based on cohort (Weeks 5–7) - All of Part…
Advanced Prompt Engineering
— Chain-of-thought prompting · Tree-of-thought · Prompt chaining · Structured outputs (JSON mode) · Se…
Advanced search
— search tasks with regex patterns, not just plain keywords 2. **Natural language date parsing** — int…
Advanced Testing (Significant entities):
— Threat-Led Penetration Testing (TLPT) at least every three years - TLPT must follow the TIBER-EU fra…
Advanced Topics
— including player tracking data, advanced EPA analysis, and building comprehensive analytics dashboar…
Advantages for vibe coding:
— Each AI interaction can be isolated to a branch, making it easy to discard experiments that go wrong…
Advantages observed:
— Adding a new account type required one new file, zero changes to existing code - Each class was self…
Advantages of AMMs:
— Always available liquidity (no empty order books) - Simple user experience (just buy or sell, no lim…
Advantages of CLOBs:
— Zero price impact for small orders (within the spread) - Professional market makers can provide tigh…
Advantages of COBOL SORT:
— Complex filtering and transformation via INPUT/OUTPUT PROCEDUREs - Sort logic documented alongside b…
Advantages of continuous models:
— No arbitrary boundary effects - Can capture fine-grained spatial variation - Naturally integrate wit…
Advantages of event-driven architecture:
— **Loose coupling**: Publishers do not know or care about subscribers - **Easy extensibility**: Addin…
Advantages of Independence:
— Higher earning potential (no employer margin) - Choice of clients and projects - Flexible schedule -…
Advantages of JCL sort:
— No COBOL program to compile and maintain - Directly leverages all sort utility features - Often fast…
Advantages of pellet systems:
— Consistent, clean-burning fuel (low moisture content, consistent BTU rating) - Can be thermostatical…
Advantages of professional status:
— Losses deductible against all income (not just winnings) - Business expenses deductible (data subscr…
Advantages of regression trees:
— No assumptions about the functional form - Automatically capture interactions and nonlinear patterns…
Advantages of smart bulbs:
— No wiring changes required — screw them in like any other bulb - Per-bulb control enables lighting s…
Advantages of smart switches:
— Normal switch operation is preserved — someone can physically flip the switch and the lights respond…
Advantages of telephone elicitation:
— **Real-time interaction**: Unlike email, you can adjust your approach based on the target's response…
Advantages of the limit order:
— Save 3 cents per contract ($0.55 - $0.52) - Earn the spread instead of paying it - May qualify for m…
Advantages of this approach:
— Every query has an optimized static access path - No runtime SQL parsing overhead - Authorization is…
Advantages of zone-based models:
— Computationally simple and fast - Easy to interpret and communicate to coaches - Work with event dat…
Advantages over OpenPose:
— Runs efficiently without GPU - Simpler installation and setup - Built-in hand and face detection - A…
Advantages over xT:
— Accounts for action-specific features (pass type, body part, pressure) - Includes defensive value (p…
Advantages:
— No cursor close/reopen overhead at each checkpoint (can be significant for complex cursor queries) -…
Advent of Code
— 25 programming puzzles released each December. Fun, challenging, and great for practicing algorithms…
adversarial examples
— inputs designed to cause misclassification — and **prompt injection** attacks against language model…
Adversarial examples are a fundamental challenge
— Small, imperceptible perturbations can cause catastrophic misclassifications in safety-critical syst…
Adversarial red-teaming
— proactively attempting to evade one's own detection systems to identify vulnerabilities 4. **Network…
adversarial share reversal
— when dark shares boomerang. The engagement was massive, but it destroyed his credibility.
adversarial sharing
— sharing to oppose, not to endorse.
Adverse action notice
— Under ECOA and Regulation B, a written statement required when a creditor denies credit or offers le…
Adverse impact:
— Can you provide adverse impact data — disaggregated by race, gender, age group, and disability statu…
adverse possession
— the legal principle that long, open, and continuous use of land could establish ownership.
Adverse selection cost
— the risk of trading against better-informed counterparties 2. **Inventory risk** — the risk of accum…
advertising detection system
— the same skeptical processing that engages when you see a TV commercial. The viewer becomes evaluati…
Advising sounds like:
— "What I would do is..." - "You should definitely..." - "In your position, I'd..." - "The problem is …
Advisory powers (Article 58(3)):
— Issue opinions on processing operations - Advise parliament, government, and other institutions on d…
Advocating for social safety nets
— unemployment insurance, portable benefits, healthcare not tied to employment — that cushion transiti…
Aerial Duel
— A contest between two players for a ball in the air, typically from a long pass, cross, or goal kick…
Aerial Stopper Requirements:
— Aerial win rate > 70% - Clearances > 7.0 per 90 - Heading accuracy in both boxes
aeroelastic flutter
— a more complex interaction between the wind and the bridge's oscillation that is related to but not …
AES (Audio Engineering Society) E-Library
— aes.org/e-lib Archive of Audio Engineering Society journal papers and convention preprints covering …
Aesthetic:
— Do my last 20 pieces all use the same color palette? - Are my fonts consistent across platforms? - C…
affect heuristic
— the tendency to let emotions guide judgments and decisions, especially when the situation is complex…
Affect labeling
— The practice of putting words to an emotional experience in real time; research by Lieberman et al. …
Affect regulation
— The processes by which people manage their emotional states; in relationship contexts, partners ofte…
affected individual
— the loan applicant, the job candidate, the benefits recipient — wants to understand why the system t…
Affected Software:
— Apache products: Struts, Solr, Druid, Flink, Kafka - Cloud services: AWS, Azure, Google Cloud, Cloud…
affectionate condescension
— the suggestion that the stereotype is a compliment, that mocking someone's poverty is really a celeb…
Affective community
— A community constituted primarily by shared feeling — shared emotional investment in a cultural obje…
Affective computing
— Technologies designed to detect, interpret, and respond to human emotional states, typically through…
Affective empathy (emotional resonance)
— I tend to feel what people around me feel — their distress becomes my distress, their joy lifts me. …
Affective polarization
— The tendency of partisans to view members of their own party favorably and members of the opposing p…
Affiliate Link
— A tracking URL that credits a specific creator with any purchases made by users who click through. C…
Affiliate Marketing
— A performance-based revenue model in which a creator earns a commission for driving sales or sign-up…
Affiliate Program Resources Worth Knowing
— Amazon Associates: Best for physical products, low commission rates - ShareASale and CJ Affiliate: A…
Affiliative humor
— Humor used to create connection, reduce tension, and affiliate with others; the humor type most cons…
Affinity routing
— route transactions that access the same data to the same member, keeping the data in that member's l…
Affinity space
— A community organized around shared identity or experience within a larger community; in fan context…
Affinity-based routing
— route related work to the same member to minimize cross-member data sharing overhead 2. **Even distr…
Affirmative consent
— A consent standard requiring positive expression of agreement rather than mere absence of refusal.
Affirmative Consent Policy Resources
— The RAINN (Rape, Abuse & Incest National Network) organization maintains accessible, up-to-date summ…
Affrilachian
— A term coined by poet Frank X Walker in 1991 to describe African Americans with roots in Appalachia,…
Affrilachian Poets
— a group of Black Appalachian writers founded by Frank X Walker in 1991. How does their work challeng…
AFL-CIO
— the national federation of labor unions — made the Pittston strike a priority, channeling resources …
Africa and Europe don't overlap
— their confidence intervals are completely separate. This strongly suggests that the true means are g…
African American Great Migration
— the movement of millions of Black Americans from the rural South to the urban North between approxim…
African Americans
— both enslaved and free — were present in significant numbers and participated in the revival with an…
after
— **before** (or post - pre)
After (18-19):
— 45% of corners targeted central zone (Van Dijk zone) - Increased inswinger deliveries to exploit his…
After 3 Days — Pattern Analysis:
— Total planned study time: ______ min | Total actual focused time: ______ min - Focus efficiency rati…
After acquiring Rodgers:
— Vegas Super Bowl odds: Moved from 50:1 to 12:1 - Win total over/under: Set at 10.5 - Point different…
After alignment:
— Safety benchmarks: TruthfulQA, HarmBench, BBQ - Capability benchmarks: MMLU, HumanEval, GSM8K (to de…
After APIs (API-first model):
— Same 23 consumers, now calling REST APIs - Average 2 incidents per month (mostly authentication-rela…
After completing the map:
— Laminate or place in a clear sleeve and affix inside the panel door - Photograph the completed map f…
After deployment:
— [ ] Am I monitoring the model's performance over time, including subgroup performance? - [ ] Is ther…
After Green (Analytics Model):
— Centers valued for switching ability, passing, versatility - Defense measured by overall impact (RAP…
After groupby:
— Use `.reset_index()` to flatten a multi-index into regular columns - Use `.sort_values()` to rank gr…
After one bet:
— If you win, your bankroll becomes $B(1 + bf)$ - If you lose, your bankroll becomes $B(1 - f)$
After Part I (Foundations):
— [ ] Can explain what soccer analytics is and why it matters - [ ] Can load, clean, and explore socce…
After Part II (Core Analytics):
— [ ] Can build and evaluate an xG model - [ ] Can construct and analyze passing networks - [ ] Can im…
After Part III (Advanced Analytics):
— [ ] Can work with spatial and tracking data - [ ] Can apply machine learning to soccer problems - [ …
After Parts IV-V:
— [ ] Can apply deep learning techniques - [ ] Can conduct economic analysis - [ ] Can integrate analy…
After redesign:
— Probability of any video getting 50K+ views: ~25% - Probability of any video getting 100K+ views: ~1…
After refactoring:
— Replace characterization tests with proper specification tests - Add performance tests if applicable…
After running all five:
— Where do the frameworks agree in their conclusions? - Where do they conflict? How do you resolve the…
After sorting, answer:
— What patterns do you notice in the "High Evergreen" category? What do those topics have in common? -…
After the attempt:
— Rewind and watch the same segment again, now comparing the recording to what she just tried - Note s…
After the backlash (Days 4-7):
— "Three camera angles for 'spontaneous' kindness?" - "How much did you make from his tears?" - "The $…
After the Call:
— [ ] Follow up with a brief email summarizing key points and any agreements - [ ] If anything was lef…
After the confrontation:
— [ ] What did I learn about this specific person's communication framework? - [ ] Was the outcome I e…
After the context packet:
— Average editing time per content piece: 5-12 minutes - Approximate edit rate: 10-20% of content need…
After the conversation:
— [ ] Follow up — did what you intended land as intended? - [ ] Name any moments that got hard and ask…
After the exam (the post-wrapper):
— What was your actual score? - How did it compare to your prediction? (Are you still overconfident? U…
After the exam:
— Before getting results: estimate your score. - After getting results: record the actual score. - Cal…
After the moment:
— Reflection content: analysis, summary, "what we learned," next steps - Lower competition (many creat…
After the session (Reflection — 5 minutes):
— Did I hit my SMART goal? Yes / No / Partially - What went well? - What didn't work? - What's my plan…
After the session (within 24 hours):
— Review her practice journal notes using a cue-column approach (Cornell method adapted for music) - L…
After translation workflow:
— CPO responds to status reports most weeks with a question or acknowledgment - COO has specifically r…
After weather forecast (Thursday):
— Spread: Bills -8 - Total: 40.5
After-action reviews (AARs)
— systematic debriefs after every operation, from platoon patrols to major campaigns - **Lessons-learn…
Against abandoning p-values:
— The value of a standardized decision framework - P-values have clear meaning when used correctly - T…
Against clutch as a distinct skill:
— What statistical evidence suggests clutch is mostly noise? - How do sample size issues affect conclu…
Against overstatement:
— Most people's media diets are shaped more by choice than by algorithms — people actively seek partis…
Age (22)
— Old for a prospect - Limited development runway expected
Age and development trajectory
— **Historical improvement rates** - **System and league changes** - **Injury history and physical pro…
Age and trajectory
— Career arc position - Injury history
Age Considerations
— Varane (25): Prime years ahead, highest long-term value - Umtiti (24): Prime years ahead, injury con…
Age Curve
— A statistical model describing how player performance changes as a function of age, typically showin…
Age identification
— How does the service determine users' ages? Is the method proportionate and privacy-preserving? 2. *…
Age of consent
— The legally defined minimum age at which a person is considered capable of consenting to sexual acti…
Agenda-setting
— The theory that media influence public opinion not by telling people what to think, but by telling t…
Agent
— In the context of AI coding, a system that can autonomously plan tasks, execute actions (like readin…
Agent Loop
— The plan-act-observe cycle that AI coding agents follow: plan what to do, take an action (read a fil…
Agent-based modeling
— A computational approach that simulates the behavior of autonomous agents to understand emergent sys…
Agent-Level Metrics:
— Execution time per agent - Token usage (input and output) per agent - Success/failure rate per agent…
Agentic state
— Milgram's concept describing the psychological shift from autonomous agency to an instrument of auth…
Agglomerative (bottom-up)
— Start with every data point as its own cluster. At each step, merge the two closest clusters. Repeat…
Aggregate (2012-2019):
— Home: 54-9-1 (.852) - Home Margin: +9.2 points/game - Away: 32-32 (.500) - Away Margin: +1.8 points/…
Aggregate bias
— A systematic error that is consistent in direction across many polls or measurements, causing the ag…
Aggregate functions
— COUNT, SUM, AVG, MIN, MAX, STDDEV, and VARIANCE — collapse multiple rows into single summary values.…
aggregation
— the process of taking many rows and collapsing them into summary values. And every one of them requi…
Aggregation and dashboarding:
— Google Sheets / Excel: Sufficient for most creators; requires manual data entry - Notion: Can be use…
Aggressive Estimate:
— Optimal decision compliance: 61.5% → 90% - EP saved per game: 0.9 points
Aggressive humor
— Humor that puts down others or uses ridicule; associated with reduced long-term mate attractiveness …
Aggressive suppression
— Active C&D campaigns, DMCA mass filings, litigation. Characteristic of early corporate IP management…
Agile
— A family of iterative software development methodologies that emphasize incremental delivery, collab…
Aging Report
— Given a list of outstanding invoices with due dates, categorize each into aging buckets (current, 1-…
agnotology
— the deliberate manufacture of ignorance through strategic information management. The term was coine…
Agreeableness
— One of the Big Five personality dimensions, characterized by cooperativeness, empathy, and warmth; m…
Agreements
— Revision policy (if collaborative creation): _______________ - What happens if one party can't deliv…
aha moment
— sudden insight — is neurologically distinct from non-insight problem-solving. Research using brain i…
Aharonov-Bohm effect
— Ch 29.4 A quantum mechanical phenomenon in which a charged particle is affected by electromagnetic p…
AI and ML
— NeurIPS (Neural Information Processing Systems): https://neurips.cc -- premier ML research conferenc…
AI coding failures span a wide spectrum
— from immediately obvious (hallucinated imports that crash on import) to deeply hidden (subtle logic …
AI companion use is driven by real needs
— availability, non-judgment, consistency, loneliness management — not primarily pathology or delusion…
AI does not help (and actively hurts) when it:
— **Provides answers before you've tried** — eliminating the generation effect - **Creates an illusion…
AI does not help in specific ways:
— **It doesn't know your full context.** The most important factors in most real decisions — your orga…
AI engineering
— is still taking shape. Unlike software engineering, which has had decades to formalize its practices…
AI ethics boards with genuine authority
— boards that include external members, have access to product development processes, and have authori…
AI Ethics Researcher
— Academic or industry position focused on fairness, accountability, transparency, and social impact o…
AI Fairness 360
— IBM Research An open-source toolkit for examining and mitigating bias in machine learning models. In…
AI for Marketing and Customer Experience
— Personalization at scale · AI-powered chatbots · Customer journey analytics · Attribution modeling ·…
AI generates code
— Developer uses AI assistant with clear prompts 2. **Developer self-reviews** — Using the checklist f…
AI generates specific resistance patterns
— fear of job loss, distrust of algorithmic outputs, data scientist vs. domain expert tension, inertia…
AI genuinely helps when it:
— **Generates practice questions** tailored to what you're studying (leveraging retrieval practice — C…
AI Governance Frameworks
— What is AI governance · NIST AI Risk Management Framework · ISO/IEC 42001 · Ethics committees and re…
AI governance gap
— the mismatch between the global reach of AI systems and the national (or at best, regional) scope of…
AI has evolved through distinct eras
— symbolic AI, classical machine learning, deep learning, and the transformer/foundation model era ---…
AI helps with complex decisions because:
— **It doesn't share your biases.** When you're already leaning toward an option, AI hasn't invested e…
AI hype cycle
— will repeat. Watch for it.
AI is a constellation of subfields
— machine learning, NLP, computer vision, robotics, speech processing, and generative AI --- that incr…
AI Product Management
— The AI PM role · Managing probabilistic products · User research for AI features · Setting expectati…
AI Regulation — Global Landscape
— EU AI Act (risk tiers, compliance) · US regulatory approach · China's AI regulations · UK, Canada, S…
AI Sprint Coefficient
— the ratio of AI-augmented velocity to pre-AI velocity. This single number captures your team's effec…
AI stack
— a collection of tools configured and integrated to support their specific workflow.
AI Strategy for the C-Suite
— AI strategy frameworks · Competitive dynamics · First-mover vs. fast-follower · CEO and board respon…
AI Suitability Key:
— High: Repetitive, text-heavy, has clear inputs and outputs, or involves synthesis of information - M…
AI surveillance excels at:
— Pattern recognition at scale - Anomaly detection - Cross-referencing multiple data sources - Automat…
AI surveillance struggles with:
— Contextual understanding - Rare-event prediction - Adversarial inputs - Explanatory transparency (bl…
AI tool provider updates.
— Monitor terms of service changes from your AI tool providers - Track provider blog posts and announc…
AI training data consent
— The question of whether creators whose work is used to train AI systems have a right to consent to t…
AI translators
— people who can bridge the gap between technical AI teams and business stakeholders (the role NK is g…
AI Utilization Rate
— Percentage of coding tasks using AI assistance (target: 60-80%) 2. **First-Prompt Success Rate** -- …
AI winter
— a period of reduced funding, diminished expectations, and widespread skepticism. The term captures b…
AI, Society, and the Future of Work
— Job displacement research · Augmentation vs. automation · The skills premium · Inequality and AI · D…
AI-assisted cyberattacks
— large language models can be used to generate phishing emails, identify software vulnerabilities, an…
AI-powered offensive tools raise the bar
— AI-enhanced phishing, vulnerability discovery, and social engineering are more effective than tradit…
AI-Powered Workflows
— RAG (Retrieval-Augmented Generation) · Embeddings and vector databases · AI agents and tool use · Wo…
AI-specific requirements include:
— **Performance requirements:** "The model must achieve at least X% precision and Y% recall on the tes…
AIBTDLI
— The Application Interface Block (AIB) version of the *DL/I* call interface used in *IMS* programming…
Aider
— Documentation: https://aider.chat - GitHub Repository: https://github.com/Aider-AI/aider - Installat…
Aiko Tanaka
— A fictional composer/physicist character who bridges both worlds. Aiko appears in case studies and t…
Aiko Tanaka:
— Always referred to as "Aiko" after her first introduction in Chapter 2 - Her physics advisor Profess…
Airbnb Listings Data (Inside Airbnb)
— Multi-table dataset with listings, reviews, and calendar data. Requires multiple merge operations to…
aktivnyye meropriyatiya
— "active measures." The term encompassed a wide range of operations conducted by the KGB's Service A …
Alan Abramowitz's Time for Change model
— one of the most celebrated and most scrutinized fundamentals models — includes presidential net appr…
alarm fatigue
— nurses become desensitized and begin ignoring alarms, including real ones.
Albumentations
— Description: Fast image augmentation library. Provides geometric and photometric transformations for…
ALC
— Assembler Language Coding. Low-level programming on IBM mainframes, sometimes used for performance-c…
Alcohol use disorder:
— *Naltrexone* — opioid receptor antagonist that reduces the rewarding effects of alcohol and reduces …
Alembic
— A database migration tool for **SQLAlchemy**. Manages schema changes to databases through versioned …
ALERT
— Suspicious activity alerts for BSA/AML compliance.
Alert delivery channels:
— **Email**: For warnings and non-urgent items - **SMS/Pager**: For critical alerts requiring immediat…
Alert Metrics (checked every 1 minute):
— Lock escalation count (delta > 0 triggers investigation) - Deadlock count (delta > 5/hour triggers a…
Alert on symptoms, not causes
— Alert when users experience errors, not when CPU is high (CPU might be high and everything might be …
Alert workflow management
— how alerts are reviewed, documented, and dispositioned — is as important to AML program quality as t…
Alerting rules
— Define at least five alerts: - Error rate exceeds threshold - Response time exceeds threshold - Rate…
Alex
— a marketing manager who uses AI daily but finds herself wrestling with quality and trust - **Raj** —…
Alex (marketing manager, non-technical, creative)
— Advantage: Reasonable expectations and a practical orientation — she is not looking to be impressed,…
Alex's AI no-fly list:
— Condolences and personal expressions of grief to people I know - Content that is explicitly meant to…
Alex's evaluation (section by section):
— Campaign objective: Good. - Target audience: Demographic solid, psychographic uses the insight langu…
Alexithymia
— Difficulty identifying and describing one's own emotional states; associated with reduced interocept…
Algorithm
— The rules-based or machine-learning system a platform uses to decide which content to surface to whi…
Algorithm (sliding window approach):
— Maintain a window [left, right] - Use a set to track characters in current window - Expand right poi…
Algorithm auditing
— running model performance statistics disaggregated by race — is an essential step before deploying a…
algorithm locus
— the belief that their outcomes are determined by the platform algorithm, and that their own creative…
Algorithm requirements:
— Logical qubits: $\sim 4{,}000$ (for Shor's algorithm with windowed arithmetic) - Logical $T$ gates: …
Algorithm signals:
— What likely explains the video's algorithmic distribution? (Watch time? Rewatches? Comments? Shares?…
algorithmic amplification
— the platform's active choices about which content to recommend to users — is legally contested and r…
Algorithmic audit firms
— sometimes called "AI audit firms" or "responsible AI consultancies" — offer services ranging from bi…
Algorithmic Auditor
— Conducts independent assessments of algorithmic systems for bias, fairness, transparency, and compli…
Algorithmic Bias
— Systematic errors in model predictions that create unfair outcomes for particular groups, such as un…
algorithmic complexity
— how the runtime grows as the input size increases.
algorithmic intuition
— the ability to look at a problem and reason about which approach will scale and which will break dow…
Algorithmic Justice League
— *Focus:* Raising awareness about AI bias and promoting equitable and accountable AI - *Founded by:* …
Algorithmic management
— our third new concept — refers to the use of AI and automated systems to assign, monitor, evaluate, …
Algorithmic redlining
— The practice, by an algorithmic model, of producing differential outcomes by geography that correlat…
Algorithmic serendipity
— The phenomenon by which recommendation algorithms on social media platforms surface unexpected conte…
Algorithmic trading
— the use of computer programs to generate, route, and execute trading orders based on predefined rule…
Algorithmic trading:
— Field 26: Algorithmic trading indicator (Y/N) - Field 27: Algo decision-making indicator - Field 28:…
algorithmic wage discrimination
— the use of data to pay different workers different rates for substantially similar work, based on th…
Algorithms change constantly
— platforms update to counteract gaming; today's hack is tomorrow's penalty 2. **Hacks optimize signal…
Aliasing
— A form of distortion that occurs in digital audio when a signal contains frequency components above …
Alice's track record:
— Of the 100 days she said "10% chance of rain," it rained on 10 of them. - Of the 200 days she said "…
Alignment problem
— The challenge of ensuring that an optimizing system (whether AI, bureaucracy, or incentive structure…
All five recurring themes
— the attention-to-revenue gap, platform dependency vs. owned audience, authenticity as economic asset…
All GPAI providers must:
— Maintain up-to-date technical documentation - Provide information and documentation to downstream pr…
ALL literal
— Repeats a literal pattern to fill the field. Used for decorative lines (`ALL "*"`), test patterns, a…
all-or-nothing
— not a statistical inequality but a deterministic contradiction.
All-or-nothing commit
— only commits when all steps succeed 5. **Transfer logging** — creates an audit trail and supports th…
All-or-nothing thinking
— Interpreting situations in binary, absolute terms with no middle ground.
All-Star Probability:
— Fultz: ~35% - Tatum: ~30%
Allegation
— A credible accusation surfaces. This might be from an audience member who noticed a non-disclosure, …
Alleghenian orogeny
— The mountain-building event caused by the collision of Africa and North America approximately 325–26…
Allegheny mountain counties
— Hardy, Pendleton, Pocahontas, and others in the high ridges — were included partly to give the new s…
ALLOCATE CURSOR
— Allocates a cursor based on the result set locator. This gives the calling program a cursor it can F…
Allometric scaling
— The systematic relationship between body size and biological properties (metabolic rate, lifespan, h…
Allostatic load
— The cumulative physiological cost of chronic stress exposure; represents the wear and tear on multip…
ALLOW READ ACCESS
— Permits concurrent read access during the load. ALLOW NO ACCESS is more restrictive but marginally f…
ALLOW WRITE ACCESS
— Permits concurrent write access during statistics collection. The alternative ALLOW READ ACCESS bloc…
Allowed energy bands
— ranges of energy where solutions exist. 2. **Forbidden gaps** — ranges of energy where *no* Bloch st…
Allport Scale
— Gordon Allport's five-stage model of prejudice escalation: Antilocution → Avoidance → Discrimination…
AllSides Media Bias Chart
— allsides.com/media-bias/ratings Rates major U.S. news sources on a left-to-right ideological scale u…
Almost Always Go For It:
— 4th & 1 anywhere in opponent's territory - 4th & 2 at opponent's 30-50 - 4th & goal from inside the …
Almost Always Kick FG:
— 4th & 6+ at opponent's 15-25 (32-42 yard FG) - 4th & 4+ at opponent's 1-10 (under 30 yard FG) - Fina…
Almost Always Punt:
— 4th & 7+ from own territory - 4th & 10+ from anywhere except desperate situations - Leading late wit…
Almost never
— pollutes namespace unpredictably |
Alpha = 1 + 30 = 31
— **Beta = 1 + 20 = 21**
ALPHABET clause
— A SPECIAL-NAMES paragraph clause that defines a custom collating sequence or maps between character …
Alphanumeric
— A data category in COBOL for items that can contain any character. Defined with *PICTURE* symbol X.
Already in most homes:
— Flashlight (or phone flashlight) - Tape measure - Pen and paper (for a home inspection notepad)
Also practice:
— Recovering deleted files with `git checkout` - Undoing the last commit with `git reset` - Viewing th…
alt text
— a text description that screen readers can read aloud to blind users. Good alt text for a chart:
Altair
— A declarative visualization library built on Vega-Lite. Elegant and principled, excellent for explor…
ALTER
— Full control. The user can read, write, delete, rename, move, and modify the security profile of the…
Alternate Index (AIX)
— A VSAM component that provides an additional access path to the records in a *base cluster*. An AIX …
alternate indexes
— additional index structures that map alternate key values to records.
ALTERNATE RECORD KEY
— A clause in the FILE-CONTROL paragraph that defines a secondary key for an *indexed file* (typically…
Alternative approaches:
— Use objective performance metrics (sales numbers, code commits, project completion rates) instead of…
Alternative capital sources to know:
— **CDFIs (Community Development Financial Institutions):** Mission-driven lenders that provide capita…
Alternative Definition (distance-based):
— Forward passes of at least 30 meters toward goal - Or passes into the final third from outside it
Alternative governance models
— community data governance, data cooperatives, regional frameworks — offer paths beyond the corporate…
Alternatives for prediction markets:
— **Brier score loss:** $\frac{1}{N} \sum (y_i - \hat{p}_i)^2$. Sometimes used for calibration-focused…
Alternatives:
— What would exterior waterproofing cost for the same protection? What would the 20-year total be? - W…
ALWAYS A LICENSED ELECTRICIAN:
— Any work in or on the main electrical panel - Adding circuits or subpanels - Service entrance work -…
Always check return codes
— file status, SQLCODE, PCB status code, CICS RESP. Processing after a failed I/O operation is the sec…
Always check the PCB status code
— spaces means success, GE means not found. Processing stale data from a previous call's I/O area is t…
Always commit:
— Source code (`.py` files) - Configuration templates (not the actual `.env`) - Requirements files - T…
Always fix axis ranges
— prevents disorienting rescaling. 2. **Always set `animation_group`** — enables smooth entity trackin…
Always open CSV files with `newline=""`
— prevents blank-row bugs from newline translation - `csv.reader` — rows as lists; positional access o…
Always share:
— Prompts that produced unusually good results for common tasks. - AI interactions that revealed a bug…
Always specify `encoding="utf-8"`
— relying on the OS default produces encoding bugs on Windows - **Always use a `with` statement** — th…
Always spot-check
— Manually verify 5-10% of your data 2. **Use known results** - Cross-check high-profile games with ne…
Always use FILE STATUS
— Define a status field and check it after every I/O operation. 2. **Use INVALID KEY for expected cond…
Always write reversible migrations
— Every `up` migration should have a corresponding `down` migration 2. **Separate deployment from migr…
Always-on microphone
— A listening mode in which a device continuously monitors audio to detect a wake word, requiring some…
AMAs (Ask Me Anything sessions)
— scheduled live sessions in a text channel or voice channel where the creator takes questions from co…
Amazon Web Services (AWS)
— **EC2**: Virtual machines with full control - **ECS/Fargate**: Container orchestration without manag…
ambient room sounds
— whatever is present in the performance space; (2) **audience sounds** — shuffling, breathing, coughi…
Ambient: Four 4-foot LED shop lights
— The 4-foot LED integrated shop lights (Barrina brand, similar low-cost alternatives available) repla…
Ambiguous loss
— A loss that lacks clear definition or social acknowledgment — a living person who is psychologically…
Ambiguous losses
— the losses that cannot be named cleanly because the person is still present but something essential …
Ambiguous solicitation
— A flirtatious or romantic signal deliberately structured so that it can be plausibly denied, allowin…
Ambisonic Decoder Toolbox (ADT)
— bitbucket.org/ambidecodertoolbox Open-source MATLAB/GNU Octave tools for ambisonic decoding matrix c…
Ambisonics
— A full-sphere surround-sound technique that encodes and reproduces the acoustic field at a point in …
American College of Sports Medicine (ACSM)
— https://www.acsm.org/ - Research and practical guidelines
American Community Survey
— Five-year estimates provide detailed contemporary demographic, economic, and social data at the coun…
American Football Coaches Association
— Coaching resources - Development best practices
American Guild of Musical Artists (AGMA)
— agmanatl.com While primarily representing performing artists, AGMA's structure and advocacy work is …
American history
— a concentrated, extreme, and revelatory version of patterns that operate across the entire country. …
American Protective League (APL)
— Volunteer civilian surveillance organization operating under Justice Department supervision, with ap…
American Psychological Association (APA)
— apa.org - Licensing requirements, ethical guidelines, continuing education
American Soccer Analysis
— MLS-focused analytics - Expected metrics explanations - Team and player analysis - Link: americansoc…
American Soccer Analysis Crossing Studies
— MLS-focused crossing analysis - Efficiency metrics - Position-specific findings
Americas and W Pacific overlap substantially
— we can't confidently say their true means are different.
AML monitoring and reporting
— the ability to generate, review, and file SAR reports. Disruption impact: medium regulatory (failed …
AMM Advantages:
— **Always available liquidity:** An AMM always offers a price, unlike an order book which requires co…
AMM Disadvantages:
— **Higher effective margins:** AMM pricing formulas typically produce wider spreads than competitive …
AMM Markets (Manifold, some DeFi platforms):
— Impact is continuous along the bonding curve - Impact is deterministic: $x \cdot y = k$ (constant pr…
Amortization
— The process of spreading a loan's principal repayment over scheduled periodic payments. Each payment…
amplification
— a single share from a connector reaches more people than a share from an average person. On social m…
amplification distinction
— differentiating between hosting content and algorithmically promoting it — offers a potential way fo…
amplification risk
— the correction paradox — means that high-volume fact-checking environments may, on balance, increase…
Amplitude
— The maximum displacement of a wave from its equilibrium position; in acoustics, this is often expres…
AMV.org
— The primary archive and community for AMV production; extensive review archives document the develop…
Amygdala
— A bilateral almond-shaped brain structure in the temporal lobe that plays a central role in fear det…
amygdala hijack
— a term that has since passed into popular understanding, though its neuroscientific underpinnings de…
An "All" option in the dropdown
— when no specific region is selected, all data is shown. This is the default that provides the big pi…
An anomaly is an invitation, not an accident
— when something significantly outperforms your baseline, don't just celebrate it; investigate it 2. *…
An API service definition
— Design the z/OS Connect service definition for account inquiry, including request/response copybooks…
An approval chain that can operate at speed
— the communications director needs authority to approve rapid response content without full internal …
An Elevation Certificate
— prepared by a licensed surveyor — can significantly reduce your NFIP premium if your home sits above…
An interview header
— Date, location, interviewee biographical information (with permission), interviewer name, recording …
An introduction (1,000-1,500 words)
— An essay that introduces the collection, explains the thematic connection between the interviews, de…
An MQ-based CDC publisher
— COBOL program that reads the transaction CDC log and publishes change events to an MQ topic (`HABANK…
An ore bank or mine
— often an open-pit excavation where workers dug iron ore from surface deposits or shallow underground…
An overfit weather model
— one that tries to predict based on dozens of local, short-lived atmospheric features — might have lo…
An understanding of instances and databases
— the instance is the engine; the database is the data store. Configuration parameters at both levels …
Anaconda
— a free distribution that bundles Python, Jupyter, and hundreds of data science libraries into one in…
AnaCredit
— The ECB's analytical credit dataset program, which collects granular loan-level data from eurozone b…
analogical reasoning
— and it's the single most important cognitive skill for transfer.
Analogy
— A structural correspondence between two systems from different domains; the primary cognitive mechan…
Analysis
— [ ] What was the effect size? (not just "significant" — how big?) - [ ] Are confidence intervals rep…
Analysis and Reporting:
— Calculate password complexity distribution - Identify password reuse across accounts - Identify patt…
Analysis Components:
— ROI calculation for scholarship specialists - Performance prediction models - Program-specific recom…
Analysis of the strong version:
— **Specific trigger** (sitting down at desk at 8:00 AM): eliminates the decision requirement - **Spec…
Analysis of Variance (ANOVA)
— a method for comparing means across three or more groups. Key resources to preview:
Analysis questions for each:
— Which components are present? - Which are missing? - What assumption does the AI likely make to fill…
Analysis questions:
— What is your P10 for your worst expected month in the next 12 months? - Does your P10 exceed your mo…
ANALYSIS — What the Critical Path Tells You:
— Optimizing EOD-002 (ATM settlement) does *nothing* for the window. It's not on the critical path. - …
Analysis:
— Which identities do you think about most? Which are invisible because they are dominant (e.g., major…
Analytic cognition
— A cognitive style characterized by attention to focal objects, formal categories, and rule-based rea…
Analytical Profile at Acquisition:
— Pressures per 90: 26.3 (98th percentile for Ecuadorian league midfielders) - Tackles + interceptions…
Analytical Standards:
— Distinguish between documented practices and reported experiences (distinguish between "the organiza…
Analytical Use:
— Betting data provides excellent prediction benchmarks - Market-derived ratings can supplement your m…
Analytics FC Podcast
— Analytics industry focus - Practitioner interviews - Technical discussions
Analytics Job Boards
— TeamWork Online - Sports Business Solutions - LinkedIn Sports Analytics
Analytics Layer
— EPA calculation engine - Win probability model - Fourth-down decision system - Opponent analysis too…
Analytics Layer:
— Proprietary player valuation models - Recruitment screening tools with customizable filters - Perfor…
Analytics Philosophy:
— "Moneyball" approach: identifying market inefficiencies - Statistical models for player valuation an…
Analytics Staff
— Primary need: Flexible tools for ad-hoc analysis, model development - Time constraints: Variable bas…
Analytics Translators:
— Bridge technical and non-technical stakeholders - Communicate insights to coaches and executives - E…
Analytics Twitter
— Real-time discussion - Research sharing - Key accounts: - @benaborowitz - @SethWalder - @tejsethi - …
Analyze Strategic Omissions
— What information, if included, would significantly change the audience's evaluation of the message? …
Analyze the Emotional Register
— What emotion is being targeted: desire, fear, belonging, pride, anxiety, reassurance? - Is the emoti…
Anchor and Redirect
— A two-part conversational technique in which you briefly acknowledge (anchor) what the other person …
anchor effect
— a cognitive bias where an extreme value distorts subsequent judgments. Within 12 months of the Neyma…
ANCHOR EXAMPLE
— Kwame Mensah designed this topology in 2019 when CNB migrated from CICS TS 5.4 to 5.6. The previous …
Anchor institutions
— particularly land-grant universities — create islands of economic activity in otherwise struggling r…
Anchoring
— Where has a first number or first impression influenced your subsequent evaluation?
Anchoring bias
— A cognitive bias in which people rely too heavily on the first piece of information encountered (the…
Anchoring effect
— A cognitive bias in which respondents' answers are influenced by a reference point (the "anchor") pr…
Anchoring options:
— **Stud-mounted:** 3" screws into studs on both ends of the bar. This requires the bar ends to align …
ancilla qubits
— extra qubits prepared in known states that interact with the data qubits to extract syndrome informa…
and
— Involves bidding or offering with the intent to cancel the bid or offer before execution.
AND SAMPLED DETAILED INDEXES ALL
— Collects detailed index statistics using sampling. DETAILED provides extended statistics including c…
Anderson's "What Is the Point of Equality?"
— available free online; the best single essay for understanding the luck egalitarianism debate at its…
Andrej Karpathy, "Computer Vision" lectures
— Stanford CS231n. The foundational deep learning for vision course. While not soccer- specific, it pr…
Andrew Ng's Machine Learning (Coursera)
— https://www.coursera.org/learn/machine-learning - Classic introduction to ML concepts
Andrew Ng's Machine Learning Course
— ML fundamentals - Free on Coursera/YouTube
Android Digital Wellbeing
— Built-in; essential for the digital audit in Chapter 39.
AndroidManifest.xml
— The application's declaration file, specifying package name, permissions, components (activities, se…
ANFO
— a mixture of **ammonium nitrate and fuel oil** that is cheap, effective, and available in enormous q…
Angle to Goal
— The angle subtended by the goal posts from the location of a shot, calculated using trigonometry. A …
Angular momentum
— Ch 5.3, Ch 12.1 A vector observable associated with rotational symmetry. In quantum mechanics, the o…
Angus Deaton
— Deaton would win the Nobel Prize in Economics that same year — published a study that sent shockwave…
anhedonia
— the loss of the capacity for pleasure or interest in previously enjoyable activities. This is more t…
Ani-Yunwiya
— the **Principal People**, the name the Cherokee used for themselves — had built a civilization that …
Animate
— https://github.com/iangow/animate - Sports animation examples - Player movement visualization techni…
Animated snapshots of standing wave motion
— because standing waves are time-varying, static plots cannot fully convey their oscillatory characte…
Anki
— apps.ankiweb.net The gold standard for spaced repetition. Free on desktop and Android; paid on iOS. …
Annealing
— A process borrowed from metallurgy in which a system is heated (randomized) and then slowly cooled (…
Annihilation operator
— Ch 4.4, Ch 8.6 The operator $\hat{a}$ that lowers the occupation number by one: $\hat{a}|n\rangle = …
Annotated bibliography — 19 sources
— ## Foundational Empirical Work
Annotated key data points
— the ones that support your message - [ ] **Reference lines** where relevant (targets, benchmarks, th…
Annotation
— writing notes in or alongside the text — is what highlighting should have been.
Annotation:
— Use red rectangles to highlight the vulnerability or key evidence - Use arrows to draw attention to …
Annotations
— Footnotes or endnotes throughout the transcript that provide historical context for events, places, …
Annotations:
— At month 13: "Campaign launched →" with an arrow pointing to the spike - At the peak (month 13-14): …
Announce
— Add a `Deprecation` header to all responses: `Deprecation: true`. Add a `Sunset` header with the ret…
Annual cost:
— 200 trades × $2.50 = **$500 per year**
Annual proceedings available at:
— https://www.sloansportsconference.com/
Annual Review
— Re-administer the **AI Maturity Self-Assessment** (Template 15) to measure progress. - Update the **…
Annual Roof Maintenance Checklist
— Ground inspection with binoculars: shingles, flashing, sagging, algae/moss - Attic inspection: light…
Annual well maintenance checklist:
— Test water: bacteria, nitrates, pH at minimum - Inspect wellhead for physical integrity - Check pres…
Annually
— Replace batteries in all battery-powered detectors (unless using 10-year sealed units) - Test CO det…
Annually:
— Full life review: the complete five-domain assessment, with written reflection - Relationship invent…
anomaly
— an observation that does not fit the paradigm's expectations. Anomalies are inevitable. No paradigm …
anonymization
— removing personally identifying information (names, addresses, social security numbers) from dataset…
Anonymous reporting mechanisms
— where they exist and where anonymity can actually be protected. The "actually protected" qualifier m…
anosognosia of pattern
— the failure to recognize a real pattern because you are too afraid of seeing ghosts. The goal is not…
ANOVA
— comparing means across 3+ groups. 2. **Chi-square test** — both variables are categorical. 3. **One-…
Anscombe's Quartet
— that have nearly identical summary statistics. Each dataset has the same mean of x, the same mean of…
ANSI
— American National Standards Institute. The organization that standardized COBOL as ANSI X3.23 in 196…
ANSI X12 EDI Date/Time Qualifiers
— DTP segment date format codes (D8 = YYYYMMDD, RD8 = date range, etc.). Essential for healthcare EDI …
Ansible for z/OS
— https://galaxy.ansible.com/ibm/ibm_zos_core — Red Hat Ansible Certified Content for IBM Z.
answer
— the subject transposed up a perfect fifth (or down a perfect fourth) while the first voice continues…
Answer framework:
— Ask for: SDK version, language, code snippet showing how they initialize the client - Common causes:…
Answer rubric (10 points):
— Risk classification that goes beyond the EU model (considers context, not just technology) — 2 point…
Answer the question they asked
— they want *recommendations for reducing churn*, not just a model. End with actionable business insig…
Answer.
— **SYNC:** The primary waits for the standby to write the log to disk before returning COMMIT to the …
Answer:
— **Control parameter (analogous to temperature):** The fraction of a person's social circle already u…
Answer: (A)
— **Precision** = True Positives / (True Positives + False Positives) = fraction of flagged items that…
Answer: a
— **10.** In the Robert Williams wrongful arrest case, what was the significance of the photo array co…
Answer: B
— COBOL's verbose, English-like syntax, paragraph names, PERFORM structures, and explicit DATA DIVISIO…
Answer: C
— AI tools frequently reference features that exist in Micro Focus COBOL but not Enterprise COBOL for …
Answer: D
— Production deployment includes a manual approval gate (`input` directive in Jenkins) that requires a…
Answer: FALSE
— AI tools cannot understand system-level context like JCL dependencies, batch chain sequencing, or in…
Answer: TRUE
— After generating 4,200 AI test cases, reducing to 3,100 through expert review, the automated nightly…
antecedent drainage
— is the key to understanding the New River's most distinctive feature: it flows north. While most riv…
anthology
— each essay covered a different topic, but all shared the theme of hidden or misrepresented history. …
Anthology:
— Commitment level: Medium — shared theme attracts, but episodes are independent; viewers can enter an…
Anthropic API
— Description: Access to Claude models. Used for generating high-quality synthetic data, especially fo…
Anthropic HH-RLHF
— Description: Human preference data for helpfulness and harmlessness. Contains pairs of model respons…
Anthropic Python SDK
— pypi.org/project/anthropic The official SDK for the Anthropic API, used in the Python code examples.…
Anti-aliasing filter
— A low-pass filter applied to an analog signal before analog-to-digital conversion to remove all freq…
Anti-forensic measures:
— The attackers encrypted the ransomware payload, making static analysis difficult - They used legitim…
Anti-Fragility
— Organizational characteristic by which systems become stronger, not merely resilient, when exposed t…
Anti-inflammatory additions:
— Fermented foods (yogurt, kimchi, sauerkraut, kefir) ___/7 days - Varied plant foods (20+ different p…
Anti-Money Laundering (AML):
— Implement a written AML compliance program - Designate a compliance officer - Conduct independent au…
Anti-Pattern Priming
— Tell the AI what NOT to do. Most useful when the AI tends to generate code with patterns that violat…
Anti-patterns
— the universal cursor, uncommitted marathon, string concatenation in dynamic SQL, unbounded scrollabl…
Anti-patterns to avoid:
— Partitioning by a high-cardinality artificial key (TRANS_ID). This distributes data evenly but provi…
Anticipate industry trends
— global market expansion, regulatory evolution, and technological convergence with financial markets …
Anticipate potential harms:
— Privacy harms (Chapter 7-12) - Bias and fairness harms (Chapter 14-15) - Accountability gaps (Chapte…
Anticipated future systems:
— Autonomous combat drones that can identify, track, and engage human targets without real-time human …
Anticipating objections
— Addressing counterarguments before the viewer thinks them signals the creator has thought about the …
Anticipation build (2-3 seconds)
— The deliberate pause before the reveal increases emotional intensity, like the comedy pause (Ch. 25)…
Antifragility
— A property of systems that gain strength from stressors, shocks, and volatility, beyond mere robustn…
Antitrust actions
— The FTC and DOJ have brought antitrust actions against Meta, Google, and Amazon, with mixed results.…
Antiunitary operator
— An operator that is antilinear ($\hat{\Theta}(\alpha|\psi\rangle) = \alpha^*\hat{\Theta}|\psi\rangle…
Anxiety and discomfort signals:
— Self-touching behaviors: touching face, neck, hair, or arms (called "pacifying behaviors" by Joe Nav…
Anxiety dimension:
— How often have you experienced excessive or difficult-to-control worry? ___ - How intensely have you…
Anxious attachment
— An attachment style characterized by hyperactivation of the attachment system; associated with preoc…
any column
— There is no sequence number area, indicator area, or identification area - Lines can be up to **255 …
any sequence
— lists, ranges, strings, dictionary items, tuples, and more. - The loop variable (e.g., `for invoice …
Any work on 240V circuits
— dryers, ranges, water heaters, HVAC, EV chargers — is not appropriate for homeowners without signifi…
any%
— A speedrunning category where the goal is to complete the game as fast as possible using any means; …
anyons
— quasiparticles that are neither bosons nor fermions but obey fractional statistics. The quasiparticl…
AOR-ACCT (Account Management):
— HABKTLR and HABKSUP can execute inquiry and basic account transactions - Only HABKSUP can execute ad…
AOR-LOAN (Loan Processing):
— Only HABKLOAN and HABKSUP can execute loan transactions - Loan file access completely segregated fro…
AOR-PAY (Payment Processing):
— Only HABKPAY and HABKSUP can execute payment transactions - Only HABKPAY can UPDATE the payment file…
AOV (Average Order Value)
— The average dollar amount a customer spends per transaction in a creator's shop or course platform. …
Apache Airflow
— A workflow orchestration platform for scheduling, monitoring, and managing data pipelines. When your…
Apache Airflow Documentation
— Workflow orchestration - Pipeline scheduling and monitoring - https://airflow.apache.org/ - Industry…
Apache Airflow Fundamentals (Astronomer)
— Free course on workflow orchestration with Airflow.
Apache Kafka Documentation
— https://kafka.apache.org/documentation Comprehensive documentation for Kafka configuration, topic ma…
API
— Application Programming Interface. A defined set of protocols and tools that allows software compone…
API (Application Programming Interface)
— A defined interface that allows different software components to communicate. In web development, ty…
API Catalog
— A developer portal that aggregates OpenAPI specifications from all registered services. Developers b…
API Definition
— An OpenAPI 3.0 specification that defines the RESTful interface. This is what external consumers see…
API Design Guidelines (Microsoft)
— Practical API design guide at docs.microsoft.com/en-us/azure/architecture/best-practices/api-design.
API Exposure Plan:
— Which CICS transactions will be exposed as REST APIs? - What z/OS Connect configuration is required?…
API gateway
— Validates OAuth2/JWT tokens, enforces rate limits, blocks known bad actors. This is the first line o…
API Gateway Testing Points:
— Endpoints without authentication (missing authorizer) - API key in headers (easily leaked in logs an…
API hallucination
— the generation of references to functions, classes, methods, or entire libraries that do not exist. …
API key
— a unique string that identifies your application:
API management
— versioning, rate limiting, analytics - **Data transformation** — JSON ↔ COBOL with a graphical mappi…
API Reference → DataFrame
— When you want to know "does pandas have a method that does X?", the API reference is the authoritati…
API Requester
— the client (mobile app, web service, partner system) that makes REST calls.
API versioning plan
— Design a v2 of the account inquiry API that adds new fields and changes the balance type from string…
API Wrapping
— A modernization technique in which a legacy COBOL program is left intact but is fronted by an API la…
APIs
— Application Programming Interfaces. And at their core, they work exactly like the functions you wrot…
Apophenia
— The human tendency to perceive meaningful patterns in random or unrelated data; the shadow side of c…
App Passwords
— separate, limited-scope passwords that can be revoked independently.
App permissions generally:
— Regularly audit all app permissions using the privacy settings menus. - Revoke microphone and camera…
Appalachian Development Highway System (ADHS)
— a network of corridors designed to connect the isolated communities of the Appalachian region to the…
Appalachian Plateau
— relatively flat-topped terrain deeply dissected by erosion into narrow valleys and hollows; contains…
Appalachian Regional Commission (ARC)
— a federal-state partnership designed to promote economic development across the thirteen-state Appal…
Appalachian Studies
— An academic field emerging from 1970s activism, committed to scholarship that serves the region's co…
Appalachian Studies Association
— The professional organization of Appalachian Studies scholars and community practitioners, founded i…
Appalachian Volunteers (AVs)
— initially a project of the Berea College-based **Council of the Southern Mountains** — sent young pe…
Appeals and contestation:
— In the Taylor era, how could workers contest supervisory decisions? - How can workers contest algori…
Appendices A–M
— ## How to Use This Book
Appendices:
— Complete list of hosts scanned. - Raw scan outputs (sanitized). - Social engineering campaign result…
Appendix Types Selected:
— Statistical tables (Category A + stats focus) - Python code reference (CODE_LANGUAGE = Python) - Env…
Applicant tracking systems with AI features
— Greenhouse, Lever, iCIMS — have integrated AI for resume screening, candidate ranking, and interview…
Application 1: Core Savings Account Processing
— 280K LOC COBOL on CICS + DB2 - Processes 50,000 transactions/second peak - p99 latency: 0.8ms - Busi…
Application 2: Monthly Statement Generation
— 45K LOC COBOL batch - Generates 2.1 million PDF statements monthly - Runs in 3-hour batch window - B…
Application 3: Internal Branch Lookup Tool
— 8K LOC COBOL on CICS + VSAM - Used by 50 branch managers for employee scheduling - ~100 transactions…
Application and Assessment (45 minutes)
— Case study analysis: small group exercise applying framework to a new scenario (25 min) - Q&A and de…
Application and vetting:
— Background investigations of owners, directors, and key employees - Financial capacity requirements …
Application Architecture:
— Consumer-facing banking application: React frontend, Go microservices backend, deployed on EKS. - In…
Application Attacks:
— Mobile app vulnerabilities (as covered in Chapter 30) - Web dashboard vulnerabilities (as covered in…
Application Developer
— Writing and maintaining COBOL programs for business applications. This is the most common path and t…
Application Fixes (Development Team):
— Code changes (input validation, parameterized queries, output encoding) - Library updates (upgrading…
Application infrastructure
— including the proprietary systems managing global container operations — completely destroyed - **Ph…
Application logging
— Your COBOL program should log significant events (successful transfers, validation failures, externa…
Application Metrics (from Chapter 27):
— Transaction response time - Batch job elapsed time - CPU consumption per transaction - DASD I/O rate…
Application processing time between SQL calls
— but the program is 95.6% in DB2, so this is only 4.4% 2. **Synchronous I/O not being properly catego…
Application Rules:
— Stronger regression for smaller samples - Less regression for more stable statistics (e.g., free thr…
Application-level authorization
— The COBOL program can perform additional checks (e.g., user X can only view account Y if they own it…
Application-Owning Region (AOR)
— Runs your COBOL programs. AORs contain the application logic, access databases through DB2 connectio…
Applications to contemporary analysis:
— The Affordable Care Act's passage and the Republican Party's failure to repeal it created political …
Applications to contemporary movements:
— Black Lives Matter's rapid growth after Ferguson (2014) reflected pre-existing infrastructure: Movem…
Applications:
— Epic Systems EHR (Electronic Health Record) — the crown jewel, containing all patient data - Patient…
Applies to:
— Chatbots and conversational AI (must disclose AI identity) - Deepfakes (must label as AI-generated) …
Apply at least three dual coding techniques
— concept mapping, mind mapping, sketch-noting, visual analogies, or infographics — to your own learni…
Apply boundary conditions
— continuity of $\psi$ and $d\psi/dx$ at interfaces; physical behavior at $x \to \pm\infty$. 5. **Norm…
Apply full premium when:
— Dome team visiting - Cross-country eastern team - Primetime game - Non-divisional opponent
Apply Historical Pattern Analysis
— Has a similar regulation been attempted before? What happened? - Who controlled enforcement when the…
Apply model scoring
— Calculate value score - Flag prospects above threshold (e.g., 70+)
Apply the addition and multiplication rules
— these are the computational workhorses of probability that students will use through Chapter 10 and …
Apply the anatomy framework:
— Source: Who produced this document? What is their institutional interest in its conclusions? - Messa…
Apply the CMI cycle
— critique what is wrong, modify what needs changing, improve what can be elevated. 4. **Build increme…
Apply the four themes:
— **Power Asymmetry:** Where are the asymmetries in this system? - **Consent Fiction:** Is consent mea…
Apply the model as if you were forecasting blind
— use only data that was available before the election, not anything known afterward. This means not i…
Apply the Propaganda-Advertising Continuum
— Where does this communication fall on the spectrum from commercial persuasion to political propagand…
Apply through projects
— Case studies in this book - Personal analysis projects - Kaggle competitions
APPLY WRITE-ONLY
— A clause in the FILE-CONTROL paragraph or I-O-CONTROL paragraph that optimizes output buffering for …
Applying the Framework to Specific Claims
— For any specific claim from the outlet, what independent sources can corroborate or contradict it? -…
Appoggiatura
— A melodic ornament in which a non-chord tone, typically placed on a strong beat, is resolved by step…
Appraisal analysis:
— What am I interpreting this situation to mean? _______________________________________________ - Wha…
Appraisal theory (of emotion)
— The framework proposing that emotions are produced by evaluative judgments (appraisals) about events…
Approach A (one thin fact per card):
— Card 1: Where do the light reactions occur? / Thylakoid membrane - Card 2: Where does the Calvin cyc…
Approach A -- Automated COBOL-to-Java conversion:
— Pros: Fast initial conversion; all code on a single platform; reduced mainframe costs. - Cons: Produ…
Approach A — Additional direct drywall layer:
— Measure the square footage of shared wall(s) - Price out 1/2-inch drywall sheets, joint compound, ta…
Approach A: Client-Side Tokenization
— Client-side JavaScript widget collects card details - Card details sent directly to payment processo…
Approach A: Monolithic Server
— One MCP server that exposes all tools (database queries, API access, file operations, deployment com…
Approach A: Process-based regulation
— requiring specific governance processes (bias testing, documentation, oversight) before algorithmic …
Approach B (one concept, deeply tested):
— Card 1: You're explaining photosynthesis to a high school student who asks, "Why does it matter that…
Approach B (SEARCH ALL) is dramatically faster.
— **Sequential SEARCH (A):** Average comparisons per lookup = 100,000 / 2 = 50,000. Total comparisons …
Approach B -- Keep COBOL, expose via APIs:
— Pros: Lowest risk (existing code unchanged); fastest time to value; COBOL performance retained; prov…
Approach B: Microservice Servers
— Multiple MCP servers, each responsible for one category of tools (one for databases, one for APIs, o…
Approach B: Server-Side Redirect
— Server creates a checkout session with the payment processor - Client is redirected to the payment p…
approach behaviors
— physically moving toward a person, entering her space, initiating conversation — once a solicitation…
Approach C -- Hybrid rewrite with MQ integration:
— Pros: Most critical/complex modules get true modernization; less risky than full rewrite; allows bes…
Approach C — Double stud wall:
— Estimate the framing cost (2x4 lumber, plates, additional drywall) - Loss of floor space: double stu…
Approach motivation
— A motivational orientation toward pursuing positive outcomes (connection, pleasure, closeness); in a…
Approach:
— Use tracking data if available - Develop proxy metrics from box scores - Build regression models for…
APPROVAL PROCESS
— Creator submits draft content by: [Date] - Brand provides feedback within: [e.g., 3 business days] -…
Approved Publication Arrangement (APA)
— a regulated third-party reporting infrastructure.
Approximate off-gassing timelines:
— New particleboard/MDF furniture: Elevated emissions for 3–12 months; declining but measurable for 2–…
approximately unbiased
— meaning that the implied probability closely matches the observed frequency of outcomes over large s…
Approximation Methods
— sampling, Bayesian networks, mean-field, and belief propagation --- make it possible to work with la…
Apps to avoid or use with caution:
— Apps with very limited public information about their design, business model, or user experience (yo…
APR
— Annual Percentage Rate. The annualized interest rate charged on a loan or earned on an investment, i…
April:
— HVAC cooling service (professional) - Replace air filter - Test sump pump - Inspect and clean gutter…
APScheduler
— a more powerful Python library that supports cron expressions, persistent job stores, timezone-aware…
APT29 Research:
— Study a minimum of six published threat intelligence reports on APT29 activity. - Create a TTP profi…
Archaic period
— the long era spanning roughly 10,000 to 3,000 BP — did not simply suffer the loss of the megafauna. …
Archetypes matter
— Different defenders suit different systems
Architect
— Designing the overall structure of mainframe applications, including how COBOL programs interact wit…
Architectural markers:
— Building construction style (concrete block versus mud brick versus modern prefab) varies by region …
architecture
— the fundamental structure, key abstractions, data model, and interaction patterns — endures. This pr…
Architecture A: Synchronous
— Client submits order - Server creates payment, sends email, generates invoice, updates inventory -- …
Architecture and design tasks:
— Designing system components - Evaluating technology choices - Planning database schema or API struct…
Architecture B: Event-Driven
— Client submits order - Server creates payment and publishes an "order.created" event - Background wo…
Architecture Decision Records (ADRs)
— including retroactive ADRs for past decisions — are the most valuable documentation artifact for kno…
Architecture Differences from ShopStack:
— Additional authentication layer (patient identity verification) - Strict session timeouts (auto-logo…
Architecture Document (Core):
— [ ] System context diagram showing all external interfaces - [ ] Logical architecture diagram (the s…
Architecture tips:
— Use transposed convolutions with kernel size divisible by stride to avoid checkerboard artifacts. Be…
Architecture:
— **Broker:** Central server that receives all messages and routes them to subscribers - **Publishers:…
architectured luck
— luck that flows from structures built before an individual enters the story.
Archival infrastructure:
— Partition TRANSACTIONS by month (12 active + 84 archive = 96 total, or rolling window with detach) -…
Archival process monitoring
— The data archival jobs now have health checks that alert if they fail to run for more than 48 hours.
Archive and protect audit logs
— audit logs must be immutable and retained per regulatory requirements (typically 7 years for financi…
archive lock
— AO3 content visible only to registered AO3 users; authors can choose to lock their work.
archive logging
— a decision that determines your entire recovery capability.
Archives with Women's History Collections:
— Appalachian Collection, W.L. Eury Appalachian Collection, Appalachian State University - Special Col…
Are you modeling an unknown probability?
— Yes (true win rate, true cover rate) --> Use **beta**.
Are you sending data to the target's systems?
— **Passive**: Querying Google for `site:medsecure.com` — Google's servers process your request, not M…
area
— the product of these two features. Creating `lot_area = lot_length * lot_width` gives the model dire…
Area A
— In fixed-format COBOL, columns 8 through 11. Division headers, section headers, paragraph names, FD …
Area B
— In fixed-format COBOL, columns 12 through 72. Most COBOL statements and data definitions at levels o…
Area probability sampling
— A form of *probability sampling* in which geographic areas are sampled at the first stage, then hous…
Areas of likely convergence:
— Transparency requirements for AI systems (most jurisdictions moving toward mandatory disclosure) - H…
Areas of persistent divergence:
— Content regulation (fundamental disagreement between Western emphasis on free expression and Chinese…
Argument Parsing
— The process of reading and interpreting command-line arguments passed to a **CLI** application. In P…
Arguments against (or for limited deployment):
— The confidence interval spanning zero means the model could actually be unprofitable once deployed. …
Arguments against backdoors:
— **Technical impossibility of "good-only" backdoors.** Cryptographers have consistently argued that i…
Arguments against clutch as a distinct skill:
— Small sample sizes make clutch statistics highly variable - Year-to-year correlations in clutch perf…
Arguments Against OSCP:
— The exam environment is artificial (predictable vulnerability patterns) - It does not test web appli…
Arguments against PERFORM THRU:
— Makes it easy to accidentally add a paragraph within the THRU range that should not be executed - Ti…
Arguments against:
— Her audience followed her specifically because she doesn't rationalize greenwashing - The "sustainab…
Arguments for accepting:
— Real money she genuinely needed - She could disclose the sponsorship — she wouldn't have to hide it …
Arguments for accidental misconfiguration:
— Large ISPs like China Telecom manage millions of BGP routes across thousands of routers. Misconfigur…
Arguments for BPM Accuracy:
— Jokic's teams consistently outperform expectations - On/off splits support elite impact - Advanced t…
Arguments for clutch as a skill:
— Some players consistently perform better in high-pressure situations - Psychological factors like co…
Arguments for deployment (with caution):
— The Brier score (0.208) and ECE (0.015) indicate a genuinely well-calibrated and discriminating mode…
Arguments for intentional hijacking:
— The sheer volume and diversity of affected prefixes suggests deliberate targeting. - China Telecom's…
Arguments for lawful access:
— **Democratic accountability.** Courts issue warrants based on probable cause. Encryption that preven…
Arguments for natural keys:
— They carry meaning. When you see SSN `123-45-6789` in a foreign key column, you know what it refers …
Arguments For OSCP:
— It proves practical skill, not just theoretical knowledge - The 24-hour exam format tests persistenc…
Arguments for our model (thinner tails):
— The current economic environment is stable - No major systemic risks on the horizon - The Fed has to…
Arguments for PERFORM THRU:
— Provides a clean exit point pattern (a common idiom pairs each logical paragraph with an exit paragr…
Arguments for Potential Overvaluation:
— Defensive metrics may be too generous - Position adjustment may over-credit center playmaking - Play…
Arguments for privacy (anonymous trading):
— Anonymous trading encourages participation by those who fear retaliation (e.g., government employees…
Arguments for storing it:
— Statement generation queries avoid the JOIN chain TRANSACTION -> ACCOUNT -> ACCOUNT_HOLDER -> CUSTOM…
Arguments for surrogate keys:
— They never change. An SSN can be corrected (data entry error), an email address can change, a produc…
Arguments for the market (fatter tails):
— Black swan events are always possible - The market may be incorporating geopolitical risks - Partici…
Arguments for transparency (position disclosure):
— Transparency deters manipulation (traders cannot manipulate anonymously) - Position disclosure allow…
Arguments for using the algorithm:
— It's more consistent than individual judges, who also have biases - It provides a structured framewo…
Arguments for:
— Gives individuals a legal basis to control their data - Creates market incentives for responsible da…
Arguments in favor:
— **Accountability:** Deadlines force vendors to prioritize vulnerability fixes. Without deadlines, ve…
Arguments That Smart Contracts Can Be Regulated:
— The humans who write, deploy, and govern smart contracts are subject to law - Front-end interfaces t…
Arjun Menon's Substack
— Deep technical analyses - Tracking data applications - Code and methodology
armored train
— a locomotive fitted with steel plating and mounted machine guns — rolled slowly up the tracks along …
Army of Jesus
— a page targeting evangelical Christian Americans with religious content mixed with political messagi…
Aromanticism
— the experience of little or no romantic attraction to others — is related to asexuality but distinct…
Arousal
— the activating/deactivating dimension of emotion; in music, predicted by tempo, loudness, spectral c…
arousal matters more than valence
— people share what makes them feel energized, regardless of whether the energy is positive (awe, amus…
ARP Spoofing
— As described above; effective on local network segments. - **DNS Spoofing** — Redirecting domain nam…
arrested succession
— a condition in which the system gets stuck at an intermediate seral stage, unable to progress toward…
Arrow Key:
— **Solid arrows (→):** Hard prerequisites. The target chapter requires understanding of the source ch…
Arrow-Debreu securities
— a concept from general equilibrium theory introduced by Kenneth Arrow and Gerard Debreu in the 1950s…
Arthel Lane "Doc" Watson
— born in 1923 in Deep Gap, North Carolina, blind from infancy — was perhaps the single most influenti…
Articulate the knowledge paradox
— the counterintuitive reality that you need to already know things in order to use AI well - **Recogn…
Artifact comparison
— Show a physical artifact from the "before" alongside one from the "after" — an old journal entry rea…
artificial bifurcations
— sudden state changes imposed by editorial decision rather than musical evolution. That they are indi…
artificial consensus
— consensus that reflects social pressure rather than genuine agreement. Artificial consensus is indis…
Artificial Intelligence and Machine Learning
— How to build systems that learn from data and make decisions. We'll discuss this more in Section 27.…
Artist Alley
— The section of fan conventions where independent creators sell directly to fans. Economically challe…
As a reviewer:
— Critique the *code*, not the *person*. "This function is hard to follow" not "You wrote confusing co…
As part of a comprehensive renovation
— if you're opening walls anyway and re-clading the exterior, the marginal cost of also replacing wind…
As percentage of bankroll:
— $500 / $50,000 = **1.0%**
As the author:
— Don't take feedback personally. The reviewer is improving the *code*, not judging *you*. - Assume go…
ASC X12 837 Professional Implementation Guide
— Detailed specification for healthcare claim EDI format, including segment definitions and element-le…
ASCII (Unix, Windows, GnuCOBOL):
— Digits: 0-9 (hex 30-39) - Uppercase letters: A-Z (hex 41-5A) - Lowercase letters: a-z (hex 61-7A) - …
ASCII or UTF-8 encoding
— **IEEE floating-point** and string-based numbers - **Asynchronous, event-driven** patterns
Asexuality
— the experience of little or no sexual attraction to others, distinct from low libido, celibacy, and …
Asheville, North Carolina
— an Appalachian city with a population of approximately 95,000 in Buncombe County — voted overwhelmin…
Ask
— Section 6.1 (formulating questions about the WHO data) 2. **Acquire** — Section 6.2 (loading the CSV…
Ask:
— "Can you tell me about a time when...?" (elicits specific, memory-grounded narrative) - "What does […
ASLR (Address Space Layout Randomization)
— Randomizes the base addresses of the stack, heap, and libraries, making it unpredictable where code …
Aspiration
— Other community members see featured individuals and think "I could be featured too" — motivating in…
Aspirational content works through:
— **Social comparison (upward):** Viewing someone above your level creates motivation - **Vicarious ex…
aspirational fiction
— not a genuine version of Tyler, but an idealized character he performed.
aspirational partner selection
— messaging users rated higher than themselves on the platform's desirability metric — and that this a…
assertions
— statements that the output should equal some expected value:
Assertiveness
— the degree to which you attempt to satisfy your own concerns in a conflict situation. High assertive…
Assess
— Use the Readiness Checklist (Section 1) and Application Inventory (Section 2) to understand your sta…
Assess compliance
— is the system in compliance with applicable law? 3. **Assess the gap between compliance and ethics**…
Assess emerging technologies
— AI-driven pricing, blockchain platforms, betting exchanges, and micro-betting --- for their potentia…
Assess model fit:
— $R^2 = r^2$ — proportion of variability explained - Residual plot — check for patterns
Assess Proposed Interventions
— Does the proposed intervention target content/viewpoint (constitutionally vulnerable) or conduct/inf…
Assess your team's psychological safety
— if you're a manager. What does your behavior signal about whether concerns are welcome?
Assess your three basic needs
— rate autonomy, competence, and relatedness across your major life domains. Identify which need is mo…
Assesses the current state
— what questions would you ask? What data would you gather? 2. **Identifies risks** — what are the big…
Assessment of this WOOP:
— The internal obstacle (habitual morning phone reach) is accurately identified and addressed structur…
Assessment questions:
— Which domains have strong representation across all three tiers? These are your well-developed netwo…
Assessment Recommendation:
— [ ] Proceed with deployment as described - [ ] Proceed with deployment subject to conditions (list b…
Assessment suggestions:
— Weekly reading response (500 words connecting reading to student's professional context) - Case stud…
Assessment:
— ### Step 3: The Diversification Index
Asset Criticality:
— Is this a domain controller, a database server with PII, or a developer workstation? - What is the b…
Asset-referenced tokens (ARTs)
— stablecoins backed by a basket of assets, currencies, or commodities — face the most stringent requi…
assets/
— Raw asset files bundled with the application, which may include configuration files, databases, cert…
ASSIGN TO assignment-name
— Links the logical file to a physical entity. On z/OS, this is a DD name from the JCL. In GnuCOBOL, i…
ASSIGN TO external-name
— Maps the internal file name to an external resource. On z/OS, `EMPFILE` maps to the DD statement `//…
Assigned as self-study (not covered in class):
— Ch 1 (Welcome to CS) — Assign as pre-reading before Week 1. Students read it before the first sessio…
Assignment Cadence:
— Weeks 1–5: Reading responses (1–2 pages each), character tracking journal begins - Weeks 6–10: First…
assignment operator
— it gives a value to a variable (`x = 5`). `==` is the **equality comparison operator** — it checks w…
Assimilation (acculturation)
— The acculturation strategy in which cultural origins are relinquished in favor of full adoption of t…
Assist
— The final pass or action leading directly to a goal. Expected assists (xA) models assign a probabili…
Assist Quality:
— Potential assists per game: 18.2 - Assists per 100 possessions: 14.9 - Assist-to-turnover ratio: 2.0
Assist rate
— Limited playmaking creation
Assists
— higher z-score indicates more exceptional relative to league.
Assists and rebounds are negatively correlated
— players who grab many rebounds tend not to dish many assists, and vice versa. This is a position eff…
ASSOCIATE LOCATORS
— Associates result set locators with the procedure call. A locator is a handle that references the re…
Association for Conflict Resolution (ACR)
— acrnet.org — The primary professional association for mediators and conflict resolution practitioner…
Association for Psychological Science (APS)
— psychologicalscience.org Publishes *Psychological Science in the Public Interest*, which occasionall…
Assortative mating
— The tendency for individuals to pair with partners who are similar to themselves on attributes inclu…
Assortative mating (cultural form)
— The tendency within cultural systems for courtship to be channeled within bounded groups (religious,…
Assume hostile networks
— Any network outside your control should be treated as compromised > - **VPN is mandatory, not option…
Assumes spherical clusters
— K-means works best when clusters are roughly round (in feature space). It struggles with elongated, …
Assuming the page structure will not change
— it will. Write defensive code and monitor for unexpected zero-result runs.
Assumptions:
— Organic growth rate: 10% per month (common for marketplace startups) - Growth modifier based on mark…
ASUTIME LIMIT
— CPU time limit for a stored procedure, specified in service units. Prevents runaway procedures from …
ASUTIME LIMIT 5000
— CPU time limit in service units. This is your safety net against runaway procedures. Set it tight fo…
Asymmetric aging standard
— Susan Sontag's term for the cultural double standard in which women face greater social pressure and…
asymmetric opportunity windows
— windows that open briefly, distribute extraordinary luck to those who position through them, and the…
Asymmetric visibility
— See *Visibility asymmetry.*
Asymmetry of regret
— The empirical finding that people tend to regret inactions (things they didn't do) more than actions…
asymptotic freedom
— the weakening of the strong force at high energies — was discovered by Gross, Wilczek, and Politzer …
Async/Await
— Python syntax for writing asynchronous code that can handle concurrent operations (like network requ…
At Any Point After a Renovation
— Verify that fire-stopping materials were installed at all new penetrations through fire-rated assemb…
At Collection:
— For every data field, ask: "Is this *necessary* for the stated purpose?" Not useful, not interesting…
At Deletion:
— Ensure deletion is real, not just a UI change. Data marked as "deleted" but retained in backups, log…
AT END
— Executes when there are no more records (end-of-file). This is file status code 10.
At Go-Live:
— [ ] Management visibly present on go-live day - [ ] Escalation path for technical issues clear and t…
At least 2 theoretical/framework sources
— works that provide the analytical vocabulary for your comparison. Suggested: - Helen Lewis, "Colonia…
At least 8 scholarly sources
— peer-reviewed journal articles, academic books, or scholarly reports. At least 4 must focus on your …
At least five primary sources
— census records, land deeds, newspaper articles, oral histories, government reports, photographs, let…
At Processing:
— Apply the principle of least privilege: grant access to data only to those who need it for their spe…
At regime transitions:
— The transition from calm to volatile often corresponds to a specific event. Traders who anticipate w…
At scale
— The defining feature. A course you sell to 1,000 people delivers similar value to each of them while…
At Storage:
— Implement retention schedules: define how long each type of data will be kept and automate deletion …
At the pipeline level:
— The WSBIND mapping validates data types (a string where a number is expected is rejected) - VALIDATI…
Athena Prompt Library
— a shared repository of tested, optimized prompts for common marketing tasks. Each prompt in the libr…
Athletic Administration
— Primary need: Performance tracking, resource allocation justification - Time constraints: Quarterly …
Athletic Profile Concerns
— Not a traditional NBA athlete - Lateral quickness questions - Vertical explosiveness below typical N…
Athletic Testing:
— Standing vertical leap - Maximum vertical leap - Lane agility time - Three-quarter court sprint - Be…
Atlassian Agile Coach
— Free agile methodology resources at atlassian.com/agile.
Atom features (per node):
— Atom type: one-hot encoding of C, N, O, S, F, Cl, Br, I, P, Other (10 dims) - Degree: node degree / …
atomic operation
— it either completes fully or does not happen at all. By writing to a temporary file (`tasks.tmp`) fi…
atonal music
— music that, lacking a tonal center, resisted traditional harmonic analysis.
Atrous Spatial Pyramid Pooling (ASPP)
— parallel dilated convolutions at multiple rates that capture multi-scale context. This addresses a f…
Attachment anxiety
— The first dimension of adult attachment, measuring fear of abandonment and preoccupation with relati…
Attachment avoidance
— The second dimension of adult attachment, measuring discomfort with closeness and dependency; measur…
Attachment behavioral system
— Bowlby's concept of the innate motivational system that keeps infants (and adults) in proximity to a…
Attachment theory
— A developmental theory originated by John Bowlby and elaborated by Mary Ainsworth, proposing that ea…
Attachment-mediated silence interpretation
— The process by which communicative absence is experienced and interpreted through the filter of an i…
Attack Narrative:
— Chronological account of the engagement - Each phase: what was attempted, what succeeded, what was d…
Attack Selection
— Choose the appropriate attack type based on what you have: - Have hashes? → Offline cracking (Hashca…
attack transient
— the first few milliseconds of a note before it reaches steady state — is strongly affected by phase.…
Attack Vector: Network
— exploitable remotely over HTTP - **Attack Complexity: Low** — no special conditions required - **Pri…
Attacking midfielder / number 10:
— xG + xA per 90 (combined threat) - Key passes per 90 - Shot-creating actions per 90 - Successful dri…
Attacking Network Protocols
— James Forshaw. Deep protocol analysis and exploitation. Complements Chapters 6, 13.
Attempt to produce something from memory
— an argument, a solution, a sentence, a philosophical analysis — without looking at sources. 2. **Com…
Attending to emotional readiness
— your own regulation state and, to the degree you can assess it, the other party's. Not waiting for p…
attention
— the cognitive gateway that determines what gets into your brain and what bounces off.
Attention and Mindset
— What signals are you actually seeing? Healthy = regular noticing practice, optimistic but realistic …
Attention Economy
— An economic framework treating human cognitive attention as a scarce commodity to be captured, held,…
Attention fragmentation
— erosion of sustained concentration capacity from chronic interruption and context-switching
Attention Mechanism
— The core innovation of the **transformer** architecture. Allows the model to weigh the relevance of …
attention pollution
— the contamination of the attention environment by low-quality, high-engagement content that degrades…
Attention Scarcity
— The economic condition created by information abundance: because there is more content than any indi…
Attention-to-Revenue Gap
— Audiences are not automatically businesses. 2. **Platform Dependency vs. Owned Audience** — You live…
attentional resources
— the finite "bandwidth" of conscious processing that can be devoted to any task at a given moment.
Attic access
— look in if you can, even briefly.
Attic air sealing
— The auditor found enormous bypasses at plumbing chases and two unsealed top-plate runs. Quoted at $8…
Attic:
— Are bathroom and kitchen exhaust fans vented to the exterior (not into the attic)? - Any visible moi…
Attitude survey (conducted at 60 days, n=18):
— "I feel competent using the system for my regular reporting tasks": 71% agree - "I trust the system'…
attraction acknowledgment norms
— culturally specific expectations about whether, when, and how workplace attraction should be recogni…
Attractiveness premium
— The systematic advantages (income, social, legal) associated with being rated as physically attracti…
Attractor
— A state or set of states toward which a dynamic system tends to evolve over time, regardless of star…
Attractor (strange attractor)
— In dynamical systems theory, an attractor is a set of states toward which a system evolves over time…
Attractor pool
— The set of potential partners to whom a person has realistic access, shaped by geography, social net…
attributes
— the individual data elements. Attributes fall into several categories:
Attribution
— You must give appropriate credit, provide a link to the license, and indicate if changes were made. …
Attribution and Disclosure
— [ ] Define your default disclosure position for client-facing work - [ ] Address industry-specific d…
Attribution bias / Fundamental Attribution Error
— The tendency to overestimate dispositional (character) factors and underestimate situational factors…
Attribution dimensions
— Locus (internal/external), stability (stable/unstable), and controllability (controllable/uncontroll…
Attribution error (fundamental)
— The tendency to overattribute others' outcomes to their personal character or ability while underatt…
attribution style
— specifically, the distinction between explaining the *causes* of outcomes and explaining the *contro…
Attribution style as a mediating variable
— workers who maintain internal orientation toward the strategically navigable variables, while accept…
Attribution theory
— developed by Fritz Heider, Bernard Weiner, and others — examines how people explain the causes of ev…
attunement
— a more profound matching of conversational rhythm, emotional pacing, and responsive timing. Daniel S…
Audience and Purpose
— Who specifically is this video for? (Describe one person): _______________ - What problem does this …
Audience composition:
— 45% watched before bed (sleep/relaxation use) - 28% watched during study sessions (ambient focus) - …
Audience Context
— Who specifically are you making this episode for? (Not "anyone interested in X" — be specific) - Wha…
Audience expectation indicators:
— How do audience members respond when the creator posts less frequently? - What language do audience …
Audience gratitude
— specific thanks for specific audience actions 2. **Mentor/influence gratitude** — publicly thanking …
Audience Persona
— A semi-fictional representation of a creator's ideal community member, built from demographic data, …
Audience pressure
— feeling unable to take breaks, change direction, or post "non-performing" content; community becomes…
Audience readiness:
— [ ] Owned email list with documented size and engagement metrics - [ ] Audience relationship partial…
Audience Retention
— The percentage of a video's total length that viewers watch, on average. A retention rate of 60% mea…
Audience Section:
— Estimate the size of your specific target demographic on this platform (use Statista, Pew Research I…
Audience targeting disclosures:
— Gender distribution: 48% male, 52% female (within platform's stated ranges) - Age distribution: 76% …
Audience test
— Would your ideal viewer read this and think "yes, that's exactly what I want"? If it's too vague to …
Audience:
— Audience scale adequate for multi-channel or multi-product support: __/5 - Audience trust transferab…
Audio Adversarial Examples:
— Adding inaudible perturbations to audio that cause speech recognition systems to transcribe attacker…
audio branding
— using consistent musical choices to create audience expectations and emotional associations unique t…
Audio Classification:
— **mean Average Precision (mAP)**: Standard for multi-label classification (AudioSet) - **Accuracy**:…
Audio Deepfakes:
— Voice cloning from minutes of sample audio - Real-time voice conversion during phone calls - Used in…
Audio halo effect
— good audio lifts perception of all other elements; the mic is the single most important investment (…
audio tokenization
— converting continuous audio into discrete tokens that can be modeled with standard language model ar…
Audio vs. visual priority:
— Audio should capture the process sounds: items being placed, drawers opening and closing, containers…
audio-dependent
— the sound of a brush and a whispered introduction. With 70% of potential viewers scrolling with soun…
Audio/podcast
— Revenue model: primarily RSS-based (open protocol — no single platform owns podcasting), with Spotif…
Audit all password storage
— Are any MedSecure applications storing passwords in plaintext or with weak hashing? Legacy healthcar…
Audit and transparency:
— Do you conduct annual bias audits? By what methodology? Are results published or available to client…
Audit app permissions regularly
— location, microphone, camera, contacts. Revoke permissions that apps don't need 3. **Disable adverti…
Audit checklist:
— How many subscribers does the subreddit have? How many are typically active (visible in sidebar or s…
Audit Controls (164.312(b)):
— SMF type 80 (RACF decisions) - SMF type 102 (DB2 access) - SMF type 110 (CICS transactions) - Applic…
Audit logging:
— Define the audit log record format - Specify retention period and archival strategy - Describe at le…
Audit risk
— late filers get flagged for enhanced compliance review 4. **Enrollment sanctions** — repeat offender…
Audit sensitive table access with EXECUTE
— for tables containing PII, PHI, or financial data, record who accessed what.
audit study
— a controlled experiment in which matched test subjects identical in all respects except for a variab…
Audit trail
— Used when the business or regulators require tracking of who changed what data and when. Appropriate…
Audit your comments for who, not what
— understanding WHO is watching changes how you speak to them 2. **Community identity is discovered, n…
Audit your network honestly
— identify clusters, map connections, locate structural holes. 2. **Name your target clusters** — be s…
AUDIT_LOG
— Centralized change tracking.
Auditory display
— the use of spatial audio to convey non-musical information — is a growing research and application f…
Auditory Distinctiveness
— A voice that sounds different from the niche norm - A signature sound effect or music choice - Silen…
Auditory scene analysis
— the brain's ability to separate a complex acoustic mixture into distinct source streams — is the psy…
Auftragstaktik
— mission-type tactics. A corps commander might be told: "Seize the crossroads at Koniggratz by nightf…
augmentation
— our second key concept.
August 2014
— Media and academic commentary on the OkCupid disclosure continues. Comparisons with the Facebook emo…
August 2017
— Independent studies by researchers at UK and US universities begin examining Snap Map's effects on t…
August 2020 patch
— Updated the Netlogon protocol to require secure RPC, but initially in compatibility mode to avoid br…
Australia:
— Gambling Help Online: 1800-858-858 - www.gamblinghelponline.org.au
Australian Sports Betting (aussportsbetting.com)
— Historical odds data for Australian sports (AFL, NRL, A-League) and international sports. Free CSV d…
Auth0 Blog
— Excellent authentication and authorization content.
Authentic cadence
— the harmonic progression V→I (or V7→I); the most conclusive cadence in Western tonal music.
Authenticated (Credentialed) Scanning:
— Logs into the host using provided credentials (SSH, SMB, WMI) - Examines installed software versions…
Authentication
— The process of verifying who a user is (proving identity). Distinct from **authorization**. Common m…
Authentication and authorization testing:
— Test login for credential stuffing resistance - Check for default credentials on non-production syst…
Authentication anomalies
— A user account authenticating from unusual systems (e.g., the receptionist's account logging into th…
Authentication Bypass
— Exploiting flaws in authentication mechanisms to gain access without valid credentials. - **Authoriz…
Authentication flows:
— OAuth 2.0 client credentials flow for system-to-system (partner banks) - OAuth 2.0 authorization cod…
Authentication logs:
— Domain controller logs (Windows Event IDs 4624, 4625, 4648, 4768, 4769) - VPN connection logs - Mult…
Authenticity
— *Presenting my genuine self; not performing for approval*
Authenticity and effectiveness aren't opposites
— appearing in thumbnails wasn't "performing"; it was meeting the audience's biology where it already …
authenticity collapse
— the moment when the mismatch became unsustainable. This case study examines what went wrong, what th…
authenticity itself
— the feeling that expressing yourself in measured, structured language is somehow dishonest. But cons…
Authenticity signal
— "real person," not "brand" 2. **Reduced production barrier** — post more frequently 3. **Content-for…
Authoritarianism
— A personality orientation or value system characterized by preference for social conformity, deferen…
authority cascade
— the most powerful entry mechanism for wrong ideas, where one prestigious wrong answer becomes everyo…
Authority cascade at machine speed
— AI's confident presentation propagates wrong answers to millions in seconds - **Consensus enforcemen…
Authority signal used
— what specific credential or marker of expertise is invoked? 2. **Relationship between authority and …
authority transfer
— a strong Twitter/X presence can convert to speaking invitations, media coverage, consulting inquirie…
Authority/Executive
— An email appearing to be from the CEO: "I need you to process an urgent wire transfer. I'll explain …
Authorization
— The process of determining what an authenticated user is allowed to do (checking permissions). Disti…
Authorization and Legality
— Every technique framed within legal boundaries 2. **Attacker vs. Defender Mindset** — Each attack ch…
Authorization:
— Written authorization from someone with legal authority to approve testing - Identification of the a…
Authors Guild Legal Services
— authorsguild.org While focused on writers, the Authors Guild's legal services and contract review pr…
auto-commit mode
— every statement is its own transaction. For any operation involving multiple related statements, you…
Auto-play
— used by YouTube, Netflix, and TikTok — eliminates the decision point between videos. When one video …
Autocatalysis
— A process in which the products of a reaction accelerate the reaction itself; a form of positive fee…
autocorrelation
— the brain (or a computational algorithm) effectively asks: at what time delay T does the sound patte…
Automate the Boring Stuff with Python, 3rd Edition
— Al Sweigart (No Starch Press, 2024)
Automated checks included:
— Model performance above minimum thresholds on standard metrics - No performance degradation on prote…
Automated highlight generation
— AI-selected key moments 2. **Broadcast augmentation** - Real-time graphics from tracking 3. **Democr…
Automated invoicing system
— Chapter 16 — Generates and emails invoices monthly without manual intervention 2. **Scheduled report…
Automated Penetration Testing:
— AI agents that can autonomously enumerate targets, identify vulnerabilities, and chain exploits - Re…
Automated price change alerts
— the script emails Marcus when any competitor price changes by more than 5% - **A full price history*…
Automated Restart Rules:
— Space abends (x37): Automatic restart with 5-minute delay, maximum 2 attempts. The delay gives SMS t…
Automated Scanning:
— Run authenticated and unauthenticated vulnerability scans against internal and external networks usi…
Automated welcome message
— triggered when someone joins. Should be warm, brief, and actionable: "Welcome to [server name]! Star…
Automatic Class Selection (ACS) routines
— installation-written programs that examine dataset characteristics (name, owner, type, etc.) and ass…
Automatic Content Recognition (ACR)
— a technology that allows the television to identify what content is being displayed on its screen.
Automatic L3 (no AI draft, immediate human):
— Customer used words indicating strong emotional distress (anger, despair, "I've had enough") - Ticke…
automatic prompt tuning
— is becoming a standard practice in organizations with large prompt portfolios.
Automatic type detection
— `year` is an integer, `coverage_pct` is a float, text columns are objects 3. **Missing values become…
Automaticity
— the quality of behavior that operates outside conscious deliberate control, triggered by environment…
automation as a multiplier
— is this: every hour spent writing an automation script pays for itself many times over. Elena spent …
Automation bias
— The tendency to over-weight automated recommendations, particularly under time pressure or cognitive…
Automation complacency
— The gradual degradation of professional skill and vigilance that results from consistent reliance on…
Automation:
— z/OS Automation tool: _______________ - Automated responses (list at least 3): 1. _______________ 2.…
Autonomous Sensory Meridian Response (ASMR)
— A tingling, relaxation-inducing sensation triggered in some people by certain audio stimuli — whispe…
Autonomous weapons
— AI systems that can select and engage targets without human intervention — raise profound ethical qu…
Autonomy
— the need to feel that your actions are self-chosen 2. **Competence** — the need to feel capable and …
Autonomy (SDT)
— One of the three basic psychological needs in Self-Determination Theory; the experience of volitiona…
autonomy gradient
— a gradual increase in autonomy and decrease in protection as children develop — offers a way to navi…
Autonomy principle
— The ethical principle that another person's desirability creates no obligation on their part to resp…
Autonomy respect
— The principle that ethical persuasion enables the audience's informed judgment rather than bypassing…
autonomy support
— explaining rationale, acknowledging others' perspectives, offering meaningful choice within constrai…
Autonomy, competence, and relatedness
— the three basic psychological needs of Self-Determination Theory (Chapter 22) — are the psychologica…
autonomy-based account of manipulation
— The view that manipulation is wrong because it bypasses or subverts the target's rational agency, pr…
Autonomy-supportive conditions:
— Provide rationale for requests - Acknowledge the other's perspective - Minimize pressure and control…
Autonomy:
— Do I react strongly when I feel controlled or told what to do? - Is it important to me to have input…
autopoiesis
— the system's capacity to reproduce its own components — is especially useful here. ARMY is autopoiet…
Ava (Subtitle Style):
— No voiceover — text overlays carry all verbal content - Natural cooking sounds audible (sizzling, ch…
Ava's adjustment:
— Reduced trend participation from 5-6/week to 2-3/week - Added evergreen cooking content (her actual …
Availability
— Is the database up? Can applications connect? Are subsystem components active? 2. **Performance** — …
Availability heuristic
— What risk or probability have you estimated primarily based on how easily examples came to mind?
Available at pick 8:
— Elite WR: 290 projected points - Elite TE: 250 projected points - Solid RB: 230 projected points
Available cases:
— WWI: Committee on Public Information's domestic messaging campaign (1917–1918) - WWII: Office of War…
Available Data (as of the most recent release):
— FIFA World Cup 2018 (Men's) - complete event data for all 64 matches - FIFA World Cup 2022 (Men's) -…
Available data:
— 2014 and 2016 presidential election results by municipality (from the Tribunal Superior Eleitoral — …
Available in advanced/tracking data:
— Separation (distance from defender at catch point) - Target separation (how open the receiver was) -…
Available in standard data:
— Targets, receptions, yards, touchdowns - EPA on targets - Air yards and yards after catch - Completi…
Available Metrics:
— Completion probability over expected - Separation at catch point - Time to throw - Rushing yards ove…
Available Prospects:
— WR A: 82 grade (best WR available) - EDGE A: 78 grade (best EDGE available) - OT A: 85 grade (best o…
Average Backup (replacement level)
— Career backup - Limited starting experience - Adequate but not impactful
Average metrics (first 20 videos):
— Views: 320 | Completion: 18% | Likes: 6 | Followers gained: 12 total
Average metrics (first 30 videos):
— Views: 180 | Completion: 31% | Likes: 4 | Comments: 1 (usually his friend)
Average metrics:
— Views: 4,200 | Completion: 48% | Followers gained/week: 80
Average odds:
— 110 - **ROI:** +5.1% - **Units profit:** +7.7 units (at 1 unit per bet)
Average performance:
— Views: 18,200 (from 340) - Completion rate: 87% (from 38%) - Save rate: 6.1% - Followers gained: 2,4…
average separation across the network was 6.6 hops
— remarkably close to Milgram's estimate, achieved through an entirely different method at incomparabl…
Average View Duration
— The mean amount of time viewers watch a video before stopping, expressed as an absolute time value (…
Averaging zip codes, ID numbers, or codes
— just because it's made of digits doesn't make it numerical 2. **Treating ordinal as continuous witho…
Aversive racism
— A contemporary form of racial prejudice characterized by simultaneously endorsing egalitarian values…
Avoid circular imports
— if A imports B and B imports A, restructure. 3. **Keep side effects out of module-level code** — put…
Avoid common misleading graph techniques
— students should be both producers and critical consumers of data visualizations.
Avoid packages with upper-bound constraints
— When evaluating new dependencies, check their version constraints. Packages that pin upper bounds on…
Avoid pure exploitation
— it creates regret from invisible alternatives. 4. **Update your beliefs** about the environment as i…
Avoid regex when:
— A string method solves the problem just as well (simpler is better) - The pattern would be unreadabl…
Avoid trading immediately after news:
— Spreads widen dramatically after major news events - Market makers pull their quotes to avoid advers…
Avoid wishful thinking
— your portfolio does not care about your political preferences.
Avoid:
— {Anti-pattern 1} - {Anti-pattern 2}
Avoidance motivation
— A motivational orientation toward preventing negative outcomes (rejection, loss, humiliation); in at…
Avoidant attachment
— An attachment style characterized by deactivation of the attachment system; associated with emotiona…
Avoiding common traps:
— *Breadth without depth*: Following every new trend without mastering any. Depth creates career capit…
Avoids slippage
— you get your exact price or nothing - **Provides a free option** to the market (you can cancel befor…
Award Recognition:
— 2017 Defensive Player of the Year - Multiple All-NBA and All-Defensive Team selections - Recognition…
Awareness
— does the person understand why the change is happening?
Away Team:
— QB: Questionable, 60% (Good tier, average backup) - All others healthy
awe
— the feeling triggered by encountering something vast, complex, or beyond your current understanding …
Awe experiences
— encounters with vast, perspective-altering stimuli (nature, art, music, great ideas) — reduce inflam…
AWS API Gateway Documentation
— https://docs.aws.amazon.com/apigateway Documentation for the managed API gateway used in SecureFirst…
AWS Certified Data Analytics
— Cloud analytics platform skills - **Google Cloud Professional Data Engineer** - Data engineering on …
AWS Certified Security – Specialty
— Focus: Cloud security on AWS; relevant to Chapter 29 - Best for: Cloud penetration testers and secur…
AWS Certified Security — Specialty
— **Focus:** AWS-specific security services, incident response, data protection, infrastructure securi…
AWS CloudFormation
— AWS-native IaC using JSON or YAML templates - **Pulumi** — IaC using real programming languages (Pyt…
AWS CloudWatch Logs
— **Google Cloud Logging** - **Azure Monitor Logs** - **Datadog Log Management** - **Papertrail** (sim…
AWS Considerations:
— Breadth can be overwhelming — the sheer number of services creates decision fatigue (as Tom's spread…
AWS EKS (Elastic Kubernetes Service):
— IAM roles for service accounts (IRSA) can be misconfigured - EKS worker nodes have IAM instance prof…
AWS IoT Greengrass
— runs ML models on edge devices connected to AWS - **Azure IoT Edge** — deploys Azure ML models to ed…
AWS Lambda
— Amazon's serverless compute service. Runs Python functions in response to events or on a schedule, w…
AWS Mainframe Modernization
— https://aws.amazon.com/mainframe-modernization/ - **Azure Mainframe Migration** — https://azure.micr…
AWS Open Data
— URL: https://registry.opendata.aws - Description: Hundreds of datasets available directly on S3. Inc…
AWS Strengths for AI:
— Broadest service portfolio — if a managed AI service exists for a use case, AWS probably has one - D…
AWS Systems Manager Parameter Store
— **Google Cloud Secret Manager** - **HashiCorp Vault** - **Doppler** or **Infisical** for smaller tea…
AWS-specific techniques:
— IAM privilege escalation (iam:PassRole, lambda:CreateFunction) - Metadata service exploitation (IMDS…
Axes
— A single chart within a Figure; contains the x-axis, y-axis, plot area, and all decorators (title, l…
Axis 1: Self-Enhancement vs. Self-Transcendence
— Power (social status, dominance, control) - Achievement (personal success through demonstrated compe…
Axis 2: Openness to Change vs. Conservation
— Stimulation (excitement, novelty, challenge) - Self-direction (independent thought and action) - vs.…
Azure AD / Entra ID attacks:
— Consent grant phishing - Application permission abuse - Device code phishing - Token theft and repla…
Azure AKS (Azure Kubernetes Service):
— Azure Active Directory integration for authentication - Managed identity for pods - Azure Policy int…
Azure Considerations:
— AI strategy is heavily coupled to OpenAI partnership — concentration risk if the partnership evolves…
Azure Enumeration:
— Blob storage: `
.blob.core.windows.net` - Azure AD tenant discovery: OpenID configuration en…
Azure OpenAI Service
— enterprise-grade access to GPT-4, DALL-E, and other OpenAI models with Microsoft's security, complia…
Azure Sovereign Cloud
— physically and logically separated cloud infrastructure meeting EU data sovereignty requirements - *…
Azure Strengths for AI:
— Exclusive access to OpenAI's models with enterprise security, compliance, and data privacy guarantee…
Azure-specific techniques:
— Azure AD enumeration and privilege escalation - Managed identity token theft - Key Vault access and …
B
B)
— `db2fmp` is the Fenced Mode Process. It runs user-written code (stored procedures, UDFs) in a separa…
B) $45,000-$70,000
— Entry-level sports analyst salaries typically range from $45,000-$70,000.
B) (Home_Days - Away_Days) × 0.15
— Standard rest differential conversion factor.
B) (Weight × 200) / (40-time)^4
— Bill Barnwell's Speed Score formula.
B) +0.15 points
— Additional penalty for West-to-East travel direction.
B) +0.15 to +0.25
— Elite offenses average 0.15-0.25 EPA per play.
B) +0.2 points to home team
— Each timezone crossed adds roughly 0.2 points of home advantage.
B) +1.2 points
— The standard bye week advantage is approximately 1.2 points.
B) -0.5 EP
— Deep in own territory typically yields slightly negative expected value.
B) -0.5 to -1.0 point penalty
— Altitude affects non-acclimated teams, though less than Denver due to neutral site.
B) -1.2
— EPA = 0.8 - 2.0 = -1.2
B) -1.5 points
— Standard TNF road team penalty for Sunday-to-Thursday turnaround.
B) -3.7
— EPA = -(opponent's EP) - (your EP before) = -1.2 - 2.5 = -3.7
B) 0.04 points per yard
— 25 passing yards = 1 fantasy point.
B) 0.25
— Win probabilities must sum to 1.00 (excluding ties, which are impossible in college football).
B) 0.7x
— Early byes (Week 4-5) have reduced effectiveness due to less accumulated fatigue.
B) 1 request per 2 seconds (0.5 requests/second)
— The chapter recommends approximately 0.5 requests per second to avoid rate limiting.
B) 1.0-1.5 fewer wins
— A +2.0 SOS typically inflates raw record by 1-2 wins.
B) 1.89
— EP = (0.45 × 3.0) + (0.55 × 1.2) = 1.35 + 0.66 = 2.01. Wait, let me recalculate: For defense, they g…
B) 10 Hz
— NFL Next Gen Stats captures data at 10 frames per second.
B) 10-15%
— Most DFS sites take 10-15% rake.
B) 12 minutes
— NBA regulation periods are 12 minutes; overtime periods are 5 minutes.
b) 12-gauge copper
— Kitchen countertop circuits are required to be 20-amp circuits; 20-amp circuits require 12-gauge wir…
b) 15 amps
— V = I × R; I = V ÷ R = 120 ÷ 8 = 15 amps 2. **d) Current** — Current is the flow of electrons, analo…
B) 15 mph crosswind
— Wind has the largest impact on field goal accuracy, especially crosswinds which affect ball trajecto…
B) 15+ yards
— Standard threshold for explosive passes.
B) 2013-14
— SportVU cameras were installed league-wide that season.
B) 25 frames per second
— The tracking system captures positions at 25 fps.
B) 25-yard line
— College football touchbacks are placed at the 25-yard line.
B) 27.4
— (32 + 24 + 28 + 31 + 22) / 5 = 137 / 5 = 27.4
B) 3 receivers on one side, 1 on the other
— The notation indicates distribution across the formation.
B) 3-4 paragraphs
— Cover letters should be brief, with 3-4 focused paragraphs.
B) 3-5
— The chapter recommends 3-5 public analysis projects.
B) 4.42 seconds
— Elite CB 40-yard threshold.
B) 40%
— Technical roles (data scientist, engineer, ML engineer) comprise approximately 40% of positions.
B) 40-yard dash time
— Mobility matters, but production metrics are more predictive.
B) 50%
— First-round picks (11-32) have ~50% starter rate.
B) 50th percentile
— By definition, the median is the 50th percentile.
B) 6 days
— Sunday to Sunday with travel typically allows 6 full days of preparation.
B) 80-85%
— College kickers typically make 80-85% of attempts in the 35-39 yard range.
B) `%matplotlib inline`
— This magic command configures matplotlib to display plots directly in the notebook.
B) `\d+-of-\d+`
— This pattern specifically matches the "X-of-Y" completion format common in football statistics.
B) `conda create --name nba_analysis python=3.11`
— The `--name` flag specifies the environment name, followed by package specifications.
B) `df.info()`
— `info()` shows column names, data types, non-null counts, and memory usage. `describe()` shows stati…
B) `df['position'].value_counts()`
— `value_counts()` returns a Series with counts of unique values, ideal for categorical data.
B) `git add .` then `git commit -m "message"`
— Files must be staged (added) before they can be committed.
B) `git init`
— `git init` creates a new .git directory and initializes the repository.
B) `pip install -r requirements.txt`
— The `-r` flag tells pip to read requirements from the specified file.
B) `python --version`
— The double-dash format `--version` is the standard way to check version information.
B) `python -m venv venv`
— The `-m venv` runs the venv module, and the second "venv" is the directory name.
B) `venv/`
— The virtual environment folder contains local copies of packages and should not be committed.
B) `venv\Scripts\activate`
— Windows uses backslashes and the Scripts folder; macOS/Linux use forward slashes and bin.
B) A coach or non-technical stakeholder
— Being able to communicate to non-technical audiences is emphasized as essential.
B) A player's share of their team's production
— Dominator Rating measures receiving/rushing yards and TD share.
B) A strong positive relationship
— r = 0.85 indicates strong positive correlation (typically r > 0.7 is considered strong).
B) About 0.4 EP
— Each down advancement typically costs 0.4-0.5 EP.
B) Abstract data access from business logic
— The repository pattern provides a clean separation between data persistence and business logic.
B) Add Python to PATH
— This allows you to run Python from any command prompt location without specifying the full path.
B) After every play or significant event
— Win probability should reflect the current game state in real-time.
B) Alias mapping / gazetteers
— A gazetteer is a dictionary mapping aliases to canonical entity names.
B) Antonio Gramsci
— Antonio Gramsci developed the concept of hegemony to describe how dominant groups maintain power thr…
B) Applied roles
— Applied roles (sports analyst, performance analyst, etc.) make up about 35% of positions.
B) At least 40% of the needed yards
— Success rate uses different thresholds by down (40% on 1st, 60% on 2nd, 100% on 3rd/4th).
B) Average distance between all offensive players
— Spacing measures how spread out the formation is.
B) Average opponents' win percentage
— Most common and intuitive SOS calculation method.
B) BeautifulSoup
— BeautifulSoup (from bs4) is commonly used with pandas for HTML parsing.
b) Best available odds:
— Lakers: **-135 at Sportsbook Y** (better for the bettor; lower vig on the favorite) - Celtics: **+13…
B) Center court
— The coordinate system places the origin at center court with axes to sidelines and baselines.
b) CFBD endpoints:
— `/plays` with filters: year, conference="SEC", playType="Rush" - `/games` for game context and oppon…
B) Check queue depth and processing backlog
— High latency often indicates processing can't keep up with input rate.
B) Classify the statistic type
— The context word identifies this as a yardage statistic versus touchdowns, completions, etc.
B) Coherence score
— Coherence measures how well the top words in each topic relate to each other semantically.
B) Communication
— The chapter emphasizes that communication skills are key to advancement.
B) Conda can manage non-Python dependencies
— Conda can install system-level libraries, compilers, and other non-Python software.
B) conda-forge
— conda-forge is a community-maintained channel with a wide variety of packages.
B) Context
— and often **C) Format** as well.
B) Correlated players from the same game
— Typically QB + pass catcher.
B) Create new columns in the working DataFrame
— This maintains the original data, allows reproducibility, and keeps derived features accessible for …
B) Credit assignment between players is difficult
— Multiple players contribute to each play.
B) d = 0.37 (small to moderate)
— The Jeong et al. systematic review found an average effect size of approximately 0.37 across 51 medi…
B) DBM1
— The Database Services address space (DBM1) handles SQL compilation, optimization, buffer pool manage…
B) Depth > 15 yards, minimal lateral movement
— Go (or fly/streak) routes run straight downfield.
B) Difficulty measuring leadership and chemistry
— These intangibles remain hard to quantify.
B) Direction standard deviation
— Higher variance in direction indicates more varied movement patterns.
B) Distance to gain
— Conversion rates drop significantly as distance increases.
B) Distance to nearest defender at catch point
— Separation at catch is highly predictive of YAC opportunity, as open space enables additional yards.
B) docker-compose.yml
— Docker Compose defines and runs multi-container applications.
B) Down, distance, and field position
— Expected points before a play depends on the game situation, not the play result.
B) Fast access to frequently used data
— In-memory caches provide sub-millisecond access times for hot data.
B) Field goal percentage must be between 0 and 1
— This is a logical constraint. The other options are not universally true (players can score 100+, st…
B) Frame IDs reset to 1 at the start of each play
— Frame IDs are play-relative, making it easy to align data.
B) Hexbin plot with shot counts
— Hexbin aggregates shots into bins, showing frequency through color intensity.
B) High projection relative to low ownership
— Leverage = differentiation opportunity.
B) High-volume pass-catching RBs
— They gain both reception points and volume stability.
B) Higher scoring rate
— A steeper slope in cumulative points means more points accumulated per game.
B) Improve latency for repeated queries
— Caching avoids redundant computations for identical inputs.
B) Increased bust risk
— Late breakouts correlate with lower NFL success.
b) Interests:
— Colleague A's possible interests: (1) recognition for the relationship they've built with the client…
B) It accounts for teammate and opponent quality
— APM uses regression to isolate individual impact.
b) Knob-and-tube wiring
— K&T is characterized by individually run conductors (not bundled in a cable jacket), with ceramic kn…
B) Log a warning but continue processing
— Missing players is a data quality issue but shouldn't halt processing; the system should degrade gra…
B) M
— In command mode, 'M' changes a cell to markdown; 'Y' changes it back to code.
B) Message broker (e.g., Kafka, RabbitMQ)
— Message brokers decouple services and handle reliable message delivery.
B) Message broker (Kafka, RabbitMQ)
— Message brokers enable asynchronous, decoupled communication between services.
B) Message queue / event-driven architecture
— Message queues decouple producers from consumers, allowing each to scale independently.
B) Mode < Median < Mean
— In right-skewed distributions, the long right tail pulls the mean higher than the median.
B) Multi-row INSERT with batched commits
— Same row-level logging as C, but with 100 commit records (1,000 rows * 10 statements = 10,000 rows p…
B) nba_api
— The nba_api library, maintained by Swar Patel and contributors, provides a Pythonic interface to the…
B) Near zero since both teams travel
— Neither team has true home advantage in neutral-site international games.
B) Optimal bankroll/entry sizing
— Kelly Criterion determines bet/entry sizing.
B) Player names (due to common surnames)
— Many players share surnames (Smith, Jones, Williams), requiring context for disambiguation.
B) Points per game
— Scoring distributions are typically right-skewed with most players scoring lower and few high scorer…
B) Portfolio
— A strong portfolio demonstrating real skills is often more important than a resume.
B) Position in tenths of feet from the basket
— LOC_X and LOC_Y are measured in tenths of feet (decifeet) from the basket location.
B) Positive (describes athleticism)
— In scouting, "explosive" refers to quick, powerful movements - a positive athletic attribute.
B) Project opponents' final records
— Forward-looking SOS requires estimating how opponents will finish.
B) QB + WR from same team + opposing player
— Captures both sides of shootout.
B) Receiving and queuing incoming data streams
— The ingestion layer handles initial data reception and buffering.
B) Redis
— Redis provides sub-millisecond latency for key-value lookups, ideal for caching frequently accessed …
B) Referer
— Requests must include headers like Referer (stats.nba.com) to receive valid responses.
B) Regress to the mean for small samples
— EPA is noisy in small samples.
B) Return yards allowed
— Net = Gross - Return yards / Number of punts.
B) Run/pass tendencies by down and field position
— Situational tendencies are crucial for game planning.
B) S.R. Ranganathan's Five Laws of Library Science
— UNESCO explicitly modeled its Five Laws of MIL on Ranganathan's famous laws, which guided library sc…
B) Scale pods up/down based on metrics
— HPA automatically adjusts replica count based on CPU, memory, or custom metrics.
B) Score differential (adjusted for time)
— Score differential, especially late in games, is the strongest predictor of win probability.
B) SEC
— SEC has the highest conference factor at 1.15.
B) Second Spectrum
— Second Spectrum became the NBA's tracking partner in 2017, replacing SportVU.
B) Shift + Enter
— Shift + Enter executes the current cell and moves to the next; Ctrl + Enter stays in place.
B) Slightly negative
— Advanced the down without gaining yards costs EP.
B) SportVU cameras
— These cameras were installed in all NBA arenas for the 2013-14 season.
B) SQL databases
— SQL is categorized as Tier 1 alongside Python, statistics, and data visualization.
B) Standard Deviation / Mean x 100%
— CV = (s / x-bar) * 100%
B) Standardize coordinate system
— Consistent coordinate systems are essential before any analysis.
B) Standardized athletic testing
— Provides consistent measurement environment.
B) Starting position and coverage quality
— RYOE accounts for expected return based on kick quality and coverage.
B) Strength of Schedule
— Measures the cumulative difficulty of a team's opponents.
B) Taller players naturally running slower
— Adjusts for expected speed decrease with height.
B) Teams lose time adjusting to earlier timezone
— Circadian rhythm disruption is worse when "losing" hours traveling east.
B) The center of the field (width-wise)
— The field is 53.3 yards wide, so 26.65 is the midpoint.
B) The data significantly deviates from normality
— p < 0.05 leads to rejection of the null hypothesis that data is normally distributed.
B) The direction the player's body is facing
— Orientation indicates where the player is looking/facing, which may differ from their movement direc…
B) The distribution is right-skewed
— When mean > median, the distribution has a longer right tail.
b) The electromagnetic solenoid
— A short circuit causes a massive instantaneous current surge that creates a strong magnetic field, t…
B) The extra value of three-pointers
— eFG% = (FGM + 0.5×3PM) / FGA.
B) The player was traded mid-season
— Traded players often have separate rows for each team they played on during the season.
B) The proportion of variance in Y explained by X
— R-squared = r^2 represents explained variance.
B) The robots.txt file and terms of service
— These documents specify what automated access is permitted.
B) The team is struggling to convert opportunities
— Red zone EPA should be positive.
B) The time remaining in the current period
— PCTIMESTRING shows time remaining (e.g., "8:34") in the current period.
B) There are likely outliers in the data
— Large range with small IQR suggests extreme values at the tails not affecting the middle 50%.
B) They outscore 85% of NBA players
— Being at the 85th percentile means their scoring exceeds 85% of the comparison group.
B) Time to arrive at catch point
— Getting downfield quickly is the primary job of a gunner.
B) To track when the most recent request was made
— This timestamp allows calculation of elapsed time to enforce minimum intervals between requests.
B) Transfer portal news monitoring
— Transfer portal news breaks quickly and requires real-time tracking.
B) Two capitalized words (potential player names)
— This pattern matches the typical "First Last" name format.
B) Use watermarks and late data handling windows
— Modern streaming systems use watermarks to handle out-of-order data gracefully.
B) Value Over Replacement Player
— VORP measures value above the best freely available alternative.
B) Values more than 1.5 x IQR beyond Q1 or Q3
— This is the standard definition used in box plots.
B) Weakness identification
— "Concerns" signals a weakness or area for improvement.
B) When you're the underdog
— Need boom games to overcome projection deficit.
B) Yards Per Route Run
— Key efficiency metric for receivers.
B) Your worst player at the position
— Compare to who you'd drop.
B) Zero (advantages cancel out)
— When both teams have equal rest, the bye effects neutralize.
B) Zero RB
— Strategy that avoids RBs in early rounds.
B) ≤19.5 years
— Elite WR breakout age threshold is 19.5 or younger.
B, C, and D
— The EDM pool caches compiled plans/packages, database descriptors, and the dynamic statement cache. …
Bach:
— Prelude: 2 (can play it, but phrasing feels generic — hasn't made interpretive choices) - Sarabande:…
Back Catalog
— The archive of a creator's previously published content. Strong back catalog drives passive discover…
Back-End Offer
— A higher-priced product or service offered to customers after an initial purchase. In a value ladder…
Backcasting
— Starting from a desired future outcome (e.g., "By 2045, all personal data is governed through democr…
Backdoor Attacks (Trojans)
— Insert a trigger pattern that causes targeted misclassification: - A model trained on poisoned data …
Backend API:
— Primary REST API: `api.shopstack.example.com/v2/` — serves the merchant dashboard, mobile apps, and …
Backend Technologies:
— Web server (Apache, Nginx, IIS, Tomcat) - Application framework (Django, Rails, Spring, Express, Lar…
Backend:
— Node.js API server (Express.js framework) - GraphQL API for the marketplace - REST API for seller ma…
Backfire effect
— The (now largely discredited) claim that corrections to false beliefs sometimes strengthen those bel…
background field
— a pervasive "gravitational" pull that gives all other notes their harmonic weight. You do not hear t…
Background reading (before class):
— Read or review the basic premise of *The Minority Report* (Philip K. Dick, 1956) - Review the chapte…
Background tasks
— If a form submission triggers a long-running operation (generating a PDF, calling a slow API), Flask…
Background:
— Serbian center, 19 years old - Playing in Serbian KLS (second-tier league) and Adriatic League - Lim…
Backpass
— A pass directed away from the opponent's goal, often used to retain possession and reset the attacki…
backpropagation
— a method for training neural networks by adjusting their internal connections based on errors — was …
Backtest results dashboard
— either a Jupyter notebook with interactive plots or a Streamlit/Dash web application. 4. **10-minute…
Backtesting
— running the model on past elections where you already know the outcome — is the primary tool for thi…
Backup assessment:
— Career stats: 4 starts, 1-3 record - EPA/play: -0.08 (below average) - Experience in system: 3 years
Backup heat:
— Most heat pump systems include electric resistance backup strips for extreme cold events. These are …
Backup recency:
— z/OS: SYSIBM.SYSCOPY (latest ICTYPE='F' and ICTYPE='I' timestamps) - LUW: db2adutl query (list backu…
Backup System Cost Comparison
— Battery backup pump system: $150–$400 installed DIY; $400–$800 professionally installed; battery rep…
Backup target: Player Beta
— Slightly lower current level but strong upside - Lower fee provides better financial value - Scout w…
Backward recovery
— the surviving member undoes all uncommitted transactions by reading the failed member's log 4. **Ret…
Bad News / Go Viral! / Harmony Square
— Browser-based inoculation games developed by van der Linden, Roozenbeek, and colleagues, in which pl…
Bad reasons to add capital:
— You want to recover from a drawdown faster. - You feel pressure to "make up for lost time." - A sing…
Bahdanau/Luong cross-attention:
— $\mathbf{Q}$: decoder hidden states - $\mathbf{K}$: encoder hidden states - $\mathbf{V}$: encoder hi…
bailouts
— taxpayer money used to prevent the collapse of financial institutions whose executives had personall…
Bake the CSV into the image
— the CSV would be one deployment old at all times. Rejected: the dashboard's value is live data.
Bakshy, Messing, and Adamic (2015)
— a study by Facebook researchers — found that Facebook's News Feed algorithm did reduce exposure to c…
Balance Inquiry
— Display the current account balance in currency-formatted output with the account number and timesta…
balance point
— below which the heat pump alone can no longer satisfy the heating load of the house. For a typical o…
Balance Sheet Accounts (Permanent):
— **Assets (1000-1999)**: Resources owned by the organization. Examples: Cash (1010), Accounts Receiva…
balanced time perspective
— maintaining access to past-positive memory, present-hedonistic engagement, and future-positive plann…
Balancing loop
— See *negative feedback loop*. A feedback mechanism that counteracts change, pushing a system back to…
Baldwin-Felts Detective Agency
— monitored not just union organizing but any cross-ethnic socializing that might lead to solidarity.
Ball Flight Effects:
— Less air resistance - Passes and kicks travel further - Punts harder to control
ball ground
— a large, flat, open field used for stickball games (a predecessor of lacrosse) that served simultane…
Ball Pressure:
— Forces 15% more turnovers in matchups - Opponent shooting -8% vs. expected
Ball progression:
— Progressive passes per 90 - Progressive carries per 90
Ball valve
— Has a lever handle. A quarter turn (90 degrees) fully opens or closes it. Much more reliable than a …
Ball-Playing CB Requirements:
— Pass completion > 88% - Progressive passes > 3.5 per 90 - Comfortable under pressure
ballad
— the long narrative song, passed from generation to generation by oral transmission, that told storie…
ballads
— narrative songs that told stories, usually of love, betrayal, murder, supernatural encounters, or hi…
Balloon framing indicators:
— Wall studs appear to run continuously past the floor level (you can follow a single stud through mul…
Ballot measure
— A legislative question placed directly before voters, either through citizen initiative, legislative…
Ballot test
— A survey question that simulates the act of voting by presenting respondents with the names and offi…
band inversion
— a situation where strong spin-orbit coupling reverses the usual ordering of valence and conduction b…
band mill
— also called a band saw mill — was the primary processing technology. Unlike the older circular saws …
Band structure
— Ch 26.2 The set of allowed energy ranges (bands) and forbidden energy ranges (gaps) for electrons in…
bands
— continuous ranges of energy $E_n(k)$ parameterized by $k$ within the Brillouin zone and indexed by a…
Bandwidth
— The range of frequencies occupied by a signal or passed by a filter, typically measured in hertz (Hz…
banjar
— appear in descriptions of enslaved people's music as early as the seventeenth century. The West Afri…
Bank barn
— A distinctive German-origin barn built into a hillside, with upper and lower levels accessed from di…
Banking (US):
— **OCC Bulletin 2023-17 (Third-Party Risk Management):** Requires banks to ensure critical third-part…
BANKING AND FINANCES
— [ ] **9. Open a dedicated business checking account.** Never commingle personal and business funds. …
Banking and Financial Services
— COBOL's exact decimal arithmetic (COMP-3) prevents the rounding errors that floating-point languages…
Bankroll Management
— Kelly Criterion - Expected value optimization - Variance and sample size
Bans and restrictions:
— San Francisco, Boston, Minneapolis, New Orleans, Portland (Oregon), and several other U.S. cities ha…
Baptist polity
— the system of church governance — was radically democratic and radically local. Each Baptist congreg…
Bar chart
— when you want to compare magnitudes - **Treemap** — when you have hierarchical categories - **Sunbur…
Bar chart rules:
— Always start the y-axis at zero. A truncated y-axis makes small differences look enormous and is one…
Barbara Ellen Smith
— Scholar whose work on race, gender, and labor in the Appalachian coalfields expanded the analytical …
Barbell strategy
— An investment and life-design strategy, developed by Nassim Nicholas Taleb, in which a person mainta…
Barlow's unified treatment approach
— the Unified Protocol for Transdiagnostic Treatment of Emotional Disorders — addresses this by target…
baryon asymmetry
— a tiny excess of matter over antimatter, about one part in a billion, in the first moments of the Bi…
Basal ganglia
— the brain structures responsible for encoding and retrieving habitual procedural routines; receives …
Base Bust Rates by Position:
— Picks 1-5: ~25% - Picks 6-10: ~35% - Picks 11-20: ~45% - Picks 21-30: ~60%
base case
— the stopping condition. Everything before it is the **recursive case** — the step that makes the pro…
Base Library (Msf::Base)
— Provides simplified APIs for the Core, making it easier to build interfaces and tools on top of the …
Base rate
— The underlying frequency of an event in a population, often neglected in human reasoning (base rate …
Base rate by dwelling amount:
— $0 - $200,000: $4.50 per $1,000 - $200,001 - $400,000: $3.80 per $1,000 - $400,001 - $750,000: $3.20…
Base rate neglect
— The failure to incorporate the prior probability of an event when evaluating new evidence; often lea…
base rate problem
— occurs because the false positive rate, applied to the large population of people who don't have the…
base rates matter
— that even excellent tests produce false alarms when the underlying condition is rare. And you've see…
Base64 encoding
— A method of encoding binary data as ASCII text. Used to embed PNG chart images directly in HTML with…
Based on Points Produced
— Credits scoring at given efficiency - Adds value from assists - Subtracts costs from missed shots an…
Baseline Metrics (collected every 5 minutes):
— Database-level: commits, CPU time, wait time, lock wait time, deadlocks, timeouts, escalations - Buf…
baseline model
— the simplest possible model that gives you a reference point.
Baseline Update:
— Update performance baselines for programs that changed - Archive historical performance data - Produ…
Basement/Crawlspace:
— Any visible water stains on walls or floor? - Any efflorescence (white mineral deposits) on masonry …
basic emotions
— brief, biologically based, cross-culturally recognizable emotional states, each with a characteristi…
Basic Information
— Video title (working): _______________ - Target length: _____ minutes - Primary platform: __________…
Basic Metrics Calculation
— [ ] Calculate team and individual possessions - [ ] Compute offensive rating per game and season - […
Basic Performance
— Total views (7-day): _______________ - Average view duration: _______________ - Audience retention r…
Basic Plays
— Pass plays vs. run plays - First down, second down, third down situations - Punting situations - Fie…
Basic Positions
— **Offense**: Quarterback, running back, wide receiver, offensive line - **Defense**: Defensive line,…
Basic Probability
— Probability as long-run frequency - Probability rules (0 ≤ P(A) ≤ 1) - Complement rule: P(not A) = 1…
Basic psychological needs (SDT)
— The three universal requirements for psychological wellbeing in Self-Determination Theory: autonomy,…
basic reproduction number
— which represents the average number of new infections caused by a single infected individual in a fu…
Basic Rules
— Scoring (2-point, 3-point, free throws) - Possessions and turnovers - Basic violations and fouls - G…
Basic Rules and Structure
— Downs and distances - Scoring (touchdowns, field goals, safeties, two-point conversions) - Penalties…
Basic Statistics
— Passing yards, completions, attempts - Rushing yards, carries - Touchdowns, interceptions - Team win…
Basic Statistics:
— 23.2 PPG, 5.7 RPG, 5.9 APG - 47.6% FG, 41.3% 3PT, 64.9% FT - Minutes: 35.7 per game (25 games) - Age…
Basic Syntax
— Variables, data types, and operators - Conditional statements (if/elif/else) - Loops (for, while) - …
Basic Testing (All entities):
— Vulnerability assessments and scans - Open-source analyses - Network security assessments - Gap anal…
Basilar membrane
— A thin, tapered membrane running the length of the cochlea (approximately 35 mm in humans) that perf…
basin of attraction
— the set of starting points from which gradient descent will converge to that particular optimum. If …
Basketball Reference API/Scraping
— https://www.basketball-reference.com/ - Historical game data for model training
Basketball Reference:
— Limited tracking metrics - Shot location data
Basketball-Reference
— https://www.basketball-reference.com/ - Comprehensive historical statistics essential for projection…
Basketball-Reference CSV exports
— **PBP Stats data access**
Basketball-Reference Player Projection Framework
— Sports Reference's approach to projecting player statistics, documented through their methodology pa…
Batch
— High volume (5 million accounts), periodic (daily), sequential processing of every account, no user …
Batch (JCL):
— DISPLAY outputs to the SYSOUT DD statement - ACCEPT reads from the SYSIN DD statement - No terminal …
batch cycles
— sequences of COBOL programs orchestrated by JCL and job schedulers — that post transactions, calcula…
Batch failure recovery strategy:
— Restart mechanism: _______________ - Commit frequency for long-running jobs: _______________ - Fallb…
Batch initiator strategy:
— WLM-managed initiators: Yes / No - Job classes and their WLM service class mappings:
Batch Normalization
— Training stabilization - Implementation details
Batch operations
— Replacing N individual operations with one batch operation - **Caching** — Identifying repeated comp…
Batch Processing
— A mode of execution in which programs run without interactive user input, processing large volumes o…
Batch Processing (Part V):
— [ ] Batch schedule (daily, weekly, monthly, quarterly) - [ ] JCL for all batch jobs - [ ] Checkpoint…
Batch testing (22:00 — 02:00):
— Rob Calloway submitted a reduced batch cycle (Tier 1 and Tier 2 jobs only) - 187 of 312 nightly jobs…
Batching
— The practice of producing multiple pieces of content in a single, dedicated session rather than one …
Bathroom fans MUST terminate outside
— through a roof cap or sidewall cap with damper. Termination in the attic deposits moisture directly …
Bathroom:
— Is the exhaust fan vented to the exterior (not into the attic or crawlspace)? - Is caulking around t…
Bathrooms
— **Ventilation**: run the exhaust fan. Hold a single sheet of toilet paper near the grille — it shoul…
Bathtub:
— Faucet: varies by tub style, but typically 4"–6" from the edge of the tub - Spout: close to the tub …
Battery factory:
— Population: All 12,000 batteries produced that day. - Sample: The 50 tested batteries. - Parameter: …
Battle of Blair Mountain
— approximately 10,000 armed miners battle mine guards and state forces in the largest armed uprising …
Battleground state
— A state in which neither major party has a reliable advantage in presidential elections, making it c…
Bayes' Theorem
— fully derived and explained intuitively in Chapter 28 and Appendix A
Bayesian
— lead to fundamentally different approaches to statistical inference.
Bayesian Inference
— A statistical framework that updates beliefs (prior probabilities) with observed data (likelihood) t…
Bayesian interpretation
— Ridge equivalent to Normal(0, τ²) prior on coefficients - λ = σ²/τ² controls how strongly we trust p…
Bayesian Logistic Regression
— Provides uncertainty estimates for predictions - Naturally handles rare game states through priors -…
Bayesian Methods
— Hierarchical models for RB evaluation - Uncertainty quantification - Prior information incorporation
Bayesian optimization
— specifically, the Tree-structured Parzen Estimator (TPE) --- to intelligently explore the hyperparam…
Bayesian reasoning
— A method of updating beliefs by combining prior probability with new evidence, following Bayes' theo…
Bayesian Statistics for Sports
— Platform: Various - Focus: Applying Bayesian methods to sports data - Level: Intermediate to Advance…
Bayesian updating
— the idea that probability is not fixed but changes with new evidence. This is a genuine paradigm shi…
BCC works differently than To and CC:
— To and CC addresses go in message headers — everyone can see them - BCC addresses go in the `to_addr…
BDNF (Brain-Derived Neurotrophic Factor)
— a protein supporting neuronal growth, plasticity, and survival; elevated by aerobic exercise; the pr…
Be aware of resolution timing:
— As resolution approaches, spreads may widen (less time for market makers to manage risk) - Or narrow…
Be especially cautious about:
— Single studies with small samples (n < 100) - Studies that have not been independently replicated - …
Be idempotent
— if the compensation itself fails and is retried, it must not double-compensate 2. **Be auditable** —…
Be more confident about:
— Findings that replicate across multiple labs and cultures - Findings supported by meta-analyses usin…
Be patient
— generational turnover may be required
Bea:
— like a spiral? That's exactly what I thought! The chapters kept returning to the same— > > **Alex:**…
Beat (acoustic)
— A periodic fluctuation in amplitude produced when two tones of slightly different frequencies are so…
Beat editing
— syncing visual cuts to musical beats in her backing tracks.
BeautifulSoup
— A Python library for parsing HTML and XML, providing Pythonic navigation and search over the parse t…
Beauty premium
— The wage and social advantage empirically documented for people rated as physically attractive; docu…
bebop
— a harmonically dense, technically demanding style pioneered by Charlie Parker, Dizzy Gillespie, and …
Before (16-17):
— 35% of corners targeted far post (Van Dijk success rate: 68%) - 25% targeted central (Van Dijk succe…
Before a Cross-Cultural Confrontation
— What do I know about this person's cultural context? What don't I know? - Am I assuming directness i…
Before analysis:
— Probability of any video getting 50K+ views: ~5% (based on her history) - Probability of any video g…
Before APIs (file transfer model):
— 23 downstream systems consuming mainframe data via nightly/hourly FTP - Average 14 incidents per mon…
Before Chapter 2:
— Skim nflfastR/nfl_data_py documentation - Read one Football Outsiders article
Before delivering:
— [ ] I am delivering this because I mean it, not to make myself feel better or to restore the relatio…
Before deployment:
— Independent methodological review of PredPol's algorithm by criminologists, statisticians, and legal…
Before Entering Any Brand Deal Negotiation
— [ ] Do I have a media kit ready to send? - [ ] Do I know my average views/impressions for this conte…
Before Go-Live:
— [ ] All procedure documentation updated (old system references removed) - [ ] Super-users designated…
Before Green (Traditional Model):
— Centers valued for height, post scoring, rebounding - Defense measured by blocks and steals - "Small…
Before installing, verify:
— Gas line is sized for 150,000–200,000 BTU/hour - Venting is compatible (sealed polypropylene, not st…
Before Part II (Player Analytics):
— Read Romer (2006) abstract and introduction - Explore Big Data Bowl winning submissions
Before Part II:
— "NFL Play-by-Play Data Quirks" article - Review one Big Data Bowl winning solution
Before Part IV (Predictive Modeling):
— Begin *Introduction to Statistical Learning* (Chapters 1-3) - Read one academic paper from JQAS
Before pressing play:
— Write a specific question in her practice journal: "What does Rostropovich do with vibrato speed dur…
Before refactoring:
— Write characterization tests (integration level) - Write smoke tests for critical paths (end-to-end …
Before Rodgers acquisition:
— 2022 Record: 7-10 - Defensive ranking: Top 5 - Offensive ranking: Bottom 10 - Primary weakness: Quar…
Before the backlash (Days 1-3):
— "This is beautiful 🥺" - "We need more people like you" - "Faith in humanity restored" - "Someone get…
Before the Call:
— [ ] Schedule the call rather than initiating it unannounced - [ ] Choose a time when both parties ar…
Before the confrontation:
— [ ] What do I know about this person's cultural background and its typical communication norms? - [ …
Before the context packet:
— Average editing time per content piece: 35-45 minutes - Approximate edit rate: 60-70% of content nee…
Before the conversation:
— [ ] Choose timing when you are regulated (not immediately after activation) - [ ] Give the other per…
Before the exam (the pre-wrapper):
— How many hours did you study? - How were those hours distributed? (One session? Multiple sessions? A…
Before the exam:
— Predict your overall score (percentage). - Predict your score on each section of the exam (if the fo…
Before the moment:
— Anticipation content: "What to expect," predictions, preparations - Creates pre-event engagement and…
Before the session (Forethought — 5 minutes):
— Check your weekly plan. What's today's goal? - Your SMART goal for tonight: "Explain the four stages…
Before translation workflow:
— CPO and COO engagement with status reports: effectively zero (by their own admission) - Questions or…
Before using any template:
— Read the corresponding chapter first. - These tools are reflective instruments, not magic formulas. …
Before using PACE:
— Understand that the assessment attaches to the property, not the person — if you sell before the ass…
Before you begin:
— [ ] Have I clearly defined the problem I am solving, and is that problem worth solving? - [ ] Who wi…
Before you hire, ask (repair contractor):
— What is the specific cause of the problem you're recommending I fix? - Can you provide a written eng…
Before you hire, ask:
— Are you licensed in this state and do you have a current license number I can verify? - Are you insu…
Beginner characteristics:
— Long, vague prompts (do you still do this?) - Accepting first outputs without adequate review (do yo…
Beginner Lab:
— Kali Linux VM (attacker) - Metasploitable 2/3 (targets) - DVWA, OWASP Juice Shop (web targets) - Iso…
Behavior Control
— [ ] Does the organization regulate members' diet, sleep, finances, or living arrangements? - [ ] Doe…
Behavior marker
— Show the same SITUATION at two different points; the transformation is visible through changed behav…
Behavior:
— Applies each cleaning operation in the correct order - Logs each step with row counts and change sum…
Behavioral activation
— A treatment approach for depression that focuses on increasing engagement in rewarding activities an…
Behavioral activation system (BAS)
— Gray's neurobiological system associated with reward-seeking, positive affect, and approach motivati…
Behavioral addiction
— See *addiction, behavioral*.
Behavioral addictions
— gambling disorder (DSM-5), internet gaming disorder (proposed), and potentially others — share the s…
Behavioral Control:
— [ ] Do you specify *how* they work (exact process, timing, method), or only *what* they produce? - […
Behavioral data that serves the user
— data used to personalize your feed, remember your settings, improve the product for you 2. **Behavio…
Behavioral economics
— A field combining psychology and economics that documents systematic ways human decision-making depa…
Behavioral features (strongest signal):
— `logins_last_7_days` — recent engagement - `logins_last_30_days` — medium-term engagement - `logins_…
behavioral futures markets
— otherwise known as the advertising market. Advertisers pay not just for your attention but for the *…
Behavioral indicators of high volatility:
— Loud, profanity-laced verbal behavior - Physical agitation: pacing, clenching, slamming - Signs of i…
Behavioral indicators:
— Relying on alcohol, caffeine, or food for regulation ___ - Reduced exercise compared to what you'd p…
Behavioral inhibition
— A temperamental dimension characterized by withdrawal and caution in response to novel stimuli; iden…
Behavioral inhibition system (BIS)
— Gray's neurobiological system associated with threat sensitivity, caution, and behavioral inhibition…
Behavioral measures
— recording who participants approach, how long they look at a face, whether they choose to continue a…
Behavioral metrics:
— Number of AI project proposals generated through Track 2 post-workshop projects: over 1,200 in the f…
Behavioral Prediction
— The use of historical behavioral data to forecast future user actions, emotional states, or commerci…
Behavioral residue
— The traces of behavior — clicks, searches, locations, purchases — left by individuals in the course …
Behavioral Resistance Signals:
— Looking at a phone or watch - Giving shorter answers over time - Agreeing to everything without enga…
Behavioral science and psychology
— the research on why lucky people are the way they are - **Network theory and sociology** — how your …
Behavioral signs:
— Missing scheduled posts and not caring - Spending more time scrolling others' content than creating …
Behavioral Surplus
— Shoshana Zuboff's term for the behavioral data collected by platforms in excess of what is needed to…
behavioral synchrony
— the tendency for people to unconsciously mirror each other's posture, gesture, rhythm, and movement …
Behavioral targeting
— Using data about individuals' online behavior — browsing, searching, purchasing, location — to predi…
Behavioral warning signs:
— Preoccupation with betting that interferes with work or relationships. - Irritability or restlessnes…
Behavioral:
— Voice getting louder or tighter - Talking faster or going completely silent - Feeling an urge to esc…
Being a Mentor:
— Once you have 3-5 years of experience, consider mentoring someone starting their journey - Mentoring…
Being Patriotic
— a conservative American identity page that amassed 200,000 followers and produced content focused on…
Belgium:
— PPDA: 9.2 (intense pressing) - Defensive line: 61.3m (high) - High turnovers: 12 - Possession: 61.4%
Belief updating
— The process of revising a probability estimate or belief in response to new evidence. Good belief up…
Beliefs
— about self, others, world, and future — shape perception and behavior; many function as self-fulfill…
Bell inequality
— Ch 24.4 A mathematical bound on correlations between measurements on two spatially separated systems…
Bell states
— the maximally entangled states of two qubits. You constructed these in Chapter 11 and computed their…
Bellwether
— A county, precinct, state, or other geographic unit whose electoral results consistently predict the…
Below Replacement (-1 to -2 points)
— Undrafted emergency option - Practice squad elevation - Very limited experience
below the diagonal
— specifically, it bows toward the lower-right. When this forecaster says 90%, they are actually corre…
Ben Baldwin's Analytics
— `https://rbsdm.com/` - EPA methodology discussions - Fourth-down analysis - R code and visualization…
Ben Baldwin's Football Analytics
— `https://rbsdm.com/` - Fourth-down decision models - Expected points methodology - Open-source code …
Ben Baldwin's Newsletter
— nflfastR creator - Technical football analytics - R and Python examples
Ben Torvaney, "Dixon-Coles in Python"
— A step-by-step tutorial for implementing the Dixon-Coles model from scratch, including parameter est…
Benchmark
— A standardized test or set of tests used to evaluate and compare the performance of AI models, tools…
Benchmark poll
— A comprehensive baseline survey conducted at the outset of a campaign, before significant public com…
Beneficiary Eligibility Lookup
— the highest-priority extraction candidate in FBA's modernization roadmap.
benefit function
— an estimate of how much performance would improve if the consumer received more memory. For buffer p…
Benefit:
— 10 extra games from star = ~2 extra wins - Reduced injury = ~$15M avoided in salary for injured play…
Benefits (annual):
— FTE savings (1.8 FTEs @ £68K fully-loaded): Years 1–3 - False positive reduction (£45,000 in Y1, £52…
Benefits (from the chapter):
— Defect detection 3 weeks faster: estimated $2.1M in avoided returns (one-time, but expect recurring)…
Benefits (three-year total):
— Year 1: £285,000 - Year 2: £310,000 - Year 3: £335,000
Benefits beyond compliance:
— **Better design.** The assessment process often reveals design alternatives that are both more priva…
Benefits of assumed breach:
— Tests the 80% of the kill chain where defenders have the most opportunity to detect and respond - Pr…
Benefits of batch normalization:
— Allows higher learning rates without divergence - Acts as a mild regularizer (due to batch noise) - …
Benefits of internal tech conferences:
— They create a deadline for knowledge codification (presenters must organize their knowledge to prese…
Benefits of LSR:
— Buffer pool is shared — a single pool can serve many files. - Hiperspace buffering (data space buffe…
Benefits of Multi-Framework Mapping:
— The client's compliance team can immediately identify which audit requirements each finding affects …
Benefits of Writing:
— Deepens your own understanding (the "learning by teaching" effect) - Creates a searchable portfolio …
Benefits:
— Improves model calibration (predicted probabilities better reflect true likelihoods). - Reduces over…
Benign Violation
— The psychological theory that humor requires something to be wrong (a violation) in a way that is si…
Benjamin, D., & Shapiro, J. (2007).
— See Foundational Academic Papers section.
Berkeley DB (BDB)
— The default on many GnuCOBOL installations. Provides full indexed file support. - **VBISAM** -- An o…
Bernoulli Distribution
— $X \sim \text{Bernoulli}(p)$
Berry phase
— Ch 32.2 A geometric phase $\gamma_n = i\oint\langle n(\mathbf{R})|\nabla_\mathbf{R}|n(\mathbf{R})\ra…
Berry phase (geometric phase)
— a phase acquired by a quantum state that is transported adiabatically around a closed loop in parame…
Bessel functions
— a family of solutions to a differential equation that appears in cylindrical wave propagation, vibra…
Best for:
— Large files that benefit from focused attention - Files with complex internal logic - Projects where…
Best interests of the child
— The best interests of the child should be a primary consideration when designing and developing onli…
BEST PRACTICE
— Every affinity is technical debt. When you design a new CICS application, your first question should…
Best practices for COMP-3 declarations:
— Always include the **S** (signed) in the PIC clause for arithmetic fields - Use an **odd** total dig…
Best practices for uncertainty communication:
— Pair verbal expressions with numerical estimates - Use natural frequencies rather than conditional p…
Best Practices:
— Vectorize instead of loop - Optimize memory for large datasets - Build reusable functions - Handle m…
Best Practices: DB2 for z/OS REORG
— IBM Support technote covering SHRLEVEL selection, FASTSWITCH configuration, mapping table sizing, an…
Bet Over.
— **Game B**: Model Under probability. $P(X < 43.0) = P(Z < (43.0-41.7)/12.0) = P(Z < 0.108) = 0.543 =…
Bet timestamp
— when you placed the bet 2. **Bet odds** --- the exact decimal (or American) odds you received 3. **C…
Bet Timing:
— The optimal time to bet depends on your edge source and the sport - NFL and NBA bets generally favor…
Bet Tracking and Journaling:
— Track every bet with complete metadata: odds, closing line, stake, result, model, and reasoning - A …
Beta Distribution
— $X \sim \text{Beta}(\alpha, \beta)$
Betdaq / Smarkets / Matchbook
— Smaller exchanges with their own APIs. Useful for cross-exchange analysis and arbitrage research.
Betfair Exchange (betfair.com)
— The world's largest betting exchange. Historical data available through the Betfair Historical Data …
BetQL (betql.co)
— Model-driven odds comparison and line movement tracking. Subscription service with free tier.
Better alternatives:
— `"viridis"` — perceptually uniform, colorblind-safe, works in grayscale - `"plasma"` — similar prope…
Better approach:
— Separate components (kicking, punting, returns, coverage) - Regress toward mean for rare events (ret…
Better compound effect estimation
— Track scheme-specific dependencies - Model play calling adjustments
Better value:
— Player X: Sportsbook B at -160 (lower implied probability of 61.54% vs. 64.29%, so better odds for t…
Better-supported findings:
— The existence of a sequential structure in courtship interaction (Perper, Grammer, and subsequent ob…
Betting Analysis:
— Simulated spreads and ATS performance - Over/under analysis with value detection - Identification of…
Betting Exchange (1.95, 3% commission):
— Win: 0.52 x ($950 - 0.03 x $950) = 0.52 x $921.50 = $479.18 - Lose: 0.48 x (-$1,000) = -$480.00 - EV…
Betting implications:
— Over/under props may be mispriced because the tails are fatter than the normal model assumes - Betti…
Betting Market Analysis
— understanding how betting markets work, what market prices tell us about team strength, and how to e…
Betting percentages:
— 62% of spread bets on Home - 48% of money on Home
Betting Performance Panel:
— Cumulative PnL curve - Daily ROI trend - Win rate by sport and market - Edge distribution histogram
betting-models
— Betting analytics - Line comparison tools - ROI calculations
Bettor Profile: "DataDriven_NFL"
— Focus: NFL sides and totals - Sample: 500 bets over 2 full NFL seasons - Average stake: $500 - Avera…
Between the Posts
— xG shot maps and analysis - Match-level xA summaries - European league coverage - Link: betweenthepo…
Between the Posts - Defensive Analysis Series
— URL: betweentheposts.net - Focus: Tactical defensive analysis - Key Articles: Pressing analysis, def…
Between the Posts - Goalkeeper Analysis Series
— URL: betweentheposts.net - Focus: Data-driven goalkeeper evaluation - Key Content: In-depth goalkeep…
Between the Posts - Set Piece Breakdowns
— URL: betweentheposts.net - Focus: Detailed set piece pattern analysis
between-country variability
— the fact that countries differ from each other. It does *not* capture:
between-group variability
— the variability explained by group membership.
Betweenness Centrality
— A network metric measuring how often a node (player) lies on the shortest path between other nodes. …
Beyond email — broader social engineering:
— **Pretexting:** Creating a fabricated scenario to manipulate the target (posing as IT support, a ven…
Beyond Point Estimates:
— Full probability distributions - Confidence intervals - Scenario probabilities - Path-dependent outc…
bias
— A fan's favorite member of a K-pop group — the member they are most invested in and attracted to. Ha…
Bias blind spot
— The tendency to recognize cognitive biases in others more clearly than in oneself.
Bias enters the AI pipeline at every stage
— from problem formulation to data collection, from labeling to model design, from training to deploym…
Bias in AI Systems
— Sources of bias (data, algorithmic, human) · Historical bias · Representation bias · Measurement bia…
bias system
— a set of concepts for naming and navigating the parasocial attachments that structure K-pop fan expe…
Bias-variance tradeoff
— The fundamental tension between a model's ability to fit training data closely (low bias, high varia…
Biases on the "trust the feeling" side:
— Narrative bias: constructing a story from the game action ("this team looks sluggish") that may not …
Biases on the "trust the model" side:
— Automation bias: over-trusting the model because it is quantitative, even when it may be using stale…
Bicultural identity integration
— extent to which dual cultural identities are experienced as compatible versus conflicting
Bicultural identity integration (BII)
— The degree to which an individual with two cultural identities experiences them as compatible and in…
Bidirectional communication
— the parameter carries input data to the subprogram and the subprogram modifies it to carry output da…
bidirectional replication
— two databases that both accept writes and replicate to each other. This enables:
bifurcation
— the study of how the qualitative behavior of a system changes as a parameter is varied.
bifurcations
— moments where its behavior splits. One stable state becomes two, two become four, four become eight,…
Big Chance
— A shot opportunity where the scorer would reasonably be expected to score, typically defined as situ…
Big Data (Journal)
— Sports analytics section - Data science applications - Interdisciplinary work
Big Data Bowl Competition Papers
— NFL-sponsored research - Tracking data applications - Special teams innovations
Big Five / OCEAN
— The five-factor model of personality: Openness, Conscientiousness, Extraversion, Agreeableness, Neur…
Big Five personality dimensions
— openness, conscientiousness, extraversion, agreeableness, neuroticism — are the most robust personal…
Big Five personality traits
— The five-factor model of personality: Openness, Conscientiousness, Extraversion, Agreeableness, and …
Big Tobacco's "Doubt Is Our Product" campaign
— commercial propaganda thread
Big-O Notation
— A mathematical notation that describes the upper bound of an algorithm's growth rate as input size i…
BigDataBall
— Play-by-play and tracking data products
BigDecimal for monetary values
— Never use `double` or `float` for money. DB2 `DECIMAL` maps to Java `BigDecimal`.
Bill Connelly
— College football analytics - SP+ rating system - Advanced stats explanations
Bill Connelly's Work
— Advanced college football analytics - SP+ rating system creator - Excellent explanatory writing
Biltmore Estate
— a 250-room French Renaissance chateau that remains the largest privately owned house in the United S…
bimodal
— two modes, two peaks. The data doesn't have a single center; it has two. Bimodal distributions often…
Bin
— A fixed-width interval used to group continuous values in a histogram.
binary outcomes
— the response variable has exactly two possible values. And here's the problem: the regression models…
binary search
— O(log n). - Linear scan worst case: 1,000,000 comparisons (check every name). - Binary search worst …
binary tree
— where each node has at most two children — is the foundation of binary search trees (BSTs), which pr…
Binaural audio
— A recording and reproduction technique that captures or simulates the acoustic signals arriving at t…
Binomial Distribution
— $X \sim \text{Binomial}(n, p)$
BINQ
— Balance inquiry. Reads one DB2 row. Average response time: 30ms. Working storage: 150 KB. 2. **XFER*…
bioacoustic niche differentiation
— the hypothesis that the species in a healthy ecosystem have acoustically evolved to occupy distinct …
Biochemical Recovery:
— Creatine kinase (CK): A marker of muscle damage, typically peaks 24-48 hours post-match and returns …
Biological clock anxiety
— The experience of urgency around fertility timelines and the need to find a partner before fertility…
Biological forms
— Bodies, hands, animals. The brain is tuned to detect living things.
Biological/physiological responses
— the brain responds to different wavelengths of light with measurable physical reactions (red increas…
Biometric authentication
— the user provides a fingerprint or iris scan, which is matched against the CIDR database - **Demogra…
biometric data
— data derived from your body. Other forms include fingerprints, iris scans, voiceprints, gait analysi…
Biometric Integration
— Heart rate and exertion monitoring - Sleep and recovery tracking - Injury risk prediction
Biometrics
— Physiological or behavioral characteristics that can be used to identify individuals, including fing…
biopiracy
— the appropriation of Indigenous knowledge for commercial purposes without consent or compensation. I…
biopower
— power exercised not over individual bodies but over *populations* as biological entities. Biopower o…
Biopsychosocial model
— Engel's framework: health and illness arise from the interaction of biological, psychological, and s…
Birth of a Nation
— D.W. Griffith's 1915 film combining technical innovation with white supremacist propaganda, establis…
bit
— one binary digit, one yes-or-no answer, one resolution of a single two-way uncertainty.
Bit depth
— The number of bits used to encode each audio sample in a digital audio system, determining the dynam…
bituminous coal
— the hard, black, energy-dense coal that built the American industrial economy. Bituminous coal is th…
BJSM Blog
— https://blogs.bmj.com/bjsm/ - British Journal of Sports Medicine blog with accessible sports science…
BKMU
— Main menu (account inquiry, transfer, history, logout) 2. **BKIN** -- Account inquiry (display balan…
Black Appalachians built institutions from scratch
— churches, schools, and mutual aid organizations — with remarkable determination and against active o…
Black Banjo Gathering
— first held in Boone, North Carolina, in 2005 — brought together Black banjo players, scholars, and e…
black box problem
— and it is not a marginal technical concern. It is a foundational challenge for democratic governance…
Black churches
— Baptist and African Methodist Episcopal (AME) — were the most important of these. They were not just…
Black community organizers in Cancer Alley
— Robert Bullard, Sharon Lavigne, and others who built the environmental justice movement from the gro…
Black Creators Fund
— Multiple platforms YouTube, TikTok, and Meta have each at various times launched specific funds or a…
Black fraternal organizations
— the Masons, the Odd Fellows, the Knights of Pythias — provided the same functions for Black miners t…
Black Girl Digital
— blackgirldigital.com Founded by Charreah Jackson, Black Girl Digital is a membership community, educ…
Black Hat GraphQL
— Nick Aleks, Dolev Farhi. GraphQL API security testing. Complements Chapter 23.
Black housing
— known in the blunt language of the time as "Colored Town" or "the colored section" — was almost univ…
black lung disease
— coal workers' pneumoconiosis. After decades of decline following the passage of the Federal Coal Min…
Black Mountain College
— a legendary experimental arts school that operated in nearby Black Mountain from 1933 to 1957, attra…
Black swan
— A high-impact, low-probability event that is unpredictable from within existing frameworks and is re…
Black swan event
— A term coined by Nassim Nicholas Taleb for a rare, unpredictable, and massively consequential event …
Black Travel Alliance (BTA)
— blacktravelalliance.com For travel creators specifically, the BTA is an organization of over 3,000 B…
Black Twitter
— the specific cultural phenomenon of Black users transforming Twitter into a space for Black cultural…
Blackbody radiation
— the ultraviolet catastrophe (Planck, 1900) 2. **The photoelectric effect** — energy arrives in discr…
Blacksburg, Virginia
— home to Virginia Tech, in the heart of the New River Valley — voted Democratic by wide margins. The …
Blacktivist
— IRA-operated Facebook page that amassed more followers than the official Black Lives Matter page and…
Blame
— attributing excessive causal responsibility to others — is the cognitive mirror image of personaliza…
blamelessness
— focusing on systemic failures rather than individual blame. This is not about excusing negligence. I…
Bleach does not remediate porous materials
— it kills surface mold but doesn't eliminate hyphae in the material. - **Remove contaminated porous m…
Blending weight
— The parameter controlling how much weight is given to polling vs. fundamentals in the blended estima…
Blind serendipity
— One of Christian Busch's three types of serendipity: a completely chance encounter or discovery for …
Blind spot
— in the Johari Window, information that others know about you that you do not know about yourself.
BLL cell
— Base Locator for Linkage. An internal pointer used by CICS to address data in the *LINKAGE SECTION* …
Bloch sphere
— Ch 13.3 A geometric representation of a qubit (spin-1/2) state as a point on the unit sphere. The no…
Bloch's theorem
— Ch 26.1 In a periodic potential $V(\mathbf{r} + \mathbf{R}) = V(\mathbf{r})$, the energy eigenstates…
block
— everything indented beneath the `if` line — runs only when the condition is satisfied. If the condit…
BLOCK CONTAINS
— Specifies the blocking factor. Blocking combines multiple logical records into a single physical blo…
BLOCK CONTAINS 0 RECORDS
— Tells the system to determine the optimal block size. On z/OS, `BLOCK CONTAINS 0` defers to the JCL …
blocked practice
— the default approach in most classrooms and most study sessions. In blocked practice, you do all the…
Blocked randomization
— Randomization stratified by key background variables to ensure balanced groups and improve statistic…
Blocking (experimental design)
— A procedure in which experimental subjects are divided into homogeneous groups (blocks) before rando…
Blocking Attribution Analysis
— Compare YBC across teams for same RB - Study backs who changed teams - Quantify line contribution
Blocking factor
— The number of logical records grouped into a single physical block on a storage device. Specified in…
Blocking:
— `BLKSIZE` should be a multiple of `LRECL` for fixed-length records. - Optimal block size: code `BLKS…
blood oxygen level-dependent (BOLD) signals
— changes in the ratio of oxygenated to deoxygenated blood in brain regions over time. When a region s…
Blood pressure study:
— Population: All patients (present and future) who could take this medication. - Sample: The 80 patie…
Bloomberg Trade Order Management Solutions (TOMS)
— Bloomberg's APA operates across EU and UK jurisdictions. - **ICE Data Services** — ICE's APA covers …
BLU Acceleration Technical Overview
— IBM white paper explaining columnar storage, actionable compression, and SIMD processing in Db2 BLU.…
Blue Chip Ratio Analysis
— Historical correlation with championships - Program-level analysis - https://www.bannersociety.com/2…
Blue Grass Boys
— named for his home state of Kentucky, the Bluegrass State — in 1938, and they became a fixture on th…
Blue Ridge Parkway
— the 469-mile scenic highway that winds along the crest of the Blue Ridge Mountains from Shenandoah N…
Blue Ridge Province
— the most visually dramatic section of the Appalachians and the one that dominates popular imaginatio…
blue-chip ratio
— the percentage of a team's roster composed of 4-star and 5-star recruits---is one of the strongest p…
Blue-green deployment
— Maintain two identical production environments ("blue" and "green"). At any time, one is live and th…
BMC (Compuware) Topaz
— Program visualization, data lineage analysis, and interactive code understanding.
BMC Capacity Management for z/OS
— Comprehensive capacity planning product that automates data collection, trend analysis, and forecast…
BMC Compuware Topaz for Total Test:
— Records actual execution paths during testing - Identifies code paths that are never exercised (dead…
BMC CONTROL-M Documentation
— CONTROL-M's monitoring and alerting capabilities, including SLA management, critical path analysis, …
BMC Control-M for z/OS Documentation
— Alternative workload scheduler widely used at mainframe sites. Covers parallel job group definitions…
BMC MainView for CICS
— Commercial monitoring tool with real-time dashboards, automated alerting, and capacity planning feat…
BMC MainView for z/OS
— Real-time monitoring of batch job performance, resource utilization, and system health. Provides the…
BMS
— Basic Mapping Support. A CICS facility for defining and managing terminal screen layouts (maps). BMS…
BMS map
— A screen layout definition created with BMS macros (DFHMSD, DFHMDI, DFHMDF) that describes the field…
Board/Senior Management
— [ ] Model risk appetite approved by the board - [ ] Quarterly model risk report presented to ALCO/Ri…
boarders
— single miners or newly arrived immigrant men who did not yet have families in camp. Boarding was a s…
Bob's track record:
— Of the 50 days he said "10% chance of rain," it rained on 25 of them (50% actual). - Of the 200 days…
Body Attributes:
— Physical attractiveness (how attractive you appear to others) - Physical health (how healthy your bo…
Body camera (bodycam)
— A wearable recording device typically affixed to a law enforcement officer's uniform to document pol…
Body clock timing
— Playing at 10 AM local = 7 AM on body clock; athletes not at peak 2. **Travel fatigue** - 3 timezone…
body count
— the number of enemy combatants killed. The logic was straightforward: if you are killing more of the…
Body dissatisfaction
— not being satisfied with how one's body looks, separate from one's objective physical characteristic…
Body surveillance
— In objectification theory, the ongoing self-monitoring of one's physical appearance from a third-per…
Bogoliubov quasiparticles
— coherent superpositions of electron-like and hole-like excitations. The original electrons have "dis…
Bohr model
— Ch 1.5 Niels Bohr's 1913 model of the hydrogen atom, postulating quantized orbital angular momentum …
Bohr radius
— Ch 1.5, Ch 5.5 The characteristic length scale of the hydrogen atom: $a_0 = \hbar^2/(m_e e^2/4\pi\ep…
Bohr-Sommerfeld quantization
— $\oint p\,dx = (n + \frac{1}{2})h$ — a semiclassical quantization rule that is exact for the harmoni…
Boiler annual tasks:
— Check system pressure (should be 12–15 PSI when cold) - Test expansion tank air pressure (should mat…
Boilerplate
— Repetitive, standardized code that is required by a framework or language but does not contain uniqu…
Bokeh
— Another interactive visualization library. Better suited for large datasets (handles streaming data)…
BOLD signal
— Blood Oxygen Level Dependent signal measured by fMRI; an indirect measure of neural activity through…
BOM (Byte Order Mark)
— A sequence of bytes at the start of a file that indicates the encoding. The `utf-8-sig` encoding rea…
Bond features (per edge):
— Bond type: one-hot encoding of single, double, triple, aromatic (4 dims) - Is conjugated: binary (1 …
Bonding social capital
— Social capital built among people who are similar to each other (same background, interests, profess…
Bone conduction
— The transmission of sound to the inner ear through vibrations of the bones of the skull, bypassing t…
Book and print licensing
— successful creator media companies often produce companion books, educational materials, or magazine…
Book class:
— Attributes: `title`, `author`, `isbn`, `checked_out` (bool), `due_date`, `genre` - Methods: `check_o…
Book:
— Title, author, ISBN - Whether it's currently available - Genre/category
Booking in-store services
— scheduling makeovers, consultations, and beauty classes through conversational interfaces - **Produc…
bookmarks
— AO3's system for readers to save and annotate fan works; public bookmarks can function as informal r…
Books and Textbooks:
— *Soccermatics* by David Sumpter --- accessible introduction to mathematical modeling in soccer - *Th…
Books:
— *Automate the Boring Stuff with Python* (free online) - *Python for Data Analysis* by Wes McKinney -…
Boolean condition
— See *condition name*.
boolean expression
— the test. Python evaluates it and gets either `True` or `False`. - The colon `:` at the end of the `…
Boolean filtering
— Selecting rows from a DataFrame by applying a condition that produces a True/False Series, then usin…
Boolean indexing
— Filtering rows using a True/False mask (`df[df["col"] > value]`). The pandas replacement for loop-wi…
Boolean logic in surveillance
— The use of "if-then" conditional rules to trigger surveillance responses, flag records, or generate …
Boomerang effect
— The tendency for persuasive messages to produce attitude change in the opposite direction from what …
Boone County, West Virginia
— one of the epicenters of the mountaintop removal era — a much larger project came online in 2023. Th…
Booster inoculation
— Periodic re-exposure to inoculation material to maintain resistance levels that decay over time.
bootstrap
— one of the most powerful and elegant ideas in modern statistics.
Born interpretation
— Ch 2.2 Max Born's interpretation (1926) that $|\psi(x,t)|^2\,dx$ gives the probability of finding th…
Borrow
— meaning adopt open-source libraries, participate in industry consortia, or access shared regulatory …
Bose-Einstein applications:
— **Photon gas:** Blackbody radiation is a gas of photons obeying Bose-Einstein statistics with $\mu =…
Bose-Einstein condensate (BEC)
— Ch 15.6 A state of matter in which a macroscopic number of bosons occupy the same single-particle qu…
Bose-Einstein mean occupation number
— the average number of quanta (phonons, photons) in the oscillator at temperature $T$.
Boson
— Ch 15.2 A particle with integer spin ($s = 0, 1, 2, \ldots$). The wave function for identical bosons…
bosons
— automatically, without any additional postulate. Bose-Einstein statistics is a *consequence* of the …
bot
— An automated service in a Discord server that performs functions like music playback, role assignmen…
Bot Detection Resources:
— **Botometer:** botometer.osome.iu.edu — Indiana University tool for assessing Twitter account bot li…
both
— Leicester were genuinely excellent at specific aspects of the game, *and* they benefited from favora…
Both players:
— TS%: 0.590, USG%: 25 - AST%: 30, TOV%: 12 - ORB%: 4.0, 3PAr: 0.35
Bottom performers — psychological hooks:
— 3 of 10 had a strong opening hook - 1 of 10 had a clear curiosity gap - Most started with generic in…
Bottom performers — share triggers:
— 2 of 10 had any identifiable share trigger - Most were "pleasant but generic" — nice to watch, no re…
bottom-up attention
— the involuntary, reflexive kind triggered by high-arousal stimuli. The engagement was real, but it w…
Bottom-up attention is exhausting
— for the viewer AND the creator.
Bottom-up data cooperatives
— Communities that don't wait for legal frameworks but create cooperatives using existing legal struct…
Bounce Rate
— In email marketing, the percentage of emails that could not be delivered. In web analytics, the perc…
Boundary indicators:
— Does the creator clearly communicate what they don't share? - Have they set explicit expectations ab…
boundary interface
— a deliberately constructed shared surface between incompatible systems that enables coordination by …
Boundary object
— An artifact, concept, or practice that is shared across communities and interpreted differently by e…
boundary objects
— concepts, tools, and frameworks that travel between different communities and enable communication a…
bounded below at zero
— The **log-normal distribution** often fits right-skewed positive data better than the normal - **Pow…
Bounded Choice
— Janja Lalich's concept describing decision-making in high-control organizations that appears volunta…
Bounded rationality
— Herbert Simon's concept that human decision-making is constrained by limited information, limited co…
Bounded Rationality Is Not Irrationality
— reframes rationality as adaptive fit to the decision environment rather than conformity to an imposs…
Bounded use
— limiting the time spent on apps per session and the number of apps used simultaneously — reduces the…
bounded utility function
— one that simply does not grow linearly with the number of lives or dollars beyond a certain scale. B…
Bourdieu's capitals
— Pierre Bourdieu's framework identifying four forms of capital that determine social position: econom…
Bowen theory
— Murray Bowen's family systems framework emphasizing differentiation of self, emotional cutoff, trian…
Box Breathing:
— Inhale for 4 counts - Hold for 4 counts - Exhale for 4 counts - Hold for 4 counts
Box Count Impact
— Run defense with light boxes - Scheme efficiency - Resource: cfbfastR pre-snap data
Box office prediction
— forecasting opening weekend and cumulative gross --- was a major feature of the Hollywood Stock Exch…
Box Out Metrics:
— Box out frequency (how often player initiates box out) - Box out duration (time maintaining position…
box plot
— a graph that condenses an entire distribution into five numbers and reveals outliers at a glance.
Box review schedule:
— Box 1: Every day - Box 2: Every 3 days - Box 3: Every week - Box 4: Every 2 weeks - Box 5: Every mon…
Box-to-box midfielder:
— Progressive carries and progressive passes per 90 - Tackles + interceptions per 90 - Goal-creating a…
BPI (Building Performance Institute)
— BPI-certified professionals have passed written and field exams covering building science, diagnosti…
BPM (Box Plus-Minus):
— Derived from box score statistics - Coefficients chosen to predict RAPM - More stable in small sampl…
BPM components
— OBPM: Offensive contribution from points, assists, offensive rebounds, spacing - DBPM: Defensive con…
BPM estimates plus-minus from box scores
— Uses regression coefficients derived from historical RAPM data - Combines scoring efficiency, playma…
BPM interpretation scale
— +10.0 and above: All-time great season - +8.0 to +10.0: MVP-level season - +6.0 to +8.0: MVP candida…
Bra
— Ch 8.2 A linear functional on the Hilbert space, written $\langle\psi|$. The bra corresponding to th…
bracket contracts
— a set of binary contracts that partition the numeric range into intervals (brackets).
Brackets (winner's EV minus loser's EV):
— 0-19 EV (extremely close) - 20-49 EV (close) - 50-99 EV (moderate) - 100-149 EV (comfortable) - 150-…
Brackets:
— Before 11:00 PM ET on election night - 11:00 PM - 2:00 AM ET - 2:00 AM - 8:00 AM ET the morning afte…
Brain drain effect
— Ward et al.'s (2017) finding that the mere presence of a smartphone on a desk — notifications off, f…
Brain-Derived Neurotrophic Factor (BDNF)
— sometimes called "Miracle-Gro for the brain" by neuroscientist John Ratey.
BRANCH
— Physical bank locations.
Branch (Git)
— An independent line of development in a **Git** repository. Branches allow parallel work on features…
Branch 1: Characterizing Resonance
— Natural frequency (f₀): determined by mass and stiffness - Q factor = f₀/Δf: sharpness and sustain -…
Branch 1: Physical Parameters
— Length (L) → inversely proportional to f₁ - Tension (T) → √T proportional to f₁ - Linear mass densit…
Branch 1: Physical Properties
— Amplitude → Intensity → Loudness (dB scale, logarithmic) - Frequency → Pitch (20 Hz – 20 kHz audible…
Branch 2: Mode Structure
— Mode number n → fₙ = n × f₁ (harmonic series) - Nodes: n-1 interior + 2 endpoints - Antinodes: n - W…
Branch 2: Propagation
— Inverse square law (intensity ∝ 1/r²) - Atmospheric ducting (long-range propagation of infrasound) -…
Branch 2: Resonance in Space — Standing Waves
— 1D (string): harmonic series [Chapter 2] - 2D (plates, membranes): Chladni figures, non-harmonic ove…
Branch 3: Musical Consequences
— Harmonic series → intervals: octave, 5th, 4th, 3rd... - Initial conditions (pluck/bow position) → ti…
Branch 3: Reception (The Ear)
— Outer ear: pinna (direction) + ear canal (resonance ≈ 3,500 Hz) - Middle ear: ossicles (impedance ma…
Branch 3: Resonance in Instruments
— Helmholtz resonator: guitar air resonance, brass mouthpieces, sound holes - Plate resonance: violin …
Branch 4: Meaning
— Periodic → pitch-bearing → musical potential - Aperiodic → noise → culturally contextual (drums = mu…
Branch 4: Quantum Parallel
— Particle in a box → same boundary conditions - Same wave functions: sin(nπx/L) - Different scaling: …
Branch 4: Resonance Across Scales
— Vocal formants → choral blend → singer's formant projection - Room modes → reverberation → concert h…
Branch 5: Aiko Tanaka's Role
— First appearance in this chapter - Identifies strut pitch by ear in physics lab - Articulates the ma…
Branch 5: Running Example
— Choir formant resonance = Lorentzian peak at 3,000 Hz - Particle resonance = Lorentzian peak in cros…
Branch Davidians / Waco (1993)
— Government and media characterization of cultic groups can itself deploy dehumanizing propaganda - T…
Branch naming convention document:
— Feature branches: `feature/HA-
-
` - Release branches: `release/v
.
`…
Branch protection rules:
— `main`: Requires pull request with at least 1 approval. No direct pushes. - `develop`: Requires pull…
BRANCH_PRODUCT
— Junction: which products are offered at which branches.
BRANCHES is the outer driver
— this is correct, as there are relatively few branches (perhaps 50-200). Each branch drives three lat…
Branching strategies for analytics teams:
— **Feature branches**: One branch per analysis task (e.g., `feature/corner-kick-analysis`, `feature/p…
Brand Ambassador
— A creator who has an ongoing, formal relationship with a brand to represent it across content, event…
Brand assets:
— Your creator name/handle: ___ - Your logo or profile imagery: ___ - Your show or series titles: ___ …
Brand Copy Writer
— The Generator adapted for product descriptions, using her five-example few-shot reference library (s…
Brand Deal
— A paid partnership between a creator and a company in which the creator mentions, features, or endor…
Brand Identity
— The visual, verbal, and emotional elements that make a creator's work immediately recognizable: logo…
Brand partnership content
— brands expect production that represents their brand; portfolio-quality is a professional requiremen…
Brand safety
— Does the output align with the company's voice and values? - **Legal safety** — Does the output avoi…
Brand's perspective:
— A brand manager is allocating a $50,000 influencer marketing budget. They need to evaluate 200 creat…
Brandenburg v. Ohio (1969)
— The Supreme Court decision establishing the "imminent lawless action" standard: government may not p…
breaching experiments
— intentional violations of social norms designed to reveal the hidden expectations that normally oper…
Breadcrumbing
— A digital dating behavior in which someone sends intermittent, minimal signals of interest (a "like,…
breadth
— the ability to master two regional histories well enough to compare them meaningfully — and **analyt…
break
— is a moment when the laryngeal musculature reconfigures its coordination from one mode to the other.…
Break-even analysis:
— Break-even point (expected case): ________ years - Break-even point (worst case): ________ years
Breaking facial symmetry
— algorithms expect the left-right symmetry of a typical face; extreme asymmetrical patterns disrupt t…
BRECVEMA
— Brainstem reflexes, Rhythmic entrainment, Evaluative conditioning, Contagion, Visual imagery, Episod…
Breece Dexter John Pancake
— known as Breece D'J Pancake, the unusual abbreviation the result of a typographical error in his fir…
Breit-Rabi diagram
— a beautiful plot showing the smooth transition from weak-field (anomalous Zeeman) to strong-field (P…
Brett Kollmann
— Film breakdown including rushing analysis 2. **JT O'Sullivan** - QB School (includes run game concep…
bridge chapter
— perhaps the most important chapter in the entire book. We will introduce Dirac notation (bras, kets,…
bridge content
— videos at intermediate lengths that gradually train your audience to expect longer content.
Bridge design:
— Hook was gaming-specific ("I played for 40 hours") — appeals to gaming community - Content was histo…
bridge fuel
— a transitional energy source that was cleaner than coal and could serve as a stepping-stone to full …
Bridge-crossing potential:
— Music fans (album discussion cluster) → psychology content - Pop culture community → educational con…
Bridged Adapter:
— The VM gets an IP address on the same network as the host - The VM is visible to all devices on the …
Bridging social capital
— Social capital built across different groups, communities, or professional domains. Bridging capital…
Brief process montage
— Between Day 1 and Day 365, he included 15 seconds of clips (Day 30, Day 90, Day 180) showing the gra…
Brier score
— A mathematical measure of forecast accuracy: (probability - outcome)²; lower is better; 0 is perfect…
Brier score comparison:
— Maria's Brier score: 0.198 - Market prices' Brier score (for the same events): 0.217
Brilliant.org Statistics Course
— Interactive learning platform - Well-structured progression - Good for self-paced study
Brillouin zone
— Ch 26.2 The fundamental domain in reciprocal (momentum) space for a crystal lattice. All physically …
Bristol Sessions
— the recordings made by Ralph Peer in Bristol between July 25 and August 5, 1927 — are often called "…
Brittleness
— The property of a system that functions well under normal conditions but fails catastrophically unde…
broad form deed
— a legal document, used extensively in the late nineteenth and early twentieth centuries, in which la…
broad-spectrum economy
— a way of life that drew on an enormous range of food sources, exploiting different resources in diff…
broadband infrastructure
— recognizing that the digital divide has become the new geographic isolation, and that communities wi…
Broadcast Video Analysis
— Converting broadcast footage to tracking data
Broadcast-Derived Tracking:
— Computer vision applied to standard broadcast television footage - No stadium hardware required—work…
Broadcasting revenue growth
— new TV deals flood clubs with cash 2. **Competitive pressure** --- clubs spend to avoid relegation o…
Broadcom CA-7 Workload Automation
— Another major workload scheduler with specific support for parallel job streams, cross-job dependenc…
Broadcom CICS Detector (formerly CA CICS Detector)
— Commercial CICS performance monitor that provides real-time and historical analysis of CICS transact…
Broaden-and-build theory
— Fredrickson's theory that positive emotions broaden attentional scope and build lasting cognitive, s…
Broken contract (over-promise):
— Thumbnail: Luna looking devastated, tears on face - Title: "The Worst Day of My Creator Journey" - V…
Broken contract (under-deliver):
— Thumbnail: Bold text "THE ALGORITHM SECRETS THEY DON'T WANT YOU TO KNOW" - Title: "How the TikTok Al…
Broken Function-Level Authorization:
— Identify administrative or privileged API endpoints by examining JavaScript source maps, API documen…
broken record technique
— restating the original concern quietly and consistently after each diversion — sustains the thread t…
Broken symmetry
— the artistic and physical violation of perfect symmetry — is as important as symmetry itself. The mo…
Brokers:
— SafeGraph (or its successor Veraset) - X-Mode / Outlogic - LiveRamp - Foursquare (Pilgrim SDK) - Acx…
Brown, Roediger, & McDaniel (2014)
— *Make It Stick* — for the accessible big picture 2. Then read **Roediger & Karpicke (2006)** — the l…
Browser Exploitation:
— Exploit known browser vulnerabilities - Launch Java/Flash exploits (legacy) - Inject keyloggers - Re…
Browser fingerprinting
— A tracking technique that identifies individual browsers by compiling a unique profile of device att…
Brussels Effect
— the EU's regulatory standards becoming a de facto global baseline.
Bryce Report
— 1915 British government document documenting alleged German atrocities in Belgium, chaired by Viscou…
Budget is limited
— HADR is much simpler and cheaper - **The workload is modest** — a single server with HADR standby ma…
Budget Level 1 — Zero cost to start:
— Microphone: The built-in microphone on a recent smartphone (iPhone 12+, any recent Android flagship)…
Budget Level 2 — Under $200:
— Microphone: Audio-Technica ATR2100x-USB ($99) or Blue Yeti Nano ($99) — both USB, plug-and-play, sig…
Budget Level 3 — Under $1,000 (semi-professional):
— Microphone: Shure SM7B ($399) — the industry standard dynamic mic, used by podcasters with millions …
BUDGETING
— [ ] Complete budget template (all sections) - [ ] Identify and research all allowances (actual likel…
Buffalo Bills (9-7)
— Ending 17-year playoff drought - Strong defensive team - Run-first offensive identity - Cold-weather…
Buffer
— A region of memory used to hold data being transferred between a program and a storage device. Buffe…
Buffer Overflows
— Writing data beyond the boundaries of a buffer to overwrite adjacent memory, potentially including r…
Buffer pool right-sizing
— Priya reviewed all buffer pool allocations and increased the DAILYBAL_TS pool from 50,000 to 100,000…
Buffer pool strategy:
— BP0 (default): ________ MB — for: ____________________ - BP1 (high-update): ________ MB — for: _____…
Buffer pool was resized smaller
— someone reduced the BP_CUST pool size (accidentally or intentionally). 2. **New workload or query pa…
Buffer pools for critical OLTP tables and indexes
— biggest impact on response time 2. **Package cache / EDM pool** — reduces CPU overhead for dynamic S…
Buffering
— QSAM reads entire blocks of records into memory buffers, so individual READ operations return record…
BUFND
— number of data buffers (default: 2). Controls how much data VSAM prefetches. - **BUFNI** — number of…
Bug 1
— The result of `.str.strip().str.title()` is computed but never assigned back to the DataFrame column…
Bug 2
— `"N/A"` cannot be converted by `.astype(float)` — it will raise a `ValueError`. Use `pd.to_numeric()…
Bug 3
— `"Inactive"` is not in `status_map`, so it becomes `NaN`. The final `isna().sum()` will print `1`, n…
Bug Bounty Bootcamp
— Vickie Li. Practical guide to finding and reporting web vulnerabilities. Complements Chapters 18-23,…
BUILD
— Rebuilds all indexes on the tablespace from the reloaded data. Index keys are sorted and leaf pages …
Build (seconds 3–[X]):
— What information or experience is delivered? - What keeps you watching? (Unresolved question, escala…
Build a culture of appreciation
— Express genuine gratitude and respect. Contempt cannot coexist with a habit of noticing what the oth…
Build a portfolio
— create GitHub repositories with COBOL programs, CI/CD pipelines, and documentation 3. **Get certifie…
Build a Simple Event Logger
— Create a Python service that receives events via HTTP, validates them, and logs to console.
Build an RYOE Model
— Start with box count only - Add features incrementally - Compare to published models
Build and Deploy Phase
— Evaluate platforms using the **Vendor/Platform Evaluation Scorecard** (Template 5). - Staff the team…
Build custom models when:
— You need consistent methodology across different data sources - You're developing predictive systems…
Build in relational support:
— Share the project with someone who can ask about it periodically — not to review it, just to create …
Build internally when:
— AI is core to your competitive strategy and you need to own the capability. - You have ongoing, recu…
Build projects
— Learning by building is most effective for systems skills
Build Python proficiency
— Pandas for data manipulation - Basic visualization - Statistical calculations
Build status
— Is CI passing? (shields.io or GitHub Actions badge) - **Version** — What is the latest release? - **…
Build technical foundations:
— Complete OWASP WebGoat and Juice Shop - Practice on Hack The Box, TryHackMe, and PortSwigger Web Sec…
Build the preprocessing pipeline
— Mistake: preprocessing outside the pipeline, causing data leakage.
Build the weak-tie layer deliberately
— through events, communities, and published work 2. **Make yourself specific and findable** — so that…
Build when:
— The AI model is a core source of competitive advantage - The problem requires custom architectures o…
Build your own tracking system
— platform dashboards show you vanity metrics prominently; real metrics are buried 2. **Patterns requi…
Build-Level Threats:
— Compromised build pipelines injecting malicious code - Tampered base images in private registries - …
Build-Up Play
— The phase of play where a team progresses the ball from their own defensive third toward the opponen…
Builder Pattern
— A **design pattern** that constructs complex objects step by step, allowing the same construction pr…
Building a Personal Learning Network
— Your professional network is a learning resource. Cultivate relationships with architects at other o…
Building a Professional Network:
— Attend conferences and local meetups consistently (not just once) - Share your knowledge: blog posts…
Building access:
— Card reader systems and their vulnerabilities - Visitor management procedures - Reception desk secur…
building allies
— identifying one other person in the room who shares your values and coordinating in advance so that …
Building and Managing AI Teams
— AI roles and responsibilities · Team structures (centralized, embedded, hub-and-spoke) · Recruiting …
Building Automation:
— A systematic approach with data collection, opportunity detection, risk evaluation, and execution ca…
Building Completion Probability Models
— Feature engineering guide - Model training walkthrough - Evaluation metrics
Building Data Pipelines (Coursera)
— Practical course from Google on pipeline construction.
Building intuition through experimentation:
— Maintain a personal "lab notebook" of experiments: mini-projects testing ideas, ablation studies on …
Building structural holes deliberately:
— Identify two or more professional communities with meaningful but incomplete overlap - Build genuine…
Building the data foundation
— skills, infrastructure, standards
Building your own (when you're ready):
— Start with a small group of 5-10 creators you've already built relationships with - Meet regularly (…
Builds toward higher ticket products
— as your early audience graduates, gets jobs, and gains income, you want to have products for them at…
Built-in comparison
— Results that viewers want to compare ("how did you do vs. how I did?"), driving both viewing and par…
built-in function
— a tool that comes with Python, ready to use. Its job is simple: take whatever you give it and displa…
Bulk collection
— The mass interception or retention of communications data from entire populations or large segments …
Burnout
— Physical, emotional, or creative exhaustion resulting from sustained overwork, lack of recovery time…
Burnout (Creator)
— A psychological condition resulting from sustained creative and production demands beyond sustainabl…
Burnout:
— A genuine psychological injury, not just tiredness - The four-stage model (enthusiasm → stagnation →…
Burnout: The Secret to Unlocking the Stress Cycle
— Emily and Amelia Nagoski's book provides a physiologically grounded framework for understanding and …
Burrow injury risk
— ACL tear in 2020 could have derailed everything 2. **Chase over Sewell** - OL still struggled, Burro…
Bus Pirate
— A multi-protocol debugging tool that supports UART, SPI, I2C, and other serial protocols ($30-40) - …
Business Acumen
— Understand organizational priorities - Quantify value of analytical work - Navigate budget constrain…
Business Analyst / Domain Expert
— COBOL developers who work in a single domain (banking, insurance) for years accumulate deep business…
Business assets:
— Your email list: ___ - Your community platform (Discord server, etc.): ___ - Your course or digital …
business associates
— organizations that perform functions involving protected health information (PHI) on behalf of cover…
Business Case
— [ ] Cost-of-status-quo analysis completed with time-and-motion data where available - [ ] Four value…
Business Case:
— [ ] Total Cost of Ownership (5-year) - [ ] ROI calculation - [ ] Risk register with mitigations - [ …
Business correlations worth measuring:
— Marketing spend vs. new customer acquisitions - Average deal size vs. sales cycle length - Employee …
Business Day Calculation
— Given a start date and a number of business days, calculate the resulting date, skipping weekends an…
Business decision-makers
— C-suite executives and board members overseeing AI systems — need high-level summaries of model beha…
Business drivers for change:
— The COVID-era claims surge exposed that the nightly eligibility batch cannot scale beyond 500,000 pe…
Business examples where RL appears:
— Dynamic pricing (adjusting prices in real time based on demand signals) - Recommendation systems (le…
Business Impact Analysis
— reviewed annually 2. **DR Plan Document** — updated after every test and significant change 3. **DR …
Business impact assessment
— What could an attacker do with this level of access?
Business implications:
— **Fraud detection.** Adversaries can craft transactions that evade fraud detection models by slightl…
Business logic testing:
— Test payment flows for price manipulation - Check coupon/discount codes for abuse - Test rate limiti…
Business Purpose and Expected Activity
— [ ] Signed customer statement describing expected account use and anticipated transaction volumes/va…
Business purpose and investment objectives
— Detailed investment objective statement (beyond standard risk tolerance form) - Explanation of why m…
Business requirements:
— Support 500 organizations (tenants) in Year 1, growing to 5,000 in Year 3 - Each tenant has 10-200 u…
business unit strategy
— how each business competes within its market. This is where Porter's competitive strategy frameworks…
Business use cases for the mean:
— Average monthly revenue (when revenue is relatively stable) - Average cost per acquisition across si…
Business use cases for the median:
— Typical deal size (especially with enterprise outliers) - Typical customer support wait time (especi…
Business use cases for the mode:
— Most common product ordered (great for inventory decisions) - Most common support issue type (great …
Business uses for break:
— Find the first transaction that exceeds a fraud threshold - Stop processing once a budget cap is rea…
Business uses for continue:
— Skip records with missing or null values - Ignore draft records when producing a final report - Filt…
BUSINESS_CUSTOMER
— Subtype for commercial/business customers.
Bust Probability:
— Fultz: ~32% (elevated by FT%, small sample) - Tatum: ~22% (standard for top-3 pick)
But meta-analyses have limitations too:
— **Garbage in, garbage out.** If most of the underlying studies are poorly designed, combining them d…
But what if:
— Player A takes mostly wide-open catch-and-shoot threes - Player B creates contested pull-up jumpers …
But-for causation
— the standard form — asks whether the harm would have occurred absent the defendant's breach. In AI c…
Buy
— specialist capability; regulated context; no value in building | | Electronic Identity Verification …
Buy when:
— The problem is well-solved by existing vendors (standard CRM, marketing, or operations use cases) - …
BY CONTENT
— A CALL statement phrase indicating that a copy of the argument is passed to the subprogram. The call…
By domain:
— Web development (frontend, backend, full-stack) - Data engineering - Machine learning - DevOps and i…
By Down (Typical Ranges):
— 1st Down: 45-50% - 2nd Down: 40-45% - 3rd Down: 38-42%
By range
— A branch manager requests all accounts in a specific account number range to generate a branch-speci…
BY REFERENCE
— The default parameter-passing mechanism in COBOL CALL statements. The address of the argument is pas…
By Score Differential
— Leverage peaks in tie games or 1-possession games - Leverage approaches zero in blowouts - The "leve…
By task type:
— Code generation (new features) - Code review - Bug fixing - Testing - Documentation - Refactoring - …
By technique:
— Chain-of-thought prompts - Few-shot prompts - Role-based prompts - Decomposition templates - Constra…
BY THE NUMBERS
— CNB's post-incident analysis found that across their 16 CICS regions, 4 had MXT settings that exceed…
By the Numbers (Estimated):
— NIS1 covered approximately 12,000-15,000 entities across the EU - NIS2 is estimated to cover 100,000…
By the Numbers:
— **Quantum Hall effect:** Edge channel conductance measured at $e^2/h$ to better than $10^{-10}$ prec…
By the Numbers: COBOL's Footprint
— **$3 trillion** in daily transactions processed by COBOL systems - **95%** of ATM swipe transactions…
By Time Remaining
— Leverage increases exponentially as the game nears its end - Final minute often sees LI > 5.0 - Firs…
BY VALUE
— A CALL statement phrase indicating that the binary value of the argument is passed on the call stack…
Bye Timing Multiplier:
— Early (Wk 4-5): 0.7x - Standard (Wk 6-9): 1.0x - Late (Wk 10-12): 1.2x - Very late (Wk 13+): 1.4x
Bye Week Benefits:
— Physical recovery time - Extra preparation for opponent - No new injuries from previous game - Strat…
Bye week studies
— Quantifying rest advantages 2. **TNF injury research** - Short rest health effects 3. **Circadian rh…
Bypass (signal processing)
— A routing configuration in which a signal is sent directly to the output without passing through a p…
Bypass censorship
— used extensively by journalists, activists, and ordinary people in countries with internet censorshi…
bypass damper
— an automatic damper that opens into a bypass duct connecting supply and return, allowing excess air …
Bystander effect
— The social phenomenon in which the presence of other people reduces the likelihood of any individual…
C
c)
— sV. The -O flag is for OS detection, -sC runs default scripts, and -A enables aggressive mode (which…
C) $8.4 billion
— The sports analytics market is projected to reach approximately $8.4 billion by 2025.
C) (x - mean) / std
— This is the standard z-score formula.
C) +3.5
— EPA = 7.0 (TD value) - 3.5 (EP before) = 3.5
C) -250 to 250
— The valid X range is -250 to 250 (representing -25 to 25 feet from center).
C) -3.0 points
— Monday-to-Thursday is the most extreme short rest scenario, doubling the penalty.
C) 0-10
— RAS uses a 0-10 scale.
C) 0.6 wins
— 0.5 EP/game × 12 games = 6 EP. With ~10 points per win, this is about 0.6 wins.
C) 0.8
— QBs are highly correlated with team scoring.
C) 1 point
— Full PPR awards 1 point per reception.
C) 100 milliseconds or less
— Real-time systems should provide near-instant feedback.
C) 12 KB
— DB2 supports 4K, 8K, 16K, and 32K page sizes only. There is no 12K option.
C) 12 yards/second
— Elite NFL speed is around 10-12 yards/second (about 22-24 mph).
C) 120 yards long, 53.3 yards wide
— This includes both end zones (10 yards each) plus the 100-yard playing field.
c) 16 amps
— The NEC 80% continuous load rule: 20A × 80% = 16 amps for continuous loads (operating 3 hours or mor…
C) 1996-97
— Most endpoints provide data back to the 1996-97 season, with box score data available from earlier e…
C) 2015
— ACRL adopted the new Framework in 2015, replacing the 2000 Standards. The shift from "standards" to …
C) 2016
— "Post-truth" was named Word of the Year for 2016 by Oxford Dictionaries, reflecting the prominence o…
C) 2017
— Second Spectrum replaced SportVU in 2017.
C) 25 times
— Tracking systems capture 25 frames per second.
C) 25.2 yard line
— (50×25 + 30×24 + 5×35) / 85 = (1250 + 720 + 175) / 85 = 2145/85 = 25.24
C) 3-4 points
— Extreme combinations (bye + travel + short week) can reach 3-4 points.
C) 3-5 seconds
— A delay of 3-5 seconds is recommended to avoid imposing undue server load.
C) 40 yards
— Field goal distance = line of scrimmage + 17 yards (10 yard end zone + 7 yard snap). 23 + 17 = 40 ya…
C) 429
— HTTP 429 "Too Many Requests" indicates rate limit exceeded.
C) 47-52%
— Elite offenses exceed 47% success rate.
C) 5.5-6.0 EP
— High probability of TD but not guaranteed.
C) 500 milliseconds
— Real-time coaching dashboards should respond quickly enough that users don't perceive delay, typical…
C) 6:1
— Pick 1 (~3000) vs Pick 32 (~500) = 6:1 ratio.
C) 75%
— TD rate regresses 75% toward the mean due to variance.
C) 8+ years
— Director-level positions typically require 8+ years of experience, with 4+ years in leadership.
C) 98.5%
— BPHR = (1 - 150,000 / 10,000,000) * 100 = (1 - 0.015) * 100 = 98.5%. This means 98.5% of page reques…
C) >105
— Elite RB Speed Score threshold.
C) `jupyter lab`
— JupyterLab is started with the `jupyter lab` command.
C) `pip install pandas==2.0.3`
— The double equals sign specifies an exact version requirement.
C) A highly right-skewed distribution
— Positive skewness indicates a long right tail; |skew| > 1 is considered highly skewed.
c) A short circuit or ground fault in the wiring
— A breaker that trips immediately on reset with no load connected indicates a fault in the circuit wi…
C) A strong negative relationship
— |r| = 0.65 is strong, and the negative sign indicates an inverse relationship.
c) About 150 amps
— Using the simplified method: lighting load ~5,940 VA, range 8,000 VA, dryer 5,000 VA, water heater 4…
C) Access path selection
— The optimizer evaluates different access strategies, estimates their costs using catalog statistics,…
C) API keys and passwords
— Credentials should never be in version control; use environment variables or secret managers.
C) Athletic director reviewing quarterly reports
— Executive reports have the longest acceptable response times as they are used for strategic planning…
C) Automotive manufacturers
— The major employer categories are professional teams, college athletics, sports media, technology co…
C) Both shorter rest and travel combined
— TNF penalty incorporates reduced prep time plus typical travel effects.
C) Checkology
— Checkology is the News Literacy Project's online learning platform for middle and high school studen…
C) Computer vision for automated tracking
— Computer vision is specifically identified as an emerging opportunity.
C) Consider game situation when deciding
— Pure efficiency doesn't account for game state, clock management.
C) Contested shot percentage
— This is derived from raw positions; it's computed, not directly measured.
C) DB2PDIST
— The DDF (Distributed Data Facility) address space handles all remote connections, including JDBC ove…
C) Dean Oliver
— His book "Basketball on Paper" (2004) established foundational concepts.
c) EPA = 1.2 - 1.4 =
— 0.2** d) EPA = 2.1 - 1.2 = **+0.9**
C) Excessive data availability
— This is not a data quality issue; the others are common problems discussed in the chapter.
C) Field goals made over expected
— This adjusts for distance and conditions of each attempt.
C) Field position, down, and distance
— The three core components of basic EP.
c) File format:
— Parquet for the main play-by-play data (will have many rows) - Reasoning: Smaller file size, faster …
C) Five
— DigComp organizes digital competence into five areas: Information and Data Literacy; Communication a…
C) Full PPR
— Zero RB leverages WR/TE volume that PPR rewards.
C) Go for it
— At opponent's 40, 4th and 3 typically favors going for it (high conversion %, good failure position,…
C) Grouped box plots or violin plots
— These allow direct comparison of distributions across multiple categories in a single plot.
C) Homebrew
— Homebrew is the most popular package manager for macOS and simplifies Python installation and update…
c) Hot busbars
— The busbars are the metal conductor bars that distribute current from the service entrance to the br…
C) INSERT...SELECT
— Full logging of all 1 million rows, but only one commit record. Still logs every row's after-image. …
C) Interception
— Turnovers typically cost 4+ expected points.
C) JSON
— The NBA Stats API follows RESTful architecture and returns JSON-formatted responses.
C) Leave as NaN/missing
— A percentage based on zero attempts is mathematically undefined (0/0), not zero.
C) Mean
— The five-number summary is: Min, Q1, Median, Q3, Max. The mean is not included.
C) Media as Social Institution
— This is not part of the ACRL Framework. The six frames are: Authority Is Constructed and Contextual;…
C) MLB
— Major League Baseball pioneered analytics adoption through the "Moneyball" approach.
C) Mode
— The mode identifies the most frequently occurring value/location.
C) Monday-to-Thursday turnaround
— At -3.0 points, this is the largest single schedule factor.
C) More variable/inconsistent performance
— Higher CV means higher relative variability compared to the mean.
C) MSTR
— The System Services address space is the first started and the last stopped. It must be running befo…
C) NAMLE
— The National Association for Media Literacy Education articulated this six-part definition in its Co…
C) Negative (risk of touchback with limited gain)
— From opponent's 35, punting into the end zone (touchback) is very likely with limited net gain.
C) Offensive rebound
— Offensive rebounds extend the possession; the other events end it.
C) pandas
— pandas provides the DataFrame class, essential for working with tabular sports data.
C) Parquet
— Parquet's columnar format provides significant advantages for analytical workloads.
C) Pass-catching ability
— Modern offenses require three-down backs.
C) Path colored by speed or time
— Color-coding provides additional information about when/how the route was run.
C) Plus-Minus
— The Four Factors are: eFG%, TOV%, ORB%, and FT Rate.
C) Prescriptive analytics
— Prescriptive analytics recommends optimal actions based on analysis.
C) Python 3 runs faster than Python 2 in all cases
— This is not universally true; performance varies by use case. The other statements are valid reasons…
C) Python 3.10
— Python 3.10 and 3.11 provide the best balance of compatibility and modern features for data science …
C) Python or R proficiency
— Programming is the most essential technical skill for entry-level positions.
C) Q3 - Q1
— IQR measures the spread of the middle 50% of data.
C) QB13
— In 12-team, 1-QB leagues, the 13th QB is replacement level.
C) Quarterback
— QBs have 1.3x premium due to positional importance.
C) Queue (FIFO)
— FIFO queues ensure events are processed in order.
C) Restart kernel and run all cells before sharing
— This ensures the notebook runs correctly from start to finish, verifying reproducibility.
C) Running Back
— RB premium is 0.85x, lowest among skill positions.
C) seaborn
— seaborn's `boxplot()` function creates statistical box plots with minimal code.
C) Sentiment-weighted attribute mentions
— The combination of which attributes are discussed and in what sentiment context best predicts grades…
C) SYSCAT.TABLES
— The `CARD` column in SYSCAT.TABLES contains the cardinality (row count) as recorded by the last RUNS…
C) TeamWork Online
— TeamWork Online is identified as the primary sports job board.
C) Term normalization mapping
— Creating a mapping that converts all variations to a canonical form (e.g., all → "touchdown").
c) The breakers may fail to trip on overcurrent
— This is the documented safety concern with Stab-Lok panels: the breakers can fail to open under over…
c) The dimmer is incompatible with LED bulbs
— LED bulbs require LED-compatible dimmers; using an incandescent dimmer with LEDs commonly causes fli…
C) The distribution is right-skewed
— When mean > median, there are high values pulling the mean up, indicating right skew.
C) The frame where direction changes most sharply
— The break point is where the route changes direction most significantly.
C) Three dimensions of data
— X-axis (TS%), Y-axis (Points), and bubble size (Minutes) represent three dimensions.
C) Universal Table Space (UTS)
— UTS is the modern standard, available in partition-by-range (PBR) and partition-by-growth (PBG) vari…
c) Use existing FILLER space
— if the original record has 20+ bytes of FILLER, the new field can replace part of the FILLER without…
C) Validate schema (required fields present)
— Schema validation should happen first to ensure basic data structure before more complex checks.
C) WebSocket
— WebSockets enable full-duplex, low-latency communication between server and client.
C) Week 10
— Allows time to acquire players for favorable playoff matchups.
C) Weighted mean using attempts as weights
— Different seasons have different sample sizes; weighting by attempts gives appropriate influence to …
c) z = (8.8 - 15.2) / 6.4 =
— 1.00** d) z = (35.0 - 15.2) / 6.4 = **+3.09**
c. Initial Access (ATT&CK Tactic: Initial Access)
— Primary vector: Design a spearphishing campaign targeting specific FinanceForward employees. Detail …
C2 Architecture:
— Select a primary C2 framework. Justify your choice (Cobalt Strike, Sliver, Mythic, Brute Ratel, or c…
C2090-600: DB2 11.1 Fundamentals
— Basic optimizer concepts, access path types. - **C2090-621: DB2 11.1 DBA for LUW** — RUNSTATS, EXPLA…
C4 (Colossal Clean Crawled Corpus)
— Description: A cleaned version of Common Crawl used to train the T5 model. Approximately 750GB of te…
CA
— Control Area. In *VSAM*, a group of *control intervals* that forms the unit of space allocation. A V…
CA Endevor Software Change Manager
— Mainframe source control tool with built-in copybook dependency tracking and automated recompilation…
CA-7, TWS, Control-M
— Production job scheduling tools. Understanding their documentation helps you design restartable batc…
CAC (Customer Acquisition Cost)
— The total cost of acquiring one new paying customer, including advertising spend, time invested in m…
cache
— a dictionary that stores recent results so they can be returned instantly:
Cache data locally
— Avoid repeated downloads 2. **Filter early** - Reduce memory usage 3. **Validate after loading** - C…
Caching
— Storing the results of expensive computations or data retrieval so they can be reused without repeat…
Cadence:
— Is my posting frequency predictable enough that followers know when to expect new content?
Caffeine:
— Half-life ~5–7 hours - 1:00 PM cutoff for most people - Quarter dose still in system at midnight for…
Calculate and interpret effect sizes (Cohen's d)
— students should leave this chapter always asking "how big is the effect?" 3. **Conduct a basic power…
Calculate and interpret p-values
— the most misunderstood concept in introductory statistics. Spend more time here than on any other si…
Calculate and interpret standard deviation
— this is the measure students will use most frequently for the rest of the course (standard error, te…
Calculate before assuming compliance
— a standard double-hung window often provides far less than its listed size in clear opening area.
Calculate EPA/play allowed
— Overall effectiveness 2. **Separate pass/run defense** - Identify strengths 3. **Analyze situational…
Calculate team defensive EPA
— Use cfbfastR data - Compare to yards allowed - Visualize differences
Calculate the standard error of the mean
— this formula (sigma / sqrt(n)) is used in every subsequent inference chapter.
Calculated cooling design load: 38,200 BTU/hr
— **Calculated heating design load: 46,500 BTU/hr**
Calculating monthly and quarterly totals
— previously done with error-prone SUM formulas across tabs - **Comparing products** — previously done…
Calculation logic
— financial formulas, date calculations, rate lookups - **Validation rules** — field edits, range chec…
Calculation work fields:
— DTI ratio, monthly payment, total interest, total repayment - Origination fee, insurance cost - Inte…
Calculation:
— P(COVID) = 0.003 - P(no COVID) = 0.997 - P(positive | COVID) = 0.97 - P(positive | no COVID) = 0.005
Calculations:
— **Weekly opportunity cost** = hours reclaimed × your hourly value - **Weekly hire cost** = hours hir…
Calculus
— not even a little bit. We never take derivatives or integrals. - ❌ **Prior statistics courses** — th…
Calendar features:
— `day_of_week`: Monday through Sunday (categorical) - `month`: January through December (categorical)…
calibrated probability reasoning
— knowing not just what probabilities to assign, but where your intuitive estimates are systematically…
Calibrated trust
— Trust that is proportional to demonstrated evidence of reliability and transparency; distinguished f…
calibration
— make sure a "70% risk" means 70% across groups — you will necessarily flag *different proportions* o…
calibration error
— she was setting curiosity gaps at a level her content couldn't fill.
Calibration examples:
— Medicine: 6/10 — Dissent is tolerated but slow to influence; Marshall and Warren's experience was ty…
Calibration gap:
— 3 (she slightly underestimated herself for the first time)
calibration is approximately satisfied
— But the FPR differs significantly (Group A ~0.17 vs. Group B ~0.09): **equalized odds is NOT satisfi…
Calibration metrics:
— Calibration curve (predicted vs. actual probabilities) - Brier score - Log-loss score
California's CPRA
— amendments to the California Consumer Privacy Act — includes rights to know about automated decision…
CALL
— A COBOL statement that transfers control to a subprogram. CALL can be *static* (resolved at link-edi…
Call a professional when:
— The work involves life-safety systems: gas, electrical panels, structural elements - Errors are expe…
Call a professional:
— Multiple rooms flickering simultaneously (possible main panel or service issue) - Any signs of burni…
Call back
— The practice of attempting to contact a selected household at multiple times and on multiple days be…
Call electrician same day if:
— Burning smell that resolved when you shut off a circuit - Breaker trips repeatedly - Warm outlets, s…
call stack
— a stack of frames, one per active function call. Each frame holds the function's local variables, pa…
CALL statement
— A COBOL statement that transfers control to another program (subprogram), optionally passing paramet…
CALL Statement (SQL)
— The SQL statement used to invoke a stored procedure: `CALL schema.procedure_name(parameter_list)`.
Call to Action (CTA)
— A directive embedded in content that prompts the audience to take a specific next step: subscribe, c…
Calling orientation
— relating to work as inseparable from identity and purpose; experiencing the work as what one is "sup…
Calling orientation statements:
— I find my work deeply connected to who I am - I would continue doing this work (in some form) even i…
Callisthenes
— in his campaigns to generate favorable accounts distributed throughout the empire. (→ Ch. 2)
Callout: The Iterative Refinement Loop
— You will not get every component right on the first prompt. The dashboard, in particular, requires m…
Calm regime:
— Lower standard deviation of price changes (approximately 0.008-0.012). - Moderate volume. - Near-zer…
caloric theory
— the idea that heat was a fluid ("caloric") that flowed from hot objects to cold objects. The theory …
Calvinist doctrine of predestination
— the belief that God had chosen, from before the foundation of the world, who would be saved and who …
Cambridge Analytica
— The British political consulting firm that improperly obtained Facebook data on 87 million users and…
Camera Configuration:
— 5-6 cameras positioned above the court - Resolution sufficient to track players within approximately…
Camera Setup:
— 12-20+ cameras providing overlapping coverage of the entire pitch - Positioned high in stands for op…
camp meeting
— a multi-day outdoor religious gathering that brought hundreds or even thousands of people together f…
Camp Solidarity
— a sprawling tent city and rally ground established near the Pittston operations — became a gathering…
Camp Washington
— also absorbed large numbers of Appalachian migrants. These neighborhoods developed their own institu…
Campaign Objective Definition:
— Define the primary campaign objective in terms that mirror APT29's documented goals. For example: "G…
Campaigns can:
— Mobilize base voters, particularly low-propensity supporters who would vote for their candidate if t…
Campaigns cannot:
— Convert committed strong partisans of the opposing party in meaningful numbers - Overcome large stru…
campanilismo
— loyalty to one's home village, symbolized by the sound of the village church bell (campana). In the …
Can achieve:
— Giving citizens the vocabulary and habit of recognizing propagandistic structures rather than just r…
Can do with existing authority:
— Challenge specific dark patterns as deceptive or unfair practices - Require companies to change spec…
Can do:
— Run MVS 3.8j (a real, if vintage, OS) - Execute JCL, including JOB/EXEC/DD processing - Run COBOL pr…
Can move to cloud/distributed:
— API gateway (keep z/OS Connect, but add cloud API management layer) - Payment status inquiries (read…
Canary deployment
— Route a small percentage of traffic (say 5%) to the new version while the majority continues hitting…
CANCEL
— A COBOL statement that logically removes a dynamically called subprogram from memory, forcing it to …
Candidate A's issues:
— Uses `DISPLAY` for error reporting (DISPLAY goes to SYSOUT, not to an error log that can be reviewed…
Candidate A: James Robinson (SG)
— Age: 27, Seeking $18M/year - RAPM: +2.4 (O-RAPM: +3.1, D-RAPM: -0.7)
Candidate B's strengths:
— Checks FILE STATUS after the READ, which catches all possible outcomes (not just INVALID KEY) - Uses…
Candidate B: Michael Chen (SF)
— Age: 25, Seeking $12M/year - RAPM: +1.6 (O-RAPM: +0.9, D-RAPM: +0.7)
Candidate C: Andre Williams (PF)
— Age: 29, Seeking $8M/year - RAPM: +0.8 (O-RAPM: +0.3, D-RAPM: +0.5)
Canning
— preserving food in sealed glass jars processed in boiling water — became the backbone of mountain fo…
Cannot achieve:
— Compensating for information deserts where accountability journalism has collapsed - Substituting fo…
Cannot be performed online
— unlike adding a nullable column (instant) or widening a VARCHAR (instant), changing the physical wid…
Cannot do (with freely available OS):
— Run z/OS (requires IBM license) - Run DB2 (requires z/OS) - Run CICS Transaction Server (requires z/…
Cannot do without new legislation:
— Establish comprehensive baseline privacy standards for all platforms - Require affirmative product s…
Canvas fingerprinting
— A fingerprinting technique that uses subtle variations in how different systems render a canvas draw…
Canvassing
— Door-to-door voter contact in which campaign volunteers or paid staff visit homes of targeted voters…
Canvassing: Estimating cost
— Volunteer canvassing direct costs: $15-25 per completed contact (staff coordination, materials, trai…
Cap is a constraint
— Every dollar matters 2. **Positions aren't equal** - Pay for premium, draft the rest 3. **Timing mat…
Cap Situation:
— Salary cap: $140M - Current committed salary: $88M - Cap space: $52M - Luxury tax threshold: $170M
capabilities and limitations
— Prioritizing **research on societal risks** posed by AI, including bias and discrimination - Develop…
capacity
— **buffer** = your **sustainable pace**.
Capacity analysis:
— At 50ms per transaction, one CICS transaction instance can process 20 per second = 1,200 per minute …
Capacity calculation:
— Estimated MIPS per transaction: ________ - Peak transactions per second: ________ - Required MIPS at…
Capacity Trending:
— Review tablespace growth rates - Project when tablespaces will need additional extents or reorganiza…
CapCut's AI features
— available in both the consumer and pro versions — include automatic subtitle generation, background …
CAPDHIST
— Extracts 36 months of daily capacity data from the DB2 capacity repository (CAPACITY_CPU_DAILY, CAPA…
CAPDHRLY
— Extracts 90 days of hourly data for detailed peak analysis (CAPACITY_CPU_HOURLY table). This is used…
CAPDRFHA
— Extracts 24 months of monthly R4HA data from the SCRT history. This is the billing data — what CNB a…
capital
— not in the narrow economic sense of money and property, but in an expanded sense that encompasses al…
capital reserves
— money that sits in the bank's vault (metaphorically speaking) rather than being lent out to earn int…
Capstone
— Three integrative projects
Capstone 1: Comprehensive AI Audit Report
— Complete AI system audit with technical analysis, bias assessment, governance review, and policy rec…
Capstone 1: The Learning Intervention Study
— Bonus consideration (up to 5 points): Pre-registration of hypotheses before data collection; honest …
Capstone 1: The Personal Finance Tracker
— a command-line application that tracks income and expenses, categorizes transactions, generates mont…
Capstone 2: The Learning Myths Debunking Guide
— Bonus consideration (up to 5 points): Audience awareness (written for a specific non-expert audience…
Capstone 2: The Trivia Game Engine
— a multiplayer trivia game that loads questions from files or APIs, supports categories and difficult…
Capstone 3: Teach Someone Else to Learn
— Bonus consideration (up to 5 points): Evidence of actual implementation (not just a plan); documenta…
Capstone 3: The Data Dashboard
— a command-line data analysis tool that reads real-world datasets, performs statistical analysis, gen…
Capstone work session.
— **Lab:** Evaluate models with multiple metrics. Build a complete pipeline. Write executive summary. …
Capstone — AI Transformation Plan
— Guided capstone project · Industry selection · AI maturity assessment · Use case prioritization · Te…
Caption
— The text accompanying a social media post. On Instagram, captions can significantly extend reach and…
capture group
— they tell the regex engine "I want to remember this part separately."
Capturing in Burp Suite:
— Use the "Copy as curl command" feature for easy reproduction - Save the full request and response (n…
carat
— Fandom names: SKZ = Stray Kids fandom; ARMY = BTS fandom (Adorable Representative M.C. for Youth); A…
carbon capture and storage (CCS)
— technologies designed to capture carbon dioxide from industrial emissions or directly from the atmos…
carbon emissions
— the greenhouse gases produced by generating the electricity that powers data centers. The carbon imp…
Card Entry
— Accept a 16-digit card number. Validate it against a stored list of valid cards. Display an error an…
Card Status Check
— Is the card active? Cards that are blocked, stolen, lost, or frozen must be declined immediately. 2.…
Card Status Validation
— Is the card active, suspended, lost, or stolen? 2. **Expiration Date Check** -- Has the card's valid…
Cardiac Autonomic Recovery:
— Heart rate variability (HRV), particularly the natural log of the root mean square of successive dif…
cardinality
— the number of rows produced by an operation:
Career (through 2023-24):
— 3× MVP (2021, 2022, 2024) - 6× All-Star - 5× All-NBA - NBA Champion (2023) - Career Win Shares: 100+…
Career / Work
— Your professional investments: skills, reputation, credentials, projects, relationships - **Educatio…
career and business luck
— the kind that translates to job opportunities, client relationships, speaking invitations, and profe…
Career capital
— The skills, reputation, relationships, and track record that make a person an attractive collaborato…
Career capital:
— *Skill capital:* Rare combination of Broadway musical theater composition and genuine hip-hop cultur…
Career investment
— Devaluation of professional work and expertise 2. **Reputational capital** — Damage to field's credi…
Career milestones projection:
— Probability of 2nd MVP: 55% - Probability of Championship: 45% (5-year window) - Probability of Hall…
Career orientation
— relating to work primarily through advancement, achievement, and status.
Career orientation statements:
— I am motivated by advancement, achievement, and recognition in my field - I care about how I compare…
Career Outcome Probabilities:
— All-Star probability: ~8% - All-NBA probability: ~3% - Out of league within 5 years: ~35%
Career Paths:
— Ethical hacking encompasses a wide range of roles from junior pentester to CISO - Specialization pat…
Career Win Shares Lost:
— Pre-injury trajectory (ages 23-32): ~75-90 WS - Actual production (ages 23-32): ~25 WS - Estimated c…
Carnegie Mellon Sports Analytics Conference
— Student and professional research - Technical deep-dives - Code sharing
Carolina Chocolate Drops
— founded in 2005 by **Rhiannon Giddens**, Dom Flemons, and Justin Robinson — brought the African Amer…
Carry
— An on-ball event where a player moves with the ball at their feet. Progressive carries advance the b…
Carrying capacity
— The maximum population or activity level that an environment can sustain indefinitely; the upper asy…
Cartesian product
— every customer matched with every account — which is almost never what you want. (A Cartesian produc…
Cascade
— A chain reaction in which one event triggers subsequent events, potentially amplifying through a net…
Case Studies (case-study-01.md, case-study-02.md)
— Two applied scenarios per chapter. These require you to apply chapter concepts to real or realistic …
Case Study Analysis Total: 50 points
— ## 3. Capstone Project Rubric (General)
CAST
— The universal type converter:
castout
— a cache coherence protocol implemented in hardware.
Catalist
— The major Democratic-aligned voter file vendor that assembles, enriches, and licenses voter data to …
Catalog
— On z/OS, a structured file (the *Integrated Catalog Facility*, or ICF catalog) that records the loca…
Catalog location
— the HLQ maps to a user catalog through the master catalog 2. **Security** -- RACF rules are typicall…
catalogs
— system-level repositories that track every VSAM data set's attributes and location. You define a VSA…
Catapult / STATSports:
— GPS/wearable solutions for teams - Physical performance focus with detailed biomechanical metrics - …
Catapult Sports
— Professional tracking systems - Used by NFL and college teams - Reference for metric definitions
Catapult Sports Blog
— https://www.catapultsports.com/blog/ - Practical articles on load monitoring and wearable technology
Catastrophizing
— Predicting the worst possible outcome and treating that prediction as likely or inevitable.
CatBoost
— https://catboost.ai - Handles categorical features - Yandex development - Good default parameters
Catch one moment of inattentional blindness
— notice something you were not paying attention to. What determined what you were focused on? What di…
Categorical Dimensions:
— Play type (pass, rush, special teams) - Personnel groupings - Formation types
Categorical Features:
— [ ] Assess cardinality: use one-hot encoding for low-cardinality and target or frequency encoding fo…
categorical variables
— variables where the values are categories or groups, not numbers on a scale.
categories
— product categories: - `id` (primary key) - `name` (varchar 100, unique) - `slug` (varchar 100, uniqu…
Categories of High-Risk AI:
— Biometric identification and categorization - Critical infrastructure (energy, water, transport) - E…
Categories:
— Direct cross into box - Short combination play - Lay-off for edge of box shot - Driven near post del…
Categorize every transaction
— reject uncategorized entries with a helpful error message. *(Chapter 11)*
Category dtype
— Converting string columns with low cardinality (e.g., "region", "tier") to `pd.CategoricalDtype` can…
Category: COMMUNITY RESOURCES
— #content-creator-corner — members who make their own gaming content share it here - #looking-for-gro…
Category: MAIN COMMUNITY
— #general — the main conversation channel, high volume, loosely moderated - #content-discussion — spe…
Category: OFF-TOPIC
— #life-updates — members sharing what is happening in their lives - #music — music sharing and discus…
Category: START HERE
— #welcome — automated welcome message, community rules in pinned post - #how-to-navigate — short guid…
Catfishing
— The practice of creating a false identity on a dating platform to deceive potential partners, rangin…
Causal
— it's asking whether sitting in the front row *causes* better grades. (It probably doesn't — motivate…
causal framework
— by telling the story of Appalachian hardship in a way that centers causes rather than symptoms. The …
Causal inference
— The process of determining whether a relationship between two variables is causal (X causes Y) rathe…
Causal interpretation
— What caused it? Crime can be framed as caused by individual moral failure, by poverty, by cultural d…
Causal opacity
— The difficulty of identifying cause-and-effect relationships in complex systems where multiple varia…
Causation vs. correlation
— A foundational distinction in research: two variables can move together (correlation) without one ca…
Caveats:
— You need a C-wire (common wire) for most smart thermostats to function reliably; many older homes la…
CBT-i Coach
— Free; developed by VA/Stanford Evidence-based CBT for insomnia; sleep diary, sleep restriction, and …
CCPA (California Consumer Privacy Act)
— A California state law enacted in 2018 (substantially strengthened by the CPRA in 2020) that grants …
CCPA/CPRA
— California Consumer Privacy Act/California Privacy Rights Act; strongest U.S. state privacy law
CCSID
— Coded Character Set Identifier. A number that identifies a specific character encoding scheme. EBCDI…
CD_DETAIL
— Subtype: certificate of deposit.
CDMP (Certified Data Management Professional)
— DAMA International's professional certification for data management practitioners. Relevant for comp…
Cease and desist
— a demand letter from a rights-holder, not a legal proceeding. Receiving one does not mean you've bee…
CECI (Command-Level Interpreter):
— Executes individual CICS commands typed by the user - Does not require a running program - Used for …
CEDF (Execution Diagnostic Facility):
— Intercepts CICS API commands during actual program execution - Shows each command before and after e…
cell
— the basic building block of a Jupyter notebook. Everything you do in a notebook happens inside cells…
Cell phone problem
— The methodological challenge created by the shift of American households from landline to cell phone…
cells
— either **code cells** (for Python) or **Markdown cells** (for formatted text). The **kernel** is the…
Celtic thesis
— were enormously influential. They provided a coherent, compelling narrative that explained Appalachi…
Census data
— the 1860 census records enslaved people in nearly every Appalachian county, with some counties (part…
Center for AI Safety (CAIS)
— Research and advocacy on AI existential risk - **Partnership on AI** — Multi-stakeholder organizatio…
Center for Applied Special Technology (CAST)
— cast.org Develops the Universal Design for Learning (UDL) framework, which is grounded in learning s…
Center framing
— placing the subject dead center — is a deliberate choice that communicates:
Centers (Traditional):
— Historically highest WS due to rebounding credit - Kareem, Wilt, Shaq dominated Win Shares
Centers:
— Historically most efficient (close to basket) - TS% advantage has decreased as perimeter players opt…
Central Claim
— The core proposition the part defends 2. **Supporting Claims** — The subordinate propositions that, …
Central hub responsibilities:
— Maintaining the group-wide data platform - Developing and maintaining core models (player valuation,…
Central limit theorem
— The statistical principle that the sum of many independent random variables tends toward a normal di…
Central Question
— one question drives the whole video 2. **Character Through-Line** — human anchor for facts 3. **Reve…
Central route processing (ELM)
— The persuasion pathway involving careful evaluation of argument quality; associated with durable att…
Central sensitization
— the amplification of pain signaling in the central nervous system, independent of ongoing peripheral…
Central Tendency:
— Mean: Average value, sensitive to outliers - Median: Middle value, resistant to outliers - Mode: Mos…
Centrality to American History
— Appalachia is not a sideshow; it is central to understanding industrialization, labor, environmental…
Centralized lock management
— all lock requests go through the CF - **Page coherency** — the CF ensures that all members see consi…
Centre-back metrics:
— **Aerial duel win rate:** $\frac{\text{Aerial Duels Won}}{\text{Aerial Duels Contested}}$ - **Tackle…
centrifugal governor
— a pair of weighted balls attached to a spinning shaft connected to the engine. When the engine ran t…
Cepstrum
— The inverse Fourier transform of the logarithm of the power spectrum of a signal, defined as C(τ) = …
Ceremonies:
— Sprint Planning -> Daily Standup -> Sprint Review -> Sprint Retrospective
CERN's official Higgs boson explainer
— CERN has produced a series of accessible videos and articles explaining the Higgs mechanism for non-…
Certainty
— waiting for assurance before committing, for clarity before deciding, for safety before engaging — d…
Certainty:
— Do I struggle with ambiguity or unexpected changes? - Do I feel anxious when I don't know what's com…
CERTIFICATE_OF_DEPOSIT (subtype)
— ACCOUNT_ID (PK, FK to ACCOUNT) - MATURITY_DATE - TERM_MONTHS - EARLY_WITHDRAWAL_PENALTY_PCT - AUTO_R…
Certifications that signal genuine capability:
— **AWS Machine Learning Specialty / Azure AI Engineer / Google Cloud Professional ML Engineer.** Thes…
Certifications to approach with caution:
— Short courses (under 10 hours) that promise "AI certification." The signal-to-noise ratio is poor, a…
Certifications:
— OSCP remains the gold standard for demonstrating penetration testing skill - PNPT offers an excellen…
Certified Cloud Security Professional (CCSP)
— **Focus:** Cloud architecture, design, operations, and compliance (vendor-neutral) - **Cost:** ~$599…
Certified Ethical Hacker (CEH)
— **Vendor:** EC-Council - **Cost:** ~$1,199 exam fee (training packages $2,000-$3,500) - **Format:** …
CFB Play-by-Play (cfbfastR)
— College football play data - 2014-present seasons - https://github.com/sportsdataverse/cfbfastR-data
cfbd
— College Football Data API client ```python pip install cfbd # Recruiting data access ```
CFBD is your primary tool
— free, comprehensive, programmatic access.
CFBD Limitations:
— No tracking data (player locations/movements) - Some historical data gaps - Occasional data entry er…
CFBD Strengths:
— Free and open access - Comprehensive historical data - Active development and community - Pre-calcul…
cfbfastR (R Package)
— `https://cfbfastR.sportsdataverse.org/` - College football play-by-play data - Expected points and w…
cfbfastR Data
— EPA-enriched play-by-play - Free to access - Well-documented
cfbfastR Package Documentation
— `https://cfbfastR.sportsdataverse.org/` - College football EPA implementation - R code examples
cfbfastR Play-by-Play
— 2000-present college football - Includes EPA, success rate - Free access via R/Python
CFBStats.com
— Detailed college football statistics - Historical data and trends - Conference-specific breakdowns
CFTC Enforcement Actions Database
— Searchable database of all CFTC enforcement actions, including civil monetary penalties and administ…
CFTC no-action letter
— essentially a promise from the regulator not to take enforcement action, contingent on several condi…
CFTC Regulation 180.1 — Anti-Manipulation Rule
— Broad prohibition on fraud-based manipulation in derivatives markets, supplementing the specific spo…
CFTC's Defense:
— The agency has broad discretion under the "contrary to the public interest" catch-all provision - El…
Ch 19, Ch 21
— both depend on Ch 2 and Ch 15 but are independent of each other.
Ch 2, Ch 3, Ch 6
— each depends hard only on Ch 1; no inter-dependencies beyond soft links.
Ch 23, Ch 24
— both depend on Ch 22 but are otherwise independent; Ch 24 also needs Ch 5. - **Ch 26, Ch 27** — both…
Ch 26, Ch 33, Ch 36, Ch 37, Ch 38, Ch 41
— these are "leaf" chapters with no outgoing hard prerequisites; safe to write last within their parts…
Ch 28 (Measurement Problem)
— Delayed-choice experiments with single photons push quantum foundations to their limits. - **Ch 31 (…
Ch 29
— Ch 30 depends on Ch 2/17, Ch 29 depends on Ch 4; they are independent of each other.
Ch 3
— Survey data exploration and effect size visualization - **Ch 8** — Beauty standards data visualizati…
Ch 35, Ch 36, Ch 37
— each depends on Ch 6 and/or Ch 22 but not on each other.
Ch 8, Ch 12, Ch 13
— all depend on Ch 7 (and Ch 8 for Ch 12/13), but Ch 12 and Ch 13 are independent of each other.
Ch.10 section 10.9
— `stats.probplot()`, Ch.10 section 10.9 QRPs, see *questionable research practices* quartile, **Ch.6 …
Ch.11 section 11.2
— of the mean, **Ch.11 section 11.2** - of the proportion, **Ch.11 section 11.5** sampling variability…
Ch.13 section 13.2
— five-step procedure, Ch.13 section 13.4 - logic of, Ch.13 section 13.2
Ch.13 section 13.5
— correct interpretation, Ch.13 section 13.5, Appendix F Q2 - five misconceptions, Ch.13 section 13.6 …
Ch.14
— **Ch.18** accessibility, Ch.18 18.4 choosing chart types, Ch.14 14.6 color, Ch.18 18.3 design princi…
Ch.15 section 15.2
— `stats.ttest_1samp()`, Ch.13 section 13.13, Ch.15 one-sample z-test for proportions, **Ch.14 section…
Ch.17 section 17.4
— Cramer's V, **Ch.19 section 19.6** - eta-squared, **Ch.20 section 20.10** - R-squared, **Ch.22 secti…
Ch.19 section 19.2
— `chi2_contingency()`, Ch.19 section 19.5 - `chisquare()`, Ch.19 section 19.3 - conditions, Ch.19 sec…
Ch.20 section 20.8
— `pairwise_tukeyhsd()`, Ch.20 section 20.8 Tuskegee syphilis study, Ch.4 section 4.7, **Ch.27 section…
Ch.20 section 20.9
— `stats.levene()`, Ch.20 section 20.9 library (Python), **Ch.3 section 3.4** likelihood ratio, **Ch.9…
Ch.21 section 21.3
— decision guide, Appendix F Q13 nonresponse bias, **Ch.4 section 4.3** normal distribution, **Ch.10 s…
Ch.21 section 21.6
— `stats.mannwhitneyu()`, Ch.21 section 21.6 margin of error, **Ch.12 section 12.2** - for proportions…
Ch.21 section 21.8
— `stats.kruskal()`, Ch.21 section 21.8
Ch.22 section 22.6
— diagnostics, Ch.22 section 22.16, Ch.23 resistant measure, **Ch.6 section 6.1** response bias, **Ch.…
Ch.26 section 26.5
— healthcare algorithm (Obermeyer), Ch.1, Ch.4, **Ch.26 section 26.5** - proxy variables, Ch.16 case-s…
Ch.4 section 4.3
— algorithmic, see *algorithmic bias* - nonresponse, **Ch.4 section 4.3** - response, **Ch.4 section 4…
Ch.6 section 6.5
— `.var()`, Ch.6 section 6.5.1 variance inflation factor, see *VIF* Verhulst, Pierre-Francois, Ch.24 s…
Chain migration
— The process by which early settlers encourage friends and family from their communities of origin to…
Chain of custody form elements:
— Case number and description - Evidence item number and description - Date and time of collection - C…
Chain-of-Thought (CoT) Prompting
— A **prompting** technique that asks the AI to show its reasoning step by step before giving a final …
Chaining tools:
— `.query()` for filtering (cleaner in chains than bracket notation) - `.assign()` for new columns (re…
challenge is approximately matched to skill
— neither too easy (producing boredom) nor too difficult (producing anxiety). The flow channel is the …
Challenge:
— Weather is keyed by location, not game_id - Need to map venues to weather locations
Challenges encountered:
— Patient data was stored in multiple incompatible formats across different hospital systems (HL7 v2, …
Challenges in African markets:
— Responsible gambling infrastructure is often underdeveloped - Payment processing can be complex (rel…
Challenges in Basketball:
— Different movement patterns than soccer - Limited practice time for prevention programs - Player buy…
Challenges specific to data ethics research:
— **Research on social media:** Can researchers ethically analyze public social media posts without th…
Challenges to reproducibility:
— Timestamps embedded in build artifacts - Non-deterministic compiler optimizations - Randomized data …
Challenges:
— **Underflow:** Small gradient values become zero in fp16 (minimum positive value: ~6e-8). - **Overfl…
Champion Fibre Company
— later Champion International — built its operations around Canton, North Carolina, establishing a pu…
Championship Game Impact:
— Against a quality opponent, 0.5-0.9 EP could be the difference - Over a 3-game playoff run, 1.5-2.7 …
Championship Years:
— 2015: PER 16.1 (slightly above average) - 2017: PER 16.8 (modestly above average) - 2018: PER 15.4 (…
Change agility
— the comfort with ambiguity and uncertainty that allows you to experiment, take risks, and iterate. (…
Change and Continuity
— What is the biggest change you have seen in this community during your lifetime? - What has stayed t…
change blindness
— the failure to detect changes in a visual scene when the change occurs during a brief interruption i…
Change Data Capture (CDC)
— now part of **IBM InfoSphere Data Replication** — is a log-based replication technology that capture…
Change impact assessment checklist
— All schema changes now require a DBA review of potential impacts on fragmentation, space utilization…
Change management
— Any change to a production API goes through a formal change request: 1. Document the change and its …
Change Management for AI
— ADKAR model applied to AI · Resistance patterns · The "last mile" problem · Communication strategies…
Change Readiness Assessor
— a structured framework for evaluating organizational readiness for transformation, which she current…
Change request
— business justification required 2. **Technical review** — Kwame and the sysprog team assess impact 3…
Changed:
— Every video now has at least one conflict type - Every video has a pre-planned tension curve - Every…
Changeman / Endeavor / ISPW
— Commercial mainframe change management tools that include copybook impact analysis. Understanding th…
Channel
— A creator's dedicated space on a platform — a YouTube channel, podcast feed, newsletter, or social m…
Channel A: Personal Finance and Investing
— Average RPM in this niche: $15–$25 - Assume 80% of views show ads
Channel analysis
— The systematic examination of the media channel through which a propaganda message travels, as a nec…
Channel authentication:
— MQ channels encrypted with TLS? _______________ - Channel authentication records configured? _______…
Channel B: Lifestyle and Vlogging
— Average RPM in this niche: $2–$5 - Assume 75% of views show ads
Channel C: B2B Software Tutorials
— Average RPM in this niche: $20–$40 - Assume 85% of views show ads
channel capacity
— provides a fundamental limit that connects to AI in surprising ways.
Channel preference
— online vs. in-store vs. mobile purchase ratios - **Category affinity** — what product categories doe…
Chanted preaching
— sometimes called "the tone" or "holy whine" — is a sermonic delivery in which the preacher begins sp…
Chaos engineering
— Design a chaos test plan that validates your HA architecture. What happens when you kill a z/OS Conn…
Chaos is deterministic unpredictability
— small initial differences grow exponentially, making long-term prediction impossible even in rule-go…
chaotic in the technical sense
— deterministic, bounded, sensitive to initial conditions, and rich in structure.
Chapter 1
— Weinberg's historical introduction. His perspective — that quantum field theory is the unique consis…
Chapter 1 (COBOL Foundations)
— Hard prerequisite. The COBOL programs in this chapter assume familiarity with file handling, working…
Chapter 1 (z/OS Ecosystem)
— Hard prerequisite. The z/OS architecture, subsystem structure, and LPAR concepts are foundational to…
Chapter 10
— "Quantum Error Correction." The definitive textbook treatment, covering the 3-qubit codes, Shor code…
Chapter 10 (False Expertise)
— The theoretical framework for false expertise is developed in Chapter 10. Chapter 26 provides its mo…
Chapter 10: Advanced SQL
— You learned window functions, recursive CTEs, CASE expressions, and temporal queries, handling sophi…
Chapter 10: Biology-Culture Feedback
— **Exercise 1:** *Give an example of a physical trait that appears to be a universal attractiveness c…
Chapter 10: DB2 Data Sharing
— Utility coordination across data sharing members. Recovery with TOLOGPOINT instead of TORBA. Cross-m…
Chapter 10: Defensive Programming
— Using copybooks for standardized error handling patterns - **Chapter 22: Subprograms and the CALL St…
Chapter 10: Network Effects
— Granovetter, M. S. (1973). The strength of weak ties. *American Journal of Sociology, 78*(6), 1360-1…
Chapter 11
— Perturbation theory presented in a matrix-mechanics framework, consistent with Townsend's Dirac-firs…
Chapter 11 (Reading Real Data)
— This chapter built DataFrames by hand from Python dictionaries. In real work, you will load data fro…
Chapter 11: A Region Divided
— Appalachia and the Civil War. Unionism, secession, the creation of West Virginia, guerrilla warfare,…
Chapter 11: DB2 Performance Monitoring
— DB2 EXPLAIN analysis, DSN_STATEMNT_TABLE, and DB2 statistics are the DB2-side diagnostics that compl…
Chapter 11: DDL
— You learned CREATE TABLE, ALTER TABLE, constraints, indexes, and tablespace management, taking contr…
Chapter 11: Sequential File Processing
— Understanding sequential file I/O is prerequisite for sort operations. - **Chapter 14: Advanced File…
Chapter 11: The Dirac Equation
— Weinberg's treatment is characteristically rigorous and reflects his deep perspective as a field the…
Chapter 12 (Grouping and Aggregation)
— The `groupby()` method unlocks category-level summaries: "total revenue by region," "average margin …
Chapter 12: Afterword
— Griffiths includes a clear discussion of the EPR paradox, Bell's inequality, and the no-clone theore…
Chapter 12: Afterword (EPR and Bell)
— Griffiths covers EPR, Bell's theorem, and the no-clone theorem in his characteristically clear style…
Chapter 12: Cognitive Biases in Attraction
— **Exercise 1:** *Describe three cognitive biases that might affect how you evaluate a first date. Fo…
Chapter 12: Emancipation in the Mountains
— What freedom meant in the mountain context. Black churches, schools, land ownership, and systematic …
Chapter 12: Perturbation Theory
— Townsend's approach to degenerate perturbation theory is particularly clear on the connection to mat…
Chapter 12: Symbols, Images, and Visual Propaganda
— Symbols operate below the level of argument. They attach meaning to identity, trigger emotion before…
Chapter 12: Transactions and Concurrency
— Understanding transaction isolation, locking, and deadlock prevention is essential for writing corre…
Chapter 12: Views, Triggers, and Stored Procedures
— You learned to encapsulate logic in the database itself, creating security boundaries, audit trails,…
Chapter 13
— CICS regions host the backend programs your APIs call. TOR/AOR routing still applies. - **Chapter 14…
Chapter 13 checkpoint
— Your CICS region topology defines the backends that z/OS Connect connects to. Reference your TOR/AOR…
Chapter 13: CICS Architecture
— Region topology (TOR/AOR/FOR), MRO, and CICSPlex SM routing are the architectural decisions that det…
Chapter 13: CICS Architecture for Architects
— Prerequisite for this chapter. TOR/AOR topology, MRO routing, and CICSPlex SM workload management — …
Chapter 13: Print and Radio
— The first mass media were revolutionary because they reached beyond the immediate community for the …
Chapter 13: Self-Esteem and Perceived Desirability
— **Exercise 1:** *Explain sociometer theory in your own words. What is the evolutionary logic of the …
Chapter 13: The Feud Mythology
— The Hatfields and McCoys, and what the feuds were really about. Timber, politics, industrial transfo…
Chapter 14
— Weinberg's derivation of the Lamb shift using modern QED methods is the gold standard for a graduate…
Chapter 14 (Physical Storage)
— Tablespace design directly affects utility behavior and performance. Revisit extent sizing, free spa…
Chapter 14 (Visualization)
— DataFrames connect directly to `matplotlib` and `seaborn`. Once you can build and filter a DataFrame…
Chapter 14: Binary Outcome Trading Strategies
— The strategies that are evaluated using the backtesting framework built in this chapter.
Chapter 14: Film and Television
— Moving images have unique propaganda power because they feel like evidence. Leni Riefenstahl underst…
Chapter 14: Indexing Strategies
— Clustering indexes and their interaction with partitioned tables. - **Chapter 17: Query Optimization…
Chapter 14: The "Discovery" of Appalachia
— Local color writers, William Goodell Frost, settlement schools, and the construction of Appalachia a…
Chapter 14: The Psychology of Rejection
— **Exercise 2:** *Explain how rejection sensitivity can become self-fulfilling. Use specific mechanis…
Chapter 15
— this chapter — adds the meta-skill that integrates all of them: the capacity to see the situation di…
Chapter 15 ("Addition of Angular Momenta")
— Shankar provides a thorough treatment with excellent physical motivation. His derivation of CG coeff…
Chapter 15 (Big Tobacco's Channel Strategy)
— Chapter 15 examined how the tobacco industry used advertising channels — radio, print, physician end…
Chapter 15 (Query Optimization)
— Understanding access paths is essential for interpreting monitoring data. A buffer pool hit ratio de…
Chapter 15: Advertising
— The most pervasive propaganda most people encounter is not political. It is commercial. This chapter…
Chapter 15: Buffer Pool Tuning
— Detailed guidance on sizing and configuring buffer pools, directly applicable to I/O-bound diagnosis…
Chapter 15: Channels and Containers
— The modern CICS data-passing mechanism that replaces COMMAREA. Essential for web services with paylo…
Chapter 15: King Coal
— The arrival of railroads and land agents. The broad form deed and the dispossession of mineral right…
Chapter 15: Personality and Attraction
— **Exercise 1:** *The Big Five trait most consistently associated with relationship satisfaction is l…
Chapter 15: Sort and Merge
— Sort operations often precede report generation; OUTPUT PROCEDUREs can contain Report Writer logic. …
Chapter 15: WKB Approximation
— Townsend provides a clean development of the WKB method with a focus on physical applications. His t…
Chapter 16: CICS Performance Tuning
— Deep dive into performance measurement and tuning for the topology patterns described in this chapte…
Chapter 16: CICS Security
— In-depth coverage of RACF integration, identity propagation, and security exits that complement the …
Chapter 16: Company Towns
— Life under corporate rule. Company housing, the company store, scrip currency, mine guards. The raci…
Chapter 16: Digital Media and Social Networks
— Platform architecture is not neutral. The design decisions of Facebook, YouTube, Twitter, and WhatsA…
Chapter 16: Motivation and Approach in Courtship
— **Exercise 1:** *What is the difference between approach motivation and avoidance motivation in roma…
Chapter 16: The Variational and WKB Methods
— Shankar gives an excellent treatment of the variational method, including a clear discussion of the …
Chapter 17
— The most comprehensive treatment of perturbation theory in a standard graduate text. Shankar derives…
Chapter 17: Algorithms and the Attention Economy
— The attention economy is a propaganda machine in the original sense: a system that optimizes for emo…
Chapter 17: Backend Development and REST APIs
— You can build API endpoints and handle HTTP requests. - **Chapter 20: External APIs and Integrations…
Chapter 17: Blood on the Coal
— The Mine Wars of West Virginia. Paint Creek, Cabin Creek, Matewan, Blair Mountain, Bloody Harlan. Mo…
Chapter 17: CICS Performance and Tuning
— Performance tuning (MAXTASK, DSA sizing) interacts with recovery. Over-tuned regions (MAXTASK too hi…
Chapter 17: RUNSTATS and Catalog Statistics
— The quality of EXPLAIN output depends directly on the quality of your statistics. Stale statistics p…
Chapter 18
— Perturbation theory with careful attention to convergence issues. Merzbacher's discussion of the Bri…
Chapter 18: CICS Failure and Recovery
— You will design XA transaction coordination for the fund transfer (DB2 updates across regions) and i…
Chapter 18: Concurrency and Locking
— Foundation for understanding L-locks in data sharing - **Chapter 26: DB2 on z/OS — The Mainframe Env…
Chapter 18: Nonverbal Communication
— **Exercise 1:** *Choose three nonverbal channels (e.g., gaze, touch, proxemics) and describe how eac…
Chapter 18: State-Controlled Media
— Some channels are not captured by propaganda; they are built for it. This chapter examines total inf…
Chapter 18: Table Handling and Searching
— Tables often used in conjunction with string handling (lookup tables for code translation, abbreviat…
Chapter 19
— "Second quantization." The most pedagogically complete treatment in any standard graduate text. Shan…
Chapter 19: Flirtation as Social Performance
— **Exercise 2:** *Why does ambiguity appear to be a universal feature of flirtation? What social func…
Chapter 19: IBM MQ for the COBOL Architect
— MQ as a 2PC participant in CICS transactions. MQ connection recovery and shared queue architecture f…
Chapter 19: Immigrant Appalachia
— Italian, Hungarian, Polish, Black, Welsh, and Greek miners in the coalfields. Ethnic enclaves, inter…
Chapter 19: Security and Authorization
— DB2's authorization model underpins API security. RACF integration with z/OS Connect, EXECUTE privil…
Chapter 19: World War I
— WWI is where modern propaganda was invented as a deliberate, systematically organized government act…
Chapter 1: Fundamental Concepts
— Sakurai takes the Stern-Gerlach experiment as his starting point and builds the entire mathematical …
Chapter 1: Quantum Behavior
— Feynman's treatment of the double-slit experiment is legendary. He calls it "a phenomenon which has …
Chapter 1: Stern-Gerlach Experiments
— Like Sakurai, Townsend begins with Stern-Gerlach but at an undergraduate level. His treatment of seq…
Chapter 1: The Oldest Mountains in the World
— The geological history of the Appalachians, from the Alleghenian orogeny to the five physiographic p…
Chapter 1: The Wave Function
— Griffiths begins with the statistical interpretation of the wave function rather than the historical…
Chapter 1: Why Study Seduction?
— **Exercise 1:** *Identify a popular claim about attraction (from a magazine, TikTok video, or self-h…
Chapter 1: Why We Can't Look Away
— Kahneman, D. (2011). *Thinking, Fast and Slow.* New York: Farrar, Straus and Giroux. - Simon, H. A. …
Chapter 1: z/OS Ecosystem and Sysplex Architecture
— Foundation for understanding TCP/IP networking on z/OS, Communications Server, and how HTTP requests…
Chapter 1: z/OS Foundations
— Job lifecycle, initiator allocation, JES processing - **Chapter 4: Dataset Management** — GDG archit…
Chapter 1: z/OS Parallel Sysplex Architecture
— Foundation for understanding coupling facility, XCF, data sharing, and Sysplex Distributor — all ref…
Chapter 2
— The quantization of the radiation field, showing explicitly how each mode of the electromagnetic fie…
Chapter 20
— Initial dataset exploration: descriptive statistics, response rates by demographics - **Chapter 25**…
Chapter 20: Data Collection and APIs
— Collecting the raw text data (news articles, social media posts, market data) that feeds into the NL…
Chapter 20: Data Collection and Web Scraping
— Gathering market data from platform APIs, building scrapers, and managing databases. - **Chapter 21:…
Chapter 20: Digital Communication and Dating Apps
— **Exercise 1:** *Using the Swipe Right Dataset (described in Appendix C), what analytical question w…
Chapter 20: The Dirac Equation
— Shankar devotes a full chapter to the Dirac equation, starting from the Klein-Gordon equation's fail…
Chapter 20: The Great Migration Out
— Why millions left. Route 23, the Hillbilly Highway. Urban Appalachian communities in Northern cities…
Chapter 20: Totalitarian Propaganda
— Goebbels's Ministry of Reich Public Enlightenment and Propaganda was the most thoroughly documented …
Chapter 21
— API mediation layer consumes events from the pub/sub topics defined here > - **Chapter 22** — Data i…
Chapter 21: API-First COBOL
— Takes web services to the next level: designing COBOL programs specifically for API consumption. Cov…
Chapter 21: Black Lung, Cave-Ins, and Sago
— The human cost of coal. Occupational disease, mine disasters from Monongah to Upper Big Branch, the …
Chapter 21: Cold War Propaganda
— The Cold War was fought primarily in the information domain. Both superpowers invested heavily in br…
Chapter 21: Introduction to Psychoacoustics
— Psychoacoustics employs absolute threshold measurement (the softest detectable sound), just noticeab…
Chapter 21: The Role of Humor
— **Exercise 1:** *Research suggests that women weight humor more heavily in mate selection than men d…
Chapter 22: Advertising Culture
— The twentieth century saw propaganda techniques migrate from wartime government use to peacetime com…
Chapter 22: Index Design and Management
— Index design is the primary tool for influencing access plans. Understanding EXPLAIN output tells yo…
Chapter 22: Query Optimization
— UDFs interact with the DB2 optimizer in important ways. Understanding access paths helps you write U…
Chapter 22: Silence, Space, and Absence
— **Exercise 2:** *The Global Attraction Project found that East Asian participants were more comforta…
Chapter 22: Statistical Modeling
— The statistical foundations (hypothesis testing, confidence intervals) applied to backtest evaluatio…
Chapter 22: The Inner Ear as a Fourier Analyzer
— The basilar membrane performs a continuous mechanical spectral analysis: high frequencies near the b…
Chapter 22: The New Deal in the Mountains
— The TVA, rural electrification, the CCC, national parks, and the Blue Ridge Parkway. Federal transfo…
Chapter 23 (Batch Window Engineering)
— Critical path analysis, job dependency graph, throughput math. Chapter 23 defines the window; Chapte…
Chapter 23: Batch Window Management
— Critical path analysis, batch dependency graphs, and batch window calculations provide the framework…
Chapter 23: EXPLAIN Tools
— Learn to read the optimizer's decisions using EXPLAIN output, Visual Explain, and the PLAN_TABLE. - …
Chapter 23: Gender, Sexuality, and Scripts
— **Exercise 1:** *Apply sexual script theory to explain why "who pays on a first date" is a source of…
Chapter 23: Spatial Hearing and Sound Localization
— Horizontal localization: ITD (below ~1500 Hz) and ILD (above ~1500 Hz) together span the full freque…
Chapter 23: The War on Poverty
— LBJ on Tom Fletcher's porch. Harry Caudill. The Appalachian Regional Commission. VISTA. What worked,…
Chapter 23: U.S. Domestic Propaganda
— Propaganda is not only what adversaries do. This chapter examines documented cases of the U.S. gover…
Chapter 24 (Audience Analytics)
— growth rate calculations, inflection point detection, and audience segmentation - **Chapter 25 (Reve…
Chapter 24 (COVID-19 Disinformation)
— Chapter 24 analyzed COVID-19 disinformation as a general information environment phenomenon. Chapter…
Chapter 24: Advanced Query Optimization
— Builds on EXPLAIN skills with query rewriting techniques, optimization profiles, and workload-level …
Chapter 24: Checkpoint/Restart
— Partition-level checkpoint/restart extends the single-program checkpoint patterns from Chapter 24. T…
Chapter 24: Checkpoint/Restart for Batch
— The batch equivalent of CICS recovery. While the mechanisms differ (checkpoint files vs. system logs…
Chapter 24: Digital Disinformation, 2016–2020
— The most recent and most consequential case in the book. Based on the Senate Intelligence Committee'…
Chapter 24: Ensemble Methods and Model Stacking
— Combining multiple ML models into ensembles that outperform individual models. Builds directly on th…
Chapter 24: LGBTQ+ Courtship and Desire
— **Exercise 1:** *Lisa Diamond argues that sexual fluidity is more common in women than in men. What …
Chapter 24: Mountaintop Removal
— When they blew up the mountains. The shift from underground to surface mining. Environmental devasta…
Chapter 24: NLP and Sentiment Analysis
— NLP features that are stored in the feature store and fed into production pipelines.
Chapter 25 (Parallel Batch Processing)
— Parallel job design, partition-by-key strategies. Chapter 25's parallelization creates the architect…
Chapter 25: Comedy
— McGraw, A. P., & Warren, C. (2010). Benign violations: Making immoral behavior funny. *Psychological…
Chapter 25: Consonance, Dissonance, and Roughness
— Roughness arises when two partials fall within the same critical band and interact to produce amplit…
Chapter 25: Education and the Fight for Literacy
— From one-room schools to settlement schools to the Highlander Folk School. Education as both opportu…
Chapter 25: Ensemble Methods
— Ensemble models whose components are individually tracked, versioned, and monitored.
Chapter 25: Ensemble Methods and Model Stacking
— Combining NLP-derived features with polling-based and market-based models in ensemble forecasts.
Chapter 25: Military Propaganda and PSYOP
— Psychological operations are legal, documented, and a permanent feature of modern military strategy.…
Chapter 25: Monitoring and Diagnosing Performance
— Covers runtime performance monitoring that complements EXPLAIN's compile-time analysis.
Chapter 25: Object-Oriented COBOL
— An alternative modernization approach that stays within COBOL rather than bridging to other language…
Chapter 25: Race, Ethnicity, and Desire
— **Exercise 2:** *Distinguish between "racial preference" as individual psychology and "racial prefer…
Chapter 26: Batch Performance Tuning
— The next chapter covers optimizing individual programs within partitions. Once you have parallelized…
Chapter 26: Class, Status, and Mate Value
— **Exercise 1:** *The concept of "mate value" is used in evolutionary psychology. What does it mean, …
Chapter 26: Inter-Language Communication
— An alternative modernization approach where COBOL collaborates with Java and C rather than adopting …
Chapter 26: The Appalachian Resistance Tradition
— Blair Mountain, Buffalo Creek, the Pittston strike, Camp Solidarity, anti-mountaintop-removal organi…
Chapter 26: The Geometry of Tonal Space
— Tymoczko (2006): voice-leading between chords can be modeled as paths in a geometric "orbifold" (quo…
Chapter 27
— Full RFM analysis with two-dimensional segment maps, automated targeting lists, and customer lifetim…
Chapter 27 (Batch Monitoring)
— Operational monitoring, alerting, trend analysis. Chapter 27 builds the ongoing monitoring framework…
Chapter 27 (Corporate Astroturfing)
— Chapter 26 focuses on the propaganda content and techniques of anti-public-health campaigns. Chapter…
Chapter 27: Culture, Religion, and Courtship
— **Exercise 1:** *How do religious courtship norms function simultaneously as social control and as g…
Chapter 27: Embedded SQL Fundamentals
— Review if you need to strengthen your foundation in static embedded SQL before tackling the advanced…
Chapter 27: Feature Stores, Pipelines, and MLOps
— The operational infrastructure for deploying strategies that have passed backtesting into production…
Chapter 27: Music of the Mountains
— From British Isles ballads through the Bristol Sessions to bluegrass, country, and beyond. The banjo…
Chapter 27: Pitch Perception and the Brain
— Absolute pitch engages left posterior auditory cortex; pitch-class and chroma processing found in se…
Chapter 28: Advanced DB2 Programming
— DB2 skills are essential for most CICS programs, as online transactions frequently access DB2 data.
Chapter 28: Advanced DB2 Techniques
— Dynamic SQL, stored procedures, and performance tuning beyond the fundamentals. - **Chapter 29: Intr…
Chapter 28: Age, Life Stage, and Desire
— **Exercise 2:** *Older adults in the Okafor-Reyes dataset showed different attraction prioritization…
Chapter 28: Appalachian Literature
— Writing the mountains from within. James Still, Harriette Arnow, Lee Smith, Silas House, Ron Rash. T…
Chapter 28: ASMR and Sensory Content
— Fredborg, B., Clark, J., & Smith, S. D. (2017). An examination of personality traits associated with…
Chapter 29 (Capacity Planning)
— MSU forecasting, storage growth, transaction volume modeling. The performance baseline established i…
Chapter 29: Capacity Planning
— Extends the CICS-specific capacity planning in Section 17.7 to the full z/OS environment: MIPS, MSU,…
Chapter 29: CICS Fundamentals
— Builds on DB2 knowledge by showing how SQL is used within CICS online transactions.
Chapter 29: Faith in the Hollers
— Baptist, Methodist, Holiness, and Pentecostal traditions. Churches as community infrastructure. Snak…
Chapter 29: The Seduction Industry
— **Exercise 1:** *Analyze a pickup artist technique (e.g., "negging") using three theoretical framewo…
Chapter 2: A History of Courtship
— **Exercise 1:** *Compare courtship in pre-industrial agricultural societies with courtship norms in …
Chapter 2: First Peoples
— Ten thousand years of Indigenous life in the mountains. Archaeological evidence from Paleo-Indian th…
Chapter 2: The Relational Model
— Formal definitions of selection, projection, and the relational algebra operations that underlie SEL…
Chapter 2: Your Brain on Screens
— Paivio, A. (1971). *Imagery and Verbal Processes.* New York: Holt, Rinehart, and Winston. - Sweller,…
Chapter 2: z/OS Storage Management
— Understanding virtual storage, address space limits, and above/below the bar storage is essential fo…
Chapter 3
— Numerically solves the Schrödinger equation for hydrogen and related potentials. Includes detailed d…
Chapter 3, Sections 3.7–3.11
— Sakurai's treatment of angular momentum coupling is among the most elegant available. He develops th…
Chapter 3.9: Bell's Inequality
— Sakurai derives the CHSH inequality cleanly using the spin-1/2 formalism developed earlier in the ch…
Chapter 30: Advanced CICS Programming
— Covers multi-screen transactions that combine CICS pseudo-conversational design with DB2 cursor proc…
Chapter 30: Disaster Recovery
— Extends the recovery concepts from this chapter to site-level failures. GDPS, Sysplex recovery, and …
Chapter 30: Foodways, Craft, and Material Culture
— Ramps, cornbread, leather britches. Quilting, basket-weaving, woodworking. The Foxfire project. Indi…
Chapter 30: Manipulation, Coercion, and Control
— **Exercise 1:** *Evan Stark distinguishes coercive control from situational couple violence. Explain…
Chapter 31: IMS DB Concepts
— An alternative database technology you may encounter in shops that predate DB2 adoption.
Chapter 31: Media Literacy
— The foundational framework for everything that follows. What does it mean to be media literate, and …
Chapter 31: Musical Memory and Learning
— Melody recognition involves encoding of contour, interval size and direction, and rhythmic pattern. …
Chapter 31: Objectification and the Male Gaze
— **Exercise 1:** *Fredrickson and Roberts (1997) propose that objectification theory explains a gende…
Chapter 31: Wholesome Content
— Haidt, J. (2003). Elevation and the positive psychology of morality. In C. L. M. Keyes & J. Haidt (E…
Chapter 32: Fact-Checking
— Fact-checking is necessary but not sufficient. It operates after the fact, on specific false claims,…
Chapter 32: Rejection, Harassment, and Violence
— **Exercise 2:** *What does research tell us about the relationship between entitlement beliefs and i…
Chapter 32: Rhythm, Meter, and Neural Entrainment
— Meter is a hierarchical grouping of beats into bars; the "tactus" is the beat level most natural for…
Chapter 32: The Coal Economy's Collapse
— Natural gas, renewables, automation, and the end of coal's dominance. Job losses, community devastat…
Chapter 33: Inoculation Theory
— The most promising line of research in propaganda resistance: instead of correcting false beliefs af…
Chapter 33: Strangler Fig Pattern
— The architectural strategy for incrementally migrating from monolithic CICS to microservices. Uses w…
Chapter 33: Technology and Harm
— **Exercise 1:** *How can the design features of a dating app create conditions that enable harassmen…
Chapter 33: The Opioid Crisis
— From Purdue Pharma's marketing to the fentanyl wave. Why Appalachia was specifically vulnerable. Cri…
Chapter 34: Analytics
— Provost, F., & Fawcett, T. (2013). *Data Science for Business.* Sebastopol: O'Reilly Media.
Chapter 34: Appalachia and American Politics
— From Yellow Dog Democrats to Trump country. Political realignment, cultural conservatism, economic p…
Chapter 34: Attraction in the Workplace
— **Exercise 1:** *What is the difference between sexual harassment and workplace romance, and why is …
Chapter 34: Ethics of Persuasion
— If propaganda is distinguished from legitimate persuasion, what distinguishes them? This chapter eng…
Chapter 35: Law, Policy, and Regulation
— The legal landscape of propaganda in democratic societies is complicated by the First Amendment trad…
Chapter 35: Media Representations of Attraction
— **Exercise 2:** *When Nadia, Sam, and Jordan watch a Netflix romance together, they each respond dif…
Chapter 36: AI Coding Agents
— You understand how autonomous AI agents use tools to accomplish tasks, and how tool calling fits int…
Chapter 36: Community
— Putnam, R. D. (2000). *Bowling Alone: The Collapse and Revival of American Community.* New York: Sim…
Chapter 36: Ethical Persuasion
— The final chapter of Part Six asks the practitioner's question: given everything we now know, how do…
Chapter 36: Hookup Culture — The Debate
— **Exercise 1:** *Lisa Wade argues that hookup culture on U.S. college campuses is a performance as m…
Chapter 36: The New Appalachia
— Latino immigration, COVID-era remote work migration, tourism economies, gentrification, housing cris…
Chapter 37: Children Under the Gaze
— The second chapter turns to a population that is among the most surveilled and the least able to con…
Chapter 37: Collaboration
— Granovetter, M. S. (1973). The strength of weak ties. *American Journal of Sociology, 78*(6), 1360-1…
Chapter 37: Energy Transition
— Coal-to-solar on reclaimed mine land. Wind energy. The Mountain Valley Pipeline. The justice questio…
Chapter 37: Testing Strategies
— Covers CICS-specific testing techniques including CEDF (the CICS Execution Diagnostic Facility) and …
Chapter 38: Ethics and Mental Health
— Vosoughi, S., Roy, D., & Aral, S. (2018). The spread of true and false news online. *Science, 359*(6…
Chapter 38: Health, Despair, and Resilience
— Company doctors to rural hospital closures. Deaths of despair. The Frontier Nursing Service. Mental …
Chapter 38: Symmetry Groups and Musical Structure
— The twelve pitch classes under transposition form Z₁₂ (cyclic group of order 12). Tone rows in seria…
Chapter 38: The Future of Courtship
— **Exercise 1:** *Predict how AI-mediated matchmaking might change two aspects of attraction that you…
Chapter 38: The Future of Surveillance
— Looking forward, this chapter examines the surveillance trajectories currently underway: the shift f…
Chapter 39: An Integrated Model of Attraction
— **Exercise 1:** *The chapter proposes a layered model of attraction integrating biological, psycholo…
Chapter 39: Designing for Privacy
— This chapter turns from analysis to response. Ann Cavoukian's Privacy by Design framework, different…
Chapter 39: Monetization
— Ries, E. (2011). *The Lean Startup.* New York: Crown Business. - Federal Trade Commission. (2023). *…
Chapter 3: Angular Momentum
— Townsend presents the algebraic approach at an undergraduate level with many well-chosen examples. H…
Chapter 3: Cherokee Appalachia
— The Cherokee Nation as the dominant civilization of southern Appalachia. Governance, agriculture, di…
Chapter 3: DB2 Architecture
— Buffer pools, memory management, and storage manager internals that underpin physical design decisio…
Chapter 3: Language Environment
— LE runtime considerations for COBOL programs invoked through web services, including enclave managem…
Chapter 3: Research Methods in Attraction Science
— **Exercise 1:** *A study finds that men prefer women with a waist-to-hip ratio of 0.7. The effect si…
Chapter 3: The Postulates of Quantum Mechanics
— We formalize the rules of the game: states, observables, measurement, and the uncertainty principle.…
Chapter 3: The Scroll-Stop Moment
— Itti, L., & Koch, C. (2000). A saliency-based search mechanism for overt and covert shifts of visual…
Chapter 3: Theory of Angular Momentum
— This is the gold standard treatment. Sakurai's algebraic derivation of the angular momentum spectrum…
Chapter 4
— Phonons I: Crystal vibrations. A more introductory treatment than Ashcroft and Mermin, suitable for …
Chapter 4 (Dataset Management)
— BLKSIZE fundamentals, SMS data class configuration, VSAM cluster design. The I/O optimization in thi…
Chapter 40: CICS Modernization Patterns
— Advanced modernization strategies building on the web services and channel/container concepts introd…
Chapter 40: First 90 Days
— Young, S. (2019). *Ultralearning: Master Hard Skills, Outsell Your Peers, and Accelerate Your Career…
Chapter 40: The Future of Music and Physics
— Emerging areas: quantum-inspired audio algorithms, neural audio synthesis (neural vocoder, music lan…
Chapter 40: Whose Appalachia?
— Race, class, gender, and the fight over a region's story. Black Appalachians, Indigenous persistence…
Chapter 41: Personal Reflection and Growth
— **Exercise 1:** *The chapter invites you to identify one pattern in your relational history that you…
Chapter 41: What Appalachia Teaches America
— Resource extraction, inequality, and the sacrifice zone. Internal colonialism as a framework. The co…
Chapter 42
— the final chapter — centers contemporary Appalachian voices in all their complexity, refusing to red…
Chapter 42: Open Questions and Future Directions
— **Exercise 1:** *Identify what you consider the single most important unanswered question in attract…
Chapter 42: The View from the Porch
— Contemporary Appalachian voices in their own words. The region as it is right now — complex, diverse…
Chapter 4: Data Types and Table Design
— Schema design considerations for cross-platform portability (z/OS to cloud). - **Chapter 18: Securit…
Chapter 4: Dataset Management on z/OS
— Utility input/output dataset allocation, space sizing, SMS storage classes, and dataset naming conve…
Chapter 4: Quantum Entanglement
— Preskill's graduate lecture notes provide an exceptionally clear treatment of Bell inequalities, CHS…
Chapter 4: The Emotion Engine
— Berridge, K. C., & Robinson, T. E. (1998). What is the role of dopamine in reward: Hedonic impact, r…
Chapter 4: The Language of Desire
— **Exercise 1:** *Jordan argues that calling this course "seduction" is problematic because the word …
Chapter 4: z/OS Datasets and File Processing
— Foundation for understanding sequential datasets, VSAM, GDGs, and the file I/O operations used in fi…
Chapter 5
— The harmonic oscillator with careful attention to the boundary between classical and quantum behavio…
Chapter 5 ("Angular Momentum")
— Townsend's undergraduate text provides an accessible treatment of angular momentum addition that bui…
Chapter 5: A System of Two Spin-1/2 Particles
— Townsend's treatment builds directly from the spin formalism and includes a clear derivation of Bell…
Chapter 5: Cognitive Load
— explains what happens *after* information passes through the attention gateway. You'll learn about w…
Chapter 5: Identical Particles
— Griffiths provides an exceptionally clear treatment of identical particles, starting from the two-pa…
Chapter 5: SELECT and WHERE
— Foundation for all subquery placement. - **Chapter 6: Joins** — Semi-joins and anti-joins are the ex…
Chapter 5: SQL Fundamentals
— You learned SELECT, WHERE, ORDER BY, and the basic shape of every query you will ever write.
Chapter 5: The Curiosity Gap
— Loewenstein, G. (1994). The psychology of curiosity: A review and reinterpretation. *Psychological B…
Chapter 5: The Ethical Compass
— **Exercise 1:** *A person agrees to a sexual encounter but only because they feel they "owe" it to t…
Chapter 5: Who Came to the Mountains?
— Scotch-Irish, German, English, and African migration into Appalachia. The Great Wagon Road. Push and…
Chapter 5: Workload Manager and DB2
— WLM application environments, service classes, and goals. Required reading before deploying any stor…
Chapter 5: z/OS Workload Manager
— WLM service classes, velocity goals, and dispatching priority directly feed CICSPlex SM's goal-based…
Chapter 6 (DB2 Optimizer)
— Access path selection, EXPLAIN analysis, catalog statistics. The DB2 batch performance patterns in S…
Chapter 6: Advanced Conditional Logic
— Conditional expressions used in PERFORM UNTIL conditions and within loop bodies. - **Chapter 8: Para…
Chapter 6: Joining Tables
— You learned INNER JOIN, LEFT/RIGHT/FULL OUTER JOIN, and cross joins, enabling queries that span mult…
Chapter 6: Memory and Repeat
— Von Restorff, H. (1933). Über die Wirkung von Bereichsbildungen im Spurenfeld. *Psychologische Forsc…
Chapter 6: Platform Landscape
— Provides background on the prediction market platforms whose APIs are covered in this chapter. - **C…
Chapter 6: Slavery in the Mountains
— The hidden history of Black Appalachia. Slavery at salt works, iron furnaces, and small farms. Demog…
Chapter 6: The DB2 Optimizer
— Access path selection governs the performance of every cursor in this chapter. Review EXPLAIN analys…
Chapter 6: The Neuroscience of Desire
— **Exercise 1:** *Helen Fisher's research identifies dopamine, norepinephrine, and serotonin as centr…
Chapter 7
— The most comprehensive treatment of the QHO in any standard graduate text. Shankar covers the analyt…
Chapter 7 (Time Evolution)
— directly extends the operator formalism to dynamics. 2. **Chapter 8 (Dirac Notation)** — recasts eve…
Chapter 7: Aggregation and Grouping
— You learned GROUP BY, HAVING, and aggregate functions (COUNT, SUM, AVG, MIN, MAX), transforming deta…
Chapter 7: Emotional Appeals
— Fear is the most reliable tool in the propagandist's kit. So is moral outrage. So is nationalist pri…
Chapter 7: Evolutionary Psychology of Mate Choice
— **Exercise 1:** *Trivers's parental investment theory predicts that the higher-investing sex will be…
Chapter 7: Expected Goals (xG) Models
— foundational understanding of the xG metric used extensively in recruitment evaluation. - **Chapter …
Chapter 7: Identical Particles
— Sakurai develops the formalism from the symmetrization postulate, emphasizing the abstract structure…
Chapter 7: Introduction to pandas
— DataFrames, Series, and the grammar of data manipulation - **Chapter 8: Cleaning Messy Data** — Prof…
Chapter 7: Iteration Patterns
— Conditional logic frequently controls loop behavior through PERFORM UNTIL and TEST BEFORE/AFTER. - *…
Chapter 7: Quantum Electrodynamics
— Griffiths provides the clearest undergraduate-level introduction to the Dirac equation, gamma matric…
Chapter 7: The Frontier Economy
— Subsistence, trade, ginseng, salt, iron, livestock. The myth of pure self-sufficiency versus the evi…
Chapter 7: What "Going Viral" Really Means
— Anderson, C. (2006). *The Long Tail: Why the Future of Business Is Selling Less of More.* New York: …
Chapter 8
— Good balance between formalism and application. The treatment of the Stark effect is particularly th…
Chapter 8 | Part 2: Techniques
— ## Introduction: Why This Case
Chapter 8: DB2 Locking and Concurrency
— SHRLEVEL options on utilities interact with application locking. Understanding lock escalation, clai…
Chapter 8: Physical Attractiveness
— **Exercise 2:** *The "what is beautiful is good" halo effect is well-documented. What are the ethica…
Chapter 8: Prompt Engineering Fundamentals
— You understand prompt anatomy, clarity, specificity, and common anti-patterns. - **Chapter 9: Contex…
Chapter 8: Simplification and the Big Lie
— Complex problems require complex analysis. Propaganda offers simple problems and simple enemies. Thi…
Chapter 8: Subqueries and CTEs
— You learned scalar subqueries, correlated subqueries, EXISTS, and Common Table Expressions, giving y…
Chapter 8: The Algorithm
— Covington, P., Adams, J., & Sargin, E. (2016). Deep neural networks for YouTube recommendations. *Pr…
Chapter 8: The Variational Principle
— Griffiths provides the clearest undergraduate treatment of the variational method. He covers the pro…
Chapter 9 (Functions)
— The functions you write in Chapter 9 become more useful when they accept and return DataFrames. Many…
Chapter 9: Bandwagon and Social Proof
— Humans are social animals. We look to others to know what to think. Propagandists manufacture the ap…
Chapter 9: Copybooks and Code Reuse
— Standardized error handling through shared copybooks (IO-STATUS, PAR-LOG) - **Chapter 11: Sequential…
Chapter 9: Data Modification
— You learned INSERT, UPDATE, DELETE, and MERGE, transitioning from reading data to changing it.
Chapter 9: Scent, Sound, and the Senses
— **Exercise 1:** *The sweaty T-shirt studies suggest that body odor carries information about MHC com…
Chapter 9: The Share Trigger
— Berger, J. (2013). *Contagious: Why Things Catch On.* New York: Simon & Schuster. - Berger, J., & Mi…
Chapter 9: Transaction Management
— Foundation for understanding COMMIT, ROLLBACK, and transaction boundaries. - **Chapter 15: Buffer Po…
Chapter 9: Women on the Frontier
— Gender, labor, and survival. Agricultural work, spinning, midwifery, herbal medicine. Mary Draper In…
Chapter appearances:
— Ch. 1: Introduced — sound as waves, first comparison to wave-particle duality - Ch. 3: Resonance — c…
Chapter I.1
— "Who Needs It?" Zee's characteristic informal style makes the motivation for QFT vivid and compellin…
Chapter Index
— an overview of the chapter's objectives and key topics, so you know what to expect before you begin.…
Chapter introduction
— What you'll learn, why it matters, and what you need to have completed first. 2. **Core content** — …
CHAPTER METRICS
— This chapter covered the CICS performance model from dispatcher through storage through capacity pla…
Chapter Overview
— Why this topic matters, what you'll learn - **Main Sections** (4–7 sections) — Core content with emb…
Chapter title and learning objectives
— what you will be able to do after completing this chapter - **Prerequisites** -- which earlier chapt…
Chapter touchpoints:
— Ch. 1: Sound is "just" pressure waves — but is that the whole story? (First mention) - Ch. 5: Psycho…
Chapter XI
— The most rigorous and complete treatment of stationary perturbation theory available in a textbook. …
Chapter XIV: Systems of Identical Particles
— The most comprehensive undergraduate treatment. Over 100 pages cover the full formalism including th…
Chapters 13, 17
— Shankar's hydrogen atom chapter is notable for its thorough discussion of the radial equation and th…
Chapters 13-18: Storytelling
— McKee, R. (1997). *Story: Substance, Structure, Style, and the Principles of Screenwriting.* New Yor…
Chapters 14, 15, 16, 17, 18
— All depend only on Chapter 13 as a hard prerequisite. Chapters 14–18 are internally independent at t…
Chapters 18-19
— Covers eigenvalue problems and boundary value problems (including the shooting method) with practica…
Chapters 19-24: Production
— Zettl, H. (2017). *Sight Sound Motion: Applied Media Aesthetics* (8th ed.). Boston: Cengage. - Bordw…
Chapters 1–2
— A more mathematically rigorous development of second quantization and Fock space. Negele and Orland …
Chapters 1–3
— This older but excellent text covers the historical experiments (blackbody, photoelectric, Compton, …
Chapters 1–5
— A remarkably accessible introduction to QFT, starting from the phonon example and building to the qu…
Chapters 1–6
— A modern treatment of atomic structure that covers fine structure, hyperfine structure, and the Zeem…
Chapters 2, 3, 4, 5
— All depend only on Chapter 1; no dependencies on each other. Can be generated or studied in any orde…
Chapters 22–23
— Classical and quantum theory of the harmonic crystal. The definitive treatment of phonons in a solid…
Chapters 28, 29, 30, 31
— Each has different prerequisites but no mutual dependencies. Can be generated in parallel once their…
Chapters 2–6
— The standard graduate textbook on QFT. Chapters 2 and 3 develop the Klein-Gordon and Dirac field the…
Chapters 33, 34, 35, 36, 37
— All depend on Chapter 32 as their hard prerequisite. No mutual hard dependencies among them (soft pr…
Chapters 37–39
— Instantons, large-order behavior, and the connection between perturbative and non-perturbative effec…
Chapters 39, 40
— Effectively standalone. Can be generated at any time.
Chapters 4, 7
— Griffiths' treatment of the hydrogen atom (Chapter 4) and fine structure (Chapter 7) is the undergra…
Chapters 5, 7
— Sakurai's treatment of approximation methods (Chapter 5) and identical particles and atomic structur…
Chapters 5–6
— An excellent intermediate-level treatment that bridges the gap between introductory quantum mechanic…
Chapters 7, 8, 9, 10
— All depend only on Chapter 6 as a hard prerequisite. Soft prerequisites create a suggested ordering …
CHAR
— Convert to fixed-length character string:
Character Arc
— The change or development a character undergoes over the course of a narrative. In creator content, …
Character development arc:
— Chapters 2–5: Aiko is introduced as a student who keeps thinking about music during physics work. He…
character moves
— they copy bytes without any numeric conversion. Elementary moves between numeric fields perform the …
Character profile:
— Aiko Tanaka, age 29, Japanese-American - Dual PhD student: Condensed Matter Physics (Stanford) + Mus…
Character-based ethics education
— An approach to ethics education focused on developing moral sensitivity, reasoning, and motivation r…
Character:
— How does the creator present themselves? What persona dimension is most prominent? - What makes them…
Characteristics:
— Models trained in Jupyter notebooks - Manual deployment (copy model file to server, update code) - N…
Characterization breakdown:
— Accurately described as "tied" or "toss-up": 38% (1,082 mentions) - Characterized as Whitfield leadi…
Characterization Test
— A test written to document the *current* behavior of existing code, not its *intended* behavior. Use…
Characters:
— **Kwame Mensah** — Chief architect, 30 years mainframe experience. The voice of wisdom. Has seen eve…
charitable hypothesis
— the most reasonable, human interpretation of what would explain their behavior. Not a naive or ideal…
charitable interpretation
— the deliberate practice of articulating the best possible reading of another person's behavior.
Charity zine
— Fan-produced creative anthology published to raise charitable donations. Combines fan creative commu…
Charleston fell on May 12, 1780
— the largest American surrender of the war, with approximately 5,500 Continental soldiers captured. T…
Chart Plan:
— Question: How have vaccination rates changed over time for three countries with different trajectori…
Chart Type Matching
— Choropleth maps: geographic variation - Bar charts: category comparison; stacked for composition, gr…
Charts Section
— Two to four charts maximum — more than that and none of them get absorbed - Trend chart over time, r…
Chasing a Deficit:
— Maximize offensive firepower - Three-point shooting for quick scoring - Gambling on defense acceptab…
Chastity
— prior sexual inexperience — showed the largest cultural variation of any characteristic studied, ran…
ChatGPT (GPT-4o):
— Occasionally over-eager to help — may fabricate specifics when it doesn't know - Can be verbose with…
ChatGPT Advanced Data Analysis
— chat.openai.com Requires a ChatGPT Plus subscription. Accepts file uploads (CSV, Excel), runs Python…
Check 4: Referential Integrity
— Verify that every `account_id` in the transactions table corresponds to a valid `customer_id` in the…
Check 5: Date Logic Validation
— Verify that `kyc_verified_date` is always before or on the account opening date. (Generate synthetic…
Check assumptions:
— Independence (study design) - Normality within each group (histograms, QQ-plots, Shapiro-Wilk) - Equ…
Check base rates
— if they differ across groups, the impossibility theorem applies 3. **Map the trade-offs** — what doe…
Check CO and smoke detectors monthly
— ideally test them the first of every month. CO detectors should be on every level of the home and ou…
Check consistency
— do the cross-validation results match the final test set results?
Check DSN_STATEMNT_TABLE
— Is COST_CATEGORY = 'A'? If 'B', RUNSTATS first. 3. **Read PLAN_TABLE** — Identify ACCESSTYPE, MATCHC…
Check error messages carefully
— they often identify the problem 2. **Print intermediate results** to trace execution 3. **Consult Ap…
Check fairness:
— Evaluate error rates separately for each relevant group - Equal accuracy does not guarantee equal er…
Check file status after EVERY I/O operation
— no exceptions. Define 88-level conditions for common status codes to make your code self-documenting…
Check for credential exposure
— Have any MedSecure employees' credentials appeared in known breaches? Services like HaveIBeenPwned c…
Check for indirect references
— the paragraph might be referenced through a computed GO TO or through a variable-based PERFORM (rare…
Check for PERFORM THRU ranges
— a paragraph that appears unreachable may be within a PERFORM THRU range and executed implicitly.
Check for recent amendments
— data protection law is evolving rapidly - **Seek qualified legal counsel** for compliance decisions …
CHECK operates at two levels:
— **CHECK Team Leader (CTL):** Can lead and oversee CHECK assessments. Requires passing CREST CCT (Inf…
Check overall fit:
— $R^2$ and adjusted $R^2$ - F-test (is at least one predictor useful?)
Check references
— speak with organizations that have completed (not just started) modernization projects with the vend…
Check SQLCODE after every SQL statement
— detect failures before they cascade. - **Commit at logical business boundaries** — not after every s…
Check the assumptions:
— Are observations independent? - Create histograms or QQ-plots for each group to check normality - Ru…
check the box that says "Add python.exe to PATH"
— this is critical and the single most common source of problems when students skip it.
Check the evidence
— what proof did the scanner provide? 3. **Attempt manual reproduction** — can you confirm the vulnera…
Check the key feedback area
— it tells you where IMS is positioned in the hierarchy, which is invaluable when GN calls return unex…
Check the return code
— RC 0 = success, RC 4 = warning, RC 8 = error, RC 12+ = severe error, RC 16 = catastrophic. 2. **Read…
Check YAC
— Is he creating yards after contact? 2. **Check RYOE** - Does he beat expectation? 3. **Check Success…
Check Your Understanding
— A quick question or prompt to test whether you have grasped the key idea. Try to answer *before* rea…
Check:
— Are signals being generated at the expected frequency? - Are the signals consistent with what the hi…
Checking analytics daily
— creates emotional volatility without actionable information; data is 24-72 hours delayed anyway 2. *…
Checking Assumptions:
— Plot residuals vs. fitted values (should show no pattern---a funnel shape suggests heteroscedasticit…
CHECKING_ACCOUNT (subtype)
— ACCOUNT_ID (PK, FK to ACCOUNT) - OVERDRAFT_LIMIT - CHECK_REORDER_THRESHOLD - DEBIT_CARD_NUMBER
CHECKING_DETAIL
— Subtype: checking-specific attributes.
Checklist before publishing a counter-message:
— [ ] Does it lead with truth, not with the false claim? - [ ] Does it repeat the false phrase as few …
Checklist:
— Are we still conversational? Using "you" and "I"? Contractions? ✓ - Are we still leading with storie…
Checkout
— Pull the latest code from the repository 2. **Setup** — Install language runtimes, dependencies, and…
Checkpoint
— Verify by direct matrix multiplication that $S_x|+\rangle_x = +(\hbar/2)|+\rangle_x$. If this does n…
Checkpoint strategy:
— Commit frequency: 10,000 (reading only, no lock concerns) - Restart: Rewrite the sequential output f…
Checkpoint/restart
— The program periodically saves its state to enable restart from the last checkpoint rather than from…
Checkpoint/Restart:
— CHKP commits database changes and saves application state for recovery. - XRST at program start chec…
checkpoints
— markers in the log that say "at this point, all committed changes up to this LSN/RBA have been writt…
chemotaxis
— movement in response to chemical gradients. The bacterium needs to find nutrients (sugars, amino aci…
Chen, Kash, and Ruberry (2014)
— Proposed "decision scoring rules" that directly reward traders for the causal effect, not the condit…
Chern number
— which is an integer by mathematical necessity. Just as you cannot have half a hole in a donut, you c…
Cherokee Phoenix
— First Native American newspaper, published at New Echota beginning in 1828 in both Cherokee and Engl…
Cherokee syllabary
— a complete writing system for the Cherokee language — around 1821. Within a few years, Cherokee lite…
Cherokee War of 1760–1761
— Armed conflict between the Cherokee Nation and British colonial forces, resulting in the destruction…
Cherokee, North Carolina
— after the people they had displaced. They told stories about the "vanishing Indian" while living on …
Cherry picking
— Selective presentation of evidence that supports a desired conclusion while ignoring the broader bod…
Chest Voice (Modal Register)
— Vocal folds: thick, short, with full mucosal contact - Glottal waveform: longer closed phase, abrupt…
Chesterton's fence
— The principle that one should not remove a fence (rule, institution, or practice) until one understa…
chestnut blight
— a fungal disease caused by *Cryphonectria parasitica*, accidentally introduced from Asia around 1904…
chi-square goodness-of-fit test
— a test of whether a single categorical variable follows a specified distribution.
chi-square test
— a formula-based method for analyzing categorical data. Where this chapter used simulation to test gr…
Chief
— chief.com A private network for women in leadership roles, including creator-founders. Membership pr…
Chief Data Officer (CDO)
— Senior organizational leader responsible for data governance, data quality, and data strategy - Incr…
chiefdoms
— hierarchical societies led by hereditary chiefs who commanded the labor and loyalty of thousands, so…
Chiefing
— The practice, common in mid-twentieth-century Cherokee tourism, of Cherokee men dressing in Plains I…
Child 243
— and this numbering system became the standard reference for ballad scholars worldwide.
Child ballads
— that became the standard reference for ballad scholarship. Decades later, when folklorists began col…
Childhood amnesia
— the limited availability of explicit episodic memories from early life — is one of the most consiste…
Children of migrants
— the generation born in the cities to parents from the mountains — occupied a liminal space: Appalach…
children with asthma
— they didn't choose where to live, they can't move on their own, and they're bearing the physical con…
Children's experiences
— growing up bilingual, mediating between cultures, attending segregated or integrated company schools…
Children's online safety
— Legislation targeting algorithms' effects on minors has advanced further than general platform regul…
chilling effect
— the tendency of surveillance to suppress lawful behavior, speech, and association --- is one of the …
Chinook Database
— A sample database representing a digital music store. Available at https://github.com/lerocha/chinoo…
CHKP (Checkpoint)
— Establishes a sync point; commits all database changes since the last checkpoint - **XRST (Extended …
Chladni figures
— visible patterns of resonance in vibrating plates — and explore how the principle of resonance opera…
choice architecture
— The design of the environment within which choices are made; the configuration of defaults, options,…
Choose a previous role
— a job, a volunteer position, a hobby, a sport, or any extended experience where you developed real s…
Choose CPMM when:
— The market will attract significant liquidity from participants - You want simplicity and familiarit…
Choose DB2 for LUW when:
— You are building new applications on distributed infrastructure - You need to run on commodity hardw…
Choose DB2 for z/OS when:
— You are operating in a mainframe environment with existing z/OS infrastructure - You need the absolu…
Choose LMSR when:
— You need predictable, bounded subsidy costs - You are operating many markets with a fixed budget - M…
Choose LS-LMSR when:
— You want adaptive liquidity without manual parameter tuning - Market activity is unpredictable (coul…
Choose one feature to analyze:
— The Tinder "superlike" (or Hinge "rose") - Bumble's "women message first" rule in heterosexual match…
Choose one of the following documented cases:
— Russian information operations related to the 2014 Crimea annexation - IRA operations during the 201…
Choose one of the following product types:
— A Notion template (using Notion free tier, duplicated to a public link) - A PDF guide or checklist (…
Choose palette
— 2-3 colors matching content emotion 2. **Control environment** — background, clothing, props in pale…
Choose the correct test based on study design
— the paired vs. independent distinction is the primary decision point, and students frequently get it…
Choose the route
— which states, which highways, what order 2. **Estimate travel time** — total driving hours, how to s…
Choose the threshold:
— Consider the relative costs of false positives vs. false negatives - The threshold is a *values* dec…
Choosing a data structure:
— Homogeneous numerical data -> NumPy array - Tabular data with mixed types -> pandas DataFrame - Spar…
Choosing environments with more traffic
— busier coffee shops, central rather than peripheral buildings, high-footprint public spaces — simply…
Choosing the right color map:
— `"Blues"` — sequential, good for all-positive values - `"RdYlGn"` — diverging, good for values above…
Choosing the timing window
— neither too soon after the triggering event nor too long, and using the request-to-meet practice to …
Chordophones
— vibrating element: a stretched **string**. Examples: violin, guitar, piano, sitar. 2. **Aerophones**…
Choreography
— each step triggers the next by publishing an event. No central coordinator. Each service reacts to e…
Chris Patterson (Valley College)
— Traditional Stats: 71.3% completion, 2,985 yards, 24 TD, 6 INT - Passer Rating: 156.4
Chroma
— The perceptual quality that makes pitches separated by an octave sound "the same" despite differing …
Chromatic modulation
— sharper and more abrupt. The music uses chromatic alteration to introduce pitches foreign to the cur…
Chromatic scale
— A musical scale dividing the octave into twelve equal (or approximately equal) semitones. In equal t…
Chronic Conflict Mapping Worksheet
— for making the invisible loop visible - **Payoff Audit** — for honest examination of what the confli…
Chronically Online Community
— A community for chronically ill and disabled creators sharing strategies for content creation within…
Chronolocation
— The process of determining when a photograph or video was taken using shadow analysis, vegetation cu…
Chronological arc
— students should be able to trace the full story from geological formation through the present 2. **C…
Chronotype
— individual variation in the preferred timing of sleep and peak alertness; substantially genetic; ran…
CHSH inequality
— Ch 24.5 The Clauser-Horne-Shimony-Holt generalization of Bell's inequality: $|S| \leq 2$, where $S =…
CHSH test
— they compute $S$ and verify that $|S| > 2$. 6. The combinations where they used the same effective b…
chunks
— meaningful clusters. The classic demonstration comes from chess: show a grandmaster and a beginner a…
chunksize
— A `pd.read_csv` parameter that makes pandas read the file in fixed-size chunks instead of loading it…
church conference
— a regular business meeting of the congregation — was the primary venue for organizing this mutual ai…
church discipline
— informal tribunals that adjudicated disputes, enforced community moral standards, and imposed conseq…
Churn Prediction — Problem Framing.
— ## The Problem Framing Document
Churn Rate
— The percentage of subscribers or customers who cancel or disengage within a given period. High churn…
Churn risk scoring
— using the classification techniques from Chapter 7, she builds a model that predicts each member's p…
ChyronHego (TRACAB):
— One of the earliest optical tracking providers, with systems installed in many major European stadiu…
CI
— Control Interval. In *VSAM*, the smallest unit of data transfer between a storage device and memory.…
CI free space
— Percentage of each CI left empty during initial load. This space accommodates future inserts without…
CI split
— moving roughly half the records in the CI to a free CI within the same CA. If the CA has no free CIs…
CI System Risks:
— CI runners with excessive permissions (Docker socket access, cloud credentials) - Shared CI runners …
CI/CD
— Continuous Integration and Continuous Deployment. Automated systems that test code on every push (CI…
CICS
— Customer Information Control System. IBM's online transaction processing system that manages termina…
CICS (Online):
— DISPLAY and ACCEPT should **not** be used for user communication - Screen I/O uses **BMS maps** with…
CICS affects WLM
— CICS reports transaction response times to WLM via the enclave model. WLM uses these response times …
CICS and DB2: The Best of Both Worlds (SG24-7421)
— Integration patterns between CICS and DB2, including thread management, connection pooling, THREADSA…
CICS and Parallel Sysplex (SG24-6449)
— IBM Redbook covering Sysplex-aware CICS features: shared temporary storage, named counter servers, c…
CICS and the Liberty JVM Server (SG24-8418)
— Covers integrating Liberty JVM server into CICS regions for REST/JSON API access. Directly relevant …
CICS and the Parallel Sysplex (SG24-6449)
— Chapter 7 covers Sysplex-aware recovery features: coupling facility log streams, shared temporary st…
CICS API commands
— EXEC CICS WRITE FILE, EXEC CICS LINK, EXEC CICS START, etc. - **Program entry/exit** — when a specif…
CICS Command
— An EXEC CICS statement embedded in a COBOL program. CICS commands are preprocessed by the CICS trans…
CICS DB2 Guide (SC34-7373)
— The CICS-DB2 connection architecture, including CMDT, THREADLIMIT, THREADWAIT, and the task-related …
CICS Developer Center
— Code samples, tutorials, and community Q&A for CICS application development.
CICS Explorer
— IBM's Eclipse-based graphical interface for CICS management and development. Useful for visualizing …
CICS Intercommunication Guide (SC34-7390)
— The definitive guide to MRO, ISC, IPIC, function shipping, DPL, and transaction routing. Chapters 1–…
CICS JSON Guide
— Part of the CICS TS 5.6 documentation. Covers the JSON assistant (DFHJS2LS, DFHLS2JS), JSON transfor…
CICS Operations and Utilities Guide — DFHRMUTL
— Documentation for the recovery manager utility that lists and resolves indoubt units of work. Includ…
CICS Performance Guide (SG24-6530)
— Performance tuning for CICS regions, including MRO session sizing, MAXTASK optimization, DSA tuning,…
CICS Recovery and Restart (SG24-6843)
— An older but still relevant Redbook focused entirely on CICS recovery. Covers failure scenarios, rec…
CICS Recovery and Restart Guide (SC34-7388)
— How CICS uses system logs, journals, and the recovery manager to ensure transaction integrity. Under…
CICS region
— An instance of the CICS transaction server running as a z/OS address space. Production environments …
CICS Resource Definition Guide — DB2CONN
— Comprehensive reference for the DB2CONN resource definition, including RESYNCMEMBER, STANDBYMODE, an…
CICS screen paging
— allowing users to page forward and backward through result sets 2. **Multi-pass processing** — when …
CICS statistics
— The PIPELINE and WEBSERVICE resources have associated statistics: request count, average response ti…
CICS System Definition Guide (SC34-7374)
— Comprehensive reference for SIT parameters (DFHSIT), CSD resource definitions (CEDA), and system ini…
CICS System Definition Guide — Recovery Parameters
— Detailed reference for all SIT parameters related to recovery: START, KEYINTV, LOGDEFER, RMRETRY, UO…
CICS transaction boundaries
— route the transaction elsewhere 2. **COMMAREA / channel boundaries** — the service contract 3. **Cop…
CICS Transaction Boundary:
— Transaction ID: ________________ - Program name: ________________ - Region: AOR / TOR / FOR (circle …
CICS Transaction Server: Modernization Patterns
— Architecture patterns for incrementally modernizing CICS applications, from screen scraping to API-f…
CICS TS 5.6 CICS Monitoring (SC34-7380)
— Detailed description of CICS Monitoring Facility (CMF) data, including SMF 110 record formats, monit…
CICS TS 5.6 Internet Guide (SC34-7379)
— Covers CICS HTTP support, TCPIPSERVICE configuration, URIMAP definitions, and the EXEC CICS WEB API.…
CICS TS 5.6 Java Applications in Liberty
— Covers deploying Java applications in the CICS Liberty JVM server, including JAX-RS REST endpoints, …
CICS TS 5.6 Knowledge Center
— The authoritative reference for all CICS configuration, commands, and architecture. Start with the "…
CICS TS 5.6 Performance Guide (SC34-7385)
— The definitive IBM guide to CICS performance tuning. Chapters on dispatcher tuning, storage manageme…
CICS TS 5.6 Resource Definition Guide (SC34-7375)
— Reference for TRANCLASS, TRANSACTION, and PROGRAM resource definitions used throughout this chapter.…
CICS TS 5.6 SOAP Guide
— Covers SOAP pipeline configuration, WSDL processing, DFHWS2LS/DFHLS2WS utilities, and WS-Security in…
CICS TS 5.6 System Definition Guide (SC34-7374)
— Reference for all SIT parameters discussed in this chapter: MXT, DSALIM, EDSALIM, GCDSALIM, and rela…
CICS TS 5.6 Web Services Guide (SC34-7392)
— The authoritative reference for CICS web services. Covers provider and requester mode, pipeline conf…
CICS TS for z/OS BMS Macro Reference
— Detailed reference for all DFHMSD, DFHMDI, and DFHMDF options. Covers advanced features like cursor …
CICS TS for z/OS Channel and Container Programming
— Detailed guide to the channel/container data model with migration examples from COMMAREA-based desig…
CICS TS Liberty Profile Starter
— A simplified CICS environment for development and learning, available as a Docker container.
CICS user mapping
— The CICS web service infrastructure maps the authenticated identity (from the API gateway header or …
CICS web services
— A CICS capability that allows COBOL programs to provide or consume web services using SOAP or REST p…
CICS Web Services Guide
— https://www.ibm.com/docs/en/cics-ts — CICS WEB commands for HTTP client and server operations.
CICS-DB2 attachment:
— Thread model: Pool / Entry / Mixed: _______________ - Pool thread count per AOR: _______________ - E…
CICS-DB2 Guide (SC34-7370)
— Covers the CICS-DB2 attachment facility, including thread management, two-phase commit coordination,…
CICS-MQ Adapter Guide
— Covers integration between CICS and IBM MQ, including transactional coordination (MQ as a 2PC partic…
CICSPlex SM configuration:
— CMAS (CICSPlex SM Address Space) on LPAR(s): _______________ - Workload routing algorithm: _________…
CICSPlex SM for CICS TS 5.1 (SG24-8237)
— Practical guide to deploying and configuring CICSPlex SM. Includes step-by-step instructions for CMA…
CICSPlex SM Managing Workloads (SC34-7382)
— Covers CPSM workload management in detail: workload definitions, routing algorithms, affinity manage…
CIFAR-10 / CIFAR-100
— Description: 60,000 32x32 color images in 10 (or 100) classes. A standard dataset for prototyping an…
CIPM (Certified Information Privacy Manager)
— IAPP certification focused on privacy program management. Relevant for privacy-compliance intersecti…
Circadian rhythm
— The approximately 24-hour biological clock governing sleep-wake cycles, hormone release, and other p…
circuit breaker
— a mechanism that detects cascading failure and deliberately disconnects parts of the system to preve…
Circuit directory
— is there a circuit directory on the inside of the door? Is it filled out legibly, and does it appear…
circuit rider
— an itinerant Methodist preacher who traveled a regular route through scattered frontier communities,…
circuits
— through the backcountry, visiting scattered settlements on a regular rotation. A circuit might cover…
CISA (Certified Information Systems Auditor)
— ISACA certification with data governance components. Relevant for compliance technology audit roles.
Citation Verification
— CrossRef (crossref.org) — DOI registration authority - WorldCat (worldcat.org) — books and library h…
Cities
— Singapore's "Virtual Singapore" project creates a real-time 3D model of the entire city-state, simul…
citizen activists
— people who had been ordinary community members before February 26, 1972, and who became organizers, …
Citizens United v. FEC (2010)
— Supreme Court decision holding that the First Amendment prohibits the government from restricting in…
Citizenship education
— instruction in American government, the Constitution, and the rights and responsibilities of free ci…
CityScope Predict
— that uses an AI risk assessment tool to inform decisions about which individuals released on bail ar…
Civic Data Trust
— a new entity that would govern data collected in the Quayside neighborhood. The Trust would:
Civic obligation
— In the context of this chapter, the obligation of democratic citizens to maintain, support, and part…
Civic online reasoning
— The specific competencies required to evaluate digital information, including lateral reading and so…
Civil society organizations
— including Access Now, the European Digital Rights initiative (EDRi), Algorithm Watch, and the AI Now…
CLAIM
— A formal request for payment filed against a specific policy. | Attribute | Type | Notes | |--------…
CLAIM_COVERAGE
— The intersection between a claim and a policy coverage. This was the most consequential design decis…
CLAIM_DOCUMENT
— Metadata for photos, reports, estimates. | Attribute | Type | Notes | |-----------|------|-------| |…
CLAIM_PARTY
— Junction table: parties play roles on claims. | Attribute | Type | Notes | |-----------|------|-----…
CLAIM_PAYMENT
— Every payment issued or recovery received. | Attribute | Type | Notes | |-----------|------|-------|…
CLAIM_RESERVE_HISTORY
— Temporal record of every reserve change. | Attribute | Type | Notes | |-----------|------|-------| |…
CLAIM_STATUS_HISTORY
— Every status transition with accountability. | Attribute | Type | Notes | |-----------|------|------…
ClaimReview
— A structured data schema allowing fact-checkers to mark up their findings so they appear in search e…
CLAIMS
— 800 million rows, partitioned by submission month (24 partitions, 2 years of history) - **MEMBER** —…
Claims vs. Findings
— [ ] Does the headline/abstract overstate the findings? - [ ] Is the researcher claiming causation fr…
clan system
— and to understand it is to understand a form of governance that was, in many respects, more equitabl…
Clarification repairs:
— "I'm not sure I understood what you just said. Can you say it a different way?" - "Let me make sure …
Clarity
— It's understandable to other humans (and to you in six months). A clever trick that saves one millis…
Clarity about your own values
— not abstract principles but specific convictions about what you will and will not tolerate witnessin…
Class 1 — Elapsed Time:
— Total elapsed time for the thread - Time in DB2 (vs. time in the application) - Wait times broken do…
Class 2 — CPU Time:
— TCB CPU time in DB2 - SRB CPU time in DB2 - CPU time for SQL statement processing - CPU time for sor…
Class 3 — Wait Time Detail:
— I/O wait (synchronous reads, writes) - Lock/latch wait - Global lock wait (data sharing) - Drain wai…
Class castout threshold
— when the percentage of dirty pages in the GBP for a given class reaches a threshold (default 10%) - …
Class imbalance handling
— using `class_weight="balanced"` and `stratify=y` in the split
class leaders
— lay members appointed to lead small groups in prayer, Bible study, and mutual accountability — who m…
Class Optimization
— Position needs analysis - Class composition optimization - Transfer portal integration - Budget/scho…
Class performance
— The active management of how one's class background and identity are communicated and perceived in s…
class warfare
— a term that historians sometimes shy away from but that the participants themselves used openly and …
CLASS-ID
— A COBOL 2002 paragraph in the IDENTIFICATION DIVISION that defines an object-oriented class, specify…
classes.dex
— Dalvik Executable files containing the compiled application code. Modern apps may have multiple DEX …
classification
— assigning an item to a category so the system can act on it.
Classification logic:
— **Class A:** Top SKUs accounting for the first 80% of annual consumption value (typically 10-20% of …
classification tree
— it predicts a category (approve, review, or deny). Decision trees can also do **regression** — predi…
Classification:
— Hairline cracks (under 1/16 inch): typically cosmetic, seal with elastomeric caulk and paint - Mediu…
Classification: "Which one?"
— Will this customer cancel their subscription? (yes/no) - Will this loan default? (yes/no) - Which pr…
Classified advertising
— want ads for jobs, apartments, cars, and merchandise. At their peak in the 1990s, classified ads gen…
Classify
— Is this misinformation (innocent sharing), disinformation (deliberate deception), or malinformation …
Classify variables as categorical or numerical
— this determines which statistical methods are appropriate for the rest of the course. 2. **Distingui…
Claude
— claude.ai Anthropic's AI assistant. Well-suited for multi-step writing workflows, long-context docum…
Claude Code
— Documentation: https://docs.anthropic.com/en/docs/claude-code - Claude Code GitHub: https://github.c…
Claude Code Textbook Series
— *For the compliance professionals, technologists, and policy thinkers building the systems that will…
Claude, GPT-4, and Gemini
— the frontier multimodal models — can generate code in response to natural language prompts, explain …
Claude:
— More conservative about factual claims — may refuse or hedge more than necessary - Strong at nuanced…
Clean Code
— Robert C. Martin (Prentice Hall) A widely read reference on writing code that humans can understand.…
Clean records
— passed all 87 rules, ready for transformation 2. **Error records** — failed one or more rules, writt…
clean, single-source data
— **Well-defined target variables** with **established feature patterns** - **Speed is the primary con…
Cleaning the Glass
— https://cleaningtheglass.com/ - Advanced basketball analysis
Cleaning the Glass (Ben Falk)
— https://cleaningtheglass.com/ - Professional-quality analysis including player evaluation. Subscribe…
Cleaning the Glass Podcast
— Ben Falk's analytical draft discussions - Methodology insights
Cleanup on completion:
— DELETE from BATCH_RESTART on successful completion - Leave the row for failed runs (enables restart)
Clear navigation guide
— a pinned post in a dedicated channel that tells new members how the server is organized and what to …
Clear purpose awareness
— having a clear understanding of what one is looking for from the app and treating it as one tool amo…
Clear rules
— Understood in under 10 seconds. One-sentence explanation: "Film yourself doing X." If viewers think …
Clear the surface
— all trees and vegetation are removed from the mountaintop, typically by clearcutting. (2) **Remove o…
clearcutting
— the removal of every tree on a hillside, from the largest canopy trees to the smallest saplings, lea…
Clearly Excluded Events:
— Terrorist attacks or assassinations - Events whose contract creates incentives for illegal activity
Clearly Permissible Events:
— Economic indicators (GDP, unemployment, inflation) - Weather events (temperature, rainfall, hurrican…
Clebsch-Gordan coefficients
— Ch 14.2 The coefficients $\langle j_1, m_1; j_2, m_2 | j, m\rangle$ that relate the uncoupled basis …
CLI (Command-Line Interface)
— A text-based interface for interacting with software through typed commands. Python CLI tools are ty…
CLI applications have five architectural layers
— entry point/routing, argument parsing, configuration, business logic, and I/O/feedback. Keeping thes…
Click
— A Python package for creating command-line interfaces with decorators. An alternative to `argparse` …
Click Farm
— An operation that uses human labor or bots to generate fraudulent clicks, views, or engagement at sc…
Click-Through Rate (CTR)
— The percentage of users who see an ad or content item and click on it. An early dominant metric of d…
clickbait farms
— content operations that produce large quantities of low-quality, often misleading, but not necessari…
Clickbait is broken promises, not strong titles
— aggressive, emotionally compelling titles are fine if the content delivers - **SEO-aware structure:*…
Clickjacking:
— Test whether the merchant dashboard and payment pages are frameable. Missing X-Frame-Options or inad…
Client context
— who the client is, what the engagement is trying to accomplish, and the key stakeholders' names and …
Client tool proficiency
— you can interact with DB2 through the command line (CLP), a graphical tool (DBeaver), and know how J…
Client-Side Data Exposure:
— Examine JavaScript bundles and source maps for hardcoded API keys, internal endpoints, or developer …
Clients
— companies and individuals she works with 2. **Projects** — engagements for a client; a client can ha…
climate justice activism from within Appalachia
— by people who live in the region, who understand its history, and who refuse to accept that the comm…
Clinical decision support
— AI-assisted diagnosis for radiology (chest X-rays, mammograms) 2. **Readmission prediction** — Ident…
Clinical finishing made the difference
— Mbappé: 4 goals from 2.4 xG (+1.6 above expected) - Griezmann: 4 goals from 2.1 xG (+1.9 above expec…
Clinical validation
— demonstrating safety and efficacy through rigorous clinical studies - **Post-market surveillance** —…
Clip licensing
— media companies regularly license short clips for news coverage, compilation shows, and documentary …
Clipper Chip
— a government-designed encryption chip with a built-in backdoor for law enforcement. The proposal was…
clipping / clip
— Recording and sharing a memorable gaming moment; clips are a major form of gaming fan content on Twi…
CLM-INTAKE
— Reads electronic claim submissions, validates them, and writes them to the CLAIM-MASTER file. 2. **C…
CLMHDR
— Claim header: claim number, policy number, date of loss, status, adjuster code 2. **CLMPTY** — Parti…
CLOB API
— For order book data, trade execution 2. **Gamma API** — For market metadata, historical data
CLOSE statement
— A COBOL statement that terminates access to a file and releases associated system resources. Every f…
Close-up inserts
— cutting between the wide shot and extreme close-ups of brush strokes 2. **Before-and-after flash fra…
Closed (proprietary) models
— including OpenAI's GPT-4 and successors, Anthropic's Claude, and Google's Gemini --- are accessible …
Closed question
— A question that invites a specific, bounded response; appropriate for clarifying facts and confirmin…
Closing line value (CLV)
— the ability to consistently beat the closing line --- is the strongest known predictor of long-term …
Closing Line Value (CLV):
— CLV is the most reliable predictor of long-term betting profitability - It measures the quality of y…
Closing lines (Saturday):
— Spread: Home -4.5 - Moneyline: Home -195, Away +165 - Total: 45.5
Closing — Rebuild forward:
— Name what has changed - Articulate a tentative intention for the relationship going forward - Give y…
Closing:
— What do you hope the relationship looks like after this conversation? - What will you say to close?
Cloud AI Services and APIs
— AWS AI/ML services · Azure AI · Google Cloud AI · Pricing models and cost optimization · Vendor lock…
Cloud compromise playbook (AWS):
— Detection criteria (GuardDuty alerts, CloudTrail anomalies) - Initial response (identify affected re…
Cloud Environment (AWS)
— **Primary Region:** us-west-2 (Oregon). - **Services in Use:** EC2 (web servers), RDS (PostgreSQL da…
Cloud Exploitation:
— Exploit AWS misconfigurations: - Overly permissive S3 bucket policies allowing public read or list a…
Cloud Infrastructure (AWS):
— Application servers: ECS Fargate containers in us-east-1. - Database: RDS PostgreSQL with read repli…
Cloud Infrastructure:
— AWS (primary cloud provider) - EC2 instances running patient portal backend - RDS (PostgreSQL) for p…
Cloud makes deployment easy
— but security is not automatic. - **Default configurations prioritize convenience** over security. - …
Cloud Solutions:
— Cloud data warehouses (BigQuery, Snowflake, Redshift) are increasingly used by clubs and data provid…
Cloud Storage
— Uploading, downloading, and managing files with pre-signed URLs.
Cloud-specific evidence sources:
— AWS CloudTrail (API call logging) - AWS VPC Flow Logs (network metadata) - Azure Activity Log and Az…
Cloud-specific vectors extend the attack surface
— Managed Kubernetes services interact with cloud IAM, metadata services, and provider APIs, creating …
Cloud/API Attacks:
— Insecure API authentication - Device impersonation - Unauthorized access to device data - Command in…
CloudGoat
— Rhino Security Labs' "Vulnerable by Design" AWS environment - **Flaws.cloud** — AWS-focused security…
Cluster 1: Primary Ball Handlers (n=45)
— Profile: High usage, high assists, moderate scoring - Exemplars: Luka Doncic, Trae Young, Ja Morant …
Cluster 2: Scoring Wings (n=52)
— Profile: High scoring, moderate efficiency, low assists - Exemplars: Devin Booker, Jaylen Brown, Zac…
Cluster 3 (Complete CB)
— the rarest archetype, characterized by above-average performance across virtually all dimensions. On…
Cluster 3: Three-and-D Wings (n=68)
— Profile: High 3PT%, low usage, positive defense - Exemplars: Mikal Bridges, OG Anunoby, Herb Jones -…
Cluster 4: Stretch Bigs (n=42)
— Profile: High rebounding, moderate 3PT attempts, interior defense - Exemplars: Brook Lopez, Myles Tu…
Cluster 5: Traditional Bigs (n=38)
— Profile: Highest rebounding, rim protection, low perimeter involvement - Exemplars: Rudy Gobert, Cli…
Cluster 6: Playmaking Bigs (n=35)
— Profile: High assists for position, versatile scoring - Exemplars: Nikola Jokic, Domantas Sabonis, B…
Cluster Evaluation
— Silhouette analysis - Gap statistic
Cluster labeled "Engagers" (n=1,400, 29.2%):
— Average posts viewed: 31 per month - Average comments made: 4.1 per month - Average reactions given:…
Cluster labeled "Lurkers" (n=3,100, 64.6%):
— Average posts viewed: 12 per month - Average comments made: 0.3 per month - Average reactions given:…
Cluster labeled "Superfans" (n=300, 6.2%):
— Average posts viewed: 67 per month - Average comments made: 14 per month - Average reactions given: …
Cluster randomization
— Randomization at the group level (households, precincts, blocks) rather than the individual level, u…
Cluster sampling
— the sections are the clusters, and everyone within selected clusters is surveyed. > 2. **Convenience…
clustering
— grouping similar items together. A retailer might use clustering to discover natural segments among …
Clustering coefficient
— A network measure indicating how interconnected a node's neighbors are with each other. High cluster…
Clustering order deteriorates
— new rows that should be physically near related rows end up on distant pages
Clustering:
— Silhouette Score - Within-cluster variance - Domain expert validation
CLV estimate:
— Average purchase value × estimated purchase frequency per year × estimated years a customer stays = …
CLV is independent of outcome variance
— unlike tracking wins and losses, CLV can be measured on every bet regardless of result
CMG (Computer Measurement Group) Publications
— https://www.cmg.org CMG focuses on performance and capacity management. Their conference proceedings…
CMU Sports Analytics
— Statistical methods - Performance prediction
CMU Statistics in Sports
— Carnegie Mellon research - Published papers - Student projects
CMU Stats Sports
— Academic research 5. **MIT Sloan Sports Analytics** - Conference papers 6. **Stanford Sports Analyti…
CNB (Kwame/Lisa/Rob):
— Regulatory reporting → Cloud (batch, periodic, read-heavy, marginal savings real) ✅ - Dev/test envir…
CNB PRACTICE
— Kwame's team reviews TRANCLASS utilization quarterly. If a class consistently operates below 50% of …
CNN/DailyMail
— Description: 300,000+ article-summary pairs from CNN and DailyMail news articles. The standard bench…
co-location is a feature, not a limitation.
— ## Discussion Questions
Co-optation
— The process by which a community's creative labor and cultural production are absorbed into official…
Co-regulation
— The process by which one person's regulated nervous system helps stabilize another's; in practice, t…
CO2 target levels:
— Below 800 ppm: Good ventilation - 800–1,000 ppm: Marginal; consider increasing ventilation - Above 1…
Coach Positioning Analysis Courses
— Platform: Various coaching education - Focus: Defensive positioning principles - Level: Intermediate
Coaches (In-Game)
— Maximum 3-5 metrics per view - Large text (readable at 10 feet) - Color-coded alerts - One-tap drill…
Coaching is not:
— Telling them what to do or say - Taking their side so completely that you lose the ability to help t…
Coaching is:
— Asking questions that help the other person clarify what they actually think and want - Offering fra…
Coaching Questions to Explore (for solo students)
— What is this conflict really about for Nadia? Beneath the immediate frustration with Francesca's ava…
Coaching Staff
— Primary need: Actionable insights for game preparation and in-game decisions - Time constraints: Dec…
coal industry's political power
— its ability to control state legislatures, county governments, and judicial systems across the coalf…
coal sludge
— is a dense, black liquid containing coal fines (tiny particles of coal), silt, clay, and a cocktail …
coal slurry impoundment
— sometimes called a **sludge pond** or **slurry pond** — is a dam built to hold the liquid waste prod…
coal tipple
— the structure where coal was loaded from mine cars into railroad cars — rose at the railroad siding.…
coal workers' pneumoconiosis
— black lung disease (see Chapter 21). Company doctors systematically underdiagnosed black lung for de…
Coal workers' pneumoconiosis (CWP)
— black lung — is a occupational lung disease caused by the inhalation of coal dust over extended peri…
Coalburg
— and these names became as familiar to the people of the coalfields as the names of neighbors. Each s…
coalfield
— an industrial landscape dominated entirely by coal production and organized entirely around the coal…
coalfield geography
— the physical shape of the land — determined which communities were transformed and which were bypass…
COBCH
— The COBOL compiler diagnostic message prefix for some Micro Focus COBOL messages. IBM Enterprise COB…
COBIT 2019: DSS01 (Manage Operations)
— COBIT's control objectives for IT operations management, including automated monitoring, event respo…
COBOL
— Common Business-Oriented Language. A programming language created in 1959 by the *CODASYL* committee…
COBOL 2002 Standard Enhancements
— The 2002 standard added the RECURSIVE attribute and LOCAL-STORAGE SECTION, both relevant to nested p…
COBOL as Part of Broader Courses:
— Multiple community colleges offering COBOL in workforce development programs - University of Cape To…
COBOL by the Numbers (2026)
— **220+ billion** lines of COBOL in active production - **$3 trillion** in daily transaction volume t…
COBOL Language Standard
— ISO/IEC 1989:2014. Available from ISO or national standards bodies.
COBOL Programming Course
— https://github.com/openmainframeproject/cobol-programming-course — Free, open-source COBOL curriculu…
COBOL Report Writer Tutorial
— Various community tutorials comparing Report Writer approaches across different COBOL compilers.
COBOL Standards Committee Documents
— ISO/IEC 1989 standard sections on STRING, UNSTRING, and INSPECT for definitive language specificatio…
COBOL-60
— was published in April 1960. By December of that year, COBOL programs were running on computers from…
COBOL-85
— The 1985 ANSI/ISO COBOL standard (ANSI X3.23-1985) that introduced structured programming constructs…
cobol-copybook (npm package)
— Open-source Node.js library for parsing COBOL copybooks into JSON structures.
Cobra effect
— An unintended consequence where a solution to a problem actually makes the problem worse, often thro…
cobrix (Spark)
— Apache Spark data source that reads mainframe files using COBOL copybook definitions, enabling big d…
Cochlea
— The snail-shaped, fluid-filled sensory organ of the inner ear that transduces mechanical vibrations …
cocktail party effect
— the brain's ability to segregate and follow individual sound streams within a complex acoustic mixtu…
COCO (Common Objects in Context)
— URL: https://cocodataset.org - Description: 330,000+ images with 80 object categories. Includes anno…
CODASYL
— Conference on Data Systems Languages. The committee of government and industry representatives that …
CODASYL COBOL Committee Documents
— Historical documents from the committee that designed COBOL. Available in various archives. Fascinat…
CODASYL COBOL Committee Reports
— The original committee documents from the 1960s are available in various archives and provide fascin…
Code Analysis:
— LLMs can identify vulnerability patterns in source code - Models trained on CVE databases can flag s…
Code and permit requirements
— Some work legally requires a licensed contractor. In others, a homeowner can pull their own permit a…
Code audit findings:
— Naming conventions varied significantly between teams and sometimes within teams. - Error handling p…
Code cells
— where you write Python code (they have a play button on the left) 2. **Text cells** — where you writ…
Code Completion
— An AI feature that predicts and suggests the next characters, lines, or blocks of code as you type. …
code concatenation
— encoding each physical qubit of a quantum code inside another copy of the same code, recursively.
Code Editor or IDE
— Recommended: VS Code with Python extension - Alternative: PyCharm, Sublime Text
Code Files:
— `code/blackbody_comparison.py` — Plot Rayleigh-Jeans, Wien, and Planck distributions - `code/photoel…
Code health metrics:
— Cyclomatic complexity (average and maximum per module) - Cognitive complexity distribution - Maintai…
code implementation block
— a program you should type out and run yourself.
Code introduced:
— `hello_business.py` — the traditional Hello World, but printing a business greeting - REPL demonstra…
Code Minimums vs. Best Practice:
— Minimum: 15-lb felt + ice-and-water shield at eaves - Better: Synthetic underlayment + ice-and-water…
Code Page
— A mapping between byte values and characters. Mainframe COBOL typically uses EBCDIC code pages (e.g.…
Code Quality:
— Full type hints on all functions and parameters - Docstrings in Google style - Proper exception hand…
Code requirements for outdoor outlets:
— All outdoor outlets must be GFCI protected, either at the outlet itself or at the first location in …
Code requirements specific to garages:
— All 120V outlets in garages must be GFCI protected - Garages must have at least one 20-amp receptacl…
Code Review
— [ ] All code reviewed by at least one other person (or by your future self after a 48-hour break) - …
Code Review Best Practices
— Palantir Engineering (https://github.com/palantir/gradle-baseline/blob/develop/docs/best-practices/c…
Code review catches 60-90% of defects
— more than testing alone. The combination of review and testing is the most effective defect-detectio…
Code Reviewer
— The Critic adapted for code review: "Review this code as a security-focused senior engineer at a fin…
Code Smell
— A surface-level indicator in code that suggests a deeper problem. Examples include long functions, e…
Code writing tasks:
— Boilerplate generation (REST endpoint scaffolding, data model definitions, test setup) - Algorithm i…
Code-switching
— the practice of shifting between two or more languages or dialects depending on the social context —…
Code:
— [ ] Random seeds are set for all stochastic operations - [ ] The analysis runs top-to-bottom without…
Codebase Context Priming
— Show examples of your existing code patterns. Most useful when you need generated code to be consist…
Codecademy: "Analyze Data with Python"
— Beginner-friendly - pandas and NumPy basics - Interactive exercises
CodeForge
— a multi-agent development tool that orchestrates multiple specialized AI agents to collaboratively d…
Coding standards
— Define COBOL coding standards with at least 15 specific rules covering naming conventions, paragraph…
Coefficient of Variation (CV)
— The ratio of the standard deviation to the mean, used to measure relative variability. In analytics,…
Coercive control
— A pattern of behavior identified by sociologist Evan Stark in which a partner (typically but not exc…
Coercive Persuasion
— A set of social and psychological techniques that produce changes in belief and behavior by exploiti…
Coevolution
— The process by which two or more interacting entities (species, technologies, institutions) shape ea…
Cognitive behavioral therapy (CBT)
— A psychotherapy approach focusing on the relationship between thoughts, emotions, and behaviors; tar…
Cognitive Behavioral Therapy for Insomnia (CBT-I)
— the evidence-based first-line treatment for chronic insomnia; addresses the thoughts, behaviors, and…
Cognitive bias
— A systematic pattern of deviation from rational judgment in the processing of information; produced …
cognitive conflict
— the brain wants to process voice but is distracted by competing audio. Proper mixing ensures each la…
Cognitive crafting
— job crafting through reframing the purpose or significance of one's work.
Cognitive deconstruction
— A detached, time-distorted psychological state induced by severe social exclusion; resembles emotion…
cognitive defusion
— techniques for changing the way we relate to our thoughts and beliefs, rather than trying to change …
Cognitive dissonance
— The psychological discomfort produced by holding contradictory beliefs or by acting in ways inconsis…
Cognitive distortion
— An automatic, systematic pattern of thought that skews perception of a situation, typically in the d…
Cognitive ease
— The sense of processing fluency generated by familiar, simple, or rhythmically satisfying informatio…
Cognitive empathy (perspective-taking)
— I can usually identify what someone else is thinking or feeling, even when they don't say it explici…
cognitive fluency
— the subjective experience of ease with which information is processed. When a claim is encountered f…
Cognitive Listening
— [ ] Allowed the other person to complete their thought before responding - [ ] Resisted the urge to …
Cognitive Load
— The total amount of mental effort required to process information. High cognitive load (too many ele…
Cognitive load analysis:
— Intrinsic load: moderate-high (complex historical information) - Extraneous load: moderate (rapid sp…
Cognitive overload
— Too much information too fast (see Section 2.4) - **Audio-visual mismatch** — Sound and image that d…
cognitive process
— a specific set of mental operations that runs on the same brain machinery you've been learning about…
Cognitive psychology (core areas)
— attention, memory, language processing — generally replicates well, though specific findings (partic…
Cognitive reappraisal
— An emotion regulation strategy that involves reinterpreting the meaning of an emotion-eliciting even…
cognitive reserve
— the idea that a lifetime of intellectual engagement builds a kind of neural resilience. Think of cog…
Cognitive restructuring
— A set of techniques for examining, testing, and replacing distorted automatic thoughts with more acc…
Cognitive Science
— Interdisciplinary journal covering learning, memory, reasoning, and problem-solving from multiple pe…
Cognitive:
— Thinking in absolutes ("always," "never," "everyone") - Can't remember what the other person just sa…
Cohen's d
— the standardized effect size. It divides the difference in means by the pooled standard deviation.
Cohere Rerank API
— Managed service, excellent quality, no infrastructure. - **Jina Reranker** — Open-weight reranker wi…
Coherence
— A measure of the correlation between two signals as a function of frequency, ranging from 0 (complet…
coherences
— make all the difference.
Coherent state
— Ch 4.6, Ch 27.3 An eigenstate of the annihilation operator: $\hat{a}|\alpha\rangle = \alpha|\alpha\r…
Cohort Analysis
— A method of analyzing groups of users who share a common characteristic at a specific point in time …
cohort effects
— the idea that outcomes are systematically shaped by the historical moment a person enters a field or…
Coincidences are connections waiting to be found.
— ### Applying Birthday Problem Thinking to Social Media
Coincident boundaries
— objects that have the same boundaries but different internal contents for different communities. A m…
COINTELPRO
— Counter Intelligence Program, an FBI program operating from 1956 to 1971 that conducted propaganda a…
cold open
— starting at the climactic moment, then rewinding to show the journey.
Cold start
— The latency experienced when a serverless function (Lambda) or sleeping container (Render free tier)…
Cold Turkey
— App and website blockers; supports temporal containment from Chapter 39.
Cold Weather Outdoor:
— Packers, Bears, Bills, Patriots - Steelers, Browns, Bengals, Eagles - Giants/Jets, Ravens, Commander…
cold working
— forces atoms out of their equilibrium positions. It creates **dislocations**: lines of misalignment …
COLGROUP
— Collects multi-column cardinality statistics. If the optimizer sees a predicate on ACCT_TYPE AND POS…
COLGROUP rationale:
— **(TRAN_DATE, STATUS):** Queries C and E use both. STATUS distribution may vary by date (more 'P' du…
Collab Capital
— collabcapital.com An Atlanta-based fund specifically focused on investing in Black-founded businesse…
collaborating and competing are the most underused
— particularly in management and professional populations.
Collaboration
— Work effectively with coaches (often non-technical) - Partner with engineering teams - Navigate orga…
Collaboration Overview
— Topic/premise: _______________ - Target audience (for both): _______________ - Planned posting date:…
Collaborative filtering
— recommending products that similar customers have purchased, using the techniques described in Chapt…
Collapse (wave function collapse)
— Ch 6.5 The postulate that upon measurement of an observable $\hat{A}$ with result $a_n$, the state i…
Collating sequence
— The order in which characters are sorted. *EBCDIC* and *ASCII* have different collating sequences: i…
Collect and process alternative data
— social media sentiment, injury reports, weather, referee tendencies, and player tracking data --- th…
collections
— Curated groups of works on AO3 organized by theme, gift exchange, or community project.
collective
— acting identically on all qubits --- then the subspace of states with definite total quantum numbers…
Collective action
— when the concern is shared by multiple people, raising it collectively changes the risk profile. No …
Collective agency
— the institutional, regulatory, and journalistic infrastructure through which structural change becom…
collective attention
— rare periods when millions of people share a common reference point.
Collective effervescence
— Durkheim's term for the feeling of shared intensity and solidarity that transcends individual experi…
Collective efficacy
— A group's shared belief in its capacity to take effective collective action; along with collective i…
Collective identity
— Fans see themselves as impacting games 2. **Strategic timing** - Coordinated noise on opponent's sna…
College Football Data API
— Free CFB data access - Historical game results - https://collegefootballdata.com/
College Football Reference
— Traditional rushing statistics - Player and team records - Historical comparisons
College Statistics (2015-16):
— 20.3 PPG, 11.6 RPG, 1.8 APG - 53.8% FG, 17.6% 3PT, 68.6% FT - Age at draft: 22
collegefootballdata.com
— `https://collegefootballdata.com/` - API access - Play-by-play data
collegefootballdata.com API
— `https://collegefootballdata.com/` - Historical game data - Play-by-play access - Advanced statistic…
CollegeFootballData.com API Documentation
— Official API for college football data - Data dictionary and schema - https://collegefootballdata.co…
colliers
— charcoal burners — who managed the slow, smoky process of converting wood to charcoal were among the…
colonial economic structure
— raw materials flowed out, finished goods flowed in, and the profits accumulated at the corporate hea…
colonial economy
— a term used by Appalachian scholars including John Gaventa, Helen Lewis, and others to describe the …
color and light
— the emotional palette that shapes how everything else is perceived.
Color key:
— 🔵 Light blue: Foundation — start here - 🟠 Orange: Critical bridge chapters — don't skip these - 🟢 Gr…
Color Scale Principles
— Sequential scales (one hue, varying lightness): for data with one-directional range - Diverging scal…
Colorism
— Differential treatment based on shade of skin color, typically disadvantaging darker-skinned individ…
colormap
— a gradient palette from yellow through orange to red. matplotlib has many colormaps: `"viridis"` (de…
Colossal Clean Crawled Corpus (C4)
— approximately 750GB of cleaned English text from Common Crawl. The cleaning pipeline removes:
Column B: Actual cost if she never reaches out.
— She never finds out if the collaboration was possible. — She stays permanently in the position of wa…
Column Guide:
— **Content Type:** News, entertainment, personal update, advertisement, influencer content, political…
Column interpretation:
— **ST (Status)**: TR = active thread, QW = queued waiting, QD = queued disabled - **A (Active)**: * =…
Combination Analysis
— [ ] Identify all two-man combinations - [ ] Calculate three-man core performances - [ ] Compute syne…
combination play
— quick passing sequences involving three or more players---is a strong indicator of team chemistry. K…
Combination systems
— a fixed showerhead plus a connected handheld on a sliding bar — are a popular upgrade. The sliding b…
Combination units
— sold as integrated primary-plus-backup systems by companies like Zoeller and Basement Watchdog — inc…
combinatorial creativity
— the ability to generate novel combinations of existing elements. Large language models produce text …
combinatorial innovation
— the process by which new technologies are created by combining existing ones, and each new combinati…
Combine Testing Standards
— Measurement protocols - Benchmark databases - Position norms
Combine using weighted averaging
— it is robust and requires minimal tuning. Use stacking only when you have enough historical data (50…
combustion appliance zone (CAZ) test
— also called a spillage test or worst-case depressurization test — that evaluates whether your home c…
comeback
— A K-pop group's return to promotional activity after a period without new releases — typically inclu…
Comfort is a driving value
— some homeowners, particularly in very cold climates, find that the comfort improvement from triple-p…
Comfort problems
— rooms that are always too hot or cold, drafts near register locations - **Moisture problems** — humi…
Comfortable silence
— The state of being at ease in shared silence without the need to fill it conversationally; a marker …
Comma (Pythagorean, syntonic)
— A small interval arising from the discrepancy between two different tuning systems. The Pythagorean …
Command Pattern
— A **design pattern** that encapsulates a request as an object, allowing parameterization, queuing, l…
Command Side (Write Model):
— Receives order submissions, cancellations, market creation requests. - Validates business rules (suf…
command-line task manager
— a program you run from the terminal that lets you manage a to-do list. Here is what it should do:
COMMAREA
— Communication Area. A block of data passed between CICS programs or preserved across pseudo-conversa…
COMMAREA / Channel Boundary:
— COMMAREA size: ________________ bytes - Key input fields: ________________ - Key output fields: ____…
comment
— text that Python ignores. Comments are notes to yourself.)
Comment themes:
— "Finally, someone who actually looked at this from more than one angle" - "I was ready to cancel [cr…
Commentary/Narrative
— Human language explaining what happened and why - Can be partially auto-generated: "The Midwest regi…
comments
— lines that Python ignores completely. They exist solely for the humans reading the code.
Commercial C2:
— **Cobalt Strike:** The industry standard commercial C2 framework. Beacon implant supports extensive …
Commercial factors:
— Social media following and marketability - Shirt sales potential - Sponsorship implications
Commercial intelligence:
— CrowdStrike Falcon Intelligence - Mandiant Threat Intelligence - Recorded Future - Intel 471 - Flash…
Commercial surveillance
— The systematic collection, processing, and monetization of personal data by private corporations for…
Commercial Systems:
— Catapult (GPS/accelerometry) - Second Spectrum (optical tracking) - Kinexon (RFID tracking) - Whoop …
Commission culture
— The practice of fans paying fan artists for specific custom creative work. Generates market conditio…
commit
— a permanent snapshot of your project at this moment in time. Let's break down what happened:
Commit (Git)
— A snapshot of all tracked files in a **Git** repository at a point in time, along with a message des…
commit frequency
— committing periodically within a long-running batch operation:
commit hash
— to this snapshot - The message `1 file changed, 22 insertions(+)` tells you what the commit contains
COMMIT ON RETURN
— A CREATE PROCEDURE option. When YES, DB2 automatically commits after the procedure returns. When NO,…
COMMIT ON RETURN NO
— The procedure does not automatically commit when it returns. The calling program controls commit sco…
COMMIT strategy:
— Online: COMMIT after each transaction (CICS pseudo-conversational, one UOW per transaction) - Batch …
Commit-checkpoint update:
— Use MERGE to handle both first-commit and subsequent-commits - Update is in same commit scope as dat…
Commitment
— the cognitive decision to love someone and to maintain that love over time. Commitment is the most s…
Commitment escalation
— A cognitive and behavioral pattern in which prior investment in a relationship makes it increasingly…
commitment overperception bias
— they tend to overestimate men's commitment to the relationship relative to what men report intending…
Committee on Public Information (CPI)
— The WWI U.S. government propaganda coordination agency, including a film division that represented t…
Commodification of intimacy
— The process by which market logic — browsing, filtering, transacting — is imported into the domain o…
Common actions to log:
— Removed duplicate rows - Dropped rows with missing values in column(s) ___ - Imputed missing values …
Common ambiguity patterns:
— Missing time zone specifications - Undefined terms ("pass," "launch," "win") - Edge cases not contem…
Common approaches:
— **Logistic regression**: Model the binary outcome as a function of predictive features. - **Ensemble…
Common BLE Vulnerabilities:
— No pairing required (open access to characteristics) - Just Works pairing (no PIN/passkey — vulnerab…
Common business percentile uses:
— P80 revenue threshold = "premium customer" cutoff - P90 resolution time = SLA benchmark - P25 perfor…
Common causes and fixes:
— **Permission error:** Use `python3 -m pip install --user package_name` or use a virtual environment …
Common causes in COBOL:
— A PERFORM or CALL branched to an address containing data instead of code. - A program was linked wit…
Common causes:
— `REGION` on the JCL JOB or EXEC card is too small. - The program allocates very large Working-Storag…
Common Characteristics of Legacy COBOL:
— Paragraph names like `2000-PROCESS` and `3000-PROCESSING` (what is the difference?) - Variables name…
Common Chartjunk to Remove:
— 3D effects on 2D charts - Gradient fills that encode nothing - Background images or textures - Exces…
Common colormaps:
— Sequential: `"viridis"`, `"Blues"`, `"YlOrRd"`, `"Greens"` - Diverging: `"coolwarm"`, `"RdBu"`, `"Pi…
Common Confounders in Basketball Data:
— Playing time (affects all counting statistics) - Team pace (affects per-game statistics) - Era effec…
Common Crawl
— URL: https://commoncrawl.org - Description: Petabytes of raw web data collected monthly since 2008. …
Common Crawl Index
— Description: Query interface to search Common Crawl archives by URL pattern or domain without downlo…
Common Criteria
— four dimensions that apply to all three projects, evaluated the same way regardless of which capston…
Common DAST Tools:
— **Burp Suite Professional:** Industry-standard web scanner with active and passive scanning - **OWAS…
Common Database Options:
— **SQLite**: File-based, no server needed, good for personal projects - **PostgreSQL**: Full-featured…
Common Definitions:
— **Explosive rush:** 10+ yards - **Explosive pass:** 15+ yards (some use 20+) - **Big play:** 20+ yar…
Common design patterns
— audit trails, effective dating, address polymorphism, configurable attributes, and tree structures.
Common diagnoses:
— Drop in first 30 seconds: Hook failure - Steady gradual decline: Normal, but if steep, pacing issues…
Common distributions
— Bernoulli, Categorical, Gaussian, and others -- are the building blocks for modeling data in AI syst…
Common DNS tunneling tools:
— **dnscat2** — Creates an encrypted C2 channel over DNS - **iodine** — Creates IP-over-DNS tunnels - …
Common drift patterns:
— **The exploitation creep:** An early-career explorer gradually shifts to pure exploitation as commit…
Common exploitation techniques include:
— Exploiting software vulnerabilities (buffer overflows, SQL injection, remote code execution) - Crede…
Common extractions include:
— **Data access logic** into repository classes - **Validation logic** into validator classes - **Form…
Common Football Questions:
— Is home field advantage real? - Does this QB perform differently in cold weather? - Is the differenc…
Common humanity
— When I am suffering, I remind myself that suffering and imperfection are part of the shared human ex…
Common ICS Vulnerabilities:
— No authentication on industrial protocols (Modbus has no native authentication) - Default credential…
Common IMS abend codes:
— U0457 — PSB not found or not authorized - U0474 — Database not available - U0778 — DL/I call error (…
Common Misconception
— Students often think that $|x\rangle$ represents a particle localized at position $x$. In a sense it…
Common Mistakes:
— Forgetting `import datetime` — Python doesn't know what `datetime` is without it. - Writing `datetim…
Common MQTT Vulnerabilities:
— No authentication required (anonymous access) - Weak or default credentials - No TLS encryption (por…
Common NFS misconfigurations:
— Exports to `*` (any host) - `no_root_squash` option (allows root access) - Sensitive directories exp…
Common Patterns:
— **Names** — First names (often the user's own or a loved one's) were extremely common - **Dates** — …
COMMON PITFALL
— "Just raise MXT" is the most dangerous reflex in CICS operations. Raising MXT without understanding …
Common pitfalls:
— Spending too long on a single target without results (set time limits) - Chasing duplicates on heavi…
Common questions and misconceptions:
— "Is DB2 the same as Db2?" Yes. IBM rebranded to "Db2" in 2017, but documentation, error messages, an…
Common race condition targets:
— Coupon/discount code redemption (apply same code multiple times) - Account balance operations (withd…
Common Reasons for Report Updates:
— Factual errors discovered after delivery (wrong IP address, incorrect CVSS score) - Client provides …
Common Registry Misconfigurations:
— Anonymous read access enabled - Anonymous push access (allowing image replacement) - No content trus…
Common regulatory trends:
— Mandatory KYC and AML compliance - Responsible gambling requirements (deposit limits, self-exclusion…
Common Ridge Vent Products
— Shingle-over ridge vent (most common): An extruded fiber or plastic channel nailed to the ridge, wit…
Common scenarios:
— COBOL FD says `RECORD CONTAINS 200 CHARACTERS` but the dataset was created with LRECL=150 - JCL spec…
Common schools
— publicly funded schools open to all children — arrived in Appalachia later and more unevenly than in…
Common scoring pitfalls:
— **Confirmation bias in scoring.** If you already suspect the claim is wrong, you'll tend to score ev…
COMMON should be used judiciously
— mark a program COMMON only if siblings actually need to call it.
Common spray passwords to try:
— `[Season][Year]!` — Winter2026!, Spring2026! - `[Company]123` — MedSecure123 - `Password1!` — Meets …
Common SSRF injection points:
— URL preview/unfurling features - Webhook configurations - PDF generation from URLs - Image import/up…
Common Statistics
— Points, rebounds, assists - Steals, blocks, turnovers - Field goals and free throws - Basic box scor…
Common struggles
— a chapter-by-chapter guide to anticipated student difficulties, with root-cause analysis and specifi…
Common student reactions to anticipate:
— "But I really am good at knowing what I know." (Gently redirect to the in-class calibration data.) -…
Common student struggles:
— Assuming z/OS works like Linux or Windows. Intervention: draw a side-by-side comparison chart of pro…
Common Table Expressions (CTEs)
— DB2's mechanism for naming and reusing subqueries within a single statement. By the end, you will be…
Common Technical Interview Questions:
— "You have a web application with a login page. Walk me through your testing approach." - "You find a…
Common tests used in this book:
— **One-sample z-test:** Test whether a bettor's win rate p-hat differs from the break-even rate p_0. …
Common threat intelligence sources:
— MITRE ATT&CK groups database - Mandiant (now Google Cloud) threat intelligence reports - CrowdStrike…
Common Voice (Mozilla)
— URL: https://commonvoice.mozilla.org - Description: The world's largest open multilingual voice data…
Common wrong interpretations:
— "There's a 95% chance mu is between 42 and 58." (Wrong — mu is fixed, not random.) - "95% of the dat…
Commonly excluded vulnerability types:
— Self-XSS (XSS that only affects the attacker's own session) - Missing security headers without demon…
communal singing
— and the most distinctive form of that tradition was **shape-note singing**, a system of musical nota…
Communicating Findings
— What story does the data tell? - How can we make insights accessible to coaches and executives?
Communication
— the ability to express intent clearly and unambiguously 2. **Systems thinking** — understanding how …
Communication Attacks:
— Unencrypted protocol traffic (plaintext MQTT, HTTP) - Replay attacks on device commands - Man-in-the…
Communication Channels:
— Design primary and backup communication channels between the operator team and the red team manager.…
Communication clarity (6 points):
— Well-organized phases with clear boundaries - Dependencies between phases identified - Realistic tim…
Communication Metrics:
— Message volume between agents - Context size passed to each agent - Number of conflicts generated - …
Communication style compatibility
— Similarity in preferences for emotional expression, conversational depth, and conflict engagement; o…
Communication:
— Primary and secondary points of contact (with phone numbers and email) - Escalation path for emergen…
Communities
— recurring groups organized around shared interest or identity — provide a different kind of opportun…
Communities that bore the costs
— emotional harm, cultural violation, financial exclusion, loss of control over their own biological n…
Communities:
— Soccer Analytics Handbook (online resource) - Analytics FC community - Various Twitter/X analytics c…
community
— the web of relationships, mutual obligations, shared memories, and collective identity that had boun…
Community belonging
— The video made the audience feel like participants, not spectators. Sharing it was an act of communi…
Community challenges
— a structured activity with a clear goal, limited duration, and community-wide participation. Example…
Community College Entrepreneurship Programs
— Nearly every US community college system now offers entrepreneurship courses and certificate program…
community consent
— the idea that communities should have collective decision-making authority over data practices that …
Community Data Advocate
— Works with communities to build data governance capacity: data literacy programs, community data coo…
community data governance charter
— a document that his neighborhood association could adopt as a framework for negotiating with the cit…
Community events
— fan meetings, concert viewing parties, and album listening parties organized by Brazilian ARMY commu…
community focal point
— a shared reference that gave ARMY members a reason to check in regularly, a shared language for disc…
Community health workers (CHWs)
— sometimes called lay health workers, promotoras (in Latino communities), or community health advisor…
Community History Portfolio
— runs through all forty-two chapters, asking students to research the history of a single Appalachian…
community identity marker
— an in-group signal (Ch. 9, identity signaling) that viewers used to connect with each other.
community infrastructure
— a network of mutual support, social organization, and collective identity that extended far beyond t…
Community intelligence:
— ISACs (Information Sharing and Analysis Centers) for specific industries - FIRST (Forum of Incident …
Community Manager
— A person responsible for nurturing and moderating a creator's online community, responding to commen…
Community Profile
— Who is your target community? Demographics, media consumption patterns, institutional context. (200–…
Community Reinvestment Act (CRA)
— 1977 federal law requiring depository institutions to affirmatively meet the credit needs of all com…
Community responses:
— **Data cooperatives in East Africa.** Farmer cooperatives in Kenya and Tanzania have developed data …
Community spotlights
— turning the camera on your audience — activate reciprocity, in-group strengthening, and aspiration, …
Community Tab
— A feature on YouTube that allows creators to post text updates, polls, images, and links directly to…
Community technology audits
— Neighborhood groups that conduct their own audits of local data systems (surveillance cameras, smart…
Community trust map
— A mapping tool for inoculation campaign design that identifies which sources a community trusts and …
Community variables:
— How does the program affect the gift economy norms that govern fan creative communities? Does the in…
Community vs. corporation at convention scale
— SDCC's evolution demonstrates how community-organized conventions become corporate marketing events …
Community-Built Servers:
— Jira and project management tool integration - Cloud provider CLIs (AWS, GCP, Azure) - Documentation…
Community:
— DEF CON, Black Hat, and BSides conferences are pillars of the security community - Local meetups (OW…
community_analytics.py:
— Generates 2 years of realistic daily community activity data - Produces 4 visualizations: membership…
Commutator
— Ch 6.3 For two operators $\hat{A}$ and $\hat{B}$: $[\hat{A}, \hat{B}] = \hat{A}\hat{B} - \hat{B}\hat…
COMP
— A USAGE clause value specifying binary (fixed-point) storage. On IBM mainframes, COMP items occupy 2…
COMP-1
— A COBOL USAGE clause specifying single-precision floating-point (4 bytes). On z/OS, may be IBM hexad…
COMP-2
— A COBOL USAGE clause specifying double-precision floating-point (8 bytes). (Ch. 5) See also: *COMP-1…
COMP-3
— A COBOL USAGE clause specifying packed-decimal representation, where each byte contains two decimal …
COMP-5
— An IBM extension specifying native binary storage where the data item can hold any value that fits i…
Compactness
— A measure of how tightly grouped a team's players are on the pitch, typically computed as the area o…
Companionate love
— A form of love characterized by deep affection, commitment, and intimacy without the intense passion…
Company and Business Model Documentation
— Platform's revenue model (advertising, subscription, freemium, data licensing, or combination) - Kno…
Company overview
— industry, size, what they do 2. **Recent news** — anything significant in the last 30 days 3. **Fina…
company town
— and it is one of the most important stories in American labor history. The company town was not simp…
Comparable criteria:
— Age 21-22 in Year 3 - 15-20 PPG, 6-9 RPG, 3-5 APG - Positive Win Shares trajectory
Comparative performance analysis:
— Select 10 videos/posts from this creator covering different topic areas - Note the views/reach for e…
Comparative Perspectives
— Cleavage theory (Lipset & Rokkan): party systems frozen around historical social divisions — nationa…
Compare scoring distributions of 5 NBA teams
— > **Box plots** (side-by-side box plots efficiently compare medians, spreads, and outliers across mu…
Compare the simple and multiple models:
— How did the coefficient for your first predictor change? - Did it shrink, stay the same, or grow? Wh…
Compare two divisional games:
— Game A: Chiefs at Raiders (same division, 2 TZ difference) - Game B: Cowboys at Eagles (same divisio…
Compare:
— What your current system costs per season - What a SEER 14 replacement would cost - What a SEER 18 r…
Comparing across eras without adjustment
— Modern passing games produce higher EPA - aDOT varies by scheme
comparing two groups
— the two-sample t-test, the paired t-test, and the two-proportion z-test. You'll finally be able to a…
Comparison
— Place two things side by side. Best for: differences, scale, before/after; the brain is wired for co…
Comparison and Impostor Syndrome:
— You see others' best content; you see your own complete messy process — the comparison is structural…
Comparison framework:
— What technologies of monitoring were/are used? - What were the metrics of performance? - Who had acc…
Comparison orientation
— a stable individual tendency to evaluate oneself through social comparison — amplifies Instagram's e…
Comparison spiral
— constantly measuring against creators with more followers/better production/faster growth; social co…
Comparison to particle-in-a-box energy levels
— plotting both fₙ/f₁ (for the string) and Eₙ/E₁ (for the quantum particle) as functions of n on the s…
Comparison to VORP:
— Both measure cumulative value - Win Shares uses different methodology (marginal offense/defense) - V…
compatibility mode
— it coexists with DB2 12 members 4. Migrate remaining members one at a time 5. Once all members are a…
Compatible observables
— Ch 6.6 Two observables $\hat{A}$ and $\hat{B}$ that commute: $[\hat{A}, \hat{B}] = 0$. They share a …
Compensation
— Mainframe architect compensation reflects this demand. Senior mainframe architects in financial serv…
Compensation Package
— Base salary - Bonus structure - Benefits (health, retirement) - Professional development budget
Competence
— *Being highly skilled and continually developing mastery; bringing full capability to what matters*
Competence (SDT)
— One of the three basic psychological needs in Self-Determination Theory; the experience of effective…
Competence and excellence
— doing things well, building genuine mastery; the satisfaction of work that is high-quality and corre…
Competence-visible content
— showing your research, your sources, your data — is a style choice, not a budget requirement.
Competent characteristics:
— Clear prompt structure (do you have this?) - Reliable use cases where you consistently get good resu…
Competition Level
— Adriatic League not considered elite - Limited games against top EuroLeague competition
Competitions Included (selection):
— FIFA World Cup (Men's and Women's, multiple editions) - UEFA Euro (multiple editions) - FA Women's S…
Competitive balance:
— Salary cap equalizes talent - Draft order helps weak teams - Revenue sharing
Competitive Cost:
— Estimated wins lost due to rest: 2-3 - Seeding impact: Minimal (comfortable 2nd place) - Playoff hom…
Competitive Position Shifts
— Colorado: +22 percentile points (Pac-12 to Big 12) - USC: -18 percentile points (Pac-12 to Big Ten) …
Compile unit
— A single COBOL source program that is compiled independently to produce an object module.
Compiler directive
— An instruction to the COBOL compiler that controls compilation behavior (e.g., COPY, REPLACE, BASIS)…
Compiler Option
— A parameter that controls the behavior of the COBOL compiler. Key Enterprise COBOL options include R…
Compiler options are your allies
— SSRANGE catches subscript errors, CHECK catches numeric issues, LIST/MAP/OFFSET are essential for du…
Compiler:
— [ ] OPT(2) for all production batch programs - [ ] FASTSRT enabled for programs with SORT verbs - [ …
Complaint
— Describe the specific behavior + your feeling + a positive need. - *Example:* "When you didn't call,…
Complement $E_V$
— Hermite polynomials: properties, generating function, recursion relations, orthogonality. The most t…
Complement B-VI
— This comprehensive treatment covers every aspect of angular momentum algebra in exhaustive detail, i…
Complement E.XI: The Variational Method
— The most mathematically complete undergraduate treatment. Includes proofs of the Hylleraas-Undheim-M…
Complementarity hypothesis
— The (largely unsupported) theory that attraction is driven by dissimilarity and the completion of la…
Complementary approaches the evidence suggests:
— **Environmental design**: Changing information presentation (accuracy nudges before sharing, base ra…
Complementary dual coding (effective):
— Showing a chart while explaining what the data means - Demonstrating a cooking technique while narra…
complete / incomplete
— AO3 markers indicating whether a multi-chapter work is finished or ongoing (WIP).
Complete all exercises
— learning requires practice 3. **Run every code example** and experiment with modifications 4. **Atte…
Complete concentration
— full engagement of attention in the task - **Merged action and awareness** — you are "in" the activi…
Complete your Learning Operating System
— the final deliverable of the progressive project you have been building since Chapter 1 - **Articula…
Completeness
— All six tablespaces have REORG, RUNSTATS, COPY, and recovery strategies 2. **Efficiency** — Utilitie…
Completeness issues:
— One patient record (`P008`) is missing a name — a critical field in health records - One patient (`P…
Completeness relation
— Ch 8.4 The identity operator expressed as a sum over a complete basis: $\sum_n |n\rangle\langle n| =…
Completeness:
— Does every component in the logical architecture appear in the physical topology? - Is every externa…
Completion metrics:
— Track 1 completion rate: exceeded 80% across targeted employee populations by 2024 - Track 2 complet…
Completion rate
— the single most important metric. If viewers watch the whole video, the algorithm promotes it. 2. **…
Completion satisfaction
— something incomplete becomes complete (final puzzle piece, frosting completing a circle); rewards cl…
Complex adaptive system (CAS)
— A system composed of many interacting agents that adapt to each other, producing emergent behavior t…
Complexity
— The study of systems with many interacting parts whose collective behavior is more than the sum of t…
Complexity Hiding in Simplicity
— the demand for clean answers in a complex world.
Complexity lives between order and chaos
— self-organized criticality describes how many systems naturally evolve to a critical edge state, whe…
Compliance Frameworks:
— PCI DSS mandates annual penetration testing for organizations handling cardholder data, with specifi…
COMPLIANCE NOTE
— For banking (PCI DSS, SOX) and healthcare (HIPAA), your CICS security architecture is auditable. Aud…
Compliance rate
— The proportion of treatment-assigned voters who actually received the treatment (e.g., were successf…
Compliance requires evidence
— PCI-DSS, HIPAA, and SOX don't just require security controls; they require proof that the controls w…
Compliance Week
— Industry publication; good for current practitioner news and enforcement updates.
Compliance-by-Design
— An approach that embeds regulatory compliance requirements into product and process design from ince…
Component 1 — Invoice Generation
— A `create_invoice.py` script that takes client name, email, amount, and description via command-line…
Component 1 — Market Scanner
— Scrape all categories available on `https://books.toscrape.com/catalogue/category/books/index.html` …
Component 2 — Payment Reminder Engine
— Extends `payment_reminders.py` from Case Study 19-2 - Adds a fourth tier: "pre-due reminder" sent 3 …
Component 3 — Dashboard Email
— A `billing_dashboard.py` script that reads `invoices.csv` and sends Maya a weekly summary email cont…
Component 4 — Testing and Safety
— A `--test-mode` flag on all scripts that uses a test recipient (your own email) instead of real clie…
Component 5 — Scheduling and Logging
— Add a `--run-log` flag that appends a summary of each run to `run_history.csv` - Add a `--dry-run` f…
Components:
— P(A|B): Posterior probability - P(B|A): Likelihood - P(A): Prior probability - P(B): Evidence
composability
— advantages that centralized platforms cannot fully replicate. - These benefits come with trade-offs:…
compose
— you build complex behavior by combining simple functions.
composite example
— based on real technologies and real documented issues, but assembled into a single, coherent scenari…
composite profiles
— characters constructed from real patterns but not representing specific individuals. What are the st…
composition
— building objects that *contain* other objects — rather than inheritance.
Composition Analysis:
— What is the relative scale of the figures depicted? Who is shown as large, monumental, or powerful? …
Compound interest
— Interest calculated on both the initial principal and the accumulated interest from previous periods…
Compound luck
— The phenomenon by which early luck advantages create conditions for further luck advantages, causing…
compound structural luck
— the way that multiple forms of structural disadvantage (or advantage) interact to produce outcomes m…
compounding
— each bias multiplies the effect of the others:
comprehensible
— the individual can actually understand what they are agreeing to - The choice is **genuine** --- ref…
Comprehension
— A concise Python syntax for creating lists, dicts, sets, or generators from iterables. Example: `[x*…
Comprehensive AI law
— most importantly, the EU AI Act — takes a different approach. Rather than focusing on the data input…
COMPRESS
— Compresses the backup image. Typically achieves 50-70% compression, dramatically reducing storage re…
Compression (data/lossy)
— An encoding technique that reduces file size by discarding audio information deemed perceptually ina…
Compression (dynamic range)
— A signal processing technique that reduces the dynamic range of an audio signal by attenuating the l…
compression toward 50%
— it avoids extreme probabilities more than the market does. When the true probability is 90%, the mar…
CompTIA PenTest+ (PT0-002)
— **Vendor:** CompTIA - **Cost:** ~$404 exam fee - **Format:** 85 questions, 165 minutes, multiple cho…
CompTIA Security+ (SY0-701)
— **Vendor:** CompTIA - **Cost:** ~$404 exam fee - **Format:** 90 questions, 90 minutes, multiple choi…
Compton scattering
— Ch 1.4 Scattering of a photon from a free electron, resulting in a wavelength shift $\Delta\lambda =…
Compulsive sexual behavior
— sometimes called sex addiction, though the diagnostic status is contested — involves patterns of sex…
compulsory able-bodiedness
— the cultural requirement to maintain, approximate, or aspire to an able-bodied norm — as a structuri…
compulsory sexuality
— the social expectation that everyone both does and should experience sexual desire, and that the abs…
Computational Challenges
— Massive data volume (2-3 million rows per game) - Requires specialized processing tools - Storage an…
computational intractability
— the mathematical discovery, formalized in the 1970s by Stephen Cook and Richard Karp, that many natu…
Computational text analysis
— using natural language processing and machine learning tools to analyze large volumes of fan-produce…
Computational thinking
— decomposition, pattern recognition, abstraction, and algorithm design — is a problem-solving framewo…
Computer Architecture
— How computers actually work at the hardware level. Binary numbers (Appendix C), memory, processors, …
Computer Vision for Business
— Image as data · CNN intuition · Transfer learning · Object detection · Retail applications (shelf an…
Computer Vision Source:
— Optical tracking systems derive positions from video feeds - Emerging AI systems automate event dete…
computing, sensing, communication, and simulation
— each exploit different aspects of the quantum formalism you have learned:
Compuware Abend-AID
— Production diagnostic tool that captures ABEND information and formats it for rapid problem determin…
Con:
— Markets on specific attacks could create incentives for violence. - The appearance of the U.S. gover…
concave
— meaning each additional dollar provides less additional utility than the previous one. This is calle…
Concept Budget:
— new_concepts: 8 - new_terms: 12 - new_techniques: 5
Concept drift
— changes in the underlying data distribution — is inevitable. Customer preferences shift. Product cat…
concept mapping from text
— visual diagrams showing relationships between ideas.
Concept:
— What is the show/channel/series? - What audience does it serve? (Same audience as your flagship, or …
Conceptual
— Test your understanding of the frameworks and research 2. **Scenario-based** — Apply the frameworks …
Conceptual Distinctiveness
— A perspective nobody else offers on a common topic - An angle or framing that recontextualizes famil…
Conceptual metaphor
— A fundamental cognitive structure in which abstract concepts are understood through more concrete do…
Conceptual path dependence
— the realization that the first explanation a field adopts constrains all subsequent thinking, regard…
Concerns Raised by Team Members:
— **Maria (CTO):** "I'm worried about code quality. I don't want the AI to introduce bugs we can't cat…
COND Parameter
— A JCL parameter on the JOB or EXEC statement that controls whether a job step is executed based on t…
conda environment file
— a simple text file that specifies exactly which packages and versions to install. She calls it `ph-d…
condensed matter physics
— the physics of electrons in solids. You will derive the band structure of crystals from Bloch's theo…
Condition Code
— (1) In JCL, a numeric value (0–4095) returned by a program or job step indicating success or severit…
Condition Codes:
— **G** = Good: No action required; monitor on normal maintenance schedule - **M** = Monitor: No immed…
Condition flags
— Set a processing flag (e.g., WS-OK-TO-PROCESS) and check it before each successive condition. Advant…
Condition name
— A level 88 data item that defines a named boolean condition associated with specific values of its p…
condition token
— a 12-byte structure — carries the severity, facility ID, and message number. LE callable services li…
Condition types:
— **Relation:** `identifier {= | > | < | >= | <= | NOT =} {identifier | literal}` - **Class:** `identi…
conditional expectation
— the crowd's belief about the outcome given the decision. - The **decision rule** compares conditiona…
conditional probability
— how a probability changes when you receive new information.
conditional restart
— a restart that overrides the normal recovery behavior.
Conditional target: Player Epsilon
— Only pursue if available below 25M EUR - Injury risk and age limit the upside - No adaptation risk i…
Conditional Token Framework
— the technical standard that Polymarket and others build upon. The Omen prediction market, powered by…
Conditioned responses
— emotional and physiological responses associated with particular stimuli through repeated pairing. A…
Conditions for deployment:
— Independent bias audit before deployment and annually thereafter - Public disclosure of the algorith…
Conditions:
— `SQLERROR` — SQLCODE < 0 - `NOT FOUND` — SQLCODE = +100 - `SQLWARNING` — SQLWARN0 = 'W'
Conduct a one-sample t-test for a population mean
— this is the workhorse procedure for inference about means. 2. **Understand when to use z vs. t** — t…
Conduct a one-sample z-test for a proportion
— this applies the hypothesis testing framework from Ch. 13 to a specific and common scenario. 2. **Ve…
Conduct and interpret a one-way ANOVA
— the procedural skill, including reading an ANOVA table. 3. **Perform post-hoc pairwise comparisons**…
Conduct requirements:
— Implementation of enhanced surveillance controls for the Rates Structured Trading desk within six mo…
Conduct the test and build a CI.
— Compute the z-test statistic and p-value - Construct both a Wald CI and a Wilson CI - Compare the tw…
Conduct the test.
— Compute the test statistic - Calculate the p-value - State your decision at $\alpha = 0.05$
Conduction
— heat through solid material. Resisted by insulation (higher R-value = more resistance). - **Convecti…
Conference (WAC)
— Low major conference - Conference factor: ~0.75
Conference Adjustment Factors:
— Power conferences (Big Ten, Big 12, etc.): 1.03-1.08 - Mid-majors: 0.85-0.92 - Low-majors: 0.65-0.75
Conference attendance
— at least one major conference per year (NeurIPS, ICML, KDD for researchers; Strata, MLConf for pract…
Conference Finals vs. Warriors:
— 3PA: 44.8/game - 3P%: 30.4%
Conference Parity Analysis
— SEC: Highest standard deviation (least balanced) - Big 12: Lowest standard deviation (most balanced)…
Conference Proceedings:
— *ACM FAccT* (Fairness, Accountability, and Transparency) — the premier venue for AI fairness researc…
Conference-adjusted scoring
— ACC production against superior competition - Tournament success (Elite Eight)
Conferences:
— MIT Sloan Sports Analytics Conference - StatsBomb Conference - OptaPro Forum - International Confere…
Confession
— Present as a social control mechanism. The catharsis sessions extracted confessions that were record…
confidence and genuineness of delivery
— which is to say, the paraverbal and nonverbal components overshadowed the verbal content.
confidence interval
— a range of plausible values for the true population mean.
Confidence interval expansion
— Larger uncertainty with backup QBs - Wilson's high variance should widen predictions
confidence intervals
— ranges that tell you how precise your estimates are. And in Chapter 23, we'll use them for **hypothe…
confidence is not accuracy
— is perhaps the single most important thing to internalize about AI output. The more authoritative an…
Confidence substitutes for experience
— someone feels certain without having the pattern library to justify it
Confidence vs. Prediction Intervals:
— Confidence intervals: Uncertainty about the model/parameters - Prediction intervals: Uncertainty abo…
Configuration and infrastructure:
— Check for exposed admin panels, debug endpoints - Test for misconfigured CORS policies - Check for o…
Configuration containers
— Create PERF-CONFIG containers with program name, threshold, and severity for each transaction 2. **T…
Configuration generation
— Dockerfiles, CI/CD configs, Terraform files, and Kubernetes manifests are all well-suited to AI gene…
CONFIGURATION SECTION
— A section of the ENVIRONMENT DIVISION that specifies the source and object computer and the SPECIAL-…
Configure when:
— The problem is somewhat standard but requires customization for your data and context - You need to …
Confirmation bias
— The tendency to search for, interpret, and recall information in ways that confirm prior beliefs; on…
Conflict
— the couple's primary anxiety-management mechanism is direct conflict. Anxiety is discharged through …
Conflict journal
— seven-prompt structured reflection for after significant conversations - **Pre-confrontation self-ch…
Conflict Narrative
— The story we construct about a conflict, including its characters, causes, and moral implications. S…
Conflict style matters less than repair
— couples can fight frequently or rarely, loudly or quietly, and still maintain high satisfaction, as …
Conflict trigger
— a stimulus that activates a threat response disproportionate to the current situation, often pointin…
Conflict triggers
— stimuli that activate disproportionate threat responses, pointing to the past as much as the present…
Conflicting dual coding (destructive):
— Showing dense text on screen while saying *different* words in voiceover (the viewer's verbal system…
Confluent
— Kafka tutorials and conference talks. - **GOTO Conferences** - Software architecture talks. - **Info…
Confluent Certified Developer for Apache Kafka
— Industry-recognized Kafka certification. - **AWS Certified Data Analytics** - Includes Kinesis and r…
Conformity
— Behavior change in response to real or imagined group pressure; can be informational (seeking accura…
Conformity Assessment (Article 43)
— [ ] Determine the applicable conformity assessment procedure (self-assessment or third-party assessm…
Confounding
— understanding why correlation doesn't prove causation requires grasping confounding. This is a genui…
confounding variable
— temperature, or more broadly, summer weather — causes *both*. Hot weather makes people buy more ice …
Confusing L2 regularization with weight decay
— they differ when using adaptive optimizers like Adam.
Confusing scoring conventions
— always check whether lower or higher is better. 5. **Over-interpreting small samples** -- with few q…
Confusion
— producing multiple contradictory narratives about an event so that no single account can achieve dom…
Congenital amusia
— a neurological condition (present from birth in ~4% of the population) characterized by impaired pit…
Congregatio de Propaganda Fide
— The 1622 papal congregation from which the word "propaganda" derives; its original meaning was the s…
Congressional action
— Senators Ed Markey and Richard Blumenthal introduced the SPY Car Act (Security and Privacy in Your C…
Congruence
— Alignment between verbal and nonverbal messages. When what a person says and how they say it (and wh…
conjugate variables
— dual descriptions of the same degrees of freedom. The Fourier transform is the unitary operator that…
conjunction fallacy
— arises because the description of Linda is highly representative of a feminist, making "feminist" fe…
Connect deliberately
— accept connections from people in different industries and functional areas than your own, even when…
Connect more vividly to values:
— Write a one-paragraph statement of why this proposal matters to him — not to the company, but to him…
Connection
— Links the current topic to another chapter or pattern in the book. These are the threads that weave …
Connection (Ch 26)
— Chapter 26 will develop band theory in full, starting from the tight-binding model and working up to…
Connection (Ch 32)
— The adiabatic theorem (Chapter 32) adds a new dimension to symmetry: what happens when the Hamiltoni…
Connection (Ch 5)
— In Chapter 5, you encountered the angular momentum quantum numbers $l$ and $m$ in the hydrogen atom …
Connection (Ch 8)
— In Chapter 8, you learned that unitary operators $\hat{U}$ satisfy $\hat{U}^\dagger\hat{U} = \hat{I}…
Connection and Care
— *Genuine sustained investment in relationships; being fully present with people I love*
Connection failure
— The external host is unreachable. EXEC CICS WEB OPEN returns RESP(NORMAL) but RESP2 indicates connec…
Connection formulas
— relations linking the WKB solutions across classical turning points, derived via Airy function match…
connection leak
— connections being borrowed but never returned. This is an emergency that will eventually exhaust the…
Connection pools are right-sized
— 20 connections per application instance, not 200. DB2 thread resources are finite and expensive.
Connection repairs:
— "This matters to me — you matter to me. That's why I'm still here." - "I know this is hard. I apprec…
Connection rules:
— Black wire → brass screw (hot) - White wire → silver screw (neutral) - Bare copper → green screw (gr…
Connection to information theory:
— The Imagination stage corresponds to computing a probability distribution over possible next events …
Connection to other patterns:
— Feedback loops (Ch. 2): the intervention spiral is a positive feedback loop - Goodhart's Law (Ch. 15…
connectionism
— the idea that intelligence emerges from networks of simple processing units. The backpropagation alg…
Connections
— Chapter 1 introduced the critical framing of attraction science; this chapter gives you the tools to…
Connections to other patterns:
— Phase transitions (Ch. 5): Phase transitions *are* symmetry-breaking events - Emergence (Ch. 3): Eme…
Connections:
— Overfitting (Ch. 14): Metric gaming is institutional overfitting - Legibility and Control (Ch. 16): …
Cons for Meridian:
— Low sensitivity at extreme probabilities (distinguishing 90% from 99% barely matters) - For rare eve…
Conscientiousness
— One of the Big Five traits, characterized by organization, reliability, and impulse control; one of …
Consecutive international games adjustment:
— First international game: Apply standard travel penalty (-0.5 to -1.0) - Second consecutive: Cumulat…
consensual non-monogamy (CNM)
— The broad category of relationship structures involving multiple partners with the full knowledge an…
Consensus
— consensus.app Scientific consensus evaluation for empirical questions. Best for yes/no questions abo…
Consensus momentum
— Once Fultz was established as #1, confirmation bias dominated - Mock drafts create feedback loops
Consent
— An affirmative, ongoing, freely given, reversible agreement to engage in a specific activity; treate…
Consent (informed)
— A legal and ethical requirement that individuals must be meaningfully informed about data collection…
consent fatigue
— the tendency to stop engaging with consent mechanisms altogether, clicking "accept all" or scrolling…
consent fiction
— one of this book's four recurring themes --- moves from the background to center stage. We have enco…
consent framework
— An approach to persuasion ethics that focuses on whether the target knows they are being persuaded a…
Consent, Agency & Ethical Negotiation
— attraction is mutual, not done *to* someone 2. **Nature vs. Nurture: The Biology-Culture Dialectic**…
Consequence
— Which might be account suspension, brand deal cancellations, audience decline, FTC enforcement, or —…
Consequences if wrong
— If you make a mistake, what happens? Is the consequence minor (cosmetic damage, redo the work) or ma…
Consequentialism
— the view, associated with philosophers like Jeremy Bentham and John Stuart Mill, that the moral qual…
Conservation law
— A principle stating that certain quantities remain constant within a closed system even as the syste…
Conservation of energy
— **Space translation symmetry** (the laws of physics are the same here as there) → **Conservation of …
Conservation of momentum
— the principle that a billiard ball set in motion in an empty universe continues forever at the same …
Conservative Estimate:
— Optimal decision compliance: 61.5% → 80% - EP saved per game: 0.5 points
conserved quantity
— its expectation value does not change in time (this follows from the Ehrenfest relation, Eq. 6.7, wh…
Consider the Broader Context
— Does the proposed regulation address the root cause or the symptom? - What non-regulatory interventi…
Consider the people in the data
— especially when personal information is involved. - **Document your collection methods** so others c…
Consider the site's size
— a personal blog can handle far less traffic than Amazon
Considerations for Live Data:
— Rate limiting is critical - WebSocket connections for streaming - Data latency varies by source - Co…
Considerations:
— Do not use label smoothing for knowledge distillation (the soft teacher labels already provide smoot…
Consistency
— Team names standardized - Date formats uniform - ID schemes consistent
Consistency issues:
— `bob@example` lacks a proper domain extension — likely a data entry error - `frank obi@mail.com` con…
Consistency:
— Do the MIPS numbers in the capacity plan match the hardware in the physical topology? - Do the DB2 t…
Consistent accuracy over time
— A track record of accuracy across multiple videos builds automatic trust through the mere exposure e…
Consistent coordinate system
— Standard 120x80 or 105x68 coordinate space - All data normalized to same orientation (attacking left…
consistent personal access
— a window into who the creator is as a person.
Consolidated duplicate code
— the five copies of the fare-table read logic became a single paragraph `8100-READ-FARE-TABLE` called…
Consonance
— The perceptual quality of a sound combination or interval that sounds stable, pleasant, or resolved.…
Conspiracy
— You construct a conspiracy narrative linking unrelated events, learning how unfalsifiability is buil…
Conspiracy framing
— The presentation of scientific consensus as the product of institutional corruption or suppression r…
Conspiracy theory (as disinformation technique)
— Attribution of documented facts to coordinated malevolent actors, rendering the claim unfalsifiable …
constant
— as it must be, since the Hamiltonian is $\propto \hat{S}_z$ and therefore $[\hat{H}, \hat{S}_z] = 0$…
Constants
— values that never change during execution (tax rates, maximum limits, program identifiers) - **Flags…
Constants (things that never change during a run):
— Program identification (name, version) - Loan product limits (maximum amounts per type) - Interest r…
Constants are named in ALL_CAPS
— `MILES_TO_KM`, `FEET_TO_METERS`. This follows PEP 8 convention and makes it clear these values don't…
constitution
— modeled in significant respects on the United States Constitution, but adapted to Cherokee governanc…
Constitutional/Rights Framework
— What rights-protection principles constrain your framework? How does it avoid over-restricting legit…
constitutive luck
— specifically unlucky in terms of structural starting position. It affected her resources (two jobs) …
Constraint analyzer
— Mapping the dependency graph and identifying blocking packages - **Migration guide** — Providing spe…
Constraint Satisfaction Prompting
— A **prompting** technique where you specify explicit constraints (performance requirements, style ru…
constraint-based prompt
— it identifies a specific problem (data corruption during writes) and specifies a solution approach (…
Constraints the prompt must enforce:
— [List specific constraints]
Construal level theory (CLT)
— A psychological framework proposing that psychological distance influences the abstractness or concr…
construct validity
— whether the operationalization captures the theoretical concept — is the most debated form of validi…
Construction
— you build the message object, set headers, add a body 2. **Transmission** — you open a connection to…
Construction Methods:
— Delta method: Track same players across seasons - Cross-sectional: Compare players of different ages…
constructor
— it runs automatically every time you create a new object from this class. Its job is to set up the o…
Consumer Resources
— Building Science Corporation Technical Library: buildingscience.com - This Old House Technical Libra…
Consumer Rights Under CCPA/CPRA:
— *Right to Know:* Right to know what personal information is collected, used, sold, or disclosed, and…
Consumer SDK
— Write a Python client library that wraps the banking API. Include authentication, retry logic with e…
Consumer-side deduplication
— consumers should be designed to handle duplicate events gracefully (idempotent processing).
Consummate love
— all three components present — is Sternberg's ideal, but it is also demanding and relatively rare ov…
Contact Hypothesis
— Allport's theory that intergroup contact reduces prejudice under certain optimal conditions (equal s…
contact interaction
— the direct magnetic coupling between the electron and proton when the electron probability density i…
Contact shadow profile
— A behavioral record maintained by a platform on an individual who has never created an account, buil…
CONTAINER
— In CICS, a named data area within a *channel* used to pass data between programs. Containers and cha…
Containers are not VMs
— They share the host kernel, and this architectural reality creates escape opportunities that do not …
Containment and Eradication (Day 3-5):
— All identified C2 domains and IPs blocked at firewall - All compromised credentials reset (including…
Contains:
— Play-by-play data (1999-present) - Expected Points Added (EPA) - Win probability - Player participat…
Contamination narrative
— McAdams' term for a narrative in which positive experiences or identity are retrospectively soured b…
Contamination narratives
— stories in which positive situations turn bad, in which good things are poisoned or lost — are assoc…
Contemporary Descendants:
— **Lippmann's descendants:** technocratic liberalism; the "expertise deficit" model in science commun…
Contemporary piece:
— Opening section (conventional playing): 2 - Extended techniques section: 3-4 (harmonics are unreliab…
Content
— [ ] Title clearly states what the visualization shows - [ ] All axes are labeled with units - [ ] Da…
Content adaptation
— converting complex documents into simplified or alternative formats.
Content analysis:
— What specific claims did the campaign promote? What is the factual status of those claims, and how h…
Content areas varied by sub-track:
— **Analytics track:** Python, SQL, data visualization, basic statistical modeling, using internal ML …
Content areas:
— How data flows through the organization — from customer interactions to data warehouses to analytica…
Content assets:
— Your video catalog: ___ - Your music or original audio assets: ___ - Any original characters or recu…
Content blocks activated:
— From A: code blocks (SQL, JCL, COBOL, Java, Python), mathematical formulations (cost estimation, car…
Content Calendar
— A planning document that maps out what content will be published, on which platforms, on which dates…
Content complexity
— simple → faster; complex → slower 2. **Audience familiarity** — familiar → faster; new → slower 3. *…
Content creation
— writing, coding, image generation, video production — was transformed overnight. - **Knowledge work*…
Content Creator
— Any individual who produces and publishes original content for an online audience, whether for perso…
Content design:
— Explain the psychology of anticipation (dopamine builds during waiting) vs. surprise (prediction err…
Content experiments:
— Depth vs. breadth: One video that goes very deep on a narrow topic. One that surveys a broader topic…
Content farm
— An operation (human or AI-augmented) that produces large volumes of content optimized for platform d…
Content Fit Section:
— What is the native content format for this platform? - Describe a piece of content you could produce…
content foundation test
— it stripped away artificial engagement signals and revealed what each creator's content was actually…
Content ID
— YouTube's system for identifying copyrighted audio and video in uploaded content. Rightsholders can …
Content Improvements
— Additional case studies or primary source analyses (especially from underrepresented communities wit…
Content Indicators
— *Confusion-promoting content*: Content that does not argue for a specific conclusion but promotes th…
Content inoculation
— Protection against a specific false claim, requiring that the specific claim be identified in advanc…
Content licensing
— a streaming service or international broadcaster wants to host your existing content on their platfo…
Content negotiation
— telling the server what format you want back: ```python headers = { "Accept": "application/json", "A…
Content Questions
— What emotional response is this content designed to produce in you, specifically? - What specific fa…
Content Strategy
— A systematic plan for what content to create, for whom, on which platforms, and in pursuit of which …
Content territories:
— Earned through use: Documentary-style content showing the product in real trail conditions, not stud…
Content test
— Does every piece of content you make fit under this statement? If half your content doesn't match, e…
Content-based regulation
— government prohibition of specific false or harmful speech — faces the most serious First Amendment …
Content:
— `VALUE "text"` -- displays a literal string (output only, not editable) - `PIC ... FROM identifier` …
ContentGuard
— A social media content moderation system deciding what speech is allowed on a platform (bias, free s…
contentious performance repertoires
— the established forms of collective action that a movement draws on — applies to ARMY's political ac…
Contest Data:
— Shots contested: 12.5 per game - Opponent FG% on contested shots: 38% - Altered shots: 8.2 per game
Context
— what the image is and why you're analyzing it 2. **Specific questions or analysis tasks** — exactly …
Context Adjustments:
— Trailing late: More aggressive - Leading late: Consider game state - Elite offense: More aggressive …
Context collapse
— The flattening of distinct social contexts in digital communication, such that information shared in…
Context comparison
— Opponent-adjusted EPA - Supporting cast quality - Scheme fit
Context diversity
— How many distinct, non-overlapping environments do you inhabit in a typical week? (1 = 1-2 contexts;…
Context features:
— League quality gap (e.g., Eredivisie to Premier League is a bigger jump than La Liga to Premier Leag…
Context from previous checkpoints:
— Checkpoint 1: Your Sysplex topology, CICS topology, DB2 configuration, and batch strategy - Checkpoi…
Context is everything
— Records without SOS are incomplete 2. **Multiple methods exist** - Choose based on application 3. **…
Context matters
— Thompson's interceptions looked worse in raw numbers but were less costly on average due to situatio…
Context Matters Enormously
— Shaq's Finals scoring (26.6 PPG) looked respectable - But efficiency (51.8% FG) and team collapse (1…
Context Matters:
— Game 7 dynamics differ from regular season - Playoff experience may be underweighted in models
Context Priming
— The practice of providing relevant background information at the beginning of a conversation with an…
Context Validation:
— Verify questionable data points by watching the original video - Understand context behind unusual s…
context window
— the maximum amount of text the model can process in a single prompt. Early versions of Copilot used …
Context-Dependent (C)
— meaning it's vanity in some situations and value in others 2. For context-dependent metrics, write o…
Context-dependent memory
— Research showing that memory retrieval is enhanced when the retrieval context matches the encoding c…
context-free rules
— "if X, then do Y" — because they have no experiential reference points to draw on. A novice driver f…
context-sensitive
— they are reserved only when they appear in specific syntactic positions. Outside those positions, th…
Context:
— Week 14, Sunday Night Football - New England traveling from East coast - Temperature: 28°F - KC rank…
Contexts that work well for this capstone:
— A school club, student government, or academic organization you are a member of - A sports team, the…
Contextual advertising
— ads matched to the content being viewed rather than to the individual viewer's profile — does not re…
contextual analysis
— annotations and interpretive essays that connect the interviewees' stories to the historical themes …
Contextual Complexity
— Impact depends on the opponent - Backup quality varies dramatically - Scheme may adjust around absen…
Contextual Data:
— Weather conditions (temperature, precipitation, wind speed, humidity) - Injuries and suspensions (wh…
Contextual Features:
— Score differential - Quarter - Home/away
Contextual Indicators
— *Timing correlation with geopolitical events*: Surges in disinformation activity coinciding with ele…
Contextual Information:
— Competition level (state, classification) - Team quality and scheme - Teammate quality - Coaching qu…
contextual interference
— the disruption caused by switching between tasks or contexts during practice. Blocked practice minim…
Contextual Red Flags:
— Statistical production dependent on superior teammates - Limited experience against high-level compe…
Contextual risk factors:
— Isolated setting (empty train car, parking garage, quiet street at night) - Absence of authority fig…
Contextualization:
— How does this compare to benchmarks? Is a player's 0.35 xG per 90 minutes good or bad? It depends on…
Continental National Bank (CNB)
— A Tier-1 bank processing 500 million transactions per day across a Parallel Sysplex. CNB is the prim…
contingency table
— a grid showing the frequency of each combination of categories. You calculated joint probabilities (…
Contingency tables
— the topic of this section — are built from two categorical variables. They show how many observation…
Contingent self-esteem
— Self-esteem dependent on ongoing external validation (approval, success, attractiveness); associated…
Contingent valuation
— A survey method that asks respondents to express the monetary value they place on a good or outcome.…
Continuation area
— In fixed-format COBOL, column 7, used for continuation of non-numeric literals (indicated by a hyphe…
CONTINUE
— after the handler executes, control returns to the statement after the one that caused the condition…
Continue iterating when:
— The output is in the right direction but needs refinement - You are getting progressively closer wit…
Continue learning
— the ethical landscape is evolving - **Accept uncertainty** — ethical dilemmas rarely have clear answ…
Continued influence effect
— The finding that corrected false claims continue to influence reasoning even after the correction ha…
Continued Innovation:
— Real-time match analysis systems - Advanced tracking data integration - Injury prediction and load m…
Continuing bonds
— The contemporary grief model proposing that healthy grief involves maintaining an ongoing but transf…
continuing medical education (CME) programs
— seminars and conferences that physicians attended to maintain their medical licenses — focused on pa…
Continuity notes:
— Energy levels: $E_n = -13.6\,\text{eV}/n^2$ — introduced Ch 2, referenced throughout - Ground state …
continuous availability
— there is no failover because multiple members are active simultaneously, sharing the same data. It i…
Continuous availability is required
— the additional overhead is the cost of zero downtime - **Workloads can be partitioned** — different …
Continuous Deployment for ML:
— Models that pass all tests are automatically registered in the model registry - Approved models are …
Continuous Improvement Frameworks
— Kaizen, A/B testing, feedback loops, and systematic mistake analysis --- ensure that your process im…
Continuous Integration for ML:
— Every code change (model code, feature engineering code, pipeline code) triggers automated tests - D…
Continuous Integration with GitHub Actions
— GitHub's CI/CD documentation.
Continuous Learning:
— The 70-20-10 model (experiential, social, formal) structures ongoing development - Annual learning g…
contour mining
— also called **contour strip mining** — which followed the contour of a coal seam around the side of …
CONTRACT AND PERMITS
— [ ] Review contract (all sections per Chapter 38 checklist) - [ ] Confirm scope of work is attached …
Contract non-negotiables:
— Deliverables specified precisely - Payment terms and schedule - Revision limit (not unlimited) - Usa…
Contract price
— if the customer has a negotiated contract price, use it (no other discounts apply) 2. **Promotional …
Contract-first testing
— Tests are written against the OpenAPI spec before the service is built. This ensures the spec is com…
CONTRACTOR SELECTION
— [ ] Identify three qualified candidates (referrals, vetting) - [ ] Verify license status for each - …
CONTRACTS AND COMPLIANCE
— [ ] **12. Draft or acquire your standard contract templates.** At minimum: a brand deal agreement (s…
Contrast
— stillness amid motion creates a pattern interrupt (the opposite of the usual approach) 2. **Emotiona…
Contrast effect
— The phenomenon whereby judgments of a target stimulus are displaced in the opposite direction from a…
Contrast-dependent evaluation
— The brain evaluates states not in absolute terms but relative to reference points. A clean room alon…
Contrastive explanation
— An explanation that answers "why this outcome and not an alternative?" rather than attempting to des…
Contribute to open source
— Practical experience with collaborative development
Contribute to the field
— whether in theory (new algorithms, error correction codes, complexity results), experiment (building…
CONTROL
— The user has UPDATE access plus VSAM control-level processing capabilities (such as control interval…
Control Area (CA)
— A VSAM organizational unit consisting of multiple *control intervals*. Control area splits occur whe…
Control Break
— A report-processing pattern in which a change in the value of a control field triggers the printing …
Control break processing
— The program detects changes in the department field and prints subtotals at each break level.
control charts
— time-series plots of measurements with lines drawn at 1, 2, and 3 standard deviations from the mean.
Control Fallacy
— The implicit belief that sufficient skill, preparation, or force of will can determine the outcome o…
Control Interval (CI)
— The unit of data transfer between disk and memory. A CI contains one or more records plus control in…
Control Plane Components:
— **kube-apiserver** — The central management point. All operations go through the API server. Comprom…
control room
— where recordings are monitored and mixed — requires accurate, spatially neutral acoustics so the eng…
Control structures
— `{% ... %}` — logic blocks that do not produce output themselves:
Controlled Components
— React manages the form state:
controlled denormalization
— they introduce data redundancy (the aggregated data exists both in the base tables and the MQT), but…
Controversial strategies:
— Related-party sponsorship deals at above-market rates - Player swap deals at inflated valuations - C…
Convention circuit
— The network of fan conventions at various scales (SDCC, NYCC, Anime Expo, KCON, PAX, DragonCon) that…
Convention notes:
— Bold lowercase letters (**x**, **w**) denote column vectors. - Bold uppercase letters (**X**, **A**)…
Conventions:
— Single-qubit gates are boxes on one wire: $\boxed{H}$, $\boxed{T}$, $\boxed{S}$ - CNOT is a vertical…
Convergence culture
— Jenkins's term for the contemporary media environment in which content flows across multiple platfor…
Convergence points
— moments when physics and music theory address the same question simultaneously — include the Pythago…
Convergent evolution
— The independent evolution of similar traits in unrelated lineages facing similar environmental press…
conversation starter
— the sharer can bring it up at dinner, text it to a friend, or use it in casual conversation.
Conversion
— The moment a prospect takes a desired action: subscribing, purchasing, signing up for a free trial, …
Conversion formulas:
— Probability to decimal odds: $d = 1 / p$ - Decimal odds to probability: $p = 1 / d$ - Probability to…
Conversion Rate
— The percentage of people who complete a desired action out of those who had the opportunity to do so…
Conversion rates are high
— Teams convert 4th & 1 at ~73%, 4th & 2 at ~63% 2. **Punts don't gain much** - Net 35-40 yards on ave…
Conversions:
— Home Win (6/4): Decimal = 1 + 6/4 = 2.50; Implied = 1/2.50 = 40.00% - Draw (9/4): Decimal = 1 + 9/4 …
Convert ACCOUNTS to system-period temporal:
— Add SYS_START, SYS_END, TRANS_START columns - Add PERIOD SYSTEM_TIME definition - Create ACCOUNTS_HI…
Convert TRANSACTIONS to system-period temporal:
— Same temporal column pattern - Create TRANSACTIONS_HISTORY table - Add versioning
Converting between them:
— Proportion to percentage: multiply by 100. So $0.73 \rightarrow 73\%$. - Percentage to proportion: d…
Converting to OWS:
— Team marginal points per win ≈ 30 - Curry OWS ≈ 450 / 30 = 15.0 (approximate)
Converting to wins
— Wins ≈ RAPM × (Minutes / 200) / 2.7 - A +5.0 RAPM player playing 2,500 minutes ≈ 23 wins added
convoy effect
— short processes get stuck behind long ones.
Cookie
— A small text file stored on a user's computer by a website, used to maintain state across multiple r…
Cookie (browser)
— A small text file placed on a user's device by a website to store information about their visit, pre…
Cooking techniques
— slow-braising tough cuts of meat, frying in animal fat, cooking greens low and slow with a piece of …
Cooking/process content
— text provides instructions while preserving process sounds (sizzling, chopping) - **ASMR/aesthetic c…
Coolidge effect
— An apparent tendency in some species (documented more strongly in non-human animals) for sexual arou…
cooling schedule
— the rate at which randomness decreases -- is the critical parameter. Too fast (quenching), and the s…
Cooper pair
— exists only because of the Fermi sea. In vacuum, the attractive interaction would be too weak to bin…
Cooper pairs
— bound pairs that move through the lattice coherently, without scattering. The pairing is a collectiv…
cooperation without consensus
— coordination of action across communities that do not share goals, vocabularies, theories, or framew…
Cooperation without trust
— Mechanisms that enable collaborative outcomes among self-interested agents without requiring mutual …
cooperative breeding
— developed in *Mother Nature* (1999) and *Mothers and Others* (2009) — fundamentally reframes the evo…
Cooperative overlap
— An interruption that signals engagement and enthusiasm rather than dominance; distinguished from int…
Cooperative ownership
— A legal and organizational model in which members collectively own and govern an organization, with …
Cooperativeness
— the degree to which you attempt to satisfy the other party's concerns. High cooperativeness means yo…
Coordinated inauthentic behavior
— Facebook's term for organized efforts to manipulate public discourse through fake accounts and coord…
Coordinated Inauthentic Behavior (CIB)
— Meta's framework for identifying and removing networks of accounts that coordinate using fake or mis…
Copenhagen interpretation
— Ch 1.10, Ch 28.1 The standard interpretation of quantum mechanics, associated primarily with Bohr an…
Coping estimation:
— On a 0–10 scale, how confident are you that you could cope if the feared outcome occurred? ___ - Wha…
coping strategies
— substantially determines outcomes. Lazarus and Folkman distinguished two primary categories:
COPPA (Children's Online Privacy Protection Act)
— A US federal law enacted in 1998 that requires websites and online services directed at children und…
COPPA's limitations are significant:
— **The age-13 threshold is arbitrary.** COPPA protects children under 13 but provides no protection f…
COPY
— A COBOL compiler-directing statement that includes the contents of a *copybook* at the point where t…
COPY statement
— A compiler directive that includes the contents of a *copybook* member into the source program at co…
Copy with filter
— Read, test a condition, write matching records.
Copy.ai
— General marketing and sales content, focused on go-to-market workflows - **Writer** — Enterprise-foc…
Copybook
— A file containing COBOL source code (typically data definitions or procedure division paragraphs) in…
Copybook Dependencies:
— Primary copybook: ________________ - Shared with other programs? List them: ________________
COPYDDN(COPY1, COPY2)
— Specifies up to four output datasets. COPY1 is the primary copy; COPY2 is the backup copy. Both are …
Copyright
— A form of intellectual property protection that grants the creator of an original work exclusive rig…
Copyright Office Online Resources (copyright.gov)
— The US Copyright Office maintains accessible guides to copyright basics, registration, and the DMCA.…
Core
— A SQL expression language that builds SQL programmatically with Python objects (closer to raw SQL) 2…
core banking system
— the software that manages customer accounts, processes transactions, and maintains the authoritative…
Core behaviors to internalize:
— Zero-indexed. The first item is at position `0`. Negative indices count from the end: `list[-1]` is …
Core Chapters (assign these):
— Part 1: Ch. 1, 2, 3, 4, 5 (all five — foundations are non-negotiable) - Part 2: Ch. 6, 8, 9 (skip Ch…
Core characters:
— *Priya Anand* — 24-year-old grad student in media studies who is also a lifelong MCU fan; provides t…
Core concepts:
— **Automation Policy.** Defines what SA z/OS monitors and how it responds. Policies are built in the …
Core definitions:
— **Pure state:** $\hat{\rho} = |\psi\rangle\langle\psi|$ - **Mixed state:** $\hat{\rho} = \sum_k p_k …
core dream
— a fundamental need, value, or life aspiration — is at stake. The conflict keeps happening because th…
Core functionality
— The AI feature works, even if performance is modest. 2. **Fallback strategy** — When the AI fails, t…
Core Idea:
— Generate many random scenarios - Aggregate results to estimate probabilities - Explore full distribu…
Core Library (Msf::Core)
— Builds on Rex to provide the framework's core functionality: module management, session handling, ev…
Core numerical computing:
— **NumPy**: The foundational library for numerical computing in Python. NumPy's n-dimensional arrays …
Core point
— Has at least `min_samples` neighbors within `eps` distance. These are the interior of a cluster. 2. …
Core positions:
— **BUY 250 contracts of Bracket 5** (1.0-1.5%) at $0.18 = $450 - **BUY 200 contracts of Bracket 6** (…
Core Python
— Official Documentation: https://docs.python.org/3/ - Python Tutorial: https://docs.python.org/3/tuto…
Core questions:
— What is the primary user action the interface is built around? (Swipe? Like? Message? "Star"? "Boost…
Core user flows work
— Login with correct credentials → dashboard loads - Expense form submission → success page - Login wi…
Corey Schafer
— Excellent Python tutorials - pandas and matplotlib series - Clear explanations
Corn right
— A claim to land established by clearing a plot and planting a crop, based on the principle that labo…
Cornbread
— made from ground cornmeal, cooked in a cast-iron skillet, without sugar (a point of fierce and endur…
Cornerstone Bank NA
— a mid-size US retail and commercial bank, OCC-regulated - **Cornerstone Capital Markets** — a UK-reg…
Corporate Network (medsecure.local)
— **Domain:** Active Directory forest `medsecure.local` running Windows Server 2019 domain controllers…
corporate strategy
— the highest-level choices about which businesses to be in, how to allocate capital across them, and …
Corpus
— A structured collection of text documents used as the basis for computational analysis.
correct
— BRANCH is on the left, and we are preserving it. The mistake version would be:
Correct analysis (paired t-test):
— $\bar{d} = 3.17$, $SE_d = 0.748$, $t = 4.24$, $p = 0.0007$ - Conclusion: Strong evidence of improvem…
Correct answer: b
— **2. A "load path" in a building is best described as:**
Correct answer: c
— **3. Which phase of construction is typically inspected before drywall is installed?**
Correct answer: d
— **3. In platform framing, each floor is built as:**
Correct clearly and promptly
— don't bury it in a comment that few people see 2. **Match prominence to prominence** — if 50,000 peo…
Correct Matching:
— A → 3 (Rathergate: the 2004 CBS/Bush document controversy) - B → 1 (Network effects: value increases…
Correct: (A)
— **(A)** is correct. The `.str` accessor gracefully handles missing values by propagating `NaN` (disp…
Correct: (B)
— **(A)** is too narrow — machine learning is one tool within data science, not the whole field. A pro…
Correct: (C)
— **(A)** is structured — rows, columns, numeric values. - **(B)** is structured — a relational table …
Correct: (D)
— **(A)** works technically — `pandas.DataFrame(...)` is valid Python — but virtually nobody writes it…
Correct: B
— Random assignment to conditions is the defining feature of experimental design, which allows causal …
Correct: C
— Cohen's conventional benchmarks: 0.2 = small, 0.5 = medium, 0.8 = large. Small effects are not neces…
Corrected:
— Buy 1,385 shares of Bracket 4 at $0.13 each = cost $180.05 - Buy 2,889 shares of Bracket 5 at $0.18 …
Correction
— fixing problems: white balance, exposure, color cast (making footage look natural) 2. **Enhancement*…
Correction paradox
— The risk that repeating a false claim to correct it strengthens the false claim through the illusory…
Corrections
— Factual errors in historical claims - Outdated statistics or citations - Broken links in Further Rea…
Corrective action:
— Remove any cord from under rugs or carpets — this is a fire hazard - Replace any damaged cords immed…
Corrective powers (Article 58(2)):
— Issue warnings and reprimands - Order compliance with data subject requests - Order controllers or p…
Correctly identified the bug in 12 cases
— the AI flagged the specific code change that caused the production issue - **Identified the general …
Correctness
— It produces the right answer for *every* valid input, not just the ones you tested. This includes ed…
Correctness Reviewer
— verifies logic and behavior 2. **Security Reviewer** - checks for vulnerabilities 3. **Maintainabili…
Correctness:
— Does the code do what the user story/requirement asks for? - Are there edge cases that aren't handle…
Correlated Bets and Parlays:
— Same-game parlays can be +EV when books fail to properly price positive correlations - The Gaussian …
Correlated state error
— The tendency for polling errors in different states to run in the same direction and by similar amou…
Correlation
— Correlation measures linear relationship strength - Range: -1 to +1 - Positive correlation: both var…
Correlation analysis:
— Which domains are most correlated? (Most concentrated exposure?) - Which domains are most uncorrelat…
correlation energy
— the difference between the exact non-relativistic energy and the Hartree--Fock energy:
Correlation ID implementation:
— Generated at: _______________ - Propagated through: _______________ - Stored on z/OS in: ___________…
correlation matrix
— a table (and often a heatmap) that shows every pairwise relationship at a glance.
Correlation only measures linear relationships
— strong non-linear patterns can show near-zero correlation - **Correlation never proves causation** —…
Correlation Stacking:
— QB + WR (same team): +0.3 correlation - RB + opposing DEF: Blowout stack - QB + opposing WR: Shootou…
Correlation ≠ causation
— confounding, reverse causation, and coincidence are common - R² indicates proportion of variance exp…
correlational studies
— they measure two or more things and look at whether they're related.
correspondence principle
— quantum mechanics reduces to classical mechanics in the appropriate limit.
correspondence standard
— does this claim accurately describe facts in the world? — is the most practically applicable.
cortisol
— the primary stress hormone
Cosine Similarity
— A measure of similarity between two vectors, computed as the cosine of the angle between them. Used …
cost
— the effort, time, stress, and opportunity cost of engaging with the task?
Cost avoided:
— In 2023, Pinnacle experienced a security incident: a former employee's userid (not yet revoked) was …
Cost calculation:
— AI subscriptions: $200/month for the team - Alex's management time on policy and training: approxima…
Cost components:
— **Input tokens:** The text you send to the model (prompts, context, documents) - **Output tokens:** …
Cost considerations for vibe coders:
— **Open-source tools** like Aider have no tool cost, but you pay API fees directly to model providers…
Cost efficiency metrics:
— FTE hours per KYC review completed (versus baseline) - False positive rate in transaction monitoring…
cost function
— a mathematical formula that determines the price of every trade. Here is the key insight:
cost of attack
— the minimum expenditure required for an adversary to force an incorrect resolution --- and compare i…
Cost of Duct Leakage: Sample Calculation
— Home: 2,000 sq ft, mixed climate - Annual HVAC cost: $2,400 - Duct leakage (measured): 28% - Annual …
Cost of the transformation:
— 18 months of project work (Diane full-time, Ahmad 50%, 2 additional developers) - 34 COBOL programs …
Cost Per Acquisition (CPA)
— The total cost required to convert one prospect into a paying customer. Calculated as total ad spend…
Cost Per Click (CPC)
— The amount an advertiser pays each time a user clicks their ad. CPC is a common pricing model for se…
Cost Per Lead (CPL)
— The total marketing cost divided by the number of leads generated. Used to evaluate the efficiency o…
Cost summary for the dining room:
— Structural contractor (beam shimming): $280 - Sister joist materials: $45 - Subfloor screws: $18 - 1…
Cost vs. Whitfield-aligned total:
— Suburban Metro competitive ratio: Garza 420 vs. Whitfield-aligned 860 GRPs/week (ratio: 0.49) - Mid-…
Cost-benefit
— Salary difference - How many wins does 0.05 EPA/play add? - ~0.05 × 500 passes = 25 EPA ≈ 2.5 points…
Cost-to-fix ranges for common foundation issues:
— Crack injection (epoxy or polyurethane, poured concrete): $400–$800 per crack - Exterior waterproofi…
Cost-to-fix ranges:
— Repipe entire house (supply lines, copper): $8,000–$20,000 depending on size and access - Repipe ent…
COST_CATEGORY
— any 'B' ratings? 5. **Expected GETPAGE count** (from DSN_FUNCTION_TABLE if available) 6. **Sorts req…
Costly signaling theory
— The evolutionary framework holding that honest signals of quality must be expensive to produce so th…
Costs
— All expenses incurred by the client that are directly related to the execution of the order, includi…
Costs of over-trust:
— **Reputational damage.** Presenting fabricated statistics to a client or publishing inaccurate infor…
Costs of under-trust:
— **Lost productivity.** The primary value of AI tools is time savings. If you re-verify everything in…
Costs:
— Development: 2 data scientists x 4 months x $12,000/month fully loaded = ? - Infrastructure: GPU com…
council house
— a large, circular or seven-sided building, often built on a raised mound, capable of holding several…
Counter-Argument:
— Mid-range shots can be easier to generate - Some mid-range specialists (Chris Paul, Kawhi Leonard) s…
Counter-Attack
— A rapid attacking transition following a turnover, designed to exploit the opponent's disorganized d…
Counter-surveillance
— Practices, technologies, and strategies designed to detect, prevent, or disrupt surveillance. Counte…
Counterarguing
— The active cognitive process of generating rebuttals to challenges; the mechanism through which inoc…
counterfactual definiteness
— the idea that unperformed measurements have definite outcomes.
Counterfactual explanation
— An explanation of an AI decision that specifies what would have been different about the situation t…
Counterfactual thinking
— Mental simulation of alternative outcomes ("what if...?" or "if only...?"). Upward counterfactual th…
Counterparty and network review
— Referral source documented and KYC'd (is the referrer also a PEP?) - Any connected parties to the in…
Counterparty identification:
— Field 1: Reporting firm's LEI - Field 2: Executing entity's LEI (if different) - Field 3: Investment…
Counters (things we count):
— Applications read, processed, approved, denied, sent to review, in error - Applications by type (per…
Country Queers
— An oral history project launched by Rae Garringer in 2013, documenting the experiences of LGBTQ+ peo…
Country Queers project
— an oral history initiative documenting the experiences of LGBTQ+ people in rural America, with signi…
County clerk's office
— Deed books, mineral rights records, and land transactions (some now digitized) - **Appalachian Land …
county history
— a work of narrative scholarship that tells the story of a place and its people across time, grounded…
County Records:
— Court order books, deed books, and will books from your selected county often contain evidence of wo…
Coupling facility hardware
— dedicated processors and memory, typically 10-20% of the total system capacity - **CF links** — high…
Coupling Facility Structure Sizing (WP102579)
— IBM White Paper on sizing coupling facility structures for CICS shared TS, named counters, and data …
Courage
— the willingness to accept costs for the sake of what is right — is revealed in Google's eventual dec…
Course
— A structured educational product delivering learning through video, audio, text, or interactive exer…
Coursera
— coursera.org Offers MOOCs from leading universities on negotiation (Yale, Michigan, Northwestern), c…
Coursera - Machine Learning (Stanford/Andrew Ng)
— https://www.coursera.org/learn/machine-learning - Classic introduction to ML concepts
Coursera - Statistics for Sports Analysis
— Focus: Statistical methods for sports data - Relevance: Foundational statistics for defensive metric…
Coursera: Applied Data Science with Python
— University of Michigan specialization - Pandas, visualization, machine learning - Applicable skills …
Coursera: Marketing Analytics
— University of Virginia Part of the Business Analytics Specialization. Covers customer lifetime value…
Coursera: Sports Analytics
— University-level courses - Statistical methods for sports - Project-based learning
Coursera: Visual Perception for Self-Driving Cars
— Good coverage of detection, tracking, depth estimation - University of Toronto
Courses for Continuing Education:
— Elements of AI (elementsofai.com) — Free course from the University of Helsinki - AI for Everyone (C…
Courtship display
— Any behavior, signal, or adornment used to attract a mate; in evolutionary psychology, analyzed as h…
Cover Letter Approach
— Lead with genuine passion for the organization - Connect your skills to their specific needs - Refer…
Coverage
— does the provider cover the leagues and matches you need? (2) **Accuracy** --- what positional accur…
Coverage bias
— Error arising when members of the target population have no chance of being selected because they ar…
Coverage confirmation
— Travel Rule compliance requires the *receiving* VASP also to support the protocol. The exchange shou…
Coverage does NOT tell you:
— Whether your tests assert the right things - Whether your tests cover meaningful scenarios - Whether…
Coverage grade model
— Build composite metric - Weight multiple factors - Validate against PFF grades
Coverage is useful for:
— Identifying untested code paths - Ensuring edge cases are tested - Detecting dead code - Setting min…
Coverage:
— Top 5 European leagues (England, Spain, Germany, Italy, France) - Major secondary leagues (Netherlan…
covered entities
— health plans, health care clearinghouses, and health care providers who transmit health information …
Covered in detail in Chapter 14
— ## Contextual Factors to Consider
Coverlet weaving
— the production of elaborately patterned bedspreads and blankets using overshot, summer-and-winter, o…
Covert disinformation operations
— foreign interference, domestic astroturfing, coordinated inauthentic behavior — are distinguished fr…
Covert influence operation
— Propaganda campaign that conceals its official origin, using independent-seeming voices to deliver g…
coverture
— a legal framework inherited from English common law that declared a married woman's legal identity t…
COVID-19 no-fans studies
— Natural experiment on crowd effects 2. **Referee bias research** - Home penalty advantages 3. **Trav…
COVID-era remote work migration
— the movement of knowledge workers from expensive metropolitan areas to rural communities, including …
CPM
— cost per mille, or cost per thousand impressions. Advertisers pay a CPM rate for every 1,000 times t…
CPM (Cost Per Mille)
— The standard unit of digital advertising pricing: the cost an advertiser pays per thousand impressio…
CPM (Cost Per Thousand Impressions)
— The price an advertiser pays for one thousand ad impressions. In creator contexts, CPM refers to the…
CPOE Stability Study
— How stable is CPOE year-to-year? - Compare to completion % - Predictive analysis
CPU cost calculation:
— The server has 32 cores at approximately $150,000/year total compute cost. - 5% additional CPU = $7,…
CPU cost of compression:
— Row decompression adds 2-5% CPU overhead per SQL statement that reads compressed data. - Row compres…
CPU registers and cache
— Lost immediately when power is removed 2. **Memory (RAM)** -- Contains running processes, network co…
Cracks
— any visible cracks in the foundation material. Note their orientation (horizontal, vertical, diagona…
Craft:
— [ ] I have practiced my presentation out loud (if presenting) - [ ] I have cut everything that does …
Create a dependency policy document
— Define criteria for adding new dependencies: maintenance activity, version constraint philosophy, te…
Create and Cultivate
— createcultivate.com A media company and conference series specifically focused on women building bus…
Create buffer pools
— separate pools for data, indexes, temporary work, and transaction data 4. **Create tablespaces** -- …
Create your Learning Operating System v1.0
— the complete, personalized system you will use for the next year of your learning life
creates (emits) a photon
— $\hat{a}_{\mathbf{k}\lambda}|n_{\mathbf{k}\lambda}\rangle = \sqrt{n}\,|n-1\rangle$ — **destroys (abs…
Creation date and time
— **LRECL, BLKSIZE, RECFM** (dataset characteristics) - **Job name and step name** (what job accessed …
Creation operator
— Ch 4.4, Ch 8.6 The operator $\hat{a}^\dagger$ that raises the occupation number by one: $\hat{a}^\da…
Creative / Content Careers:
— Career capital = distinctive aesthetic voice + technical craft skills + audience understanding - Luc…
Creative capacity on call
— at least one person who can quickly produce graphics, pull video clips, and format content for rapid…
Creative Commons (creativecommons.org)
— The organization's website includes accessible explanations of copyright basics, the Creative Common…
Creative momentum
— Once in the zone, staying there is easier than restarting. Second and third videos are often better …
Creative signs:
— Dreading the creation process (not just editing — the WHOLE thing) - Ideas drying up (the bank runs …
Creative values
— what we give to the world; the work we do, the things we make, the contributions we offer 2. **Exper…
Creative variables:
— What content restrictions are attached to the license? (Likely restrictions on adult content, critiq…
Creative work
— what we contribute to the world through our actions and achievements 2. **Experiential value** — wha…
CreativeFutures / Latino Creative
— Networks supporting Latinx creators in digital media with community events, educational programming,…
Creator A (your information)
— What you will create: _______________ - Where you will post: Platform _______ , Date/time _______ - …
Creator A: Maya
— Opening: "These 3 study tips saved my GPA." (Text on screen, Maya's confident face) - Content: Well-…
Creator A: Priya
— Net self-employment income of $35,000 in year 2
Creator B (their information)
— What they will create: _______________ - Where they will post: Platform _______ , Date/time _______ …
Creator B: Marcus
— Net self-employment income of $90,000 in year 3
Creator B: Tyler
— Opening: "I failed every exam until a Harvard professor told me this ONE THING." (Dramatic close-up,…
Creator Economy
— The ecosystem of tools, platforms, business models, and cultural norms that enable independent creat…
Creator Fund
— A pool of money a platform (TikTok, Snapchat, YouTube) distributes to creators based on content perf…
Creator Guild (Emerging)
— As of 2025, several attempts have been made to form creator-specific labor organizations. Search for…
Creator Mental Health Community
— An informal but active community on Discord where creators share resources, discuss burnout, and pro…
Creator retrospective videos
— Almost every creator with 100,000+ subscribers has posted some version of "what I wish I'd known whe…
Creator Stack
— The full suite of tools a creator uses to run their business: recording equipment, editing software,…
Creator's perspective:
— A Black creator with 18,000 YouTube subscribers and 11% engagement rate is pitching a brand that req…
Creator-curated community content
— showcasing and amplifying member-created content within the community. When Marcus screenshots a mem…
Creator-specific manifestations:
— **Physical:** Chronic fatigue, headaches when thinking about content, disrupted sleep, getting sick …
Creator-to-Company
— The transition from operating as a solo creator to building a media company with employees, systems,…
Creators of Color Summit
— An annual gathering organized in partnership with multiple platforms and creator advocacy organizati…
credence
— a rational agent's confidence in a proposition, given all available evidence.
Credential breach monitoring
— Services like HaveIBeenPwned's API, SpyCloud, or Enzoic can check if employee credentials appear in …
Credential Collection
— Obtain password hashes, encrypted passwords, or credential databases through exploitation, file syst…
Credential Dumping (T1003):
— Look for processes accessing LSASS memory (lsass.exe) - Check for Mimikatz artifacts in memory - Exa…
Credential harvesting:
— LSASS memory dumping (with appropriate safeguards) - Kerberoasting and AS-REP roasting - NTLM relay …
Credential vaulting
— Passwords stored in encrypted vaults, checked out when needed - **Session recording** — All privileg…
Credentials
— genuine but in a different domain from the claim 2. **Institutional affiliation** — an organization …
credibility
— a recommendation from a maven carries more weight than a random share. When a maven shares your cont…
credibility tax
— a reduction in their professional standing that comes from challenging the consensus. The tax is aut…
Credit scoring
— The use of algorithms to generate numerical scores predicting the likelihood that an individual will…
Credit to Charlotte
— by first name, with her permission
Credited authorship norms
— community expectations that fan creators be credited for their work and that their work be engaged w…
Crediting/blaming QB for all passing results
— Receivers affect YAC - O-line affects pressure - Play-calling affects opportunity
creole
— a fully developed language with complete grammar, rich vocabulary, and the capacity to express anyth…
CREST accreditation levels for companies include:
— **CREST Penetration Testing:** Standard commercial pentesting - **CREST STAR (Simulated Targeted Att…
CREST Registered Penetration Tester (CRT)
— **Vendor:** CREST International - **Cost:** Varies by country (typically $500-$1,500) - **Format:** …
CRF (corticotropin-releasing factor)
— A hormone initiating the HPA axis stress response cascade; elevated in chronic stress states. (Ch. 1…
Criminal charges
— Boeing agreed to a $2.5 billion deferred prosecution agreement in January 2021, acknowledging that t…
Crisis and Correction
— why fields change only when forced to.
Crisis Text Line
— Text HOME to **741741** - Available 24/7 for any crisis
Critical
— where most COBOL lives; hard hardware limit for AMODE 31 | | Theoretical max | 16 EB | 64 | Above th…
Critical (immediate action required):
— Proprietary fraud detection algorithms exposed to third-party services - API keys discovered in AI t…
Critical alerts (PagerDuty — immediate page):
— Active logs: 5 of 6 full - Any object in RECP or GRECP status - Data sharing coupling facility struc…
Critical band
— A frequency-analysis bandwidth of the auditory system, representing the range of frequencies that sh…
Critical bands
— the frequency ranges processed by single auditory filters — represent the cochlea's frequency resolu…
critical bandwidth
— the frequency range within which the auditory system cannot fully separate two simultaneous tones. T…
critical connectors
— if removed, passing routes between other players become longer or impossible. In soccer terms, betwe…
critical edge between order and chaos
— which requires specific constraints to maintain — uniquely possess maximum computational capability …
critical fluctuations
— large, correlated variations that are genuinely informative about the approaching transition. These …
Critical mass
— The minimum amount of something (fissile material, adopters, participants) needed to sustain a self-…
Critical media literacy
— Media literacy that addresses structural questions of media ownership, power, and representation.
Critical parameters:
— `str.contains(pat, case=False)` — case-insensitive search - `str.contains(pat, na=False)` — treat Na…
Critical perspectives:
— Public infrastructure controlled by the state is subject to *state* surveillance, not *corporate* su…
Critical phases:
— **UNDERSTAND:** Map every business rule, every edge case, every undocumented behavior. This is the k…
Critical pluralism
— drawing on multiple frameworks, using each where it illuminates, maintaining skepticism about total …
critical point
— and the transition is sharp relative to the forces driving it. One degree of temperature increase pr…
Critical Situation:
— Away team played Monday Night Football in Week 7 - Now playing Thursday Night in Week 8 (away) - Hom…
critical state
— a knife-edge between order and chaos — without any external tuning.
Critical.io / Project Sonar
— Large-scale internet scanning projects that mapped the global attack surface - **Rapid7 Labs** — Res…
Critically evaluate any quantitative betting claim
— whether from a tout service, a published paper, or your own backtesting --- by applying the appropri…
Criticisms of the methodology:
— The sample size (21 violinists, 6 instruments) was relatively small - The instruments were not the m…
Critics argue:
— It lowers the barrier for malicious hacking - Script kiddies can use it without understanding the un…
Critiques:
— The Aether Committee is advisory, not decision-making - Microsoft laid off its entire ethics and soc…
CRM (Customer Relationship Management)
— Software systems used to track and manage interactions with voters, volunteers, and donors.
CronTrigger
— for cron-style scheduling:
Cross section
— Ch 22.2 A measure of the probability of scattering, with dimensions of area. The differential cross …
cross-cluster transmission
— they carry content from one network into another, entirely different network. This is Granovetter's …
Cross-cultural flirtation encounters
— when people from different flirtation cultures interact — create predictable misreadings in both dir…
Cross-cutting themes across all emerging markets:
— **Inefficiency is the opportunity.** Every emerging market discussed in this chapter is less efficie…
Cross-device tracking
— Techniques for linking behavioral data across multiple devices used by a single individual.
Cross-domain pattern
— A structural or dynamic regularity that appears across multiple, seemingly unrelated fields; the cen…
cross-domain pattern recognition
— and it is, she argues, one of the most undervalued mechanisms in creative research. "The literature …
Cross-generational fan communities
— Doctor Who, Star Trek, long-running soap opera fandoms — demonstrate that fan communities can sustai…
Cross-genre activation:
— Transformation (Ch. 30): canvas changes, progress visible, before/after implied - Sensory (Ch. 28): …
Cross-Job Validation (at pipeline milestones):
— Running totals from CLMINTKE through CLMPAYMT must reconcile - Claim count at each stage must be tra…
Cross-national polling firms
— Ipsos, Gallup, YouGov, and the various national academic survey programs that coordinate through the…
Cross-platform arbitrage trade structure:
— Buy YES on the cheaper platform - Buy NO on the more expensive platform (equivalent to selling YES) …
Cross-Platform Learning
— The most dangerous thing a mainframe architect can do is stop learning about non-mainframe technolog…
Cross-platform metrics (calculated):
— End-to-end transaction latency (API Gateway response time minus CICS response time = integration lay…
Cross-Posting
— Publishing the same content (or adapted versions of it) across multiple platforms simultaneously. Re…
CROSS-REFERENCE
— Chapter 1 covered z/OS Parallel Sysplex and CF data sharing. DB2 data sharing through the coupling f…
Cross-reference with existing entries:
— **Feedback loops (Ch. 2):** Debt is a specific instance of a positive feedback loop. The debt trap i…
Cross-References
— Chapter 16 (The Monetization Landscape): Overview of all creator revenue models and how physical pro…
Cross-references to other patterns:
— Gradient descent (Ch. 7): Exploration solves the local optima problem that pure gradient descent can…
cross-sectional
— a snapshot of many groups at one point in time. Approach (b) is **longitudinal** — following the sam…
Cross-sector patterns
— fiduciary principles, minimum necessary access, breach notification, regulatory lag, and regulatory …
Cross-Site Request Forgery (CSRF):
— Identify sensitive actions that rely on cookie-based authentication and test for CSRF token presence…
Cross-Validation
— A model evaluation technique that partitions data into complementary subsets for training and testin…
Crowd effects are real
— ~1.5 points attributable to fans 2. **Referee bias exists** - Penalty differential disappeared 3. **…
Crowd noise
— affects communication, false starts 2. **Travel fatigue** - especially long distances 3. **Time zone…
Crowd psychology
— Deep mechanisms 2. **Officiating bias** - Subtle effects 3. **Statistical methods** - Proper estimat…
Crucially excluded:
— Shooter identity (to measure difficulty, not ability)
CRUD
— An acronym for Create, Read, Update, Delete -- the four basic operations for persistent data storage…
Crypts of Pythonia
— A text-based adventure game used as a running example for game design concepts. All room description…
Crypts of Pythonia (The Text Adventure)
— A text-based adventure game that starts with a single if/else fork and grows into a full game with i…
Crystallized intelligence
— your accumulated knowledge, vocabulary, and reasoning ability based on experience — continues to gro…
CSRF protection
— Cross-Site Request Forgery attacks can affect any application that processes POST requests. Flask do…
CSS (Cascading Style Sheets)
— The language used to describe the presentation and layout of HTML documents. AI assistants can gener…
CSS selector
— A pattern string for targeting specific HTML elements; used in styling and in BeautifulSoup's `.sele…
CSS selectors
— the same syntax used in web development to style elements. CSS selectors are often more concise for …
CSV
— the universal plain-text format. You mastered encoding (`encoding='latin-1'`), delimiters (`sep=';'`…
CSV export uses `extrasaction="ignore"`
— if tasks have extra fields (like from the undo stack), the CSV writer silently ignores them instead …
CTGAN (Conditional Tabular GAN)
— Description: GAN-based approach for generating synthetic tabular data that preserves statistical pro…
CTR
— Meaningful only when compared against channel-specific benchmarks. A 2% CTR means very different thi…
CTR_FILING
— Currency Transaction Reports (BSA requirement for cash > $10,000).
Cue-taking
— The process by which citizens rely on information shortcuts (cues) from trusted sources — parties, i…
cues
— triggers in the environment that activate the stored memory. Hearing a specific song might retrieve …
Cult of Pedagogy
— cultofpedagogy.com Jennifer Gonzalez's podcast for teachers, but many episodes are directly relevant…
Cultivation theory
— Gerbner and Gross's (1976) theory that sustained heavy exposure to television's representational wor…
Cultural calibration
— describing the cultural world your audience inhabits (what they read, what they buy, what they value…
Cultural capital (Bourdieu)
— Non-financial social assets including education, aesthetic tastes, vocabulary, and ways of being tha…
cultural colonization
— not in the sense that they intended to destroy mountain culture (most of their founders thought they…
cultural genocide
— the deliberate destruction of a people's way of life, language, governance, and connection to homela…
Cultural humility
— The ongoing, self-critical practice of examining one's own cultural assumptions and approaching othe…
Cultural neuroscience
— study of how cultural experiences shape neural structure and function
cultural precursors
— earlier events, content, or conversations that create the conditions for the trend to emerge. A tren…
Cultural relativism
— the anthropological position that moral and social practices should be understood within their cultu…
Cultural truisms
— Widely shared beliefs that have never been seriously challenged and are therefore cognitively undefe…
Cultural/associative responses
— colors carry learned cultural meanings (white = purity in Western culture but mourning in some Easte…
Culturally variable aspects:
— **Number of notes per octave.** Five, seven, twelve, seventeen, twenty-two, and twenty-four are all …
Culturally variable rhythmic properties:
— **Specific meter.** While duple and triple meters are universal, the specific meters used (4/4, 3/4,…
Culture
— shared meanings, practices, values, and knowledge transmitted across generations
Culture and Community
— What traditions or customs from your childhood are still practiced? Which ones have disappeared? - T…
Culture change
— from "move fast and break things" to responsible innovation — requires leadership commitment, psycho…
Culture industry
— Frankfurt School concept (Adorno and Horkheimer) proposing that mass commercial culture produces ide…
culture of appreciation
— the consistent practice of noticing and acknowledging what is good in the other person, which provid…
Culture-of-poverty framing
— scholars such as Elizabeth Catte (*What You Are Getting Wrong About Appalachia*, 2018) argue that Va…
Culture:
— Decisions are made by intuition and seniority, not data - The merchandising team has resisted previo…
Cultured the bacterium
— eventually named *Helicobacter pylori* — proving it existed in the stomach, not as a contaminant but…
Cumulative advantage
— See: Matthew Effect. *First introduced: Chapter 18.*
Cumulative losses
— the accumulation of multiple losses over a period, which can overwhelm even robust coping resources.…
Cumulative projection (Age 30-35):
— Total Win Shares: 21.7 - Expected remaining All-Star selections: 2-3 - Probability of productive car…
cumulative review
— a session where she tests herself on material from across the entire course, mixing old and new. Thi…
curated casual
— a background that looks natural but has been considered. Every visible object should either support …
Curated Content
— Content a creator assembles from other sources — articles, studies, products, recommendations — orga…
Curation by cultural institutions
— radio stations that play "classic" hits, streaming playlists titled "Greatest Songs of the '80s," fi…
Curiosity (as luck strategy)
— The disposition to actively seek out novel information, experiences, and ideas across domain boundar…
Curiosity Gap
— The psychological discomfort created by an information gap — knowing that you don't know something a…
Curiosity is a motivational state
— a drive toward information that is activated by a gap between what you know and what you want to kno…
Curiosity pivot
— The real-time practice of noticing a statement impulse and converting it into a genuine question.
curiosity seed
— an open loop that activates top-down attention. The viewer now has a goal: find out what happened. A…
Current approaches:
— Fractional Kelly (betting a fixed fraction of Kelly, typically 25--50%) as a heuristic for accountin…
Current capacity:
— MQ: 100,000 message queue depth (20 days of buffer at current volume) - DB2: 500 transactions per se…
Current data flows:
— KYC exports a weekly CSV to Transaction Monitoring containing customer risk classifications - Sancti…
CURRENT DATE, CURRENT TIME, CURRENT TIMESTAMP
— These are special registers, not functions (no parentheses):
Current infrastructure:
— 8 application servers behind an AWS Application Load Balancer - PostgreSQL primary with 2 read repli…
Current landscape (as of early 2026):
— 38+ states plus DC have legalized sports betting in some form - Mobile betting is legal in approxima…
Current mainframe costs:
— System contributes 800 MIPS to the total mainframe workload - Software licensing cost attributed to …
Current market prices
— queried on every page load and WebSocket tick. 2. **Open orders for a market** --- queried by the ma…
current message
— The AI's **response as it generates it**
Current phase
— she updates this section as the engagement progresses ("We are in data collection phase" or "We are …
Current propane system:
— 920 gallons × $2.85/gallon = $2,622/year - Assuming $3,000 in equipment life remaining (prorated rep…
Current Roster RBs:
— RB1: 15.0 PPG, 8 weeks remaining - RB2: 10.0 PPG, 8 weeks remaining
Current state (baseline, documented):
— The current process requires 4.2 FTE of analyst time allocated to regulatory reporting activities, a…
Current state of the technology:
— Fully homomorphic encryption (FHE), which supports arbitrary computations, has been theoretically po…
Current state:
— 2.8 million lines of COBOL across 1,400 programs - DB2 database with 340 tables, some with 200+ colu…
Current systems with autonomous functions:
— **Missile defense systems** (e.g., the U.S. Phalanx CIWS, Israel's Iron Dome) that automatically det…
Current volumes:
— 20,000 claims adjudicated per business day - ~5,000 are HSA-eligible (25%) - Processing concentrated…
CURRENTDATA
— Controls data currency for ambiguous cursors:
Curry-Draymond Pick-and-Roll:
— Curry's gravity created open shots for others - Draymond's passing from short roll created layups - …
Curse of dimensionality
— The phenomenon whereby the computational or data requirements for solving a problem grow exponential…
curse of knowledge
— the difficulty that experts have in imagining what it's like to not know what they know. It's not un…
CURSOR
— In *DB2*, a mechanism for processing a result set row by row. A COBOL program declares a cursor, ope…
Cursor declarations:
— Each cursor optimized for its specific access path - FETCH FIRST 50 ROWS ONLY on all multi-row curso…
Cursor Positioning
— In *BMS*, the technique of placing the screen cursor at a specific field position. Achieved by setti…
Cursor Stability (CS)
— The default, and the right choice for most online transactions. It locks the current row only while …
Custom Audiences
— Facebook's advertising feature that allows campaigns to target specific individuals by matching thei…
Custom roles
— a visible "Community Veteran" or "Trusted Member" Discord role that signals status within the server…
Custom sorting
— sort tasks by priority, due date, creation date, or title using `key` functions and `lambda` 2. **Bi…
Custom Sports Lexicons
— Build domain-specific dictionaries - Continuously update
CUSTOMER
— a person or business that holds accounts - **ACCOUNT** — a financial product held by a customer (che…
Customer account access
— the ability for customers to access their accounts (mobile app, web banking). Disruption impact: hig…
Customer Acquisition Cost (CAC)
— Total marketing and sales spend divided by new customers acquired. Only meaningful in context of wha…
Customer churn prediction
— a well-defined binary classification problem with clean tabular data 2. **Product demand forecasting…
Customer count change (net adds)
— Did the company grow revenue by winning more customers or by selling more to existing customers? Bot…
Customer Due Diligence (CDD):
— Identity verification for all customers (KYC) - Enhanced due diligence for high-value or high-risk c…
Customer engagement level
— customers who read newsletters are likely already more engaged with the brand, and this engagement (…
Customer Lifetime Value (LTV)
— The total revenue expected from a customer relationship: Average Order Value × Purchase Frequency × …
Customer Name
— Last name (up to 25 characters), first name (up to 20 characters), middle initial (1 character). Mus…
Customer onboarding
— the ability to onboard new customers through the KYC process. Disruption impact: medium (new custome…
Customer Portal (14 AI-atomic tasks)
— Feedback submission form with rich text editor - File attachment upload (images, screenshots) - Feed…
Customer Record
— personal information, identification, contact details, and customer classification 2. **Account Reco…
Customer test data:
— At least 10 customer records covering all customer types (individual, business, trust) and all statu…
CUSTOMER_ADDRESS
— Multiple addresses per customer with type classification.
CUSTOMER_DOCUMENT
— Identity and regulatory documents.
CUSTOMER_EMAIL
— Multiple email addresses per customer.
CUSTOMER_PHONE
— Multiple phone numbers per customer.
Cutback
— A pass or cross delivered backward from the byline toward the edge of the penalty area, creating hig…
CV = Standard Deviation / Mean
— CV below 0.25: Low volatility — relatively stable income - CV of 0.25–0.50: Moderate volatility — ty…
CVPR (Computer Vision and Pattern Recognition)
— Premier computer vision conference - Annual, proceedings available online
CVPR Sports Workshop
— Workshop at CVPR focused on sports vision
CWE (Common Weakness Enumeration)
— cwe.mitre.org The authoritative catalog of software weakness types. When AI identifies a security is…
cybernetics
— the science of communication and control in animals and machines.
Cycle detection
— if the data might contain cycles (an employee who indirectly manages their own manager), track visit…
Cyclomatic Complexity = 12
— in the "moderate" range, but approaching "high." This paragraph is a candidate for refactoring.
Cynthia Rudin's argument
— that inherently interpretable models should be used in high-stakes domains rather than complex model…
D
d)
— Descriptive: "What is the average drink price of the four coffee shops in this dataset?" (Just summa…
D) 0.65
— FCS competition significantly discounted.
D) 1st & goal at opponent's 3
— Closest to guaranteed touchdown, EP ~5.5-6.0.
D) 95% of expected data is present and valid
— Quality scores measure overall data completeness and correctness.
D) All kickoff results weighted by frequency
— Expected starting position = sum of (probability × starting position) for all outcomes.
D) All of the above
— EPA provides complete contextual evaluation.
D) Both A and B
— Directional kicking avoids elite returners and compensates for poor coverage.
D) Both A and C
— Teams don't always score TDs, and XPs aren't guaranteed.
D) Both B and C
— High turnover rate and lack of explosives can explain this.
D) Changing player team assignments
— Team assignments are constant; only coordinates and angles need transformation.
D) Daryl Morey
— As Houston Rockets GM, his analytical approach became known as "Moreyball."
D) Elite alpha
— 35%+ indicates dominant target share.
D) Field goals, three-pointers, and free throws
— TS% = PTS / (2 × (FGA + 0.44×FTA)).
D) IRLM
— The Internal Resource Lock Manager handles all lock management including deadlock detection. A spike…
D) LOAD utility
— Minimal logging. LOAD writes data pages directly and logs only control information (which pages were…
D) Media economics
— Masterman's four key concepts were: media languages, media representations, media institutions, and …
D) Opponent's 20-0 (red zone)
— Each yard is worth more as you approach the goal line.
D) Passive reading
— Hall's three positions were: the dominant/preferred reading (accepting the text's intended meaning),…
D) Return units
— Returns can swing from touchdowns to fumbles, creating highest variance.
d) Separate file
— adding a companion file avoids any change to the existing record. This is the safest approach when n…
D) Shooting (40%)
— Oliver found shooting efficiency is the most important factor for winning.
D) Tight End
— TE has the steepest dropoff after elite players.
d) Tradeoffs:
— **Player X:** Higher ceiling, more impactful per minute, but durability/availability concerns. Ideal…
D) Variable based on field position
— EPA for a touchdown is approximately 7 minus the expected points at the starting field position.
D) Week 13 (very late bye)
— Late byes have 1.4x multiplier; teams get rest when it matters most for playoff push.
D3.js Documentation
— Interactive examples at d3js.org.
D3.js Network Layouts
— Web-based visualization - Interactive features - https://d3js.org/
D5. Outcome Analysis
— How does the actual outcome compare to your ideal, acceptable, and minimum acceptable outcomes from …
DAG diagram
— updated monthly, showing all jobs and dependencies 2. **Critical path documentation** — which jobs a…
Daily (10–20 minutes total):
— Morning: brief review of the day's intention (what kind of person do I want to be today in the speci…
Daily (5-10 minutes):
— Scan one curated newsletter. *The Batch* (Andrew Ng) and *TLDR AI* provide high-signal summaries of …
Daily (max 20 minutes total):
— Morning practice (5 minutes): - Evening review (5 minutes): - Environmental maintenance (ongoing):
Daily emotional summary:
— Did social media use improve, worsen, or not change your mood today overall? ___________ - Which ses…
Daily fragmentation monitoring
— A scheduled job queries SYSTABLESPACESTATS and REORG REPORTONLY, alerting when disorganization excee…
Daily Monitoring:
— Pre-game wellness survey - Tracking load from prior games - Practice load integration
Daily motivational quote scraper
— Fetch a random quote from `quotes.toscrape.com` and display it when the app starts, with caching so …
Daily QA Checks:
— Review the day's findings for completeness - Verify all evidence is properly stored and labeled - Ch…
Daily Routine During Week 3:
— Complete your luck journal entry (5-10 minutes) - Complete your intervention tracking entry for both…
Daily Standup:
— Add an optional "AI note" where developers briefly share AI successes or struggles - Watch for patte…
Daily Transaction Input
— Sequential file, fixed-length 200-byte records, expected volume 2 million records per day. 2. **Acco…
Damping
— The process by which the amplitude of an oscillating system decreases over time due to energy dissip…
Dana Whitfield (38)
— Senior Marketing Analyst, 8 years at Greenfield. Dana is the team's Excel power user. She has built …
Dangerous Attack
— A possession sequence that enters the final third and results in a shot or penalty area entry. The r…
Dangerous methods to check for:
— **PUT/DELETE**: If enabled without authentication, attackers may be able to upload arbitrary files o…
Daniel Boone
— and Boone's fame is both deserved and distorting. Boone was a real person who did real things: he ex…
Daniel Willingham's Science and Education Blog
— danielwillingham.com The cognitive scientist's blog covering learning myths, research controversies,…
Danish folk high schools
— residential adult education institutions that had been operating since the mid-nineteenth century.
Danny Page, "Expected Goals and Match Prediction"
— A practical walkthrough of building an xG-based match prediction model in Python.
Darian's brand pillars:
— **Lens:** Cultural analysis ("What does this say about us?") - **Credibility:** Research-backed take…
dark data
— the data that does not exist, not because the phenomena do not exist, but because no one has measure…
dark figure of crime
— the gap between crimes committed and crimes recorded. For many categories of offense -- domestic vio…
Dark knowledge
— Knowledge that exists within a system but is not documented, formalized, or easily communicated; inc…
Dark money
— Political spending by nonprofit organizations that are not required to disclose their donors, enabli…
Dark patterns
— User interface designs that deliberately trick or mislead users into making choices that serve the c…
dark shares
— sharing motivated by negative emotions and negative intentions toward the content or its creator.
Dark Social
— Traffic that arrives at a website or link through private channels (direct messages, WhatsApp, email…
Dark triad
— The cluster of subclinical personality traits comprising narcissism, Machiavellianism, and psychopat…
DARVO
— Acronym for Deny, Attack, and Reverse Victim and Offender; a manipulation tactic identified by Jenni…
DASD
— Direct Access Storage Device. A disk storage device on a mainframe, such as an IBM 3390. DASD volume…
DASD architecture
— volumes, VTOCs, and the two-level catalog structure (master catalog and user catalogs) -- provides t…
Dash
— The framework for building full analytical web applications in pure Python, built on top of Plotly. …
dash / the dash
— Tumblr's primary feed, showing posts from accounts you follow and tagged content you follow; where T…
Dashboard specification:
— Real-time metrics (request volume, response time, error rate) - Per-consumer breakdown - Backend hea…
Data & Society Research Institute
— *Focus:* Social and cultural implications of data and automation - *Notable work:* Research on media…
Data (excluding pushes):
— n = 123 games (128 minus 5 pushes) - Underdog covers = 72 - Observed proportion: p_hat = 72/123 = 0.…
data about the data
— statistics. The optimizer must know:
Data Access Demonstration:
— Identify and document access to sensitive data categories: - **PHI (Protected Health Information):**…
Data Analyst:
— Focuses on answering specific business questions with existing data - Primary tools: SQL, Excel, Tab…
Data and Confidentiality
— [ ] Identify which AI tools are approved for team use - [ ] Define categories of information that ca…
Data and Data Governance (Article 10)
— [ ] Use training, validation, and testing datasets that are relevant, sufficiently representative, a…
Data and Metrics:
— The nflfastR/nfl_data_py ecosystem provides rich play-by-play data with pre-calculated EPA, WPA, and…
Data anomalies
— duplicate, inconsistent, or contradictory data because relationships were not properly modeled. 2. *…
Data architecture
— What data flows where, and in what order? - **Systems architecture** — How many initiators, LPARs, D…
Data Architecture (Part II):
— [ ] Logical data model (entity-relationship diagram) - [ ] Physical data model (DB2 DDL for all tabl…
Data architecture patterns
— partitioning, history tables (especially temporal tables), and archival via partition detach — are s…
Data assembly
— Identify development sample, define observation window, define default window (typically 12 months).…
Data assets introduced:
— `acme_sales_2023.csv` — introduced in Chapter 11 - `acme_inventory.db` — introduced in Chapter 23 - …
data asymmetry
— the platform's monopoly on the information necessary for informed decision-making. - **Algorithmic w…
Data Available Through NBA Stats:
— Player speed and distance - Touches and time of possession - Contested/uncontested shot classificati…
Data available:
— Current market prices and order books (real-time) - Historical price data with configurable interval…
Data broker
— A company that collects personal information from diverse sources — public records, loyalty programs…
Data brokers
— companies whose primary business is collecting, aggregating, and selling information about individua…
Data Categories:
— Four Factors (eFG%, TOV%, ORB%, FT Rate) - Lineup data - On/Off statistics - Zone shooting percentag…
data centers
— the massive server farms that store and process the digital information on which the modern economy …
Data Class
— defines the default physical attributes of a dataset (RECFM, LRECL, BLKSIZE, SPACE, and DSNTYPE). If…
Data collection
— What data is collected about workers, and is the collection proportionate to legitimate management n…
Data Collector
— Fetches odds from the API on a schedule 2. **Database** -- Stores historical odds in SQLite 3. **Ana…
data colonialism
— the idea that contemporary data extraction practices reproduce the logic of historical colonialism: …
Data component
— Contains the actual records, stored in key sequence within control intervals. - **Index component** …
DATA DIVISION
— The third of COBOL's four divisions, containing all data definitions used by the program: FILE SECTI…
Data Division checks:
— Are all data items properly initialized (or explicitly initialized in the PROCEDURE DIVISION before …
Data Division Survey Checklist:
— [ ] How many files? Input vs. output? - [ ] How many record types (REDEFINES on FD records)? - [ ] W…
Data Engineer (James)
— Needs: nba_api, requests, sqlalchemy for data pipelines - "I pull data from multiple sources daily."
Data Engineer:
— Focuses on building and maintaining the infrastructure that makes data available - Primary tools: SQ…
Data Engineering
— The practice of collecting, cleaning, transforming, and organizing data for analysis. Typically cons…
Data Engineering with Python (DataCamp)
— Comprehensive introduction to Python-based data engineering.
Data Engineers:
— Build and maintain data infrastructure (databases, pipelines, APIs) - Ensure data quality and access…
Data Ethics Audit
— Conduct a comprehensive ethical audit of a real data system 2. **Policy Brief** — Draft a policy bri…
data exhaust
— information generated as a side effect of digital activities.
Data Exposed:
— **Names, dates of birth, and Social Security numbers** for approximately 40 million former and prosp…
data flywheel
— a self-reinforcing cycle:
Data gathering:
— Find your system's BTU/hour capacity (from label or nameplate) - Estimate your cooling season length…
Data Handling
— [ ] I've inspected the data and reported its basic properties - [ ] I've created a data dictionary -…
Data handling OPSEC:
— Encrypt all collected data at rest and in transit - Never exfiltrate real sensitive data (use proof …
Data handling:
— Production data subsetted (HIPAA compliance: no real PHI in dev/test) using IBM InfoSphere Optim - T…
Data Infrastructure
— Centralized data warehouse integrating all sources - Real-time data pipelines for tracking and weara…
Data Infrastructure:
— The company runs on a 15-year-old point-of-sale (POS) system that stores data in a proprietary forma…
Data Ingestion Layer:
— Automated feeds from multiple event data providers (adapted per league) - Tracking data integration …
Data Injection
— Adding crafted samples to the training set: - Inject samples that create a specific decision boundar…
Data is accessible
— without the data file, the notebook can't run. 2. **Cells run in order** — out-of-order execution cr…
Data is collected by intermediaries
— platforms, corporations, development projects — that provide services (weather information, market p…
data justice
— and they connect directly to the Power Asymmetry, Consent Fiction, and Accountability Gap themes tha…
Data Layer
— Multi-source ingestion pipeline - Data validation and quality monitoring - PostgreSQL storage with p…
Data Layer:
— Database (MySQL, PostgreSQL, MongoDB, Oracle, SQL Server) - Caching (Redis, Memcached, Varnish) - Se…
data leakage
— using information from the game you are trying to predict.
Data lineage
— the ability to trace data from source through transformation to compliance output — is both a regula…
data literacy
— the ability to read, interpret, and reason with data — becomes essential. Data literacy is for data …
Data literacy programs
— Community-organized programs that build the technical knowledge needed for meaningful participation …
Data loss risk (RPO)
— can committed transactions be lost if the primary fails? - **Transaction latency** — does the primar…
Data Management Platform (DMP)
— A system that aggregates behavioral data from multiple sources and organizes it into audience segmen…
Data merge
— The process of combining records from two or more datasets using a common identifier (often a voter …
Data migration and reconciliation
— Moving 40 years of data from IMS/DB2 to a new platform is not a weekend job. Budget 15-20% of total …
Data minimization
— A privacy-by-design principle holding that systems should collect only the minimum data necessary fo…
Data Output:
— Raw positional data at 25 fps with positional accuracy of approximately 10-30 centimeters - Derived …
data pipeline
— the end-to-end process by which raw data is transformed into business value.
Data Pipeline:
— Daily POS data from 340 stores, cleaned and validated within 24 hours - External data feeds: promoti…
Data poisoning targets the trust root
— Compromising training data compromises the model itself, and backdoor attacks can be nearly impossib…
Data portability
— the right to receive your data in a structured, commonly used format and transmit it to another serv…
Data preparation
— structuring match results for regression. 2. **Parameter estimation** — fitting a Poisson regression…
Data preparation requirements
— Play-by-play data transformed to stint-level observations - Each stint has 10 player indicators (+1 …
Data preprocessing:
— Normalize images to $[-1, 1]$ (matching Tanh output in the generator) rather than $[0, 1]$. - Use da…
Data Processing:
— Position smoothing and correction (raw GPS data is noisy and requires filtering) - Physical metric c…
Data Products:
— **Opta F24:** The core event data feed, providing detailed event records for each match. The F24 for…
data protection by default
— personal data should be processed only to the extent necessary for each specific purpose, and by def…
Data Protection Officer (DPO)
— Required by the GDPR for organizations that process personal data at scale - Responsible for ensurin…
Data provenance
— the documented history of where data came from, how it was processed, and who handled it — is increa…
Data Provenance Tracking
— Record the source and lineage of all training data > - **Anomaly Detection on Training Data** — Iden…
Data Provided:
— Player statistics (15 metrics each) - Population distributions for percentile calculations - Game-by…
Data quality issues
— missing data, errors, inconsistencies—are present in all datasets. Awareness and explicit handling a…
Data Quality Metrics:
— Input feature distributions - Missing value rates - Feature correlations - Input volume
Data Readiness
— [ ] Data requirements identified for all planned capabilities - [ ] Data quality assessment complete…
data reconciliation
— comparing two data sources to find gaps on either side
Data Reconciliation:
— Verify that all testing data is properly organized in your evidence directory - Cross-reference your…
DATA RECORD IS record-name
— Names the 01-level record description that follows. Like LABEL RECORDS, this clause is informational…
Data requirements:
— Data needed from mainframe: ________________________________________________ - Synchronization patte…
Data Science:
— Jupyter notebooks for exploratory analysis (interactive documents that mix code, text, and visualiza…
Data Scientist:
— Focuses on building models, conducting statistical investigations, and discovering patterns - Primar…
Data Scientists:
— Build statistical models and machine learning systems - Develop new metrics and frameworks - Conduct…
Data Sensitivity:
— Does the system process, store, or transmit regulated data (PII, PHI, PCI)? - What is the regulatory…
Data sharing considerations:
— Expected cross-invalidation rate: ________% - Group buffer pool castout threshold: ________% - Lock …
data snooping
— and the fact that the industry uses the same term for legitimate data analysis and for overfitting r…
Data Snooping Simulation:
— Simulate 100 betting strategies, each with 200 bets at true 50% win rate - Show the distribution of …
Data source confirmed
— Where does the data come from? Database, API, CSV? - [ ] **Aggregation point identified** — Does Pyt…
Data sources:
— Participant observation in a bounded fan community space (a fandom subreddit, Discord server, or Tum…
Data sovereignty
— African agricultural data should be governed under African frameworks - **Benefit sharing** — entiti…
Data Standards:
— Review vendor documentation for data formats and export options
Data stewardship models
— centralized, federated, and hybrid — determine how governance responsibility is distributed. Most ma…
Data Storage:
— PostgreSQL 14: Primary relational database for orders, products, customers, and merchant accounts. -…
Data Strategy and Data Literacy
— What is data strategy · Data governance fundamentals · Data quality dimensions · Data silos and inte…
Data Structure:
— **Competitions:** Metadata about available competitions and seasons - **Matches:** Match-level infor…
Data Structures
— Lists and list comprehensions - Dictionaries - Sets and tuples - Basic understanding of classes and …
Data subject rights have mandatory deadlines
— 30 days for access/portability/erasure/restriction; extendable to 90 days with notification. Missing…
Data Subjects:
— People whose prior arrests formed the training data — had no voice in whether their data was used, n…
Data Tables
— Complete detail for readers who want it - Sortable in Excel; paginated in HTML - Footnotes explainin…
Data targeting:
— File share enumeration and sensitive data discovery - Database access and query execution - Email ac…
Data they already had:
— **Point-of-sale (POS) transaction records:** Every sale at every location, going back three years. T…
Data they needed to find:
— **Neighborhood demographics:** Population density, median household income, age distribution, and pe…
Data they wished they had but didn't:
— **Customer home addresses:** They knew where people *bought* coffee but not where they *lived*. With…
Data to track:
— Individual bet CLV - Moving average CLV (last 50 bets) - Cumulative CLV - Win rate vs expected win r…
data transformation
— There's **no state to maintain** between calls - The logic is a **pipeline** (input -> transform -> …
data trusts
— proposes that personal data be managed by independent trustees who owe duties to the data subjects, …
Data Type Safety
— The `setXxx()` methods ensure correct type conversion between Java types and DB2 types.
Data Understanding Phase:
— [ ] Examine data types, missing value patterns, and distributions for every feature. - [ ] Understan…
Data Warehouse:
— Centralized storage with club-specific access controls - Standardized data models that enable cross-…
Data you need:
— Current attic R-value (from Exercise 4-3) - Target R-value (from Exercise 4-1) - Your home's approxi…
Data-dependent jitter
— jitter whose timing variations are correlated with the digital data stream — is the most complex and…
data-ink ratio
— the proportion of the ink on the page that represents data versus the ink used for borders, backgrou…
Data.gov
— Government open data - Varied data quality - https://data.gov/
Data:
— Play-by-play data (100+ plays) - Drive summaries - Player statistics - Win probability at each play
Database
— 2 million rows updated nightly requires efficient querying, not reloading entire files. SQL lets the…
Database Calls:
— **GU** (Get Unique): Direct access by key -- random access to any segment. - **GN** (Get Next): Sequ…
Database Configuration (DB CFG)
— applies to a specific database:
Database connections
— the first thing to saturate. 2. **Lock contention** --- multiple orders for the same market compete …
Database exception table (DBET)
— tracks the status of databases, tablespaces, and index spaces across members (e.g., which objects ar…
Database Manager Configuration (DBM CFG)
— applies to the instance:
Database Migration
— A version-controlled change to a database schema. Managed by tools like **Alembic** to ensure databa…
Database migrations
— Flask does not manage database schema changes. If you add a column to a database table, you handle t…
Database Server (db.shopstack-staging.local):
— PostgreSQL 12.3 (CVE-2022-1552, CVSS 8.8) - Remote connections from any IP (pg_hba.conf misconfigura…
Database trigger
— must fire regardless of which application modifies data | | Data validation that must be absolute | …
Databases
— How to store, organize, query, and manage large amounts of data efficiently. You used JSON files for…
Databases/SQL
— the enterprise format. You wrote your first SQL queries (SELECT, WHERE, JOIN, GROUP BY) and used `pd…
DataCamp
— https://www.datacamp.com/ - Interactive courses including sports analytics tracks
DataCamp - Sports Analytics Track
— Focus: General sports analytics with soccer applications - Level: Beginner to Intermediate
DataCamp Soccer Analytics Courses
— "Introduction to Soccer Analytics" - Practical Python implementations - https://www.datacamp.com/
DataCamp Sports Analytics Track
— Python-based sports analysis courses - Practical coding exercises - Subscription required
DataCamp: "Cleaning Data in Python"
— Interactive Python course - Hands-on exercises - https://www.datacamp.com/ - Good for beginners
DataCamp: "Data Manipulation with pandas"
— Interactive learning format - Soccer-compatible techniques - Immediate feedback
DataCamp: "Statistical Thinking in Python"
— Practical, hands-on approach - Sports examples included - Quick interactive format
DataCamp: Python for Data Science
— Interactive Python learning - Statistics and visualization - Machine learning fundamentals
DataCamp: Sports Analytics Track
— R and Python courses - Hands-on coding - Football-specific projects
Dataclass
— A Python decorator (`@dataclass`) that automatically generates `__init__`, `__repr__`, `__eq__`, and…
DataField.Dev COBOL Trilogy --- Book 3
— *An open-source textbook for the mainframe professionals who keep the world running.*
DataFrame
— a two-dimensional table, like a spreadsheet or a SQL table - **Series** — a one-dimensional column, …
DataLens
— a data pipeline and analytics platform that ingests data from multiple sources, transforms it throug…
dataprep
— Automatic data preparation - Data profiling and cleaning - https://dataprep.ai/ - Quick initial data…
Dataset
— The z/OS term for a file. Datasets are cataloged in the *ICF catalog* and have a 44-character name o…
Dataset summary (47 polls, all dates):
— 28 LV polls, 14 RV polls, 5 Adult polls - Average sample size: 682 respondents - Methodologies: 13 C…
Dataset:
— 5 seasons of NBA regular season games (6,150 games) - Opening lines, closing lines, and results - Po…
Datasets:
— Pro-Football-Reference game logs - nflfastR play-by-play - Historical spread data
datasheets for datasets
— standardized documentation that accompanies training data, analogous to nutrition labels on food. Th…
dataveillance
— coined by Roger Clarke in 1988 --- refers to the systematic monitoring of people's actions or commun…
Date Arithmetic
— DB2 supports direct arithmetic on dates:
Date Fields
— Account open date, last transaction date, and last statement date. All dates must include full four-…
DateTrigger
— run once at a specific time:
Dating market stigma
— The experience of perceiving oneself as racially or otherwise devalued in romantic contexts as a con…
DAU / MAU (Daily/Monthly Active Users)
— Engagement metrics measuring how many unique users interact with a platform in a given day (DAU) or …
Dave Kowalski
— Dave is a single first-time buyer who purchased a rural property with well and septic. He has a high…
David Sumpter, "Is Maths Killing Football?"
— TEDx talk. An accessible overview of how mathematical models are used in football, including match p…
Day 1 (Match Day -4): Initial Data Pull
— Aggregate event and tracking data from the opponent's last 5-10 matches - Generate automated tactica…
Day 1 — API Enablement
— Morning: Chapter 33 (z/OS Connect, API mediation, OpenAPI generation). Chapter 34 (event-driven arch…
Day 1 — Architecture Review and Final Prep
— Morning: Integration session — review MedClaim end-to-end. Discuss architectural decisions, tradeoff…
Day 1 — Checkpoint/Restart and Performance
— Morning: Chapter 25 (checkpoint/restart), Chapter 26 (batch performance tuning). - Afternoon: Lab — …
Day 1 — Embedded SQL and Cursors
— Morning: Chapter 7 (static and dynamic SQL), Chapter 8 (cursor processing). - Afternoon: Lab — write…
Day 1 — Locking, Stored Procedures, Utilities
— Morning: Chapter 10 (locking and concurrency), Chapter 11 (stored procedures), Chapter 12 (utilities…
Day 1 — MQ Integration
— Morning: Chapters 20-21 (MQ architecture, MQI calls from COBOL, async patterns). Chapter 22 (poison …
Day 1 — Queues, Web Services, and Diagnostics
— Morning: Chapter 17 (channels and containers, TS/TD queues), Chapter 18 (CICS web services) — conden…
Day 1 — RACF and DB2 Security
— Morning: Chapter 29 (RACF fundamentals, profiles, access control), Chapter 30 (DB2 security, grants,…
Day 1 — z/OS Architecture (Condensed)
— Morning: Chapters 1-3 condensed — z/OS address spaces, virtual storage, subsystem architecture. Focu…
Day 1: Tool Setup
— Install approved AI coding tools (list specific tools and versions) - Configure tools using the team…
Day 2 (Match Day -3): Deep Analysis
— Detailed build-up play analysis with passing network graphs - Defensive vulnerability mapping (spati…
Day 2 — Batch Design
— Morning: Chapter 23 (advanced JCL, batch design patterns), Chapter 24 (SORT/MERGE). - Afternoon: Lab…
Day 2 — CICS Architecture
— Morning: Chapter 13 (CICS architecture), Chapter 14 (BMS maps). - Afternoon: Lab — create MedClaim c…
Day 2 — CICS Security and Compliance
— Morning: Chapter 31 (CICS security) — condensed. Chapter 32 (audit and compliance) — condensed. Focu…
Day 2 — CICS-DB2 Integration
— Morning: Chapter 16 (CICS-DB2 integration, thread management, DSNCRLI). - Afternoon: Lab — integrate…
Day 2 — DB2 Performance
— Morning: Chapter 9 (EXPLAIN, indexing, access paths). Hands-on EXPLAIN interpretation. - Afternoon: …
Day 2 — DevOps Pipeline
— Morning: Chapter 36 (testing strategies, zUnit), Chapter 37 (CI/CD, Git SCM, DBB). - Afternoon: Lab …
Day 2 — Final Assessment
— Morning: Final practical exam (2 hours). Timed exercise: participants receive a partially complete C…
Day 2 — Language Environment and DB2 Concepts
— Morning: Chapters 4-5 condensed (LE runtime options that matter for DB2 and CICS programs, key compi…
Day 2 — Midterm Practical
— Morning: Review session (1.5 hours). Midterm practical (1.5 hours). Timed exercise: participants rec…
Day 2 — Scheduling and Parallel Processing
— Morning: Chapter 27 (workload scheduling, DAG concepts) — condensed lecture. Chapter 28 (parallel pr…
Day 2-3: Prompt Library Orientation
— Review the team's prompt library and its organization - Complete three guided exercises using prompt…
Day 4 (Match Day -1): Presentation and Refinement
— Present to coaching staff - Incorporate coach feedback and adjust recommendations - Prepare player-f…
Day of month
— captures paycheck cycles (spending often spikes on the 1st and 15th) - **Week of year** — captures a…
DAYS
— Converts a date to an integer representing the number of days since December 31, 0000:
DAYTIME
— Online transactions at importance 1, batch at importance 3-4 - **BATCHWIN** — Batch critical-path at…
DB2
— IBM's relational database management system for z/OS (and other platforms). COBOL programs access DB…
DB2 10 for z/OS: Database Administration
— Covers the DBA lifecycle including utility management, backup strategy, and recovery procedures with…
Db2 11.5 for LUW
— operational database for the digital banking platform, mobile app backend, and customer analytics - …
Db2 11.5 for LUW: ALTER TABLE statement
— Search for "ALTER TABLE" in the Db2 11.5 for LUW SQL Reference. Covers all supported ALTER operation…
Db2 11.5 for LUW: EXPORT, IMPORT, LOAD commands
— Search for each command in the Db2 11.5 Data Movement Utilities Guide. These are the primary tools f…
Db2 11.5 for LUW: REORG TABLE command
— Search for "REORG TABLE" in the Db2 11.5 for LUW Command Reference. Documents classic and inplace RE…
Db2 11.5 for LUW: Upgrading to Db2 11.5
— Search for "Upgrading" in the Db2 11.5 Installation and Upgrade documentation. Covers db2iupgrade, U…
DB2 11.5 Knowledge Center: Backup and Recovery
— Complete reference for BACKUP DATABASE, RESTORE DATABASE, ROLLFORWARD DATABASE, and all related comm…
DB2 11.5 Knowledge Center: Database Logging
— Detailed explanation of log file configuration parameters, archive logging setup, and log management…
Db2 11.5: Administrative Routines and Views
— `ADMIN_GET_TAB_COMPRESS_INFO`, `MON_GET_TABLESPACE`, `SNAP_GET_TBSP`.
Db2 11.5: Database Administration Guide
— Table partitioning overview, range partitioning, hash partitioning, ATTACH/DETACH operations. https:…
Db2 11.5: Database Partitioning Guide
— Database Partitioning Feature (DPF), partition groups, distribution keys, collocated joins. https://…
Db2 11.5: SQL Reference
— CREATE TABLESPACE, ALTER TABLE ... PARTITION, COMPRESS YES ADAPTIVE, INLINE LENGTH.
Db2 12 for z/OS: ALTER TABLE statement
— Search for "ALTER TABLE" in the Db2 12 for z/OS SQL Reference. This is the definitive reference for …
Db2 12 for z/OS: Managing Pending States
— Search for "pending definition changes" or "REORG-pending" in the Db2 12 for z/OS Administration Gui…
Db2 12 for z/OS: Migration from Db2 11 to Db2 12
— Search for "Migrating to Db2 12" in the Db2 12 for z/OS documentation. Covers Compatibility Mode, En…
Db2 12 for z/OS: Utility Guide — REORG TABLESPACE
— Search for "REORG TABLESPACE" in the Db2 12 for z/OS Utility Guide and Reference. Covers SHRLEVEL op…
DB2 13 for z/OS Administration Guide
— Chapters on tablespace design, index design, and storage management provide operational context that…
DB2 13 for z/OS Installation and Migration Guide
— Covers initial log configuration, BSDS setup, and the DSNJU003/DSNJU004 utilities for log management…
DB2 13 for z/OS Utility Guide
— Understanding REORG, CHECK DATA, REBUILD INDEX, and COPY is essential for managing the DDL lifecycle…
DB2 13 for z/OS Utility Guide and Reference
— Detailed reference for the COPY, RECOVER, QUIESCE, REPORT RECOVERY, REBUILD INDEX, and CHECK DATA ut…
DB2 13 for z/OS: Administration Guide
— Chapter on tablespace design, partitioning, and compression. IBM Knowledge Center. - Sections on Uni…
DB2 13 for z/OS: Managing Performance
— Chapter on partitioning strategies and partition elimination. IBM Knowledge Center. https://www.ibm.…
Db2 13 for z/OS: Managing Security
— Chapters on authorization and column access control 4. **z/OS ICSF Administrator's Guide** — Chapter…
DB2 13 for z/OS: SQL Reference
— CREATE TABLESPACE syntax, ALTER TABLESPACE, partition management. - Complete syntax diagrams for all…
DB2 13 for z/OS: Utility Guide and Reference
— REORG TABLESPACE, RUNSTATS, COPY, DSN1COMP. - Covers partition-level utility execution and compressi…
DB2 9 for z/OS Performance Topics
— SG24-7473. Covers monitoring improvements in DB2 9, including enhanced DISPLAY commands and new IFCI…
DB2 Access Pattern:
— Tables read: ________________ - Tables written: ________________ (should be NONE for balance inquiry…
DB2 and CICS: The Perfect Couple (SG24-7421)
— Integration patterns between DB2 and CICS, including connection pooling, thread management, and data…
DB2 Application Programming and SQL Guide
— Covers external stored procedures in Java, C, and COBOL, including parameter styles, JVM configurati…
DB2 catalog
— the system tables that store metadata about every object in the database. The RUNSTATS utility (z/OS…
Db2 Community Edition on Docker Hub
— Official Db2 container image with deployment instructions, environment variables, and configuration …
DB2 Connection Statistics
— CICS-DB2 thread usage. Key fields: - Current and peak active threads - Thread wait count (tasks wait…
DB2 coordination:
— Automatic — the COMMIT/ROLLBACK handles it.
DB2 data sharing
— multiple DB2 subsystems accessing the same data simultaneously through the Coupling Facility's group…
DB2 DRDA distributed processing
— queries from remote clients, JDBC/ODBC access - **DB2 parallel query processing** — CPU consumed by …
Db2 Federated Systems Documentation
— Complete reference for wrappers, server definitions, user mappings, nicknames, and federated query o…
Db2 for LUW — SQL Reference: System Catalog Views
— Search for "Db2 LUW SYSCAT views" on IBM Documentation. The system catalog views section provides co…
DB2 for LUW: EXPLAIN facility
— Search for "db2expln" and "db2exfmt" in the Db2 11.5 documentation. These tools format access plan o…
DB2 for LUW: Indexes
— In the Db2 11.5 documentation, search for "Index design guidelines" and "CREATE INDEX statement." Th…
DB2 for z/OS
— the mainframe original, running the world's banks, insurers, and government agencies - **DB2 for LUW…
DB2 for z/OS Administration Guide
— Chapter on Monitoring and Tuning. IBM Knowledge Center. Covers DISPLAY commands, trace configuration…
DB2 for z/OS Administration Guide (SC27-8841)
— Chapter on query parallelism covers I/O parallelism, CP parallelism, and Sysplex query parallelism i…
DB2 for z/OS Utility Guide and Reference
— The definitive reference for all z/OS utility syntax, parameters, and behavior. Covers REORG, RUNSTA…
Db2 for z/OS — SQL Reference: Catalog Tables
— Search for "Db2 12 for z/OS catalog tables" on IBM Documentation (ibm.com/docs). The catalog tables …
Db2 for z/OS — SQL Reference: DB2 Directory
— The same SQL Reference manual includes a section on the DB2 directory (DSNDB01), describing the DBD,…
Db2 for z/OS — Utility Guide: RUNSTATS
— The Utility Guide documents the RUNSTATS utility, including which catalog columns it updates, the va…
DB2 for z/OS: Accessing Distributed Data
— Configuration for DRDA connections between z/OS and distributed platforms, including cloud endpoints…
DB2 for z/OS: EXPLAIN
— Search for "Interpreting EXPLAIN output" in the Db2 for z/OS performance documentation. Understandin…
DB2 for z/OS: Indexes
— In the Db2 12 for z/OS documentation, search for "Creating indexes" and "Index design guidelines." T…
DB2 for z/OS: Indexing Best Practices
— IBM technical paper covering DPSI vs. NPSI trade-offs, partition key inclusion in indexes, and clust…
DB2 is an ecosystem, not just a database
— SQL, utilities, optimizer, storage, security, and monitoring must be understood as a whole 2. **The …
DB2 LUW Database Administration Guide
— Comprehensive coverage of REORG, RUNSTATS, BACKUP, RESTORE, ROLLFORWARD, and maintenance planning fo…
DB2 LUW Monitoring Guide
— IBM Knowledge Center. Comprehensive coverage of snapshot monitors, MON_GET table functions, event mo…
DB2 member abnormal termination
— the DB2 subsystem crashes (e.g., due to a software error) 2. **z/OS system failure** — the entire LP…
DB2 Performance Expert for Multiplatforms
— IBM Knowledge Center Documentation for IBM's performance monitoring tool, which includes visual acce…
DB2 Performance Expert for Multiplatforms V3.2
— IBM Redbook SG24-7357. Practical guide to using Performance Expert for monitoring and tuning, with r…
Db2 REST Services
— IBM documentation for enabling and creating REST services on Db2 for LUW, including service registra…
DB2 SQL PL Reference
— IBM Knowledge Center: "SQL Procedural Languages: Application Enablement and Support." The definitive…
DB2 SQL Reference
— CREATE PROCEDURE, CREATE FUNCTION, CREATE TYPE statements with full syntax diagrams and examples.
DB2 thread
— a structure that represents the CICS task's conversation with DB2.
DB2 thread limits (CMDT)
— Threads exhaust before MXT because most transactions use DB2. 2. **MXT** — Task accumulation hits th…
DB2 Version 1
— a relational database management system for the MVS mainframe operating system (the predecessor to t…
Db2 Warehouse on Cloud Pak for Data
— the enterprise data warehouse, receiving replicated data from both z/OS and LUW environments.
DB2:
— [ ] Commit frequency 1,000-5,000 (not every record) - [ ] FOR FETCH ONLY on all read cursors - [ ] D…
db2look (LUW)
— IBM's built-in utility for extracting DDL and statistics from a DB2 for LUW database. db2look reads …
db2move Utility Reference
— Syntax and options for bulk data movement between Db2 instances. https://www.ibm.com/docs/en/db2/11.…
DBD (Database Descriptor)
— For every database, DB2 maintains an internal descriptor that maps the logical structure (tables, in…
DBeaver
— Open-source database tool that supports DB2 stored procedure editing and execution. Lacks the debugg…
DBeaver Power Tips for DB2:
— Use Ctrl+Enter to execute the current statement (not the entire script). - Right-click a table name …
dbForge Studio for DB2
— Commercial IDE with advanced debugging, code generation, and testing features for DB2 stored procedu…
DBRM
— Database Request Module. The output of the DB2 precompiler containing the SQL statements extracted f…
dbt (data build tool)
— A framework for transforming data in your data warehouse using SQL, with version control, testing, a…
dbt documentation
— `docs.getdbt.com` — The official documentation for dbt (data build tool) is exceptionally well writt…
DCB
— Data Control Block. A z/OS data management structure containing file attributes (RECFM, LRECL, BLKSI…
DD Statement
— Defines a dataset (file) for the step: ```jcl //INFILE DD DSN=PROD.TRANS.DAILY,DISP=SHR //OUTFILE DD…
De Broglie wavelength
— Ch 1.8 The wavelength associated with a massive particle: $\lambda = h/p$. De Broglie's 1924 hypothe…
De-escalation
— The deliberate reduction of arousal — physiological and emotional — in a conflict interaction, creat…
De-escalation repairs:
— "Let me start over. I don't think I said that the way I meant to." - "I'm getting upset and I don't …
De-moralizing the emotions
— recognizing that resentment about an unjust dynamic does not mean she does not love her mother; that…
De-Platforming
— The permanent or temporary removal of a creator from a platform, eliminating their access to audienc…
dead code
— code that appears to serve no purpose. A function that is never called. A variable that is assigned …
deadband
— a small range around that set point within which the system stays off. When room temperature drops b…
DEADLOCK
— IRLM detects cycle, rolls back CNBBAT01 | Proceeds |
Deal Information
— Brand name: _______________ - Product/service to promote: _______________ - Proposed compensation: _…
Death Lineup Statistics (2015-16)
— Net Rating: +25.4 per 100 possessions - Offensive Rating: 123.8 - Defensive Rating: 98.4 - Minutes: …
Death Lineup:
— With Green at center, team posted +28.7 net rating - Individual Win Shares don't fully capture lineu…
Debate format:
— Divide into two groups: those arguing FOR the proposition and those arguing AGAINST - Each group has…
Debate structure (in class):
— Opening statements: 3 minutes per side - Cross-examination: 5 minutes per side (each side questions …
Debate structure:
— Opening statements: 4 minutes each - Rebuttal: 3 minutes each - Audience questions: 10 minutes - Clo…
Debates to choose from:
— Minimum wage legislation - Financial regulation (banking rules, securities regulation) - Health insu…
Debezium Documentation
— Complete guide to the Debezium DB2 connector, including setup, configuration options, event format, …
debiasing training data
— identifying and correcting patterns that reflect discriminatory practices rather than underlying dif…
Debrief Questions (for the group):
— What did the mediator do that helped? What made it harder? - At what moments did the mediator's own …
Debrief questions:
— Can both individual therapy and structural critique be valid simultaneously? - Does this debate reve…
Debt (as pattern)
— The cross-domain pattern of borrowing from the future to fund the present, appearing as financial de…
debt peonage
— involuntary servitude based on indebtedness, a practice prohibited by federal law since 1867. The te…
Debug Tool
— IBM's interactive debugger for z/OS (now called z/OS Debugger). Allows setting breakpoints, inspecti…
Debugging
— The process of identifying and correcting errors in a program. COBOL debugging techniques include DI…
Debugging and Troubleshooting
— what to do when tests fail, how to diagnose problems in AI-generated code, and strategies for workin…
Debugging is systematic hypothesis testing
— observe, hypothesize, test, narrow, fix, prevent. Never guess randomly.
Debugging Spotlight
— Guidance for diagnosing and fixing common errors in the computational exercises. Quantum simulations…
Debugging tasks:
— Diagnosing error messages - Tracing unexpected behavior - Understanding obscure compiler or runtime …
Debunking
— Correcting false claims after they have been encountered and absorbed.
decay time
— how long the string vibrates before becoming inaudible — affects the perceived sustain of an instrum…
Decentralized Cult
— The form of cultic persuasion documented in QAnon: the same Lifton mechanisms operating without cent…
decentralized oracle
— a mechanism for bringing real-world data onto the blockchain --- reports the result. The oracle migh…
Decentralized Protocol (1.93, 1% fee, $5 gas):
— Effective profit if win: $930 x 0.99 - $5 = $920.70 - $5 = $915.70 - Wait, let me recalculate: odds …
Deception Gradient
— The practice in high-control organizations of incrementally disclosing full demands and doctrines as…
Deceptive cadence
— the harmonic progression V→vi; produces surprise through partial note-overlap between expected tonic…
deceptive landscape
— a landscape in which the gradient consistently points away from the global optimum. (That is, follow…
Decibel (dB)
— A logarithmic unit expressing the ratio of two quantities, most commonly sound pressure or power. So…
Decimal point, implied
— A logical decimal point position in a numeric data item, specified by the V symbol in a PICTURE clau…
decimal scaling position
— a digit position that is NOT stored but is assumed to be zero. In `PIC 9(3)P(4)`:
Decision
— Accept / Negotiate / Decline - If declining, reason: _______________ - If negotiating, my counter: _…
Decision 1: KYC Backlog
— Engage a specialist KYC remediation firm to run an intensive 60-day program using their digital veri…
Decision 2: Transaction Monitoring
— Do not replace the monitoring platform immediately (too disruptive during the FCA remediation period…
Decision 3: Regulatory Reporting
— Prioritize documentation of the current manual process (to reduce key-person risk), then evaluate an…
Decision 4: Team
— Hire two additional senior compliance analysts immediately (within the existing budget by redeployin…
Decision 5: FCA Communication
— Proactively update the FCA on the remediation plan within 30 days. Maya's experience as a former FCA…
Decision Categories
— [ ] Shot selection (2 vs 3, quick vs normal) - [ ] Fouling strategy (when to foul, who to foul) - [ …
Decision fatigue
— The deterioration of decision quality after a prolonged period of decision-making, caused by the dep…
Decision guide in plain English:
— You're including a chart in a **PDF report or print document**: use matplotlib or seaborn - You're d…
Decision heuristic:
— Need to look things up by name? **Dictionary** - Need an ordered collection you will modify? **List*…
Decision output record:
— Application ID, decision status, approved amount, rate, term - Monthly payment, risk rating, conditi…
decision point
— a person who must decide: "Do I share this?" The content must provide enough motivation (Chapter 9's…
Decision Trees:
— For each major campaign decision point, create a decision tree: - "If phishing succeeds and we get a…
Decision: Fail to reject $H_0$
— **Conclusion:** At the 5% significance level, there is not sufficient evidence to conclude that Dari…
Decisions:
— Age -99 and 999: Set to NaN (clearly placeholder values, not real ages) - Negative watch times: Set …
Declarative (explicit) memory
— knowledge you can consciously state - *Episodic memory* — personal experiences ("I remember the day …
Declarative knowledge
— knowing *that.* Facts, concepts, principles. "The heart has four chambers." "Supply curves slope upw…
declarative memory consolidation
— the stabilization and strengthening of fact-based, concept-based, and event-based memories. The kind…
declarative programming
— describing *what* you want rather than *how* to produce it. The same philosophy appears in:
DECLARATIVES
— A section of the COBOL Procedure Division that contains USE statements for specifying procedures to …
Declared data
— Data explicitly and knowingly provided by users, such as name, email address, or survey responses.
Decoder:
— Autoregressive text decoder with learned positional embeddings - Cross-attention to encoder outputs …
Decoherence
— In quantum mechanics, the process by which a quantum system loses its quantum coherence (definite ph…
Decoherence does NOT explain:
— Why we experience a single outcome (the "problem of outcomes") - The Born rule for probabilities - W…
Decoherence explains:
— Why interference effects are unobservable for macroscopic objects - Why certain states (pointer stat…
decoherence factor
— is $\Gamma(t) = \langle e_1(t)|e_0(t)\rangle$.
Decompose into normal modes
— each mode is a harmonic oscillator. 3. **Quantize each mode** — introduce creation/annihilation oper…
Decomposers
— bacteria, fungi, invertebrates -- break down dead organic matter, releasing the nitrogen locked in d…
Decomposing variability
— the insight that total variation can be split into "explained" (between-group) and "unexplained" (wi…
Decomposition
— Breaking TaskFlow into modules (Ch 12): `models.py`, `storage.py`, `display.py`, `cli.py` > 2. **Pat…
Decoration Day
— the annual spring gathering at the community cemetery to clean graves, place flowers, and remember t…
Decorative gridlines
— light gridlines help; heavy, numerous gridlines distract. - **3D effects** — adding depth to a 2D ba…
Decorator
— In Python, a function that modifies the behavior of another function or class. Applied using the `@d…
Decorator Pattern
— A **design pattern** that dynamically adds responsibilities to an object by wrapping it, providing a…
Decoy internet searches
— searching for things you're not actually interested in to pollute your profile - **Location spoofing…
Dedicated COBOL Courses:
— University of Limerick (Ireland) — COBOL in the CS curriculum since 2020 - University of North Texas…
deep burgundy, warm gold, and cream
— an analogous warm palette with one rich accent color.
Deep Contribution:
— 10 players with positive Win Shares - Bench contributed ~16 total Win Shares - Role players all with…
DEEP DIVE
— The two-phase commit protocol is what distinguishes CICS from a simple program executor. In phase 1 …
Deep dive on flagged prospects
— Additional video study - Interview coaches/teammates - Medical evaluation
Deep domain knowledge
— Sofia knew the Elgar deeply enough to hear it in new ways. Without technical mastery (Chapter 25), s…
Deep fake
— Synthetic audio or video content generated by machine learning models that depicts real individuals …
Deep Feature Synthesis (DFS)
— automatically generating features by applying transformation and aggregation primitives to relationa…
deep learning
— the use of neural networks with many layers (hence "deep") trained on large datasets with powerful h…
Deep learning (Chapters 11--16):
— Neural network architectures (feedforward, CNN, RNN, transformer) - Training techniques (regularizat…
Deep learning frameworks:
— **PyTorch**: The most widely used deep learning framework in both research and industry. Its dynamic…
Deep Link
— A URL that takes users directly to a specific page within an app or website rather than the home scr…
Deep work
— tasks requiring sustained concentration; produces the most cognitive value
deep-media filter cabinet
— a box installed in the return duct that holds a 4–5 inch thick filter. These cabinets run $150–$400 …
Deepen existing practice when:
— Your current use cases have clear room for improvement (high iteration counts, low batting averages …
Deepfake
— AI-generated synthetic media that represents a real person saying or doing something they never said…
Deepfakes
— synthetic media that place real people in fabricated situations — had existed before the generative …
Deerskin trade
— The commercial exchange of deer hides for European manufactured goods that drew Cherokee communities…
Default engineering
— designing the environment so that the desired behavior is the path of least resistance; removing dec…
Default mode network
— A brain network active during mind-wandering, self-referential thought, and social cognition; activa…
Default mode network (DMN)
— A neural network active during rest and self-referential processing; associated with mind-wandering,…
default parameter
— if you call `format_as_percentage(42.356)`, it uses 1 decimal place. But you can override it: `forma…
Default White
— the cultural tendency to imagine unspecified characters and ideals as White, positioning Whiteness a…
Defenders argue:
— Art changes culture; culture change is the precondition for political change - Art reaches people th…
Defending (0.83) > Fouling (~0.80)
— but close. Depends on parameters.
Defending against NTLM relay:
— **SMB Signing** — Mandatory SMB signing prevents relay by requiring packet signing with the session …
Defending against PtH:
— **Credential Guard** — Windows feature that isolates LSASS in a virtual secure mode, preventing hash…
Defense
— Defended field goal percentage - Shots defended per game - Defensive win shares (tracking-enhanced)
Defense exceeded expectations
— Hugo Lloris saved approximately 3 goals above expectation - The defense limited opponents to low-qua…
Defense requires a layered approach
— Adversarial training, input validation, output sanitization, monitoring, and secure architecture mus…
Defense:
— Steals per 75 possessions - Blocks per 75 possessions - Defensive Box Plus/Minus
Defenses against cache poisoning:
— **Source port randomization** — Using random source ports for DNS queries exponentially increases th…
Defenses against P+epsilon:
— **Commit-reveal schemes**: Prevent voters from conditioning their votes on the bribe contract. - **I…
Defensibility:
— For every major design decision, can you articulate: what you chose, what you rejected, and why? - H…
Defensive Action
— An umbrella term for tackles, interceptions, clearances, blocks, and pressures performed to regain p…
Defensive Actions
— Tackles, interceptions, blocks, and clearances
Defensive adjustment
— If teams always passed, defenses would always play pass coverage 2. **Situational needs** - Short-ya…
Defensive analysis requires context
— Raw stats are misleading without adjustment
Defensive Analytics
— evaluating the 11 players trying to stop everything we've analyzed.
Defensive Concepts
— Defensive positions and their roles - Difference between zone and man coverage - Basic understanding…
Defensive contribution:
— Tackles won per 90 - Interceptions per 90
Defensive Coordinator (DC):
— Heavy user during opponent game prep - Primary questions: "What does the opponent do in [situation]?…
Defensive Efficiency Features:
— `home_def_epa`: Home team's defensive EPA per play allowed. Lower (more negative) values indicate a …
Defensive Effort
— Westbrook's steals (1.6 per game) appeared positive - However, he frequently gambled on passing lane…
Defensive Evaluation:
— Matchup data against elite wings - Closeout speed and shot contest rates - Help defense frequency - …
Defensive fix
— add validation to BAL-CALC:
defensive inquiry
— questioning that appears curious but is actually protective.
Defensive Line Height
— The average x-coordinate of a team's defensive line, indicating how high or deep they defend. Measur…
Defensive Metrics:
— Opponent eFG% - Opponent Turnover Rate - Defensive Rebounding Rate - Opponent Free Throw Rate
Defensive parameter validation
— the validation gate, overflow guards, output initialization, envelope pattern, and documented contra…
Defensive play prediction
— Predict coverage type - Predict blitz likelihood - Evaluate model accuracy
Defensive programming
— validating input, initializing variables, checking boundaries, guarding against division by zero, an…
Defensive Rating (On/Off):
— Points allowed per 100 possessions with player on court - Points allowed per 100 possessions with pl…
Defensive Shape Findings:
— **Average Defensive Line**: 42m from own goal - **Defensive Width**: 52m (compact laterally) - **Def…
Defensive Specialist Example:
— ORtg On: 108.0, ORtg Off: 110.0 (Offensive Diff: -2.0) - DRtg On: 102.0, DRtg Off: 112.0 (Defensive …
Defensiveness
— A psychological self-protection response activated when a person perceives threat to their identity,…
Deferred to Sprint 2:
— Story 2 (Task Assignment) — depends on workspaces being implemented - Story 3 (Due Date Notification…
Deferred until after COMMIT
— perform the non-reversible action only after the data is committed 2. **Made idempotent** — design t…
DEFINE ALTERNATEINDEX
— Creates the AIX structure 2. **DEFINE PATH** -- Creates a logical connection between the AIX and the…
Define chunking and schema formation
— the two main mechanisms your brain uses to work around its capacity limits - **Identify the split-at…
DEFINE CLUSTER
— Creates a VSAM dataset (KSDS, ESDS, RRDS, or LDS) along with its DATA and INDEX components. 2. **REP…
Define the API contract
— Design the REST endpoint (URL, HTTP method, request/response JSON schema) based on the COBOL program…
Define the problem and metric
— Mistake: jumping into modeling without a clear question or choosing the wrong evaluation metric (e.g…
Defining Characteristics:
— High pass completion (>90%) - High progressive passes (>4.5 per 90) - Moderate pressures (10-15 per …
Defining Scope:
— Which networks, IP ranges, and domains are in scope? - Which applications and APIs will be tested? -…
Definition: DataFrame
— A two-dimensional, size-mutable, and potentially heterogeneous tabular data structure provided by th…
Definition: Python
— A high-level, general-purpose programming language created by Guido van Rossum in 1991. Known for it…
Definition: Variable
— A named reference to a value stored in memory. Variables let you reuse values throughout your code w…
Definitions:
— Explosive Rush: 10+ yards - Explosive Pass: 15+ yards - Big Play: 20+ yards (any)
Degeneracy
— The ability of structurally different components to perform the same function; a form of redundancy …
degenerate
— that is, if multiple linearly independent eigenstates share the same eigenvalue? Suppose $\psi_{n,1}…
degenerate case
— where the unperturbed energy levels have multiple states. Here, naive perturbation theory produces i…
degradation problem
— the surprising observation that simply adding more layers to a network can *decrease* accuracy, not …
DEGREE
— Parallel query processing:
Degree programs (as of 2026):
— Carnegie Mellon University -- MS in Privacy Engineering - DePaul University -- MS in Data Science wi…
degrees of freedom
— the number of ways the model can adjust itself to fit the data. A straight line has two degrees of f…
Degrees of freedom for chi-square tests:
— Goodness-of-fit: df = k - 1 (where k = number of categories) - Test of independence: df = (r - 1)(c …
Degrees of separation
— The number of relationship links between two individuals in a social network. Stanley Milgram's orig…
Dehydration
— possible. She's been on diuretics. He orders IV fluids. - **Medication side effect** — she's on a bl…
Deindividuation
— The reduced sense of personal identity and accountability that occurs in groups or crowds; associate…
Delayed JOLs
— wait 24 hours after studying, then rate your confidence and self-test to compare predictions against…
Delegate early:
— Video and audio editing - Thumbnail creation - Caption writing and upload logistics - Research and f…
DELETE
— Abnormal disposition: **DELETE**
DELETE statement
— A COBOL statement that removes a record from a relative or indexed file, or (in embedded SQL) a DB2 …
deliberate career pivot
— the significant career direction change that is not merely a job change but a shift in domain, funct…
Deliberate meaning-making
— the development of an integrated story about one's history that includes difficulty without being de…
Deliberate Practice
— Just as musicians practice scales and athletes drill fundamentals, architects should practice their …
deliberative democracy
— formal processes in which citizens discuss political issues under structured conditions — consistent…
DELIVERABLE
— Document your topology design in the format shown in code/project-checkpoint.md. Bring your design t…
DELIVERABLES AND SCOPE
— [ ] **1. Deliverables are specific, not vague.** The contract states exactly what you will produce —…
Deliverables:
— Data analysis with visualizations - Statistical trend analysis - Future projections - Recommendation…
Delivered consistently
— Products work because buyers get roughly the same experience regardless of when they purchase. This …
Delivery Layer:
— Web-based dashboards accessible from any location - Mobile interfaces for coaching staff - Automated…
Delivery Tips:
— Keep to 15-20 minutes maximum (boards have limited attention spans) - Anticipate questions: "How do …
Deloitte Annual Review of Football Finance.
— Comprehensive financial analysis of the football industry, providing context for analytics budget de…
Demand for Purity
— Present and escalating. The catharsis sessions imposed a standard of purity that members were always…
demand shock
— a sudden increase in demand that drove prices beyond the reach of existing residents.
Demand-Side Platform (DSP)
— A technology system allowing advertisers to purchase digital advertising inventory through automated…
Demand-withdraw pattern
— A conflict dynamic identified by John Gottman and colleagues in which one partner escalates emotiona…
Democratic and Civic Effects:
— **SECTION 4: FAIRNESS AND DISCRIMINATION ANALYSIS**
Democratic backsliding
— The gradual erosion of democratic institutions through legally ambiguous means, often beginning with…
Democratic resilience
— The capacity of democratic institutions, processes, and information environments to maintain their e…
Demographic Destiny: The Fallacy
— Population growth of Democratic-leaning groups does not automatically translate into Democratic elec…
Demographic determinism
— The error of assuming that an individual's political preferences can be reliably predicted from thei…
demographic parity
— flag the same proportion of each group — you will necessarily have different error rates. You will o…
Demographics:
— Age range: 20-24 - Gender: M/F/Unknown (brokers typically infer from name) - Race/ethnicity: Inferre…
Demolition
— remove existing cabinets, appliances, tile, drywall as needed 2. **Rough plumbing** — before walls c…
Demonetization
— The removal of advertising revenue from a creator's content, typically because the content violates …
Demonstrate data governance
— showing that training data is representative, that biases have been identified and mitigated, and th…
Demonstrate technical competence
— Show you can handle the work 2. **Reveal basketball understanding** - Prove you know the game 3. **H…
Density matrix (density operator)
— Ch 23.1 The operator $\hat{\rho} = \sum_i p_i|\psi_i\rangle\langle\psi_i|$ that describes both pure …
density of states
— the same function that appears in Planck's derivation of the blackbody spectrum (Ch 1). Each of thes…
department selectivity
— Women applied more heavily to selective departments (low admission rates for everyone) - Men applied…
dependencies
— packages that `requests` itself needs to function
Dependencies:
— `requirements.txt` is current (`pip freeze > requirements.txt`) - All required packages are listed -…
Dependency health metrics:
— Number of outdated dependencies - Known vulnerabilities count - License compliance status
Dependency Injection
— A technique where an object receives its dependencies from external code rather than creating them i…
dependency tree
— a hierarchy of packages that all need to be present for the top-level package to work.
dependent
— knowing one outcome changes your assessment of others.
Deploy a hook
— your comment signals what you're working on and invites response 4. **Increase your surface area** i…
Deploy to Render or Railway
— covered in Chapter 38
Deployment
— [ ] Build prediction API - [ ] Handle real-time updates - [ ] Monitor calibration drift - [ ] Docume…
Deployment documentation:
— Write a one-page "How to Deploy" guide for a hypothetical second team member - Include: how to creat…
Deployment Metrics — After CI/CD
— Average time from code complete to production: **3 business days** - Deployments per month: **12** (…
Deployment Metrics — Before CI/CD
— Average time from code complete to production: **14 business days** - Deployments per month: **2** (…
Deployment Metrics:
— **Deployment frequency:** How often do we deploy to production? (Target: weekly or better) - **Lead …
Deployment strategy:
— **Shadow mode** (Months 12--14): The ML models ran in parallel with the production rule-based system…
Deployment:
— `FLASK_DEBUG=false` is set in the platform's environment variables - The deployment completes withou…
Deposit
— Accept a deposit amount. Add to the balance and confirm.
Deprecated features
— ALTER, NEXT SENTENCE, GO TO -- are identified and replaced with modern structured alternatives. - **…
Depression dimension:
— How much difficulty have you had experiencing pleasure in activities you normally enjoy? ___ - How o…
depth
— shares, saves, DMs, and the kind of loyal audience that returns because they *feel* something.
Depth analysis
— identify the deepest reporting chains and flag any that exceed the bank's policy maximum of 6 levels…
depth and expertise luck
— being discovered as an authoritative source on a specific topic by people who are actively searching…
Depth limiting
— add a condition in the recursive member:
Depth of target matters
— Completion percentage means little without knowing where the ball is going.
Depth over breadth
— Going deep on one topic signals "they really understand this field." Depth implies expertise without…
Derek Washington
— Junior COBOL Developer (8 months at GlobalBank) Derek graduated with a computer science degree focus…
Derivative work
— any work based on a preexisting work. Most fan creativity is derivative by definition: fan fiction u…
Derived data
— Data generated by combining two or more data sources, such as a credit score or a psychographic prof…
Describe the properties of the normal distribution
— students need to internalize symmetry, the 68-95-99.7 rule, and the role of mean and standard deviat…
Descriptive
— It asks "what happened?" using historical data. No prediction or causal claim involved. 2. **Predict…
descriptive statistics
— they describe what happened. They've existed as long as football has been played. Box scores in news…
descriptively
— to describe and explain musical structures that composers invented by intuition, revealing the mathe…
Design considerations for scalar markets:
— **Range:** Set minimum and maximum values that are extremely unlikely to be breached (e.g., GDP grow…
Design considerations:
— **Targeting:** Credits should be allocated based on demographic and geographic underrepresentation, …
Design constraints:
— The building must comply with fire safety codes (inspectors must be able to assess conditions) - Res…
Design decisions to document:
— Why separate PROD and BATCH catalogs? (Answer: batch creates/deletes thousands of GDG generations ni…
Design Decisions:
— We process at 5 fps rather than the full 25 fps to reduce computational load. For basic tracking, 5 …
Design fiction
— Creating realistic artifacts (products, advertisements, news articles, policy documents) from a spec…
Design for balance:
— Use decentralized architecture (phones exchange anonymous tokens, not identities) - Implement automa…
Design for Failure
— Assume components will fail; build resilience 2. **Measure Everything** - You can't improve what you…
Design Pattern
— A reusable solution to a commonly occurring problem in software design. Cataloged in categories: cre…
Design principles:
— One main idea per slide - Minimal text — let the visuals do the work - Every chart must have a clear…
Design rationale for Tier 1:
— **LIMIT(14)**: Two weeks of daily generations. Provides enough history for restart/recovery of any d…
Design rationale for Tier 2:
— **LIMIT(8)**: Eight weeks of weekly summaries — nearly two months. Covers any month-end processing w…
Design rationale for Tier 3:
— **LIMIT(24)**: Two years of monthly snapshots. Covers regulatory audit cycles (typically 12-18 month…
Design rationale for Tier 4:
— **LIMIT(10)**: Ten years of annual snapshots. Covers the longest regulatory retention requirement (I…
Design rationale questions to address:
— Who is your target audience, and why did you select this technique as most relevant for them? - What…
Design rationale:
— The arc builds from quiet curiosity to full awe, with each phase increasing visual and audio intensi…
Design Requirements:
— Consistent color scheme (Player A: blue tones, Player B: red tones) - Professional typography - Clea…
Design review
— Before any code is written, the OpenAPI spec is reviewed by: - A mainframe architect (does the data …
Design rules for effective dating:
— Use a half-open interval: EFFECTIVE_DATE is inclusive, END_DATE is exclusive. This prevents gaps and…
Design the content upgrade:
— What is the primary value of the original content? - What is the obvious "next step" or "deeper dive…
Design the RUNSTATS strategy
— what profile, what frequency, what COLGROUP specifications.
Design three types of interventions
— implementation intentions, temptation bundles, and Premack-principle strategies — to bridge the gap …
Design:
— Is the code in the right place? (Right module, right class, right function) - Are functions and clas…
Designated Contract Market (DCM)
— the same regulatory designation held by the Chicago Mercantile Exchange (CME). This made Kalshi the …
designated reporter
— an address chosen by the market creator that has the first opportunity to report the outcome. The de…
Designed for:
— Undergraduate students in data science, statistics, or sports management - Aspiring sports analysts …
Designing the environment
— prioritizing privacy, considering territorial dynamics, choosing a seated conversation in a physical…
Desirability asymmetry
— The empirically documented tendency in heterosexual dating apps for women to receive far more matche…
desirability hierarchies
— the finding that online dating markets are strongly stratified, with a clear rank ordering of who me…
Desirability hierarchy
— The stratified rank ordering of users by perceived attractiveness in online dating markets, as docum…
desirable difficulty
— it feels harder in the moment but produces better long-term retention. We'll explore this concept fu…
Desire
— addressing fear of replacement is the single most important change management investment for this te…
Destination z
— IBM's community for mainframe professionals.
destroying the learned representations
— a phenomenon sometimes called "catastrophic forgetting." The new classification head, initialized ra…
destructive interference
— a microphone on the outside of the headphone measures incoming noise, electronic circuitry generates…
Detecting ARP Spoofing:
— Look for ARP replies that were not preceded by ARP requests (gratuitous ARP). - Look for multiple IP…
Detecting change points
— moments when the underlying process shifts
Detecting Port Scans:
— Look for a single source IP sending SYN packets to many different ports on a single destination. - F…
Detecting Synthetic Photos:
— Look for asymmetries in earrings, glasses, and hair - Check for blurred or inconsistent backgrounds …
Detection
— monitoring behavior and identifying anomalies 2. **Diagnosis** -- analyzing logs, traces, and change…
Detection (recognizing tilt in real time):
— Periodic emotional check-ins (every 30-45 minutes) - Monitor for behavioral indicators: faster decis…
Detection and Response Assessment:
— Which techniques were detected and how - Which techniques were not detected - Time-to-detect for eac…
Detection Engine
— consumed the event stream, ran anomaly detection models, and published detection signals when anomal…
Detection methods:
— **Artifact detection**: Looking for subtle inconsistencies (lighting, reflections, lip sync, blinkin…
detection threshold
— say, 95 percent -- the filter classifies the email as spam and diverts it.
Detection:
— Monitor for unusual patterns of `madvise()` and `/proc/self/mem` access - Deploy kernel exploit dete…
Detectron2
— https://github.com/facebookresearch/detectron2 - State-of-the-art detection and segmentation
DETERMINISTIC
— A function attribute indicating that the function always returns the same result for the same input …
Deterrence Has No Box Score
— Ben Wallace's impact included shots never attempted - Opponents changing behavior left no statistica…
Dev/test on cloud
— the one clear win. Three dev environments running on AWS, saving approximately $2.1M/year in mainfra…
Develop your specialty:
— Choose a focus area (web, mobile, API, cloud, IoT) - Build deep expertise in 2-3 vulnerability types…
Developing RESTful Services with CICS
— Step-by-step guide to creating REST APIs that call existing COBOL programs, including JSON transform…
Development
— Where developers write and test code locally. Should be easy to set up and fast to iterate.
Development Environment
— Using Jupyter notebooks - Running Python scripts - Installing packages with pip - Basic debugging st…
Development languages for red team tools:
— **C/C++:** Low-level control, direct syscalls, shellcode development - **Rust:** Memory safety witho…
Development Modernization Plan:
— Git migration plan (from what? SCLM, Endevor, PDS?) - CI/CD pipeline design (Jenkins + Zowe? Other?)…
Development Tools:
— GitHub with branch protection on main - Docker for local development - Terraform for infrastructure-…
Developmental losses
— the losses that come simply from growing up and moving through life: the freedom of childhood, the b…
Developmental stability
— the organism's capacity to execute its blueprint reliably despite perturbations — therefore predicts…
Developmental Uncertainty
— College-to-NFL transition varies by player - Coaching and scheme fit impact outcomes - Character and…
Device and account signals (lower weight):
— Language preference, country setting, device type - Account age and stated interests (selected durin…
Device Components:
— GPS receiver: determines position at approximately 10-18 Hz (depending on the device) - Acceleromete…
Device setup for maximum effectiveness
— Use different accounts on different devices where possible - Do not stream on mute — muted streams m…
devil's advocate
— a person whose formal role is to argue against the dominant narrative. The Catholic Church instituti…
DevOps
— A set of practices combining software development (Dev) and IT operations (Ops) to shorten the devel…
DFHJS2LS
— JSON Schema to Language Structure (generates COBOL copybook from JSON schema) - **DFHLS2JS** — Langu…
DFHJS2LS Reference
— Detailed parameter documentation for the JSON Schema to Language Structure utility. Covers JSON sche…
DFHLS2JS Reference
— Detailed parameter documentation for the Language Structure to JSON Schema utility. Covers MAPPING-L…
DFHLS2WS Reference
— Detailed parameter documentation for the Language Structure to WSDL utility. Covers bottom-up WSDL g…
DFHMDF
— Field Definition: - `POS=(row,col)` — Screen position - `LENGTH=n` — Field length in characters - `A…
DFHMDI
— Map Definition: - `SIZE=(24,80)` — Standard 3270 screen: 24 rows, 80 columns - `LINE=1, COLUMN=1` — …
DFHMSD
— Map Set Definition: - `TYPE=&SYSPARM` — Allows generating physical or symbolic map from same source …
DFHWS2LS
— WSDL to Language Structure (generates COBOL from WSDL/XSD) - **DFHLS2WS** — Language Structure to WS…
DFHWS2LS Reference
— Detailed parameter documentation for the WSDL to Language Structure utility. Covers WSDL interpretat…
DFS optimization
— Linear programming 2. **Ownership dynamics** - Game theory 3. **Machine learning projections** - Adv…
DFSMS Access Method Services for Catalogs
— DEFINE CLUSTER with NUMBERED option, REPRO for RRDS files, and LISTCAT output interpretation for rel…
DFSMS Access Method Services for Catalogs (IDCAMS)
— The definitive reference for defining and managing VSAM clusters, alternate indexes, and paths. Avai…
DFSMS Using Data Sets
— Chapters on VSAM data set organization, including detailed coverage of CIs, CAs, index structures, a…
DFSORT Application Programming Guide
— IBM's DFSORT can perform many multi-file operations (merge, match, compare) without custom COBOL cod…
DFSORT Application Programming Guide (SC23-6878)
— Comprehensive reference for DFSORT control statements including SORT, MERGE, OUTFIL, INCLUDE/OMIT, a…
DFSORT Application Programming Guide (SC26-7523)
— Comprehensive guide to IBM's sort utility, including control statements, performance tuning, and adv…
DFSORT optimization checklist:
— MAINSIZE=MAX (use all available memory) - Work datasets on 3+ separate volumes/CUs - BLKSIZE=27,998 …
DFSORT's sort algorithm is hardware-aware
— it knows the CPU cache line size, the number of available processors, and the memory hierarchy. 4. *…
DFSORT:
— [ ] All sort/merge/reformat jobs evaluated for DFSORT replacement - [ ] INCLUDE/OMIT used to filter …
DFSORT: Getting Started (SC26-7527)
— A gentler introduction to DFSORT for those new to mainframe sort utilities.
DHCP Attacks:
— **Rogue DHCP Server:** An attacker sets up a fake DHCP server that provides clients with a malicious…
Diagnose
— What specific weakness am I targeting this week/month? > 2. **Target** — What practice will put me d…
Diagnose connection issues
— firewall rules, authentication failures, driver version mismatches. 3. **Tune connection pools** — a…
Diagnose Offensive Line Issues
— Review film for technique breakdowns - Assess any injury impacts - Consider personnel changes
Diagnose residuals:
— Residuals vs. predicted → linearity, equal variance - QQ-plot → normality - Independence → study des…
Diagnosing mode collapse:
— Visual inspection of generated samples for lack of diversity. - Compute the number of distinct modes…
Diagnosis Agent
— consumed detection signals, gathered additional context, performed pattern matching and root cause a…
Diagnostic conclusion:
— Viral: High share ratio (>5%), exponential velocity, cross-platform presence, independent of trend t…
Diagnostic signals:
— Output is generic — could apply to any company or situation - Output uses reasonable approaches but …
DIAGNOSTIC TECHNIQUE
— To identify a storage leak in production, take CICS storage snapshots (CEMT I DSAS) at 30-minute int…
Dialect leveling
— the process by which regional dialects become more similar to each other over time, typically conver…
Dialectical montage
— Eisenstein's specific form of montage editing in which contrasting or conflicting shots are juxtapos…
Diane and Kenji Park
— Diane is a parent; Kenji is her 8th-grade son. Together they represent the family learning dynamic d…
Diane's power over Marcus:
— Legitimate: complete, as supervisor in the formal hierarchy - Coercive: substantial; she controls hi…
Diaspora courtship
— The experience of navigating partner selection while belonging to two cultural frameworks simultaneo…
Diatonic (smooth) modulation
— the musical analog of a second-order phase transition. The music moves gradually from one key to ano…
Diatonic scale
— A seven-note scale consisting of five whole steps and two half steps arranged in a specific pattern …
dictionaries
— mapping keys to values — and **sets** for membership testing and deduplication. You'll also learn ho…
Dictionaries and Sets
— organize data by keys instead of position, enabling O(1) lookups. TaskFlow upgrades from tuples to d…
dictionary
— a mapping from measurement names to values. > - The countries in South America? That is a **set** — …
Dictionary.
— Need to check membership (is X in the collection)? **Set.** - Need ordered items that you will modif…
Didn't change:
— Production quality (same camera, lighting, editing) - Recipe difficulty (same level of cooking) - Po…
Diego's adjustment:
— Started incorporating 1-2 trend videos per week alongside his original formats - Used trends as "aud…
dielectric union
— a fitting designed to break the electrical connection between the two pipes while providing a watert…
diff
— it shows exactly what changed between two versions. Stage and commit:
difference tones and summation tones
— acoustic interference products of the singers' frequencies. The ring only appears when the four voic…
Difference-in-differences
— A quasi-experimental method that estimates causal effects by comparing changes over time between tre…
differencing
— computing the change from one period to the next rather than modeling the raw values.
Different "challenges"
— one piece that had been praised for handling an eco claim without preachiness, one that used humor e…
Different methods have different efficiency
— through balls generate higher xG but are harder to execute 3. **Set pieces matter significantly** - …
Different models and risk assessments
— Each book's trading desk uses proprietary models 2. **Different customer bases** -- A book with shar…
different organizations
— most without any deliberate action.
Differential attrition
— the tendency for sicker patients to drop out of trials before completion -- creates survivorship bia…
Differential nonresponse
— The general phenomenon in which certain subpopulations are less likely to respond to surveys, creati…
Differential privacy
— A mathematical framework for releasing statistical information about a dataset while protecting indi…
Differential settlement
— different parts of the foundation settling by different amounts — is the problem. When one corner se…
Differential turnout shapes outcomes
— who votes is at least as important as how they vote in determining electoral outcomes.
Differentiating
— increasing emphasis on individual differences; "I" language replaces "we" language - **Circumscribin…
differentiation
— of a life that reflects genuinely chosen values rather than inherited obligations — requires not rej…
Differentiation of self
— the capacity to maintain one's own perspective while remaining emotionally connected — is the centra…
Difficulty Guide:
— ⭐ Foundational (5–10 min each) - ⭐⭐ Intermediate (10–20 min each) - ⭐⭐⭐ Challenging (20–40 min each)…
Difficulty Key:
— ★ Accessible — suitable for getting started - ★★ Moderate — requires some reflection or analysis - ★…
Difficulty legend:
— ⭐ Foundational — recall and basic application - ⭐⭐ Intermediate — analysis and comparison - ⭐⭐⭐ Adva…
difficulty level
— the percentage of students who answer it correctly. The final test is assembled with a carefully cal…
Difficulty Levels:
— ★ Basic: Reinforce fundamental concepts - ★★ Intermediate: Apply concepts to new situations - ★★★ Ad…
Difficulty ratings:
— ⭐ Foundational — recall and comprehension - ⭐⭐ Developing — application and analysis - ⭐⭐⭐ Advanced …
Difficulty Scale:
— ⭐ Recall and comprehension - ⭐⭐ Application and analysis - ⭐⭐⭐ Synthesis and evaluation - ⭐⭐⭐⭐ Origi…
Difficulty:
— ★ — Beginner - ★★ — Intermediate - ★★★ — Advanced
Diffraction
— The bending of waves around obstacles or through apertures, most pronounced when the wavelength is c…
Diffuse physiological arousal (DPA)
— Gottman's research term for the state of flooding; characterized by heart rate above approximately 1…
Diffusion (acoustic)
— The scattering of sound waves in many directions by irregular surfaces, distributing acoustic energy…
Diffusion models
— the architecture behind systems like Stable Diffusion, DALL-E, and Midjourney — learn to generate im…
Diffusion of innovations
— Everett Rogers's theory of how new ideas spread through populations: innovators → early adopters → e…
Diffusion of responsibility
— The reduction in individual felt responsibility for taking action when others are present; a primary…
Digital and public presence:
— The White House performance was recorded and widely shared. It functioned as the first public artifa…
Digital Audio Workstations (DAWs)
— initially **Pro Tools** (1991), later Logic, Ableton Live, and many others — moved recording, editin…
Digital data
— email open rates, click-through rates, ad engagement — provides signal about which voters are paying…
Digital enclosure
— Andrejevic's concept describing an environment in which participation requires disclosure — engageme…
Digital environment:
— [ ] Non-urgent app notifications disabled — Chapter 39 - [ ] Social media temporally contained (desi…
Digital ethnography
— also called netnography in Robert Kozinets's formulation — adapts ethnographic principles to online …
digital exhaust
— data generated as a byproduct of doing something else. You are not trying to share information; info…
Digital literacy
— sometimes called digital citizenship — encompasses the technical, social, and ethical competencies a…
Digital minimalism
— selective, values-driven approach to technology use
Digital product platforms:
— **Gumroad** (3-5% fee + payment processing) - **Lemon Squeezy** (similar to Gumroad, creator-focused…
Digital products (highest margin):
— 80–95% margins; zero cost of distribution; one-time creation - Best fit: specific expertise your aud…
digital public infrastructure (DPI)
— a stack of interconnected digital systems:
Digital Regulatory Reporting (DRR)
— The FCA/Bank of England initiative to express regulatory reporting requirements in machine-readable …
Digital Resources:
— Foxfire Digital Archive: foxfire.org - Frontier Culture Museum (Staunton, Virginia): frontiermuseum.…
Digital Services Act (DSA)
— The EU regulation enacted in 2022 requiring very large online platforms to conduct systemic risk ass…
Digital Twin
— A continuously updated computational model of a player that integrates physical, tactical, technical…
Digital watermarking
— the embedding of invisible signals in AI-generated content to identify its synthetic origin — has be…
DIGITS
— Convert a numeric value to a character string of digits (no sign, no decimal point, padded with lead…
Dignity
— the belief that every person deserves to be treated as fully human; to have their circumstances seen…
Dimension 1: Outcome Quality
— Did the conversation produce the result you were hoping for? Did they change? Did they agree? Did th…
Dimension 1: Routine vs. Non-Routine
— *Routine tasks* follow explicit, codifiable rules. They can be described as a series of if-then proc…
Dimension 2: Cognitive vs. Manual
— *Cognitive tasks* involve information processing, analysis, communication, and decision-making. - *M…
Dimension 2: Process Quality
— Did you conduct the conversation well? Did you say what needed saying? Did you listen genuinely? Did…
dimension-free
— unlike numerical integration methods whose cost explodes with dimensionality, Monte Carlo works just…
Diminishing returns
— The principle that incremental inputs yield progressively smaller incremental outputs; the slope-fla…
diminishing returns of sample size
— you need to *quadruple* your sample size to cut the standard error in half.
Dirac cone
— the 2D analogue of the energy-momentum relation for a massless relativistic particle.
Dirac equation
— Ch 34.1 The relativistic wave equation for spin-1/2 particles: $(i\hbar\gamma^\mu\partial_\mu - mc)\…
Dirac notation
— Ch 8.1 The notation system invented by P.A.M. Dirac using kets $|\psi\rangle$ (states), bras $\langl…
Dirac notation specifics:
— Kets: |ψ⟩, |n⟩, |↑⟩, |+⟩ - Bras: ⟨ψ|, ⟨n| - Inner products: ⟨φ|ψ⟩ - Outer products / projectors: |φ⟩…
Dirac sea
— is extravagant. It posits an infinite number of invisible electrons filling up all negative-energy s…
Direct access
— a channel or voice room that only superfans can access, for more intimate conversations with the cre…
Direct cost savings:
— 300 hours/year of analyst time recovered: approximately $22,500 (at a blended cost of $75/hour) - Re…
Direct costs:
— Forensic investigation and incident response - Customer notification (legally required in most juris…
Direct exposure pathways:
— Has your target community been the subject of military or intelligence target audience analysis (as …
Direct investment in coalfield communities
— not as charity but as recognition of a debt. The communities that powered America's industrial econo…
Direct openers
— explicit declarations of interest ("I noticed you and thought you were really attractive. Would you …
direct procurement
— long-distance expeditions to the source by people from distant communities — or carried by specialis…
direct request
— short, clear, and focused on a single feature. Direct requests work well when the AI already has con…
Direct Value:
— Revenue increase from AI-enabled capabilities (new revenue, upsell, retention) - Cost savings from p…
Direct-to-Consumer (DTC)
— A business model in which a creator or brand sells products directly to their audience without a ret…
directed
— a pass from Player A to Player B is distinct from a pass from Player B to Player A. However, for som…
Direction matters:
— West → East: +0.3 additional - East → West: Normal
Directional Kicking Value:
— Reduces elite returner impact - Trades distance for field position certainty - Best against specific…
Directly affects ball flight
— Passes and kicks 2. **Asymmetric by possession** - Teams take turns facing wind 3. **Harder to prepa…
Director of Basketball Strategy
— Owns game preparation analytics - Manages relationship with coaching staff - Leads player developmen…
Director of Data Engineering
— Manages all technical infrastructure - Ensures data quality and availability - Leads tool developmen…
Director of Player Evaluation
— Owns all player evaluation models and processes - Manages draft board creation - Coordinates with sc…
Directory entries
— tracking which pages are cached and their status - **Data entries** — the actual page images (4K, 8K…
disability rights movement
— which emerged nationally in the 1970s and 1980s and culminated in the **Americans with Disabilities …
Disabled and Here
— disabledandhere.com An accessibility and disability visibility project that has expanded to include …
Disabling direct messages for users under 16.
— **Limiting notifications for younger users** (no notifications after 9 p.m. for users under 16, afte…
Disadvantages observed:
— Compilation required Micro Focus COBOL; IBM Enterprise COBOL on z/OS could not compile the full hier…
Disadvantages of AMMs:
— Impermanent loss for liquidity providers - Price impact scales with trade size (slippage) - The liqu…
Disadvantages of CLOBs:
— Requires active market makers for liquidity - On-chain CLOBs are extremely gas-intensive - Off-chain…
Disadvantages of Independence:
— No steady paycheck (feast-or-famine cycle) - Business administration overhead (invoicing, taxes, ins…
Disadvantages of regression trees:
— A single tree is prone to overfitting (deep trees memorize training data) - Predictions are "stepped…
Disadvantages of smart bulbs:
— Smart bulbs must remain powered to maintain network connectivity — if someone turns off the wall swi…
Disadvantages of smart switches:
— Requires neutral wire at the switch box (most homes built after 1985 have neutrals; older two-wire s…
Disadvantages of the limit order:
— **Execution risk**: The order may never fill (price may move up without coming back to $0.52) - **Ad…
Disadvantages:
— WITH HOLD cursors retain certain resources across COMMITs, potentially affecting DB2 memory utilizat…
DISALLOW PARALLEL
— Table functions that maintain state via scratchpad cannot be parallelized. The optimizer needs to kn…
disciplinary siloing
— a case where knowledge or skills in one part of the organization are not reaching another part where…
Discipline mechanisms:
— How did the Taylor-era foreman discipline workers? - How does the algorithmic manager discipline wor…
disciplined information diet
— a deliberate approach to continuous learning that balances depth with breadth, signal with noise, an…
Disclosure
— sharing from your Hidden Area expands the Open Area downward. When you tell someone about your true …
DISCLOSURE AND COMPLIANCE
— [ ] **15. Disclosure requirements are stated.** The contract confirms you will include required FTC/…
Discord Analytics Servers
— Real-time discussion - Code sharing - Job opportunities
Discord and Slack Communities:
— Hack The Box Discord (one of the largest security Discord servers) - TryHackMe Discord - PNPT Discor…
Discord Communities
— nflverse Discord for NFL data - sportsdataverse for college sports - Active developer communities
Discord Servers
— Various basketball analytics communities - Search for "basketball analytics discord"
Discord: Football Analytics
— Live chat - Project collaboration - Help and support
Discord: Sports Analytics
— Real-time chat with practitioners.
discord_activity_model.py:
— Models 40,000-member server across 7 timezone groups - Simulates 4 server states: regular, BTS event…
discount rate
— your minimum required rate of return, often the company's cost of capital or a hurdle rate set by ma…
Discover hidden structure
— interactions, nonlinearities, and temporal patterns --- that domain experts might overlook. - **Scal…
Discovery
— The process by which new audiences find a creator's content, whether through platform algorithms, se…
Discovery pathway:
— How do you think most viewers found this video? Algorithmic recommendation? Search? Social sharing? …
Discovery Phase
— the precarious period between announcing an AI transformation and understanding what one actually re…
Discovery Service
— A Eureka-based service registry. When a z/OS Connect instance starts, it registers itself with the d…
Discovery service registration
— Write the YAML registration for each z/OS Connect instance: - Service ID and metadata - Health check…
Discovery Techniques:
— Read API documentation for internal field names - Examine API responses for fields not present in in…
Discredit
— You attack the credibility of mainstream information sources — journalists, scientists, government a…
Discrete Profile:
— Protects a single, specific dataset by exact name. - The profile name exactly matches the dataset na…
discrete sequence of symbols
— notes, chords, or rhythmic values — and compute the entropy of that sequence.
Discriminated union
— Use a type field to determine which interpretation to apply, and document both schemas with `oneOf` …
Discrimination
— differential behavioral treatment based on group membership
discrimination at the callback stage
— the stage between submitting an application and being invited to interview.
Discriminatory surveillance
— The disproportionate or intentional targeting of surveillance at particular communities based on rac…
Discuss the proposed extractions
— ask about trade-offs and alternatives 3. **Write characterization tests** for the original code (see…
Discussion format:
— Each position presents for 5 minutes - Cross-examination: 10 minutes - Open discussion: 15 minutes -…
Discussion points to address:
— For Activity 1: Does the absence of fully automated decision-making eliminate the DPIA requirement? …
Discussion Prompts:
— Which scenarios were easiest to place? Why? - Which were hardest? What made them ambiguous? - In sce…
Discussion questions (individually, 300 words):
— Did the crossed arms feel meaningful, or did it feel arbitrary? How did context affect this? - Did t…
Disenfranchised grief
— coined by Kenneth Doka — describes grief for losses that are not socially recognized or acknowledged…
Disengage or defer when:
— The timing is wrong (a family gathering, a crisis, a moment of high emotion) - You are too activated…
disguised you-statement
— a statement that begins with "I feel" but immediately pivots to a judgment or accusation about the o…
disinformation
— false or misleading information that is deliberately created and spread to deceive. This distinguish…
Disinformation (deliberately created to deceive):
— State-sponsored campaigns: Russian and Chinese state media outlets and affiliated accounts deliberat…
Disorganized (fearful-avoidant) attachment
— An adult attachment style characterized by both high anxiety and high avoidance; associated with his…
Disorganized attachment
— associated with histories of relational fear — corresponds with the most complex confrontation patte…
DISP=SHR
— Shared access. Multiple jobs can read the data set simultaneously. Used for input files that are not…
Disparate impact
— sometimes called adverse impact — occurs when a facially neutral practice has a disproportionately n…
Disparate impact ratio (DIR)
— The approval rate for a protected group divided by the approval rate for the highest-approved group.…
Disparate treatment
— Discrimination in which a creditor treats an applicant differently because of their race, sex, or ot…
Dispatcher entries
— Show task state transitions (running, waiting, ready) - **File control entries** — Show VSAM I/O tim…
Dispatcher Statistics
— How busy is the dispatcher? Key fields: - QR TCB busy percentage — if this exceeds 80%, the QR is sa…
Dispensing of Existence
— Present and escalating. Non-members were characterized as spiritually inadequate. Defectors were des…
dispersion
— the fact that different frequency components of the packet travel at different speeds. For the free …
dispersion relations
— integral relations connecting the real and imaginary parts of $f(\theta)$. These relations, which ar…
Displacement
— The offset of a data item from the beginning of its containing record or group item, measured in byt…
DISPLAY
— (1) A COBOL USAGE clause specifying zoned-decimal representation, where each digit occupies one byte…
Display advertising
— retail chains, department stores, grocery stores, automotive dealers, and local businesses buying la…
Display correlations among 8 different statistics
— > **Heatmap** (correlation matrix heatmap efficiently shows all pairwise correlations using color in…
Display rules
— cultural norms for appropriate emotional expression across contexts
Display/report fields:
— Header lines, detail lines, separator lines - Formatted amounts, rates, percentages, counts
dispositional optimism
— a generalized expectancy that good things will happen in the future. Unlike Seligman's explanatory s…
dispossession
— a systematic process by which Black Appalachians who managed to acquire land were stripped of it ove…
disruptive innovation
— a concept that is, in many respects, Kuhn's paradigm shift translated into the language of business …
Dissonance
— The perceptual quality of a sound combination or interval that sounds tense, rough, or unresolved. D…
Distance to Goal
— The Euclidean distance from the shot location to the center of the goal. One of the most predictive …
Distance:
— Total distance per game - High-intensity running distance (>18 mph) - Distance by game segment
DISTINCT
— DB2 must deduplicate before the outer query can process results. - **GROUP BY with aggregation** — A…
Distinguish between note-taking and note-making
— between transcription and transformation — and explain why the distinction changes everything - **Co…
Distinguish between P(A|B) and P(B|A)
— the "prosecutor's fallacy" is one of the most dangerous statistical errors, and it appears in medici…
Distress tolerance
— the capacity to experience negative emotional states without resorting to maladaptive regulation (av…
Distributed (Motion Offense):
— Relatively even centrality - Many interconnections - Harder to defend but requires high IQ
Distributed surveillance
— Surveillance conducted by multiple actors across a decentralized network rather than by a single cen…
Distributed system
— A system in which processing, decision-making, or control is spread across many nodes rather than co…
distributed test preparation
— the opposite of cramming.
Distribution Insights:
— **Spain's** approach under De Gea emphasized short passing, aligning with their possession philosoph…
Distribution Matters
— Modern goalkeepers must be evaluated as passers
Distribution Shape:
— Skewness: Asymmetry direction - Kurtosis: Tail heaviness - Outliers: Extreme values
Distribution thinking
— seeing data as a shape, not just a single number — is the mindset shift that makes everything else i…
distribution-free methods
— they work regardless of the underlying distribution's shape.
Distributions
— Understanding that data has a "shape" - Familiarity with the normal distribution concept - Awareness…
Disturbing ACM releases fibers
— sanding, cutting, drilling, breaking, demolishing. - **Common locations:** 9" and 12" floor tiles, p…
DIVA (Damn Insecure and Vulnerable App)
— Android vulnerabilities - **InsecureBankv2** — Vulnerable Android banking application - **OWASP iGoa…
Diverge
— Generate multiple plausible strategies (the "branches" of the tree) 2. **Evaluate** — Assess each br…
Divergence framing
— A news framing strategy that emphasizes conflict, disagreement, and partisan division in coverage of…
Divergence periods
— when the two fields develop largely independently — include the medieval period (music theory advanc…
diverging palette
— A color palette with two distinct hues meeting at a neutral midpoint, used to represent values above…
Diverse ensembles beat individual models
— combine different model families, not just different hyperparameters. 3. **Calibration is not option…
Diverse participants
— genuine weak-tie potential (different backgrounds, expertise, networks) 2. **Voluntary and interest-…
Diversification (luck portfolio)
— The strategy of spreading luck bets across multiple uncorrelated domains, so that failures in one ar…
Diversify Your Life:
— Cultivate interests outside of security - Physical exercise counteracts the sedentary nature of secu…
diversity
— each tree needs to be different enough to capture different aspects of the data.
Diversity (Chapters 6, 12, 19, 40)
— Do your interviews capture the diversity of Appalachian experience? If your interviewees are predomi…
Divide and Conquer
— The closest-pair problem has a famous O(n log n) divide-and-conquer solution. Brute force would be O…
Divisive (top-down)
— Start with everything in one cluster. At each step, split the most heterogeneous cluster. Repeat unt…
DIY air sealing budget approach:
— Attic hatch or pull-down stair: $50–$150 to build or buy an insulated cover plus weatherstripping - …
DIY is generally appropriate when:
— The work is reversible (you can undo mistakes without major consequences) - Errors have low conseque…
DIY tasks (monthly/seasonally):
— Replace the air filter monthly during heating season (1" filters) or every 3 months (4–5" media filt…
DIY tasks (seasonally):
— Change air filter monthly during heavy use seasons (both heating and cooling). - Rinse outdoor unit …
DIY tasks (seasonally/regularly):
— Bleed all radiators at the start of the heating season, and any radiator that runs cold mid-season. …
DIY vs. Professional: Heat Pump Work
— **DIY:** Change the air filter (monthly in heating season), clear snow and ice from around the outdo…
DIY vs. Professional: Mini-Split Installation
— **DIY possible:** Mounting the indoor unit bracket, drilling the wall penetration, routing and secur…
DIY-appropriate:
— Hair removal from shower and sink drains (drain stick) - Plunging a single fixture - Remove and clea…
DJ — Daniel James Carter
— is 18. He has 76,000 subscribers on a commentary channel that has been described, in one comment tha…
DJ's Code (developed over 18 months):
— *Accuracy:* "Every specific claim I make, I can source. If I can't source it, I say 'I think' or 'I …
DJ's code (key elements):
— **Accuracy:** Every specific factual claim is sourced. If he can't source it, he labels it clearly a…
DL/I is navigational, not declarative
— you tell IMS how to traverse the hierarchy, one segment at a time, unlike SQL where you describe wha…
DLET (Delete)
— Deletes the segment most recently retrieved with a hold call *and all its dependents*. If you delete…
DLQ depth
— any message on the dead letter queue triggers an immediate alert. In a healthcare system, a failed e…
DM / PM
— Direct Message / Private Message; private one-on-one communication outside of server channels.
DMCA (Digital Millennium Copyright Act)
— A US law that provides a framework for copyright owners to request the removal of infringing content…
DMCA weaponization
— using copyright takedown mechanisms to silence fan creators — is a specific form of false reporting …
DNS and Infrastructure Analysis:
— Perform DNS enumeration: A, AAAA, MX, TXT, NS, SOA records. - Identify email security posture: SPF, …
DNS logs:
— All DNS queries and responses - Essential for identifying C2 communication, data exfiltration via DN…
Do
— requires your specific voice, judgment, or creative presence - **Delegate** — could be done by someo…
Do both
— moderate promises with genuinely surprising content
Do comment:
— *Why* you made a particular choice (not *what* the code does) - Anything that would confuse someone …
DO measure by completion rate
— how many viewers watch to the end (should be very high for effective sensory content) - **DO measure…
Do not commit secrets to version control!
— ### Exercise 34: Logging Implementation
Do not optimize before you have users
— You do not know what the real usage patterns will be. - **Do not sacrifice readability for negligibl…
Do not treat it as an unexpected error
— this is a predictable business condition (e.g., a duplicate transaction ID). 2. **Check SQLERRM** to…
Do not upload to external AI tools:
— Personally identifiable information (PII) — names, email addresses, social security numbers - Protec…
Do not use CoT when:
— The task is factual retrieval (no reasoning required) - You need a short, direct output and reasonin…
Do not:
— Replay the argument in your mind - Rehearse your counterarguments - Text the other person about the …
Do the exercises
— at minimum, all Part A (conceptual) and Part B (calculations) problems 5. **Study at least one case …
Do/Don't examples
— actual side-by-side content samples, one in voice and one out of voice, so there is a real reference…
Do:
— {Best practice 1} - {Best practice 2} - {Best practice 3}
Docker
— Containerization is how modern software is deployed reliably. A basic understanding of Docker lets y…
Docker Compose
— A tool for defining and managing multi-container Docker applications using a YAML file.
Docker Daemon Socket
— If accessible, provides full control over all containers and the host 2. **Docker API** — When expos…
Docker Documentation
— Comprehensive guides at docs.docker.com.
Docker image
— A layered, read-only snapshot of a filesystem. The template from which containers are instantiated.
Docker in depth
— "Docker Deep Dive" (Poulton) for understanding containers, networking, and volumes more thoroughly 2…
Docker:
— `docker build` completes without errors locally - `docker run --env-file .env image-name` starts and…
Dockerfile
— A text file containing instructions for building a Docker image. Each instruction creates a layer.
Docstring
— A string literal placed at the beginning of a Python module, class, or function to document its purp…
Docstring conventions:
— First line: one-sentence summary of what the function does - Args section: each parameter, its type,…
docstrings
— they describe what the function does. They're not comments — they're actually stored by Python and c…
Doctrine Over Person
— Present. Members who reported internal doubts were told their doubts were evidence of the enemy's in…
Document the data exposure
— not just that the database is accessible, but what types of data it contains and the potential busin…
Document the full process:
— Number of rounds - Iteration types used - What each round changed - Time spent on AI interaction vs.…
Document your decisions
— the reasoning behind design choices matters as much as the code 5. **Evaluate rigorously** — every p…
DOCUMENT_TYPE
— Lookup: types of identity documents.
Documentation
— Is there a data dictionary, codebook, or schema description? Poorly documented data leads to incorre…
Documentation CAN:
— Record the "what" — system structure, configurations, procedures - Record decisions and their stated…
Documentation CANNOT:
— Transfer judgment and intuition - Capture the full reasoning behind complex decisions - Convey the "…
Documentation practices
— maintaining organized archives of harassment received, with timestamps, platform context, and screen…
Documentation Quality Metrics:
— 100% of public functions and classes had complete docstrings - All 47 code examples in documentation…
Documentation Setup:
— Create your engagement notebook (many testers use CherryTree, Obsidian, or Notion) - Prepare finding…
Documentation Standards:
— All code should be version-controlled and documented - Analytical findings should be stored in a sea…
Documentation tasks:
— Writing docstrings - Creating README files - Writing technical specifications
Documentation:
— [ ] The README explains what the project does, how to set it up, and how to run it - [ ] Key decisio…
Documents included:
— [Filename]: [What it contains, last updated date] - [Filename]: [What it contains, last updated date…
does not add newlines automatically
— `.writelines(iterable)` — writes each string from an iterable; **also does not add newlines** - Mode…
Does NOT Provide:
— Better point estimates than models - Certainty about outcomes - Immunity to bad assumptions
Does the data fit?
— Always validate with visual inspection and formal goodness-of-fit tests (Section 7.5). - If the fit …
Doesn't Capture Everything
— No ball tracking in current public data - Can't see player eye movement or hand placement - Doesn't …
Doesn't crash on unexpected input
— it tells the user what went wrong 2. **Doesn't lose data** — it saves progress before failing 3. **G…
Doesn't exclude your lower-income audience
— everyone who needs the content should be able to access meaningful versions of it
Dolchstoßlegende
— The "stab in the back" myth; the false claim that Germany's WWI defeat resulted from internal Jewish…
DOM
— Document Object Model; the tree structure that a browser (or parser) builds from HTML, allowing prog…
Domain
— A distinct field of knowledge or practice (e.g., biology, economics, music) with its own vocabulary,…
Domain 1 priority:
— Three specific 30-day actions: 1. 2. 3.
Domain 1: Education
— **Civil Rights Data Collection (CRDC)**: U.S. Department of Education data on school discipline, acc…
Domain 1: The Inner Life
— thoughts, emotions, beliefs, values, attention, consciousness, memory, perception
Domain 2 priority:
— Three specific 30-day actions: 1. 2. 3.
Domain 2: Criminal Justice
— **Stanford Open Policing Project**: Traffic stop data from multiple states, including driver demogra…
Domain 2: The Self
— personality, identity, self-concept, self-esteem, self-efficacy, development, motivation
Domain 3: Employment and Hiring
— **Bureau of Labor Statistics / Current Population Survey**: Employment rates, wages, and occupationa…
Domain 3: Relationships
— attachment, communication, conflict, intimacy, family, friendship, empathy
Domain 4: Housing and Lending
— **Home Mortgage Disclosure Act (HMDA) data**: Mortgage application outcomes by race, income, and geo…
Domain 4: Work and Purpose
— achievement, procrastination, decision-making, leadership, creativity, meaning
Domain 5: The Social Ecology
— social forces, group dynamics, culture, technology, physical environment
Domain and Certificate Strategy:
— Select domain naming conventions that plausibly relate to FinanceForward's technology stack or busin…
domain expertise
— your expertise — it borrows the ability to ask the right questions, interpret results in context, an…
Domain instances:
— **Physics:** The Higgs mechanism broke the electroweak symmetry, giving particles mass and creating …
Domain knowledge
— You must understand the subject matter well enough to evaluate whether the model's output is correct…
Domain knowledge breadth
— cross-domain knowledge generates more intersection insights 2. **Pattern recognition from experience…
Domain knowledge:
— Understanding of the specific industry or application area - Ability to translate business problems …
Domain-agnostic
— which also means it can miss domain-specific sentiment. In a medical context, "positive" test result…
Domain: _______________
— Current investment level (Low / Medium / High / Very High): - Expected return (what you get from thi…
Domains selected for intervention:
— Domain 1: __________________ (Week 1: ___/50; Week 4: ___/50; Change: ___) - Domain 2: _____________…
Domains Where It Appears:
— Manufacturing (Soviet nail factories, output quotas) - Education (standardized testing, teaching to …
Dominance by frequency:
— **Low frequencies (below ~1.5 kHz):** ILD is very small because low-frequency sounds diffract easily…
Dominance hierarchy
— A rank-ordering within social groups based on access to resources, status, and mates; studied in evo…
dominant region
— the area of the pitch they control.
dominant region area
— measures how much space that player "owns" at a given instant. Large cells for defenders may indicat…
Don't abandon roundups
— they're working and serve his core audience. Keep them as the 70% consistent format. 2. **Give the e…
Don't comment:
— Every single line (this makes code *harder* to read, not easier) - Obvious things (`x = 5 # assign 5…
Don't forget dependency mapping
— you can't modernize an application that 347 other programs call without a plan for all 347 callers.
Don't Over-Trust Single Games:
— Even well-calibrated models have significant single-game variance - 22% events happen 22% of the tim…
Don't:
— Be condescending ("The client failed to implement basic security...") - Be alarmist ("The network is…
donor network analysis
— mapping the connections between donors, committees, and candidates to reveal patterns of coordinatio…
Doodle Jump
— a simple vertical-scrolling game — was built by two brothers in Croatia, Igor and Marko Pušenjak. It…
Door-in-the-face technique
— A compliance technique in which a large, refused request is followed by a smaller request, increasin…
Dopamine from improvement detection
— The brain's dopamine system responds not just to good outcomes but to IMPROVEMENT — the delta betwee…
Dopaminergic system
— Neural circuits involving dopamine transmission; central to reward processing, motivation, and the r…
doping
— intentionally introducing impurity atoms that either donate extra electrons (n-type) or create holes…
Doppler effect
— The change in observed frequency of a wave caused by relative motion between the source and observer…
Dormant or effectively abandoned:
— A KYC automation platform procured in 2020 — implementation stalled when it became apparent that the…
dormant tie
— that is particularly valuable in digital networks. Dormant ties are connections that were once stron…
double modal
— that is a systematic feature of their dialect, with a specific meaning that Standard American Englis…
Double Pivot Podcast
— Focus: Soccer analytics discussions - Defensive Episodes: Defender evaluation, pressing analysis
Double Team Win Rate
— Measuring elite rusher impact - Scheme implications - PFF's double team tracking
Double template
— The explicit adoption of the tobacco industry's manufactured doubt strategy by another industry. Doc…
Double-entry bookkeeping
— An accounting system where every transaction is recorded as both a debit and a credit of equal amoun…
Doujinshi
— Japanese self-published fan works. Technically infringing under Japanese copyright law but informall…
Doves
— those who prioritize employment and growth -- effectively set a higher threshold. They are willing t…
dower right
— the guarantee that a widow would receive one-third of her deceased husband's estate for her lifetime…
Down Adjustments (Approximate):
— 1st down: baseline - 2nd down: -0.4 EP - 3rd down: -0.9 EP - 4th down: -1.5 EP
Down-ballot
— Referring to candidates or measures appearing below the top-of-ticket (presidential or gubernatorial…
down-the-line exchange
— a system in which materials moved from community to community, each transfer covering a relatively s…
Downloads
— Is it widely used? 2. **Maintenance** — When was the last update? 3. **Source code** — Can you read …
downward causation
— the emergent level exerting causal influence on the components from which it arises — that sits unea…
Downward toward his team:
— Sam has legitimate, coercive, and reward power over Tyler and others - Tyler may have expert power i…
Doxxing
— the publication of personally identifiable information about a target, typically including home addr…
DPI
— Dots Per Inch; controls image resolution when saving. 150 DPI for digital use; 300 DPI for print.
DPI guidance:
— 72 DPI: Screen resolution minimum (draft use only) - 150 DPI: Good quality for digital documents and…
DR characteristics:
— IMS databases reside on VSAM datasets mirrored via GDPS/Metro Mirror - IMS log datasets are mirrored…
DR site upgrade:
— DR site capacity increased from 50% to 75% of production - Dedicated IMS recovery LPAR at DR site (a…
DR Test Plan
— Design a Level 3 (planned site failover) test with specific success criteria, schedule, and measurem…
DR Test Schedule:
— Monthly: Component-level failover test (one CICS region, one DB2 member) - Quarterly: Full applicati…
Dr. Amara Osei
— Jordan's surveillance studies professor; Ghanaian-American; provides theoretical framing - **Marcus*…
Dr. Anika Patel
— Biology researcher at a university, processing DNA sequence data. Her scenarios illustrate bioinform…
Dr. James Okafor
— Second-year medical student studying for USMLE Step 1. Represents the expertise development pathway …
Dr. Maya Chen
— public health epidemiologist tracking disease outbreak patterns across communities (CDC/WHO-style da…
Dr. Patel's DNA Pipeline (Dr. Anika Patel)
— A biology researcher processing thousands of DNA sequence files. From counting nucleotides to patter…
Draft Class Comparison
— Compare QB draft classes by EPA - Track development curves - Predictive features
Draft Mistakes:
— **Raiders (Ruggs at 12):** Overdrafted by ~30 picks based on speed alone - **Eagles (Reagor at 21):*…
Draft value basics
— Understanding pick economics 2. **Combine data interpretation** - What testing means 3. **Production…
DraftExpress.com (Archive)
— Historical prospect reports - Pre-draft analysis archive - Methodology documentation
Dragging Canoe
— Cherokee war chief who opposed the Treaty of Sycamore Shoals and led decades of armed resistance to …
DRAIN_WAIT 120
— Two minutes. The nightly batch processes long-running units of work. 120 seconds accommodates most b…
Drainage Solution Costs (Rough Estimates):
— Splash block: $10–$30 - Downspout extension (flexible): $10–$25 - Underground downspout line, 20 fee…
Drawdown Management:
— Maximum drawdown analysis quantifies the worst expected decline in bankroll - Recovery time grows ra…
Drawdowns are psychologically devastating
— even with a positive edge, extended drawdowns cause self-doubt and poor decision-making 2. **Drawdow…
Drive-Level Data
— One row per possession - Includes start/end field position, result, plays count - Useful for studyin…
driven harmonic oscillator
— any mass-spring-like system with damping, driven by an oscillating force. The amplitude of steady-st…
Drone surveillance
— The use of unmanned aerial vehicles equipped with cameras, thermal sensors, or other instruments to …
Drop Coverage:
— Defender sags to protect rim - Concedes pull-up jumpers (EPV ~1.10) - Best against poor-shooting bal…
Drop rows with missing values
— this would reduce the dataset from 183 to 147 countries and systematically exclude low-income countr…
Dropout Regularization
— Preventing overfitting - Optimal rates
Drug courts
— specialized court programs that diverted nonviolent drug offenders from incarceration into supervise…
drug distribution chain
— a network of companies responsible for shipping prescription medications from factories to pharmacie…
DRY
— **Don't Repeat Yourself**. The idea is simple: if you find yourself writing the same code more than …
DRY (Don't Repeat Yourself)
— A software principle that aims to reduce duplication of logic. Every piece of knowledge should have …
DSA (Dynamic Storage Area)
— Below the 16 MB line. In 2026, you might think below-the-line storage is irrelevant. It is not. CICS…
DSALIM
— Maximum size of the DSA. Default is 5M. For most modern workloads, 5M is sufficient. Only increase i…
DSN1COPY and DSN1PRNT (z/OS)
— Utilities for copying and printing VSAM data sets, including catalog and directory data sets. Used i…
DSNACCOR (z/OS)
— The DB2 Autonomic Computing sample stored procedure that uses Real-Time Statistics to generate utili…
DSNAME
— Dataset Name. The fully qualified name of a z/OS dataset, consisting of one or more qualifiers separ…
dtype
— Data type of a pandas column. Common types include `int64`, `float64`, `object` (string), `bool`, an…
Dual Audience Writing:
— Executive summaries communicate risk in business terms (1-2 pages, no jargon) - Technical findings p…
Dual Coding Theory
— Allan Paivio's theory that information processed through two channels simultaneously (verbal + visua…
Dual Control Model
— (Referenced in Ch. 37; relevant here) The model of sexual excitation and inhibition that underpins u…
Dual inhibition
— Okafor and Reyes's term for the simultaneous activation of strong approach and avoidance motivation …
dual role
— contributing to environmental harm through energy consumption and e-waste, while also enabling essen…
Dual-process theory
— The framework distinguishing fast, automatic, heuristic processing (System 1) from slow, deliberate,…
Duchenne laugh
— A genuine, involuntary laugh that involves specific facial musculature (orbicularis oculi); distingu…
Duct blaster results (pre-drywall):
— Total duct leakage: 6.2 CFM25 per 100 sq ft of floor area - Duct leakage to outside: 3.8 CFM25 per 1…
Duct system (for ducted heat pump):
— Have ducts been tested or assessed? High duct leakage is more damaging to heat pump performance than…
Duct termination must be to the exterior
— through a roof cap, wall cap, or properly placed soffit exit. Never terminate into the attic or wall…
Duende
— in flamenco, the quality of deep emotional authenticity and confrontation with existential weight th…
Duke Reporters' Lab Fact-Checking Database
— reporterslab.org/fact-checking Tracks the global growth of fact-checking organizations, with country…
Dumb Luck or Divine Intervention?
— See: Rescher, N. (1995) below.
Dump
— A formatted display of the contents of a program's storage areas at the time of an *ABEND*. Tools li…
Dunbar's number
— Robin Dunbar's finding that humans maintain approximately 150 stable social relationships. This limi…
Dunc'd On
— Combines analytics with salary cap and league coverage
Dunning-Kruger effect
— The finding that limited knowledge in a domain correlates with overconfidence in that domain.
Duplicate records
— rows that appear more than once, sometimes identically, sometimes with slight variations. The same p…
Durability Assessment:
— Workload history and trends - Speed/explosion consistency over season - Injury history relative to w…
durable frameworks
— is perhaps the most important takeaway from this entire course. By the time you read this sentence, …
Duration
— anxiety persists far beyond the resolution of the precipitating situation; anticipatory anxiety abou…
Duration compression
— Compresses hours/days of work into seconds (8-hour painting → 30-second video). The brain perceives …
During analysis:
— [ ] Have I checked for representation gaps in the data? Which groups are underrepresented or absent?…
DURING CONSTRUCTION
— [ ] Establish daily and weekly communication rhythm - [ ] Keep project journal (daily entries) - [ ]…
During deployment:
— Ongoing community liaison function with genuine power to surface community concerns and require depa…
During DPO/RLHF:
— Chosen reward: $\hat{r}(y_w)$ should increase - Rejected reward: $\hat{r}(y_l)$ should decrease - Re…
During growth, the system accumulates debt
— deferred costs, technical shortcuts, institutional compromises -- that enable rapid expansion but wi…
During refactoring:
— Write unit tests for new code - Run characterization tests after every change - Run integration test…
During SFT:
— Training loss (should decrease smoothly) - Validation loss (should decrease; divergence from trainin…
During the Call:
— [ ] Open with a check-in before entering difficult content - [ ] Explicitly acknowledge the medium (…
During the confrontation:
— [ ] Am I leaving space for indirect signals as well as direct statements? - [ ] Am I framing concern…
During the conversation:
— [ ] Open with genuine care and stated intention - [ ] Pace slower than feels natural - [ ] Check in …
During the moment:
— Real-time reaction: immediate responses, live commentary, in-the-moment content - Highest competitio…
During the session (Performance — 90 minutes):
— First 10 minutes: **Preview** tomorrow's lecture material (Phase 1 of the study cycle — quick scan o…
During viewing (2-3 minute segments):
— Watch the segment with attention focused on her specific question - Pause the recording - Write a br…
Dvorak Cello Concerto in B minor, first movement
— the centerpiece. Technically demanding, with long lyrical lines that require sustained emotional int…
Dvorak:
— Exposition: 2 (mostly there, but some shaky intonation in the high register) - Development section: …
DVWA
— Damn Vulnerable Web Application (PHP, multiple security levels) - **OWASP Juice Shop** — Modern vuln…
Dyadic personality
— The combined personality profile of both partners in a relationship, which predicts outcomes better …
Dyan Gibbens
— CEO of Trumbull Unmanned, a drone technology company 2. **Alessandro Acquisti** -- Professor of Info…
dYdX Model (for perpetuals):
— Order matching: Off-chain (Starkware L2) - Margin: On-chain (Ethereum L1) - Settlement: L2 with L1 f…
DYNAM
— A COBOL compiler option that causes CALL literal statements to be treated as dynamic calls, resolvin…
Dynamic ARP Inspection (DAI)
— A switch-level security feature that validates ARP packets against a trusted binding table (DHCP sno…
Dynamic backup assessment
— Update backup projections weekly - Account for learning/adaptation
Dynamic Call
— A CALL statement that resolves the target subprogram name at run time by loading it from a load libr…
Dynamic dispatch
— building program names at runtime from data values — enables extensible systems where new functional…
Dynamic Network Analysis
— Time-varying graphs - Evolution patterns - Snapshot methods
Dynamic pricing
— Algorithmic adjustment of prices in real time based on demand, supply, competition, and individual u…
Dynamic Programming and Optimal Control
— Bertsekas - Advanced DP theory - Computational approaches - Optimal policy derivation
Dynamic range
— The ratio between the loudest and softest sound levels in a signal or system, typically expressed in…
Dynamic Report Generator
— a single COBOL/DB2 program that constructs SQL statements at runtime based on a report definition fi…
Dynamic SQL
— SQL statements that are constructed and prepared at runtime rather than embedded in the source code …
Dynamic SQL is built and prepared at runtime
— necessary when the SQL text varies (different tables, different WHERE columns). Use PREPARE once and…
Dynamic SQL:
— **CACHEDYN**: When set to YES, DB2 caches prepared dynamic SQL statements in a global cache. This is…
Dynamic substring operations
— scanning for delimiters, extracting tokens, parsing variable-format records — are built by combining…
DYNAMICRULES
— Controls how dynamic SQL is processed:
Dysfunction in one spouse
— one partner functions at the expense of the other. One person's anxiety is managed by under-function…
Dyson series
— the backbone of time-dependent perturbation theory. The first-order term gives Fermi's golden rule; …
E
e) Data quality checks:
— Verify all 16 SEC teams are represented - Check for missing values in key fields (yards, down, dista…
E) INSERT with NOT LOGGED INITIALLY
— Near-zero logging for the INSERT itself. Only the COMMIT is logged plus metadata about the table's s…
Each fall before heating season:
— Schedule furnace inspection and tune-up (the heat exchanger crack reinforces this — he'll never skip…
Each iteration materializes
— DB2 stores intermediate results. Deep hierarchies with wide rows consume TEMP space. 2. **No indexes…
Each spring:
— Check the exterior termination caps on all direct-vent appliances and the furnace exhaust pipe (for …
Each step must be idempotent
— running it twice produces the same result as running it once (where possible) 2. **Each step must ch…
Each user is randomly assigned
— the hash function is effectively random with respect to user characteristics - **Each user stays in …
Early 2000s:
— Play-by-play becomes more available - Still missing advanced charting
Early access
— superfans get first look at new content, products, or community features. This is low-cost for the c…
Early Analytics Pioneers
— Charles Reep's passing analysis - Egil Olsen's direct play studies - Foundation for modern metrics
Early involvement
— before procurement, not after deployment - **Genuine authority** — the power to reject or modify pro…
Early Life and Community
— Tell me about where you grew up. What was the community like? - What did your parents do for a livin…
Early Pioneers:
— **Bud Wilkinson** (1950s-60s): Oklahoma's legendary coach kept meticulous records of play success ra…
Early Season Performance (Games 1-4):
— Record: 3-1 - Points per game: 38.0 - Yards per game: 485 - Plays per game: 72
Early warning signs:
— **Disproportionate early intensity:** Declarations of profound connection before genuine mutual know…
Early-season SOS limitations:
— Small sample sizes make opponent records unreliable - Teams haven't yet established their true quali…
earned credibility
— trust built through demonstrated knowledge rather than claimed authority.
earned security
— security achieved through reflective engagement with insecure early attachment history, rather than …
earthworks
— carefully constructed mounds of soil, often built over elaborate burial chambers, that served as mon…
Eastern Band of Cherokee Indians
— The Cherokee community that remained in the Appalachian mountains after the Trail of Tears, now a so…
Eastern Band of Cherokee Indians (EBCI)
— The federally recognized sovereign nation descended from Cherokee who remained in the Appalachian mo…
eastern panhandle
— Berkeley and Jefferson Counties, nestled between the Potomac River and the Blue Ridge — was included…
Easy enough
— most people believe they can do it 2. **Hard enough** — doing it feels like an achievement 3. **Visi…
EBCDIC
— Extended Binary Coded Decimal Interchange Code. The character encoding system used on IBM mainframes…
EBCDIC (z/OS mainframe):
— Lowercase letters: a-z (hex 81-A9) - Uppercase letters: A-Z (hex C1-E9) - Digits: 0-9 (hex F0-F9) - …
ECCV (European Conference on Computer Vision)
— Biennial European venue
echo
— a spontaneous reappearance of the signal
Echo chamber
— social dynamics in which like-minded people share content that confirms and intensifies shared belie…
Echo/reverb
— makes speech muddy and signals unprofessional recording - **Background noise** — distracts from cont…
Echoes
— distinct repetitions of the original sound, perceptually separate from it — occur when a reflection …
ECML PKDD Sports Analytics
— European ML conference - Soccer-specific workshops - Technical implementations
ECML PKDD Sports Analytics Workshop
— Academic machine learning focus - Soccer analytics papers - Cutting-edge research
ECOA (Equal Credit Opportunity Act)
— 1974 federal law prohibiting discrimination in any aspect of a credit transaction on the basis of ra…
Ecological fallacy
— The error of inferring individual-level relationships from aggregate-level data. For example, if pre…
Ecological inference
— Statistical methods for estimating individual-level relationships from aggregate data. Used extensiv…
Ecological succession
— The predictable sequence of community changes following a disturbance, from pioneer species to clima…
Economic Features:
— `gdp_growth`: Annualized GDP growth rate in the quarter preceding the election. - `unemployment_chan…
Economic Risk
— **Impermanent loss**: As discussed in Section 36.3. - **Token price risk**: Mining rewards denominat…
Economic variables:
— What percentage of fan creators would be eligible (based on platform requirements, content type, ter…
Economic voting
— The tendency of voters to reward or punish incumbent parties for economic conditions, especially inc…
economizer mode
— when outdoor conditions are favorable (cool, low humidity), an economizer opens a damper to bring in…
EDD Triggers (MLR 2017, Reg. 33):
— Customer or jurisdiction appears on FATF blacklist/greylist - PEP or immediate family member - Non-f…
Edge Case
— An input or situation at the extreme boundary of expected operating parameters. AI-generated code of…
edge cases
— situations that fall outside the patterns the training data captured:
Edge cases:
— Empty string: "" - All same characters: "aaaa" - All unique characters: "abcdef" - Repeats at bounda…
Edge Computing
— Processing data near the point of collection (e.g., at the stadium) rather than in a remote cloud, e…
Edge metrics:
— Average edge per trade (your probability - market price, signed by direction of bet) - Realized edge…
Edge of chaos
— The narrow zone between rigid order and complete randomness where complex adaptive systems are most …
Edge uncertainty
— 240 bets is a small sample. The 95% confidence interval for their true win rate is approximately 47.…
Editing efficiency
— Editing similar videos in sequence is faster than across separate sessions. You develop rhythm, reus…
Editorial identity:
— How does this new vertical connect to your main brand? What is the connective tissue? - What does it…
Editorial Patterns
— Does the outlet's coverage of its funding government or ownership's political allies follow the same…
EDSA (Extended Dynamic Storage Area)
— Below the 2 GB bar but above the 16 MB line. This is where the bulk of CICS's work happens: program …
EDSALIM
— Maximum size of the EDSA. This is the critical parameter. Default is 500M, which is almost always wr…
Education
— community colleges, regional universities, and public school systems — is a significant employer acr…
Educational content:
— Setup: "Scientists believed for 200 years that this is how gravity works..." [establish expectation]…
Educational homogamy
— The trend toward partnering with others of similar educational attainment; has increased dramaticall…
Educational Psychology Review
— Publishes review articles and meta-analyses on educational topics. The Dunlosky et al. (2013) strate…
Edutainment
— Content that combines educational goals with entertainment formats, making learning engaging rather …
Effect on mass interception:
— Cable-level interception: captures encrypted ciphertext — useless without keys - Legal orders to com…
Effect size
— A statistical measure of the practical magnitude of a finding, independent of sample size; common me…
Effect:
— Rewards larger margins - Dampens expected blowouts (favorite wins big) - Amplifies upset blowouts
Effective dating
— Used when an attribute changes over time and the business needs to know the value at any historical …
Effective length specifications:
— "Respond in exactly three sentences." - "Maximum 200 words." - "Write a one-paragraph summary (four …
Effective Python Testing with pytest
— Real Python (https://realpython.com/pytest-python-testing/) A comprehensive tutorial that covers fix…
Effective sample size
— The sample size that accounts for the statistical efficiency loss introduced by weighting; always le…
Effects and aftermath:
— What is the documented evidence of the campaign's effects on beliefs, attitudes, or behavior? - What…
Efficiency
— It doesn't waste time or memory. The key insight of this chapter is that efficiency isn't about abso…
Efficiency gap
— A measure of partisan advantage in legislative maps that captures the differential "wasting" of vote…
Efficiency matters
— Two players with same points have different OWS - Higher TS% = more efficient = higher OWS - Volume …
Efficiency metrics:
— Time from project initiation to model deployment (should decrease over time) - Reuse rate of shared …
Ego depletion
— The theory that self-regulatory capacity functions like a limited resource that can be exhausted by …
Ehrenfest's theorem
— Ch 2.7, Ch 7.4 The result that quantum expectation values obey classical equations of motion: $m\fra…
EIBRESP
— The EIB field containing the numeric response code from the last CICS command. Testing EIBRESP (usin…
EIBRESP / EIBRESP2
— Response code from the last command. Non-zero responses indicate errors that may be causing retries …
Eigenstate
— In quantum mechanics, a state in which a physical observable has a definite, well-defined value (an …
Eigenstate (eigenfunction, eigenvector)
— Ch 2.5, Ch 6.2 A state $|\psi\rangle$ satisfying $\hat{A}|\psi\rangle = a|\psi\rangle$ for operator …
Eigenvalue
— In linear algebra and quantum mechanics, the scalar associated with an eigenvector or eigenstate: Aψ…
Eigenvector Centrality
— A network metric that measures a node's influence based on the influence of its neighbors. In passin…
Einstellung
— officers trained in conventional operations perceive new conflicts through the conventional framewor…
elaboration likelihood
— the motivation and ability to think carefully about a message. Motivation is reduced by low personal…
Elaboration Likelihood Model (ELM)
— Petty and Cacioppo's dual-process model of persuasion distinguishing the central route (argument qua…
elaborative interrogation
— asking "why?" and "how?" questions that force deep processing. Research consistently shows that self…
elaborative processing
— building a rich web of connections around the fact, generating questions, constructing explanations,…
Elapsed and CPU time breakdown:
— Class 1: Total elapsed time (in-DB2 + out-of-DB2) - Class 2: In-DB2 elapsed time - Class 3: Wait tim…
eLearnSecurity Junior Penetration Tester (eJPT)
— **Vendor:** INE Security (formerly eLearnSecurity) - **Cost:** ~$249 (exam + training bundle varies)…
Electoral College
— The system by which the U.S. president is elected, in which each state receives a number of electors…
Electoral victory
— the populist leader or party wins office through democratic means, often with genuine majority suppo…
Electrical infrastructure:
— Does your panel have 200-amp service? (100-amp panels may not accommodate a heat pump plus other mod…
Electronegativity
— the tendency of an atom in a molecule to attract electrons --- is not a ground-state atomic property…
Electronic Communications Privacy Act (ECPA)
— A US federal law enacted in 1986 that establishes standards for government access to electronic comm…
Electronic Frontier Foundation (EFF)
— *Focus:* Digital civil liberties, free speech, privacy, innovation - *Notable work:* Privacy Badger,…
Electronic Privacy Information Center (EPIC)
— *Focus:* Privacy, free expression, democratic values in the information age - *Notable work:* Litiga…
electronic variable acoustic systems
— technology that artificially extends or modifies a room's reverberation characteristics.
element interactivity
— how many elements in the material must be processed simultaneously to achieve understanding. A fact …
Elementary Item
— A COBOL data item that is not further subdivided; it has a PICTURE clause. Contrast with a *group it…
Elements of Construction:
— The specific market of "strangers renting rooms in each other's homes" did not exist as a recognized…
Elements of Discovery:
— The resource gap (empty rooms) existed before Airbnb - The demand gap (people needing accommodation)…
Elena
— Public health analyst exploring COVID vaccination rates across demographics and regions, discovering…
Elena (freelance consultant, efficiency-focused)
— Advantage: Strong domain expertise across many areas means she can evaluate AI output for substantiv…
Elena Vasquez
— Data analyst at a nonprofit organization. Appears throughout the textbook as the anchor example for …
Elena's AI no-fly list:
— Client data in any form into consumer AI tools - Legal and regulatory claims in client deliverables …
Elena's Nonprofit Report (Elena Vasquez)
— A data analyst at a nonprofit who spends four hours every week manually assembling a report from thr…
Elena's role
— that she is the primary strategist and deliverable author, that she uses Claude to organize research…
elevated relational stakes
— the sense that any significant confrontation risks not just discomfort but structural damage to a re…
elevation
— the warm, uplifting feeling triggered by witnessing acts of moral beauty, kindness, or human goodnes…
Eleven Sports Blog
— Analytics from Belgian sports tech company - Research-oriented posts
Elias Boudinot
— born Buck Watie, a Cherokee who had been educated at a mission school in Connecticut and who took th…
Elicit
— elicit.org Research question-based literature search across Semantic Scholar. Best for academic rese…
Eligible case types:
— A political movement (domestic or international) with high-control characteristics - A multi-level m…
Eliminated downtime costs
— for a major bank, one hour of unplanned downtime can cost millions of dollars in lost revenue, regul…
Eliminating N+1 queries
— The single most impactful optimization for web applications. 2. **Adding database indexes** — Often …
Elite (High EPA + High Success):
— Consistent and explosive - Championship-caliber offense - Can win in any style
elite gift-giving
— a system in which high-status individuals maintained alliances with their counterparts in distant co…
Elite Shooters:
— Create spacing for others - Can play off-ball, enabling overlap with ball handlers - Valuable in all…
ellipsis (...)
— suggesting time passing, a trailing thought, or a gentle connection between ideas. Just as an ellips…
Elo and Power Ratings
— the backbone of most NFL prediction systems. You'll learn how to build rating systems that automatic…
Elo → Spread:
— ~25 Elo points ≈ 1 point spread - Spread = (Away_Elo - Home_Elo - HFA) / 25
Elo's original chess rating paper
— Foundation of many systems 2. **FiveThirtyEight methodology posts** - Modern implementation 3. **Bri…
Elo's original work
— Foundation understanding 2. **FiveThirtyEight methodology** - Modern NFL implementation 3. **Glicko …
elopy
— Python Elo implementation - Easy rating system setup - Custom K-factor support
Email 1 — Launch Day (Monday):
— Subject line (write 3 options; A/B testing requires alternatives) - Opening hook (first paragraph) —…
Email 2 — Value Email (Wednesday):
— Subject line focused on a specific outcome or objection - Address the most common hesitation about b…
Email 3 — Testimonial / Proof Email (Friday):
— Subject line: social proof focused - Two to three specific testimonials or results (can be beta test…
Email 4 — Closing Email (Saturday evening):
— Short, urgency-driven, personal - "Last chance" framing without being manipulative - Final CTA with …
Email 5 — Post-Close Email (Monday after):
— Announce that enrollment has closed - Share one piece of community feedback or early result - Plant …
Email and Notification Services
— Building multi-channel notification systems with the Strategy Pattern.
Email Content:
— Use the target's name and role - Reference real projects, vendors, or events - Include appropriate l…
Email Deliverability
— The ability of an email to successfully reach a subscriber's inbox rather than being filtered into s…
Email fetcher
— polls the shared inboxes via IMAP and retrieves unprocessed emails 2. **Triage engine** — classifies…
Email Infrastructure:
— Register a convincing sender domain (lookalike domain or compromised email) - Configure SPF, DKIM, a…
Email List
— A database of subscribers who have opted in to receive email communications from a creator. Consider…
Email list hygiene checklist:
— [ ] Quarterly: Identify subscribers who haven't opened an email in 90 days - [ ] Send a re-engagemen…
email list quality
— the proportion of subscribers who open, click, and donate.
Email List:
— Total subscribers: 1,847 - Monthly growth: 236 new subscribers - Open rate: 38% - CTR: 4.2%
Email outreach:
— Research by Yesware and Boomerang (tools that track email responses) consistently finds response rat…
Email Phishing Metrics:
— **Open rate**: Percentage of recipients who opened the email (tracked via embedded pixel). Industry …
Email Security:
— Microsoft 365 with Exchange Online. - Proofpoint Email Protection for inbound email filtering. - DMA…
Email Sequence
— A series of pre-written emails sent automatically to new subscribers in a defined order and timing. …
Embedded Finance
— The integration of financial services products (payments, credit, insurance) into non-financial plat…
Embedded SQL
— SQL statements coded directly within a COBOL program, delimited by EXEC SQL and END-EXEC. The DB2 pr…
Embedding
— A numerical vector representation of text (or other data) that captures semantic meaning. Used in **…
Embedding dimensions:
— Teams: 32 teams, d = min(50, ceil(32/2)) = 16. Two team embeddings (home and away) contribute 32 dim…
Ember-resistant vents
— 1/16-inch or finer mesh replaces standard 1/4-inch hardware cloth 2. **Clean gutters** — accumulated…
embodied AI
— AI systems that interact with the physical world through robotic bodies. The gap between simulated a…
embodied carbon
— can be substantial. For some AI workloads, embodied carbon accounts for a significant fraction of to…
Embodied cognition
— The theoretical position that thought and emotion are shaped by bodily states and sensations, not ju…
Emergence
— The phenomenon whereby collective behavior arises from the interactions of simpler components in way…
Emergency Procedures:
— "Stop" command: How the client can halt testing immediately - Contact information available 24/7 dur…
Emergency services
— 911 call centers in multiple U.S. states experienced disruptions. - **Government agencies** — the So…
Emergency Use Authorization (EUA)
— a special pathway that allows use of unapproved treatments during a public health emergency. The EUA…
emergent abilities
— capabilities that appear only in models above a certain scale and are not predictable by extrapolati…
Emergent Norm Theory
— Turner and Killian's crowd behavior theory proposing that crowd behavior is guided by norms that eme…
emergent properties
— outcomes that arise from the interaction of system elements but cannot be predicted or explained by …
Emerging adulthood
— Jeffrey Arnett's term for the life stage between approximately 18 and 25 characterized by identity e…
Emerging AI Technologies
— Agentic AI · Edge AI and on-device inference · Quantum computing reality check · Neuromorphic comput…
Emerging Applications:
— AWS Next Gen Stats coverage metrics - ESPN win rate for pass rushers - Completion probability over e…
Emerging compute paradigms:
— **Optical computing**: Using light for matrix multiplication, potentially achieving orders-of-magnit…
Emerging technology
— Technologies in early or growth phases of adoption, where opportunity windows are wide before mainst…
Emerging Technology Areas to Watch:
— **AI/ML Security:** As organizations deploy machine learning models, testing for adversarial inputs,…
Emerging:
— ESPN win rate metrics - AWS Next Gen Stats pocket analysis - Computer vision block grading
eminent domain
— the government's power to take private property for public use, with compensation — to acquire land …
EMNLP
— Empirical methods - Application-focused
Emoji and reaction use
— including specific emoji sequences and the layering of reactions on others' messages — have develope…
emotes
— Animated expressions used in Twitch chat by subscribers; specific emotes (PogChamp, KEKW, OMEGALUL) …
Emotion
— You craft posts designed to maximize emotional arousal — fear, outrage, disgust — to drive engagemen…
Emotion is multi-component
— involving subjective experience, physiological change, cognitive appraisal, expressive behavior, and…
Emotion recognition
— also called "affect detection" --- claims to identify emotional states from facial expressions, thou…
Emotion regulation
— The processes by which individuals influence which emotions they have, when they have them, and how …
emotional arcs
— planned sequences of feeling that give the viewing experience shape and momentum.
Emotional buffer
— Pre-filmed content means bad days don't break consistency. Creation is separated from publication.
emotional climate
— the characteristic tone of emotional life in the home. Families with high expressed emotion (high cr…
emotional contagion
— the tendency to automatically mimic and synchronize with others' emotional expressions, producing co…
Emotional Control
— [ ] Is love bombing used during recruitment — followed by conditional approval that makes members de…
Emotional dimension questions:
— What did my actions produce in you? What did you feel? - What did you need from me that you didn't g…
Emotional distance
— partners manage anxiety by creating distance between them. They may live parallel lives, avoid topic…
emotional driver
— what's underneath the behavior.
emotional ecosystem
— a rotating palette of feelings that kept the audience connected across multiple dimensions.
Emotional engineering
— The deliberate design of a message's affective features (tone, language choices, imagery, format) to…
Emotional exhaustion
— feeling drained, unable to summon creative energy, dreading the process of creation 2. **Depersonali…
Emotional flooding
— A physiological state in which stress hormones and cardiovascular arousal exceed the threshold at wh…
Emotional granularity
— the precision with which one can label emotional states — is associated with better regulatory outco…
Emotional Inventory:
— What did you feel when you first encountered this image, before you analyzed it? - How quickly did t…
Emotional labor
— a concept developed by Arlie Hochschild to describe the management of one's emotional expressions as…
Emotional moments
— jump cuts undermine gravity and make vulnerable content feel manufactured - **Process content** — tu…
Emotional payoff
— Participation feels rewarding through the result (video looks cool), the process (fun to attempt), o…
Emotional Register
— What specific emotion or emotional state does the advertisement attempt to activate? - How does it a…
Emotional regulation
— managing one's emotional states in adaptive ways — is one of the most consequential self-regulation …
Emotional Repair (addressing the felt dimension)
— [ ] I have listened fully to the impact of what happened, without defending - [ ] The other person k…
Emotional review:
— What was your emotional state during the week? - Were there tilt episodes? What triggered them? How …
Emotional significance
— group membership is not neutral; it is tied to self-esteem - **Intergroup dynamics** — social identi…
Emotional signs:
— Resenting your audience ("why do they always want MORE?") - Comparing yourself to others with increa…
emotional units
— interdependent systems in which the emotional state of any member affects, and is affected by, the e…
Emotional warning signs:
— Significant mood swings tied to betting outcomes - Feeling anxious or irritable when not betting - U…
Emotional weight
— not cutting creates gravity; the viewer senses something significant - **Authenticity** — a long tak…
Empathic accuracy
— The ability to correctly infer another person's thoughts and feelings; related to but distinct from …
Empathic acknowledgment
— Validating another person's experience from within their own frame of reference; distinct from agree…
Empathic concern
— The other-oriented component of empathy associated with motivation to help; distinguished from perso…
Empathic concern (caring motivation)
— When I become aware that someone is suffering, I am strongly motivated to help. - I follow through o…
Empathic Listening
— [ ] Tried to understand their perspective before evaluating it - [ ] Acknowledged that their experie…
Empathy and compassion
— the topic of Chapter 21 — are the psychological foundations of all the social capabilities discussed…
Empathy gap (hot-cold)
— The difficulty people have in accurately predicting their behavior or feelings when in a different e…
Emphasis
— adding weight to visual moments (whoosh on transition, ding on text) 2. **Comedy** — signaling "this…
Emphasis framing
— A type of *framing effect* in which a particular attribute, consideration, or value is made more sal…
empirical evidence on correction effects
— discussed in Section 32.4 — is more positive than the dominant narrative suggests. Wood and Porter (…
Employee concerns (from an internal survey):
— Privacy in home environments - Trust — being monitored feels like not being trusted - Stress from co…
Employment and housing status
— **Substance use history** - **Social environment factors** (peer criminal involvement, neighborhood …
empties the file first
— all existing records are deleted. Be extremely careful with OPEN OUTPUT on a production file.
Enables the guard clause pattern
— Each check fails fast with GO TO to the exit. The "happy path" is the last statement. This produces …
Enabling the digital economy
— creating regulatory environments that support data-driven innovation and economic growth - **Protect…
encapsulation
— each program manages its own state without interference from other programs.
Encapsulation Costs
— DIY vapor barrier only (6-mil): $0.15–$0.30 per square foot in materials, plus labor - Professional …
Encoder:
— Input: 80-channel log-mel spectrogram computed from 30-second audio segments (padded or trimmed) - T…
Encoding
— [ ] The chart type is appropriate for the data type and question. - [ ] Position and length are used…
Encoding (memory)
— The first stage of memory formation; the conversion of sensory experience into a neural representati…
Encrypt everything in transit
— TLS 1.3 for API traffic, AT-TLS on z/OS, IPSec for MQ channels. 2. **Encrypt everything at rest** — …
Encrypted protocols
— SSH instead of Telnet, SFTP instead of FTP, IMAPS instead of IMAP > - **Network segmentation** with …
Encrypted Storage
— Passwords encrypted with a reversible algorithm. Better than plaintext, but if the encryption key is…
Encryption
— The process of encoding data so that it can only be read by parties with the appropriate decryption …
End-of-Day Reflection:
— What was your best focus period today? What made it work?
End-of-day transaction posting
— PROG-TXN-POST - **Interest calculation** — PROG-INT-CALC - **Statement generation** — PROG-STMT-GEN …
End-of-Season Analysis:
— Team had 11-6 record - Opponents' final combined record: 120-168 (.417) - League average SOS would b…
END-READ
— The explicit scope terminator. Always use it.
Endevor
— IBM's software configuration management system for mainframe applications. Manages source code versi…
Ending
— letting go of the old identity, role, or structure. This is accompanied by grief, even when the chan…
Ending:
— How does the video end? What does the viewer feel in the last 30 seconds? - Is there a callback or b…
Endorsement experiment
— A survey experiment that measures support for a policy by varying whether it is attributed to a part…
endowment effect
— first described by Richard Thaler — is the well-replicated finding that people value objects more hi…
Endpoint
— A specific URL in a **REST API** that accepts requests and returns responses. For example, `GET /api…
Endpoint Detection and Response (EDR) evasion:
— Direct system calls (bypassing user-mode API hooks) - Syscall proxying and indirect syscall techniqu…
Endpoint Security:
— Windows 11 enterprise workstations managed via Microsoft Intune. - CrowdStrike Falcon endpoint detec…
Endpoint Specification:
— POST /api/v1/auth/register - Accept JSON body with: email, password, first_name, last_name
Endpoints:
— `/games?date=YYYY-MM-DD` — returns games for a specific date - `/boxscore/{game_id}` — returns playe…
energy bands
— continuous intervals of allowed energies. Between the bands are **band gaps** — intervals where no s…
Energy level diagram
— showing gross, fine, Lamb, and hyperfine structure for $n = 1, 2, 3$ 2. **Wavefunction comparison** …
ENFORCE CONSTRAINTS
— Validates referential integrity constraints during the load. Without this, the table enters CHECK-pe…
Enforcement Mechanism
— Who enforces the framework? (government regulator, independent body, private right of action, some c…
Engage publicly when:
— Factual misinformation is circulating and silence could be harmful - You represent an organization a…
Engage when:
— The issue is ongoing and affects your wellbeing or functioning - You have reason to believe the fami…
Engage with comments
— commenting on others' posts is a high-efficiency weak tie maintenance strategy. It surfaces you in t…
Engage with community
— Share analysis online - Participate in discussions - Attend conferences (virtual or in-person)
Engage with the final sentence
— "True love is a choice, not a feeling." Does the neuroscience support a hard distinction between cho…
engagement
— clicks, watch time, shares. But high-engagement content is often sensational, outrageous, or emotion…
Engagement Metrics
— Quantitative measures of user interaction with platform content, including clicks, likes, shares, co…
engagement optimization
— algorithmic maximization of time spent and interactions generated - **Dark patterns** are design cho…
Engagement Overview (1–2 pages):
— Scope summary, testing timeline, methodology description, and tools used. - Any limitations encounte…
Engagement Overview:
— Scope, timeline, and rules of engagement - Threat actor profile and emulation rationale - Team compo…
Engagement Planning:
— The scoping call is the most important conversation in any engagement - Engagement types (black/gray…
Engagement Pod
— A group of creators or accounts who agree to systematically engage with each other's content to boos…
Engagement Rate
— The percentage of people who engage with a piece of content relative to how many saw it (reach-based…
English readability
— The syntax should resemble English prose. 2. **Business orientation** — The language prioritizes fix…
engram
— may still exist in the brain even when you can't access it.
Enhanced Accuracy
— Multiple camera angles per arena - Machine learning-based position inference - Sub-inch positional a…
Enhanced Computer Vision
— Automatic play classification - Referee assistance - Fan engagement features
Enhanced JSON/XML Support:
— Schema validation during JSON PARSE (reject messages that do not conform to a schema) - JSONPath exp…
Enhanced Viewer Experience
— Player speed displays - Shot difficulty ratings - Real-time win probability
Enharmonic modulation
— the most dramatic, and the one that most closely resembles a first-order phase transition. In enharm…
ENLIST
— constructs the male viewer as the necessary agent of protection.
enslaved women
— a population whose presence in the mountains has been doubly erased, once by the myth of a "slavery-…
Ensure data portability
— no single company would have exclusive access to the data generated in the neighborhood
Entanglement
— Ch 11.4, Ch 24.1 A quantum state of a composite system that cannot be written as a product of states…
entanglement swapping
— a Bell measurement on one member of each adjacent pair — to create entanglement between the endpoint…
Enterprise COBOL for z/OS Language Reference
— Chapter on "Data Description Entry." The definitive reference for every clause discussed in this cha…
Enterprise COBOL for z/OS Programming Guide
— "Defining Data" section. Provides practical guidance on storage allocation, alignment, and performan…
Enterprise COBOL for z/OS: Language Reference
— ORGANIZATION IS RELATIVE syntax, RELATIVE KEY clause, and relative file I/O statement semantics.
Enterprise COBOL for z/OS: Programming Guide
— Chapter on file processing, covering SELECT statements, access modes, and file status codes specific…
Enterprise COBOL JSON and XML Support
— Search IBM docs for "JSON GENERATE COBOL" for detailed syntax and examples.
Enterprise COBOL Migration Guide
— "Arithmetic Differences" section. Documents how arithmetic behavior varies between compiler versions…
Enterprise COBOL Performance Tuning
— Redbook SG24-5945. Chapter 8 covers table handling optimization including index vs. subscript benchm…
Enterprise COBOL Programming Guide
— COBOL-LE interaction chapter 6. **z/OS Language Environment Runtime Application Migration Guide** (G…
enterprise prompt governance
— the organizational practices, policies, and technical controls that ensure prompts are reliable, sec…
Enterprise Servers:
— Internal knowledge base connectors - Compliance and audit tools - Custom deployment pipelines - Prop…
Enthusiasm
— excited, high energy, ideas everywhere 2. **Stagnation** — results plateau, motivation wavers, more …
Enthusiastic consent
— A model of consent defined by genuine positive desire rather than merely the absence of refusal; rel…
entire run unit
— which in CICS means the **entire CICS region**, not just the current task. This would abort all acti…
Entities and attributes
— identifying what the business needs to track, classifying attributes (simple, composite, derived, mu…
entity embeddings
— dense, learned vector representations of teams --- can capture meaningful similarity structures dire…
Entity Features:
— `entity_count`: Number of unique entities mentioned. - `key_entity_frequency`: How often a specific …
Entrainment
— The synchronization of two oscillating systems through their mutual interaction, such that they adop…
Entrenchment
— The process by which early choices become increasingly difficult to reverse as more systems and depe…
Entrepreneur
— A person who identifies an opportunity and organizes resources to pursue it, accepting the associate…
Entrepreneur of information
— Ronald Burt's term for the individual who bridges structural holes in a network, brokering informati…
Entrepreneurial alertness
— Israel Kirzner's term for the perceptual capacity that allows entrepreneurs to notice opportunities …
Entrepreneurship / Startup Founding:
— Career capital = product-market fit intuition + specific domain knowledge + founding team building -…
entropic force
— a statistical effect arising from the tendency of information to spread out and become more disorder…
Entropy
— A measure of disorder or uncertainty in a system; in information theory, a measure of the average in…
ENTRY
— A COBOL statement that establishes an alternate entry point in a subprogram. Allows a single load mo…
Entry attention
— motion (pop, fade, slide, bounce) triggers the orienting response, guaranteeing the text is noticed …
Entry-level (0-2 years experience):
— Financial services: $70,000 - $95,000 - Government: $55,000 - $75,000 - Insurance: $65,000 - $85,000…
Envelope tightness:
— Heat pumps benefit more from a tight envelope than gas furnaces do. A drafty house with poor insulat…
ENVIRONMENT DIVISION
— for copying SELECT statements or special-names entries - **DATA DIVISION** — for record layouts, wor…
Environment of Evolutionary Adaptedness (EEA)
— the range of ancestral environments in which human psychological mechanisms were shaped by natural a…
Environment Preparation:
— Update your testing OS and all tools - Verify VPN connectivity and access credentials - Confirm your…
Environment reproducibility
— the same container runs identically in dev, test, and production - **Scaling** — spin up more instan…
Environment Setup:
— Virtual environments ensure project isolation and reproducibility - Consistent project structure imp…
Environment variable
— A configuration value provided to a running process through the operating system's environment, rath…
Environment:
— [ ] Dependencies are recorded in `requirements.txt` or `environment.yml` - [ ] Library versions are …
Environmental
— [ ] The location is private - [ ] The location is appropriate to the relationship and the issue - [ …
environmental classism
— the disproportionate siting of polluting facilities in low-income communities, regardless of race — …
Environmental cost of fan economic practice
— Multi-copy K-pop album purchasing, convention travel, and physical merchandise production generate e…
Environmental Design
— Does your environment support luck-generating behavior? Healthy = serendipity-friendly physical spac…
Environmental design, not willpower
— phone out of the bedroom at night (negotiated with the parents; Destiny's initial resistance was sig…
Environmental DNA (eDNA)
— Genetic material shed by organisms into their environment — water, soil, air — that can be collected…
Environmental Failures
— Power failure to the data center - Network failure isolating the database server - Fire, flood, or n…
Environmental failures:
— Data center power outage - Cooling failure - Natural disaster (flood, earthquake, fire) - Network ba…
Environmental proxy
— Show environment changes that reflect inner change. Luna's studio evolved from cramped corner to per…
environmental racism
— the pattern in which communities of color bear a disproportionate share of environmental burdens bec…
EOD020 - Transaction Processing (3h 15m):
— Application Performance Analyzer shows 62% of CPU time in DB2 calls. - DB2 EXPLAIN reveals a tablesp…
EOD030 - Interest Calculation (2h 30m):
— The program uses DISPLAY numeric fields for all interest rate calculations, causing constant pack/un…
EOD040 - Statement Generation (1h 45m):
— The output file has BLKSIZE=133 (unblocked), causing one I/O per line of output. - The program reads…
EOQ rules of thumb:
— If your current order quantity is 2× or more the EOQ, you are likely over-ordering - If your current…
EP can:
— Capture events from CICS API commands without code changes - Extract data from COMMAREA, channels/co…
EP cannot:
— Capture events from programs that don't use CICS APIs (pure COBOL logic without EXEC CICS commands) …
EPA framework papers
— Foundation for player valuation 2. **VORP/WAR methodology** - Value over replacement concepts 3. **M…
Epidemiological surveillance
— The systematic collection and analysis of health data to monitor the distribution and determinants o…
Episode A: "My Story — How I Started This Podcast"
— Downloads: 3,200 - Spotify completion rate: 34% - Listen-through: major drops at 8 minutes and 14 mi…
Episode Overview
— Episode title and number (treat this as if it's part of an existing series) - Target length: 20–30 m…
Episodic memory
— memory for specific experiences: "My first day of high school"; "what I did last Saturday"; the conv…
Episodic:
— Commitment level: Low — any episode can be someone's first; no viewing order required - Creator adva…
epistasis
— among its genes. When genes act independently, the fitness landscape is smooth, and evolution easily…
Epistemic authority
— The authority to be believed because one has access to reliable knowledge. Public health institution…
Epistemic coercion
— Influencing someone's decisions by manipulating the information environment they are reasoning withi…
epistemic commons
— the shared information environment on which all members of a community depend for accurate beliefs a…
Epistemic curiosity vs. perceptual curiosity
— Berlyne's distinction between curiosity driven by the desire for knowledge (epistemic) and curiosity…
Epistemic hedging
— Language that marks statements as provisional or uncertain ("I think," "sort of," "maybe"); a gramma…
Epistemic humility
— The recognition that one's knowledge is always incomplete and potentially wrong; a core virtue of cr…
epistemic infrastructure
— The network of institutions, practices, and norms — journalism, science, government statistical agen…
epistemic injustice
— injustice that occurs in a person's capacity as a knower. Two forms are particularly relevant to dat…
Epistemic justice
— The fair distribution of epistemic goods — knowledge, testimony, rational agency — across society. H…
epistemic power
— the ability to control what is known, by whom, and on what terms. Facebook possessed knowledge about…
Epistemological privilege
— The advantage in understanding certain aspects of social reality that comes from occupying a particu…
eponymy
— the practice of naming discoveries after their discoverers.
EPR pairs
— form an orthonormal basis for the two-qubit Hilbert space:
EPR paradox
— Ch 24.2 The 1935 argument by Einstein, Podolsky, and Rosen that quantum mechanics is incomplete beca…
eps (epsilon)
— the radius of the neighborhood around each point - **min_samples** — the minimum number of points wi…
epsilon
— a parameter that represents the privacy "budget." Smaller epsilon means stronger privacy (more noise…
Equal calibration
— a score of 7 means the same probability of reoffending for all groups 2. **Equal false positive rate…
equal representation in outcomes
— the idea that a fair system should produce the same results regardless of group membership.
Equal temperament
— A tuning system that divides the octave into twelve equal semitones, each a frequency ratio of 2^(1/…
Equal Weight:
— Annual mean: $250 \times 0.0112 = 2.80$ - Annual std: $\sqrt{250} \times 0.0890 = 1.407$ - $P(\text{…
equalized odds
— match error rates across groups — you may have to sacrifice calibration or demographic parity.
Equalizer (EQ)
— A signal processing device or algorithm that selectively boosts or attenuates specified frequency ba…
equanimity
— the ability to experience the full range of emotions without being controlled by any of them, and to…
Equating follower count with community
— a large audience with no shared identity is a metric, not a community 2. **Generic comment responses…
Equilibrium
— A state in which opposing forces or processes balance each other, producing no net change; may be st…
Equipment changes:
— External microphone ($22 clip-on) placed on her desk near the subject - Phone mounted on a small tri…
Equipment Condition
— For furnaces: any visible rust staining on the exterior of the unit? Any smell of combustion gases w…
Equipment Effects:
— Ball becomes harder and slicker - Grip aids less effective - Cleats interact differently with surfac…
Equipment:
— Extension ladder (6-foot A-frame for single-story, 24-foot extension for two-story; use with ladder …
Equity
— An ownership stake in a business. In creator contexts, equity may refer to a stake in a company buil…
Equity integration
— Every capstone includes an equity dimension — an explicit prompt to think about structural barriers,…
Equivalence framing
— Presenting logically equivalent information in different surface forms to demonstrate that framing s…
Equivalences:
— `ROLLUP(A, B, C)` = `GROUPING SETS((A,B,C), (A,B), (A), ())` - `CUBE(A, B)` = `GROUPING SETS((A,B), …
Equivalency framing
— Presenting logically identical information with different labels or emotional valences, producing di…
Equivalents:
— Transatlantic flights: ~169 one-way flights - Car miles: ~1.29 million miles - Household electricity…
ER diagram notation
— Chen, Crow's foot, and UML notation, with Crow's foot as our standard for the rest of the book.
ERAN
— Early Right Anterior Negativity; an ERP response to harmonic violations in music; the music-syntacti…
erasure through adjacency
— the placement of queer-coded characters or dynamics in supporting roles that serve the protagonist's…
Ergodicity
— The property of a system in which time averages equal ensemble averages; many human systems are non-…
Erich Ludendorff
— attributed the loss not to battlefield failures but to betrayal by Jews, socialists, and civilians o…
Erosion of trust
— in media, in institutions, in the possibility of shared knowledge. The goal is not a particular beli…
Erotic capital
— Sociologist Catherine Hakim's controversial term for the social and economic value derived from phys…
Erotomania
— formally De Clérambault's Syndrome — is a delusional disorder in which the affected person believes …
Error and remediation costs:
— In the past two years, the firm has had two instances of suspicious activity identified by external …
Error count
— alert on any non-zero value
Error handling:
— Wrap `requests.get()` in `try/except` to handle network errors. - Use `response.raise_for_status()` …
error rate equality
— the idea that innocent people of all races should be equally likely to be wrongly flagged. Northpoin…
Error reporting and discussion
— teams that could talk about mistakes could correct them; teams that couldn't, couldn't - **Speaking …
Error sanitization:
— List all internal fields that must be suppressed (abend codes, program names, SQL codes, etc.) - Def…
Errors will persist for years or decades
— because the combination of low dissent tolerance and low outsider access means that no one with the …
escalates
— it replaces all the individual page/row locks with a single tablespace lock (or table lock in segmen…
Escalation cycle
— The progressive four-stage model (Pruitt & Kim) describing how conflicts move from frustration to en…
Escalation indicators:
— Expressed strong emotion (anger, distress, frustration that goes beyond irritation) - Mentions of le…
Escalation of commitment
— the tendency to invest further in a failing course of action because of prior investment (the sunk c…
Escalation or de-escalation
— Depending on the response, the situation either grows (other sources come forward, media coverage am…
Escalation signals (violence-side):
— Increased volume and speech rate - Leaning forward aggressively - Face becoming flushed - Rapid gest…
escalation trap
— a pattern where outrage-based content requires increasing intensity to maintain the same engagement …
Escalation Triggers (Return to Break):
— Any loss limit hit during weeks 1-2 - More than one checklist skip during weeks 1-2 - Any model over…
escape characters
— special sequences that start with a backslash (`\`).
ESDS
— Entry-Sequenced Data Set. A *VSAM* file organization where records are stored in the order they are …
ESDS (Entry-Sequenced Data Set)
— Records are stored in the order they are written, similar to sequential files. Records are accessed …
Espionage Act (1917) / Sedition Act (1918)
— Legal infrastructure that criminalized interference with military recruitment and, under the Seditio…
ESPN / CBB
— https://www.espn.com/mens-college-basketball/ - College basketball statistics - Recruiting rankings
ESPN Analytics
— FPI development - QBR methodology - Win probability
ESPN API (site.api.espn.com)
— Undocumented but widely used public endpoints for scores, schedules, standings, and rosters across a…
ESPN BPI (Basketball Power Index)
— https://www.espn.com/nba/bpi - Team strength ratings used for prediction - Methodology periodically …
ESPN Draft Analysis
— Mike Schmitz scouting reports - Jonathan Givony analysis (DraftExpress legacy) - Statistical breakdo…
ESPN Fantasy
— Projection explanations - Historical accuracy - https://www.espn.com/fantasy/football/
ESPN FPI Methodology
— ESPN's Football Power Index explanation - Efficiency-based ratings - Preseason initialization
ESPN Recruiting
— ESPN 300 rankings - https://www.espn.com/college-sports/football/recruiting/ - Position rankings
ESPN Statistics
— https://www.espn.com/college-football/statistics - Current season statistics - Player and team leade…
ESPN Stats & Info
— QBR methodology - Broadcast-ready metrics - Weekly insights
ESPN Stats & Information
— Expected points explanations - Weekly applications - Mainstream integration
ESPN Win Probability
— Live WP tracking - Methodology explanations - https://www.espn.com/
ESPN's FPI (Football Power Index)
— College football predictive model - Methodology explanations available - Good example of applied sta…
ESPN's Stats & Info
— Expected points explanations - Fourth-down decision analysis - Win probability applications
ESPN/CBS Sports
— Game recaps and analysis - Draft coverage
Essential Entities (stricter requirements):
— Energy (electricity, oil, gas, hydrogen) - Transport (air, rail, water, road) - Banking and financia…
Essential Skills to Balance:
— Ball handling and playmaking - Shooting (especially three-point) - Rim protection - Perimeter defens…
Establish accounts with key providers
— a plumber, electrician, and HVAC company you've vetted before you need them in an emergency.
Establish the Run
— Fantasy application of analytics - QB evaluation discussions - Data-driven analysis
Estimated AWS costs (from vendor proposal):
— Micro Focus COBOL runtime license: $180K/year - EC2 compute (m5.4xlarge reserved instances, 3 instan…
Estimated grade for your specification:
— Meets all 11 criteria: Architect-ready - Meets 8-10 criteria: Strong foundation, review gaps - Meets…
Estimated grade:
— Meets all 9 criteria with detailed calculations: Architect-ready - Meets 7-8 criteria: Strong founda…
Estimated heat pump system:
— Heat pump electricity (estimated 5,400 kWh/season at blended COP of 2.4): 5,400 × $0.11 = $594 - Aux…
Estimated pages: 10 | Estimated words: 4,000
— B.1 Standard Normal Distribution Table - B.2 Student's t-Distribution Critical Values - B.3 Chi-Squa…
Estimated pages: 20 | Estimated words: 8,000
— A.1 Set Theory and Combinatorics - A.2 Calculus Review (derivatives, integrals, optimization) - A.3 …
Estimated pages: 5 | Estimated words: 2,000
— F.1 Mathematical Notation Conventions - F.2 Statistical Notation - F.3 Probability and Odds Notation…
Estimated savings (monthly):
— Reduced production incidents: 11 fewer incidents x 4 hours average resolution = 44 hours - Faster co…
Estimated spread:
— Facebook shares/engagements: ___ - Twitter/X impressions: ___ - TikTok views: ___ - Mainstream media…
Estimated Time: 4 hours | Difficulty: Beginner
— 1.1 What Is Sports Analytics? - 1.1.1 Defining Analytics in Sports - 1.1.2 The Evolution from Statis…
Estimated Time: 5 hours | Difficulty: Advanced
— 23.1 Network Concepts in Football - 23.1.1 Network Theory Basics - 23.1.2 Football as a Network - 23…
Estimated Time: 5 hours | Difficulty: Beginner
— 2.1 Understanding Football Data - 2.1.1 Play-by-Play Data Structure - 2.1.2 Game-Level vs. Play-Leve…
Estimated Time: 5 hours | Difficulty: Intermediate
— 6.1 The Box Score Era - 6.1.1 History of Football Statistics - 6.1.2 What Traditional Stats Capture …
Estimated Time: 6 hours | Difficulty: Advanced
— 16.1 Understanding Football Spatial Data - 16.1.1 Coordinate Systems - 16.1.2 Tracking Data Concepts…
Estimated Time: 6 hours | Difficulty: Beginner
— 3.1 Setting Up Your Analytics Environment - 3.1.1 Python Installation and Virtual Environments - 3.1…
Estimated Time: 6 hours | Difficulty: Intermediate
— 7.1 Beyond Passer Rating - 7.1.1 Problems with Traditional Passer Rating - 7.1.2 The Need for Contex…
Estimated Time: 7 hours | Difficulty: Advanced
— 22.1 Machine Learning in Sports - 22.1.1 When to Use ML - 22.1.2 ML vs. Traditional Statistics - 22.…
Estimated Time: 8 hours | Difficulty: Advanced
— 27.1 System Design - 27.1.1 Requirements Gathering - 27.1.2 Architecture Planning - 27.1.3 Technolog…
Estimating the likelihoods:
— P(E1 | H): If the Fed IS going to announce the facility, how likely is it that an unscheduled weeken…
Estimator Properties:
— **Unbiasedness:** $E[\hat{\theta}] = \theta$ - **Consistency:** $\hat{\theta} \xrightarrow{p} \theta…
EternalBlue exploit module
— Used to gain initial code execution on vulnerable systems - **DoublePulsar backdoor installer** — A …
Ethel de Long
— a Smith College graduate from New Jersey — worked with local leader **William Creech Sr.** to establ…
Ethical analysis:
— This arrangement involves deception of the sportsbook and potentially the regulatory authorities. - …
Ethical approach:
— Credit all original creators in the first 5 seconds of every video - Apply the power asymmetry test …
Ethical Boundaries:
— Never exfiltrate real sensitive data beyond what is needed to prove the vulnerability - Never modify…
Ethical considerations
— Does the data contain sensitive attributes (race, gender, health status)? If so, have appropriate pr…
Ethical Considerations:
— Respect the website's terms of service. Some sites explicitly prohibit scraping; others tolerate it …
Ethical framework application:
— **Who benefits?** The company (reduced churn). **Who is harmed?** Users who want to cancel but canno…
Ethical grounding
— A personal framework for navigating bias, fairness, privacy, and the societal impact of AI decisions…
Ethical problems:
— Likely violates the competitor's Terms of Service. - Could constitute unfair business practices or e…
Ethical reflection should engage genuinely:
— Who is represented in your data, and who is invisible? - How could your findings be misinterpreted o…
Ethics
— [ ] I've addressed data provenance and consent - [ ] I've considered who might be harmed - [ ] I've …
ethics champion network
— trained individuals embedded in product teams who serve as first-line ethical reviewers and cultural…
Ethics Framework:
— Safety: Physical safety = yes. Emotional safety = questionable. Embarrassing photos can trigger genu…
Ethics infrastructure without authority
— ethics teams, principles documents, review boards — provides the appearance of governance without th…
ethics of scraping
— `robots.txt`, Terms of Service, and the question of when scraping is responsible. You explored **aut…
Ethics Pre-Check
— Are all factual claims verified against primary sources? Yes / No / N/A - Is any sponsored content c…
ethics washing
— the performance of ethical commitment without the substance. When an organization publishes AI princ…
Ethics, Mental Health, and Responsible Creation
— what no one tells you about the psychological cost of being a public creator at any age, but especia…
Ethics:
— [ ] I have not cherry-picked findings - [ ] I have disclosed limitations - [ ] I have not let my vis…
Ethnic Affinity
— A Facebook advertising targeting category that inferred users' affinity with particular racial or et…
ethnobotanical knowledge
— practical pharmacology developed through empirical methods.
ethogram
— before moving to hypothesis-testing. Moore wanted to first describe what women actually did in court…
Ethos
— the credibility and character of the speaker. An audience's willingness to be persuaded depends subs…
ETW and AMSI bypass:
— Explain what ETW provides to EDR products - Describe ETW patching techniques - Explain AMSI and comm…
EU AI Act
— the full risk classification framework 7. **Nissenbaum's contextual integrity** -- the original arti…
EU database of high-risk AI systems
— a publicly accessible register maintained by the European Commission. Public registration means civi…
EU Declaration of Conformity
— a formal document signed by an authorized representative attesting that the system meets the Act's r…
EU-US Privacy Shield
— a new framework that attempted to address the Court's concerns by including: - Stronger self-certifi…
Eudaimonic wellbeing
— wellbeing through engagement, contribution, and the realization of potential; distinguished from hed…
Euroleague Stats
— https://www.euroleague.net/ - Official EuroLeague statistics
Europe has the narrowest interval
— both because it has the most countries (n=53) and the smallest standard deviation. We're quite preci…
European Digital Rights (EDRi)
— *Focus:* Digital rights in Europe - *Notable work:* Advocacy on GDPR implementation, EU AI Act, Digi…
European Union
— European Banking Authority: eba.europa.eu — Guidelines, ITS, RTS, Q&As - European Securities and Mar…
European Union:
— Laws vary by member state - Some countries (Netherlands, France, Belgium) have explicit protections …
EV Calculator Tools:
— GTO Wizard (for poker-specific EV practice): gtowizard.com - Decision Matrix Builder (general): Many…
EV charger
— typically the most time-sensitive (you need it when the car arrives) 3. **Solar** — takes 2–4 months…
EV thinking applies to all decisions
— career choices, relationships, creative projects — not just money.
Evacuate immediately and call 911 if:
— Persistent burning smell that does not go away after shutting off circuits - Visible smoke from wall…
EVALUATE
— A COBOL conditional statement that provides multi-way branching (similar to switch/case in other lan…
Evaluate before applying
— AI suggestions must be understood and verified, not blindly applied (see Chapter 14).
Evaluate carefully:
— Implementation projects (only at higher rates, or for strategic relationships) - Nonprofit engagemen…
Evaluate on the held-out test set
— Mistake: reporting only accuracy, or using the test set more than once.
EVALUATE statement
— A COBOL-85 structured conditional statement that provides multi-way branching, similar to a switch/c…
Evaluate the model:
— Confusion matrix at the chosen threshold - Accuracy, sensitivity, specificity, precision, F1 score -…
Evaluate the Problem Precisely
— What specific harm are you trying to address? (voter suppression disinformation, health misinformati…
Evaluate transparency and explainability
— can the system explain its decisions? 4. **Assess accountability mechanisms** — who is responsible w…
Evaluate wise interventions
— values affirmation, attributional retraining, and utility-value interventions — understanding when t…
Evaluate your monitoring
— Is my self-assessment accurate? Am I using the right methods to check my understanding? Am I being f…
Evaluating the Claim
— [ ] What is the precise claim being made? Is it specific enough to be tested? - [ ] Is the claim tha…
Evaluating the Platform and Context
— [ ] What platform delivered this claim? What are the platform's incentive structures for attention-g…
Evaluating the Source
— [ ] Who is making the claim? What are their specific credentials in the relevant field? - [ ] Are th…
Evaluation apprehension
— the fear of being judged by others for intervening inappropriately. "What if I'm wrong and the seizu…
Evaluation criteria:
— [ ] Specification is valid OpenAPI 3.0 (validate with Swagger Editor) - [ ] All six operations fully…
Evaluation Engine
— Physical profile scoring - Statistical production analysis - Composite prospect scoring - Comparable…
Evaluation methodology:
— **Validation scheme:** Walk-forward validation across three full NBA seasons (e.g., train on all dat…
Evaluation Rigor
— When evaluating vendor products, insist on proof-of-concept testing in your environment with your da…
Evaluation Scores:
— Composite ratings (247Sports, Rivals, ESPN, On3) - Position-specific grades - Star ratings (2-5 star…
Evaluative apprehension
— awareness of being observed and potentially judged; produces arousal underlying social facilitation/…
Evening (3:00 p.m. - midnight)
— Ride-share app records pickup location, destination, route, driver rating - Payment card records pur…
Event 1: Endorsement (Week 4)
— Pre-event estimate: Endorsements historically move markets 1-3 cents - Position: Buy YES at 0.53 (We…
Event 1: Fed Rate Cut in March
— Buy YES on Kalshi at $0.32. Fee = $0.03. Cost = $0.35. - Buy NO on Polymarket at $0.67. Fee = 1% of …
Event 2: Convention A (Weeks 7-8)
— Pre-event estimate: Convention bounce typically 3-5 cents, fades 50% within 2 weeks - Position: Buy …
Event 3: Convention B (Weeks 10-11)
— Pre-event estimate: B's convention will narrow the gap by 3-4 cents - Position: Buy NO (sell A) at 0…
Event 4: First Debate (Week 17)
— Pre-event estimate: 60% chance A wins debate; expected market impact +5 cents for A win, -3 cents fo…
Event 4: S&P 500 > 6000 by June
— Buy YES on Kalshi at $0.50. Fee = $0.03. Cost = $0.53. - Buy NO on Polymarket at $0.47. Fee = 1% of …
Event 5: Scandal (Week 20)
— Not in calendar (unscheduled). Event-driven trader reacts post-event. - Assessment: Scandals in Octo…
Event Data
— A structured record of every on-ball action in a match, including passes, shots, tackles, and carrie…
Event emission rate
— events emitted per minute by each event binding. A sudden drop indicates the adjudication engine has…
Event mesh design decisions:
— How do you guarantee event ordering per account? ___________________________________________________…
Event Schemas
— standardize event formats for COBOL producers and consumers (Section 20.5) 5. **Event-Driven Pattern…
Evergreen Content
— Content that remains relevant and valuable over a long period, continuing to drive traffic, views, o…
evergreen notes
— notes designed to be permanently useful, not just records of what you read. Evergreen notes are conc…
Every 10 Years
— Replace all smoke detectors regardless of apparent function - Have a licensed electrician check hard…
Every 5–7 Years
— Replace CO detectors (electrochemical CO sensors degrade — check manufacturer's listed service life)…
Every 6 Months
— Vacuum smoke detector openings (dust accumulation reduces sensitivity) - Test interconnect function:…
Every DL/I call gets an EVALUATE
— check for spaces (success), GE (not found), and OTHER (unexpected error). - **Use qualified SSAs whe…
Every hit has a clear share trigger
— the algorithm amplifies what people already want to share 2. **Schema violation is almost universal*…
Every member accesses every page
— maximum GBP-dependent activity - **High update rates on shared data** — constant P-lock negotiations…
every metric is a model
— a simplified representation of something you actually care about. And like all models, every metric …
every month, forever
— **Beyond free tier:** $0.20 per million requests + $0.0000166667 per GB-second
Every month:
— Review your most-used prompts. Are they still optimal? Have you found better approaches that haven't…
Every processing activity needs a lawful basis
— documented in the RoPA before processing commences.
every row accessed
— whether it qualified for the result set or not — until COMMIT. This prevents non-repeatable reads an…
Every variable is either categorical or numerical
— and getting this right determines which tools and analyses are appropriate. 2. **Numbers aren't alwa…
Every Woman's Story (EWS) Community
— A grassroots network for women video creators sharing strategies, opportunities, and emotional suppo…
everyday resistance
— acts that fell short of flight but that asserted a measure of control over the pace and conditions o…
Evidence AGAINST (or at least not conclusive):
— The p-value (0.024) is significant but not overwhelming; it would not survive a more stringent thres…
Evidence against simple translation:
— Tufekci herself notes a paradox: social media lowers the organizational costs of getting people into…
Evidence against:
— Many Trump supporters in 2016 had above-average incomes; similar findings in European right populism…
Evidence and Accuracy
— [ ] Are factual claims in the communication verifiable through independent sources? - [ ] Are claims…
Evidence Cleanup:
— Remove any tools, scripts, or payloads deployed on client systems - Reset any passwords changed duri…
Evidence Collection (3:00-6:00 AM):
— Memory image analyzed with Volatility: malicious process `svchost.exe` (running from `C:\ProgramData…
Evidence Collection:
— Capture screenshots of every significant access point. - Record hashes (not plaintext) of compromise…
Evidence FOR skill:
— Win rate of 53.5% is statistically significant at the 5% level (z = 1.98, p = 0.024) against the nul…
Evidence for translation:
— Philip Howard and Muzammil Hussain's research on the Arab Spring shows that Twitter activity in Egyp…
Evidence from tracking (later reconstructed):
— Opponents shot 38.2% on contested two-point jumpers vs. Detroit - League average: 42.1% - Difference…
Evidence in favor:
— The geographic correlation between Trump 2016 support and deindustrialized communities (Autor, Dorn,…
evidence of attention
— that the person speaking had actually noticed something specific about her, not deployed a generic l…
Evidence of the echo chamber:
— High engagement + plateau = cluster saturation - 80K followers after 4 months of stasis = the cookin…
Evidence set:
— Official FBI crime statistics show violent crime rates declined from 2015 to 2022 in the United Stat…
Evidence Standards:
— Screenshots must be clear, annotated, and consistently organized - Request/response pairs are essent…
Evidence Summary: What We Can Say With Confidence
— Olfaction likely plays *some* role in attraction, but the specific MHC mechanism is less robustly su…
Evidence to consider:
— Eisenberger's neural overlap theory and what it implies about the evolved function of rejection pain…
Evidence to gather:
— Developer-published accuracy and performance statistics broken down by demographic group - Third-par…
Evidence:
— Rural vaccination rates declined by an average of 11 percentage points between 2019 and 2022, compar…
Evolution or repeat
— The best-case outcome is genuine evolution: the creator demonstrates changed behavior over time. The…
Evolution test
— Does the statement allow room to grow? "I make chemistry experiment videos" boxes you in. "I make sc…
Evolutionary mismatch
— The hypothesis that psychological mechanisms evolved for ancestral environments may produce maladapt…
Evolutionary psychology
— A theoretical framework applying principles of natural and sexual selection to explain psychological…
exact
— the Morse potential, like the harmonic oscillator, is one of the rare cases for which WKB gives the …
exact matching
— the database checks each record against precise conditions.
Exact solution
— the Coulomb problem in all its analytical glory 2. **Perturbation corrections** — fine structure, hy…
exactly one period per paragraph
— at the very end of the paragraph. Use explicit scope terminators for all conditional and I/O stateme…
exactly zero for every eigenstate
— not approximately zero, not numerically small, but identically zero by symmetry. You can compute the…
Exam Structure (as of recent updates):
— Multiple standalone machines at varying difficulty levels - An Active Directory set (multiple machin…
Examine one memory dispute
— a situation where you and someone else remember the same event differently. Apply the chapter's fram…
Example 1:
— Disguised: "I feel like you don't take this seriously." - Why it's wrong: "like you don't take this …
Example 1: "Will Elon Musk buy Twitter in 2022?"
— Musk signed the acquisition agreement in April 2022. - He attempted to back out in July 2022. - The …
Example 1: Polymarket (Zero Fees)
— Market price: $0.60 (bid $0.58, ask $0.60) - Spread cost: $\frac{0.02}{2} = 0.01$ - Gas: ~$0.005 per…
Example 2:
— Disguised: "I feel that you're being manipulative." - Why it's wrong: "that you're being manipulativ…
Example 2: Kalshi (Taker Fee)
— Market price: $0.60 (bid $0.58, ask $0.60) - Spread cost: $0.01$ - Taker fee: $\min(0.01, 0.60/15) =…
Example 3:
— Disguised: "I feel like you never listen to me." - Why it's wrong: two problems — "like" plus a disg…
Example 3: PredictIt (Profit + Withdrawal Fee)
— Market price: $0.60 - Profit fee: 10% of profit if win - Withdrawal fee: 5% - Breakeven probability:…
Example 4:
— Disguised: "I feel victimized by your behavior." - Why it's wrong: "victimized by your behavior" is …
Example 5:
— Disguised: "I feel like the team is suffering because of your choices." - Why it's wrong: the speake…
Example A — Gas is clearly better:
— Gas at $0.80/therm (cheap gas market, e.g., Texas or Oklahoma), 95% AFUE - Gas cost per BTU: $0.80 ÷…
Example applications:
— **Proving data provenance**: A ZKP could prove that a price feed came from a specific exchange's API…
Example B — Heat pump is competitive:
— Gas at $1.50/therm (Northeast or Pacific Northwest), 95% AFUE - Gas cost per BTU: $1.50 ÷ 95,000 = *…
Example business questions (choose your own):
— Which customer segments are most profitable, and what distinguishes high-value customers from low-va…
Example C — Heat pump wins clearly:
— Gas at $2.00/therm (New England), 95% AFUE - Gas cost per BTU: $2.00 ÷ 95,000 = **$0.0000211/BTU** -…
Example calculation:
— Daily notification count: 87 - Estimated notifications requiring immediate action: 8 - Estimated not…
Example Interpretation:
— z = +2.0: Two standard deviations above era mean (elite) - z = +1.0: One standard deviation above (v…
Example of a broken contract:
— Thumbnail: Luna looking devastated, tearful expression, dark background - Title: "The Worst Day of M…
Example programs:
— Partner with agricultural cooperatives in Africa and South Asia to recruit farmers for food security…
Example topic: Health
— Level 1 (Broad): Health and wellness - Level 2: Fitness - Level 3: Strength training - Level 4: Stre…
Example — Competitive Analysis Chain:
— Sub-chain A: Research Company 1 → summarize strengths/weaknesses → format - Sub-chain B: Research Co…
Example — Testing a product description generator:
— Simple product: "Blue cotton t-shirt, S-XXL, $29.99" - Complex product: "Wireless noise-cancelling h…
Example:
— Binary: "This relationship is completely broken." - Spectrum alternatives: - "This relationship has …
Example: Elite Wide Receiver Absence
— Starter EPA/play: +0.15 (elite) - Expected targets per game: 10 - Backup EPA/play: +0.02 (average)
Examples across fields:
— **Evolutionary psychology "just-so stories":** "Humans evolved X behavior because of Y adaptive pres…
Examples at Athena:
— Nightly churn scores for all active customers, consumed by the marketing team each morning - Weekly …
Examples at Meridian Bank:
— One BRANCH has many EMPLOYEES; each EMPLOYEE works at one BRANCH. - One CUSTOMER has many ACCOUNTS; …
Examples by creator type:
— *Art/design creator:* Procreate brushes, color palettes, Lightroom presets, tutorials - *Educational…
Examples from MedSecure:
— "The web application firewall (WAF) successfully blocked multiple automated SQL injection attempts, …
Examples in prediction markets:
— Using the final resolution outcome to filter which markets to trade. ("I only backtested on markets …
Examples in ShopStack:
— A regular user accessing `/api/v2/admin/users` by simply changing the URL - Modifying the `user_id` …
Examples in video:
— "Something in this room isn't what it seems. Can you spot it?" - "I woke up to 500 messages. Let me …
Examples of format specifications:
— "Format your response as a markdown table with columns: Category, Finding, Recommendation." - "Retur…
Examples of independent samples:
— Patients randomly assigned to a drug group vs. a placebo group - Students at School A vs. students a…
Examples of useful digital intentions:
— "I will not open any social media platform before 9:00 AM for the next 30 days." (Specific, time-bou…
Examples:
— The **Open Data Institute** (UK) has piloted data trust frameworks for urban mobility data - **Sidew…
Excel
— the business world's format. You learned sheet selection (`sheet_name`), handling messy layouts (`sk…
Excel/Google Sheets
— Quick analysis and exploration - Good for learning concepts - Limited for large datasets
Excellence
— high standards, rigorous work, best possible outcome 2. **Respect for intelligence** — treating peop…
ExcelWriter
— A pandas context manager (`pd.ExcelWriter`) that enables writing multiple DataFrames to multiple she…
exception
— a signal that something went wrong. If your code does not catch that signal, Python prints a traceba…
Exception Monitoring:
— Configurable thresholds (e.g., "alert if any thread exceeds 300 seconds elapsed") - Lock contention …
Exception processing:
— Define thresholds for any metric (e.g., "alert when hit ratio drops below 95%") - Automatic actions …
Exception types to catch:
— `ValueError` — for failed numeric conversions - `IndexError` — for rows with fewer fields than expec…
exceptionally long lifespans
— often 20, 30, or even 40+ years in production. During that time, the original programmer retires or …
Excessive GO TO statements
— Creates spaghetti control flow that is difficult to trace, test, and modify. A single change can hav…
exchange energy
— the energy lowering that occurs when electrons with parallel spins occupy different orbitals. The ex…
exchange interaction
— a purely quantum mechanical effect that looks like a spin-dependent force but is actually a conseque…
Exchange symmetry
— Ch 15.1 The requirement that the wave function of identical particles be either symmetric (bosons) o…
exchange-correlation functional
— the small but crucial part that encodes all the many-body quantum physics.
excise tax on distilled spirits
— the first tax imposed on a domestic product by the new federal government. The tax was part of Hamil…
exclusion error
— legitimate beneficiaries being denied services because Aadhaar-based authentication fails.
EXCLUSIVITY
— [ ] **13. Exclusivity is limited in scope.** The exclusivity clause names specific brands or a speci…
Exclusivity Clause
— A contract provision that prohibits a creator from working with competing brands in the same categor…
EXCP count
— The number of Execute Channel Programs issued, representing physical I/O operations. - **Connect tim…
EXEC
— The prefix that begins an embedded command in COBOL: EXEC SQL for *DB2*, EXEC CICS for *CICS*, EXEC …
EXEC CICS
— The delimiter that begins a CICS command embedded in a COBOL program, terminated by END-EXEC. The CI…
EXEC SQL
— The delimiter that begins an embedded SQL statement in a COBOL program, terminated by END-EXEC. The …
EXEC Statement
— Identifies a program or procedure to execute: ```jcl //STEP1 EXEC PGM=ACCTPOST ```
execute
— are applied at three levels: **owner**, **group**, and **others**.
EXECUTE privilege on the procedure
— Controls who can call it. - **Underlying table privileges** — The procedure's package runs with the …
Execution
— Run the chosen attack with carefully selected parameters to balance speed, success probability, and …
Execution Challenges:
— Simultaneous execution is difficult in practice. - Partial fills, slippage, and latency can erode or…
Execution OPSEC:
— Time activities to blend with normal business operations - Mimic the target's legitimate network tra…
execution risk
— your order may never fill, or it may fill at the worst possible time (when an informed trader picks …
Execution:
— 50 contracts filled at $0.55 - 50 contracts filled at $0.56 - Average execution price: $0.555
Executive debrief (Leadership):
— Present findings in business risk terms - Use attack narrative to make the risk tangible - Provide c…
Executive Summary
— One paragraph describing the vulnerability and its business impact. 2. **Technical Details** — CVE n…
Executive Summary (1-2 pages):
— Engagement objectives and threat scenario - Key findings in business impact terms - Overall risk ass…
Executive Summary (1–2 pages):
— Overall risk rating for MedSecure (Critical/High/Medium/Low). - Summary of the most significant find…
Executive Summary (first page, always)
— Three to five bullet points maximum - The most important numbers: total revenue, whether you hit you…
Executive Summary Best Practices:
— Lead with the overall risk assessment --- do not bury the lead - Use business language, not technica…
Executive Summary Guidance:
— Quantify the findings (e.g., "43% of pods run as root, 0 of 12 namespaces have network policies") - …
Executive Summary of API Changes
— for the product leadership team and two enterprise clients' CTOs who need to understand what changed…
Executive summary problems:
— The output was written as if the API was being launched for the first time, not upgraded - It contai…
Executive Summary:
— [ ] Written for non-technical leadership - [ ] Includes overall risk assessment - [ ] Connects findi…
Executives
— Lead with conclusions - Context through benchmarks - ROI emphasis - Simple visualizations
Exercise 1 Solution:
— a) VSAM (KSDS for keyed access to customer records) - b) CICS (BMS maps define screen layouts for on…
Exercise 1.1
— *Historical Epochs* Identify the four major epochs of AI described in this chapter. For each epoch, …
Exercise 1.10
— *Model Parameter Counting* A simple neural network has an input layer of size 784, one hidden layer …
Exercise 1.11
— *Foundation Model Scaling* GPT-2 (2019) had 1.5 billion parameters. GPT-3 (2020) had 175 billion par…
Exercise 1.12
— *Data Requirements* A supervised classification model needs approximately 1,000 labeled examples per…
Exercise 1.13
— *Inference Latency Budget* A movie recommendation system must return results within 200ms of a user …
Exercise 1.14
— *Cost Comparison* A company runs inference for a text classification model. Option A uses a GPU serv…
Exercise 1.15
— *AI Timeline Extension* Extend the `example-01-ai-timeline.py` code to include at least five additio…
Exercise 1.16
— *Parameter Counter* Write a Python function using NumPy that takes a list of layer sizes (e.g., `[78…
Exercise 1.17
— *Simple Linear Regression from Scratch* Using only NumPy, implement a simple linear regression model…
Exercise 1.18
— *Ecosystem Audit* Write a Python script that audits your local AI/ML development environment. The sc…
Exercise 1.19
— *Decision Boundary Visualization* Using NumPy and matplotlib, create a visualization that shows the …
Exercise 1.2
— *Symbolic vs. Statistical* Explain the fundamental difference between symbolic AI and machine learni…
Exercise 1.20
— *Forward Pass Implementation* Implement a complete forward pass for a three-layer neural network usi…
Exercise 1.21
— *Stack Trade-offs* Consider a startup building an AI-powered customer service chatbot. They have a t…
Exercise 1.22
— *Build vs. Buy* For each of the following scenarios, argue whether the company should build a custom…
Exercise 1.23
— *Failure Mode Analysis* Choose one of the following AI systems and conduct a failure mode analysis. …
Exercise 1.24
— *Paradigm Comparison* The chapter describes the evolution from symbolic AI to machine learning to de…
Exercise 1.25
— *Ethical Analysis* A healthcare company wants to build an AI system that predicts which patients are…
Exercise 1.26
— *Technology Radar* Create a "technology radar" for AI engineering. Categorize the following technolo…
Exercise 1.27
— *Historical Deep Dive* Choose one of the following historical AI systems and write a 500-word analys…
Exercise 1.28
— *Industry Case Study* Select an industry (healthcare, finance, automotive, retail, or another of you…
Exercise 1.29
— *Open Source Investigation* Explore the GitHub repositories of two major AI/ML frameworks (e.g., PyT…
Exercise 1.3
— *The Three Ingredients* The deep learning revolution required three ingredients: data, compute, and …
Exercise 1.30
— *Future Forecast* Based on current trends in AI research and engineering, write a thoughtful forecas…
Exercise 1.4
— *Foundation Model Paradigm Shift* Describe the paradigm shift from traditional ML to the foundation …
Exercise 1.5
— *Subfield Identification* For each of the following systems, identify which subfields of AI are invo…
Exercise 1.6
— *AI Stack Layers* Draw (or describe in text) the layers of the modern AI stack. For a company buildi…
Exercise 1.7
— *Role Distinctions* A startup has a team of five people building an AI-powered medical imaging produ…
Exercise 1.8
— *AI Winters* What factors have historically caused "AI winters"? Do you think the current era of AI …
Exercise 1.9
— *Speedup Estimation* A training job takes 48 hours on a single CPU. Using the rule-of-thumb speedup …
Exercise 10.10
— *Text replacement pipeline*
Exercise 10.11
— *Regex capture groups*
Exercise 10.13
— *Building a text normalization function*
Exercise 10.14
— *Cleaning medication names*
Exercise 10.15
— *Parsing semi-structured log entries*
Exercise 10.16
— *Survey response categorization*
Exercise 10.17
— *Address parsing and standardization*
Exercise 10.18
— *Finding patterns in social media text*
Exercise 10.19
— *Regex crossword* (3-star)
Exercise 10.2
— *The `.str` accessor*
Exercise 10.20
— *Building a data validation function* (3-star)
Exercise 10.21
— *Reverse engineering regex* (4-star)
Exercise 10.22
— *Complete text cleaning pipeline* (4-star)
Exercise 10.23
— *Combining text cleaning with data types (Ch. 3, 8, 10)*
Exercise 10.24
— *Text cleaning meets groupby (Ch. 9, 10)*
Exercise 10.25
— *Regex and missing data (Ch. 8, 10)*
Exercise 10.3
— *Regex as a mini-language*
Exercise 10.4
— *When NOT to use regex*
Exercise 10.5
— *Regex building blocks*
Exercise 10.6
— *Cleaning company names*
Exercise 10.7
— *Extracting numbers from descriptions*
Exercise 10.8
— *Filtering with `.str.contains()`*
Exercise 10.9
— *Splitting compound columns*
Exercise 11.1
— *Why dates need parsing*
Exercise 11.10
— *Rolling vs. expanding*
Exercise 11.11
— *Extracting date components for analysis*
Exercise 11.12
— *date_range for scheduling*
Exercise 11.14
— *Sales time series analysis*
Exercise 11.15
— *Pandemic timeline analysis*
Exercise 11.16
— *Handling multiple date formats*
Exercise 11.17
— *Finding temporal patterns*
Exercise 11.18
— *Event-driven time series*
Exercise 11.19
— *Complete time series pipeline* (3-star)
Exercise 11.20
— *Multi-series comparison* (3-star)
Exercise 11.21
— *Handling missing dates in a time series* (4-star)
Exercise 11.22
— *Year-over-year analysis* (4-star)
Exercise 11.23
— *Combining text cleaning and date parsing (Ch. 10, 11)*
Exercise 11.24
— *Merging time series data (Ch. 9, 11)*
Exercise 11.25
— *Data cleaning pipeline with dates (Ch. 8, 10, 11)*
Exercise 11.3
— *Resampling vs. groupby*
Exercise 11.4
— *Rolling windows explained*
Exercise 11.5
— *Timedelta vs. DateOffset*
Exercise 11.6
— *Parsing a messy date column*
Exercise 11.8
— *Building and using a DatetimeIndex*
Exercise 11.9
— *Resampling daily to weekly and monthly*
Exercise 12.11
— *JSON with record_path*
Exercise 12.12
— *SQL SELECT and WHERE*
Exercise 12.13
— *The mystery file* ⭐⭐
Exercise 12.14
— *Choosing the right format* ⭐⭐
Exercise 12.15
— *The encoding detective* ⭐⭐⭐
Exercise 12.16
— *Multi-format integration* ⭐⭐⭐
Exercise 12.18
— *Build a data loading report* ⭐⭐⭐
Exercise 12.19
— *SQL vs. pandas comparison* ⭐⭐⭐
Exercise 12.20
— *The format converter* ⭐⭐⭐⭐
Exercise 12.21
— *Chunked loading for large files* ⭐⭐⭐⭐
Exercise 12.22
— *The multi-source weather project* ⭐⭐
Exercise 12.23
— *Review: Boolean indexing (Chapter 7)* ⭐⭐
Exercise 12.24
— *Review: String methods (Chapter 10)* ⭐⭐
Exercise 12.25
— *Review: Merging (Chapter 9) meets new loading* ⭐⭐⭐
Exercise 12.5
— *When to use a database*
Exercise 12.6
— *CSV with encoding issues*
Exercise 12.7
— *Semicolon-delimited CSV*
Exercise 12.9
— *Excel multi-sheet loading*
Exercise 13.1
— *The request-response cycle*
Exercise 13.10
— *BeautifulSoup basics*
Exercise 13.11
— *HTML table scraping*
Exercise 13.14
— *Building a multi-city weather collector* ⭐⭐⭐
Exercise 13.15
— *Debugging a scraper* ⭐⭐
Exercise 13.17
— *robots.txt analysis* ⭐⭐
Exercise 13.18
— *Complete data pipeline* ⭐⭐⭐
Exercise 13.19
— *Scraping vs. API comparison* ⭐⭐⭐
Exercise 13.20
— *Retry logic with exponential backoff* ⭐⭐⭐⭐
Exercise 13.21
— *Caching for repeated API calls* ⭐⭐⭐⭐
Exercise 13.22
— *Ethical scenario analysis* ⭐⭐
Exercise 13.23
— *Review: Data types (Chapter 7)* ⭐⭐
Exercise 13.24
— *Review: Merge patterns (Chapter 9)* ⭐⭐
Exercise 13.25
— *Review: Dates (Chapter 11) + APIs* ⭐⭐⭐
Exercise 13.3
— *Using the CONSPIRE framework, analyze the appeal of a specific contemporary conspiracy theory.*
Exercise 13.6
— *Making a GET request*
Exercise 13.8
— *Handling errors gracefully*
Exercise 13.9
— *Parsing JSON responses into DataFrames*
Exercise 14.1
— *Identifying components*
Exercise 14.10
— *Progressive project chart plans*
Exercise 14.11
— *Spot the manipulation*
Exercise 14.13
— *Exploratory vs. explanatory*
Exercise 14.14
— *When the grammar breaks down*
Exercise 14.15
— *The ethics of emphasis*
Exercise 14.16
— *Design for a different audience*
Exercise 14.17
— *The visualization taxonomy*
Exercise 14.18
— *Anscombe's lesson revisited*
Exercise 14.19
— *Cross-cultural chart design*
Exercise 14.2
— *Changing one component*
Exercise 14.20
— *Your vaccination data chart plans*
Exercise 14.21
— *Critique a real public health chart*
Exercise 14.22
— *The pie chart debate*
Exercise 14.23
— *Is "data-ink ratio" always right?*
Exercise 14.24
— *Visualization and trust*
Exercise 14.25
— *Your visualization philosophy*
Exercise 14.3
— *Grammar decomposition*
Exercise 14.5
— *The "it depends" exercise*
Exercise 14.6
— *Marcus's menu analysis*
Exercise 14.8
— *Three views of one dataset*
Exercise 14.9
— *Redesign a default chart*
Exercise 15-1 (key points):
— Data must be reshaped to long format for `sns.barplot` with `hue`. Use `pd.DataFrame` with columns `…
Exercise 15-12 (key points):
— `fig.update_layout(yaxis2={"overlaying": "y", "side": "right"})` is the correct syntax for dual y-ax…
Exercise 15-14 (key points):
— Each `go.Bar` trace has `visible=False` except the first. Dropdown buttons set `visible` to a list o…
Exercise 15-7 (key points):
— The deviation matrix: `deviation = (revenue_matrix - 110000) / 110000` - `sns.heatmap(..., center=0)…
Exercise 15.1
— *Your first line chart*
Exercise 15.10
— *Highlighting a single bar*
Exercise 15.11
— *Side-by-side histograms*
Exercise 15.13
— *Small multiples for time series*
Exercise 15.14
— *Vaccination rates by region*
Exercise 15.15
— *Before and after: the Tufte makeover*
Exercise 15.16
— *Saving in multiple formats*
Exercise 15.17
— *Annotated policy chart*
Exercise 15.18
— *Scatter plot with size encoding*
Exercise 15.19
— *The complete workflow*
Exercise 15.2
— *Bar chart of course enrollments*
Exercise 15.20
— *Recreate a published chart*
Exercise 15.21
— *Dynamic figure sizing*
Exercise 15.22
— *Bar chart of vaccination rates by region*
Exercise 15.23
— *Line chart of vaccination trends*
Exercise 15.24
— *Scatter plot of GDP vs. vaccination rate*
Exercise 15.25
— *Histogram of vaccination rate distribution*
Exercise 15.3
— *Scatter plot of study hours vs. exam score*
Exercise 15.4
— *Histogram of exam scores*
Exercise 15.5
— *Horizontal bar chart*
Exercise 15.6
— *Multi-line chart with legend*
Exercise 15.7
— *Removing chart clutter*
Exercise 15.8
— *Color-coded scatter plot*
Exercise 15.9
— *Annotation practice*
Exercise 16-10 (key points):
— `ws["B3:F20"]` returns a tuple of row tuples. Each inner tuple is a sequence of Cell objects. Access…
Exercise 16-13 (key points):
— Read just the first line: `with open(filepath) as f: first_line = f.readline()` - Count tokens: `len…
Exercise 16-16 (key points):
— Conditional formatting in openpyxl applies Excel's native formatting rules — the logic runs in Excel…
Exercise 16-3 (key points):
— `utf-8-sig` writes a BOM (byte order mark, `\ufeff`) at the start of the file. Excel uses this to au…
Exercise 16.1
— *Figure-level vs. axes-level*
Exercise 16.10
— Evaluate the following hook for alignment problems: - Video content: A calm, step-by-step watercolor…
Exercise 16.11
— Design a complete multi-layer hook (verbal + visual + audio) for each of the following scenarios: a)…
Exercise 16.12
— *Theme and palette exploration*
Exercise 16.13
— Write three versions of the same hook, each targeting a different point on the relatability spectrum…
Exercise 16.14
— *Weather data analysis* (3-star)
Exercise 16.15
— *Student grades exploration* (2-star)
Exercise 16.16
— *E-commerce analysis* (3-star)
Exercise 16.17
— *The complete exploration workflow* (3-star)
Exercise 16.18
— *Publication-ready figure* (3-star)
Exercise 16.19
— *Custom FacetGrid mapping* (3-star)
Exercise 16.2
— *When to use which categorical plot*
Exercise 16.20
— *Comparing distributions rigorously* (4-star)
Exercise 16.21
— *seaborn vs. matplotlib comparison* (3-star)
Exercise 16.22
— *Data cleaning before visualization* (2-star)
Exercise 16.23
— *Reshaping for visualization* (2-star)
Exercise 16.24
— *Grammar of Graphics revisited* (2-star)
Exercise 16.25
— *From question to visualization* (3-star)
Exercise 16.3
— For each verbal hook category (Curiosity, Challenge, Emotional, Value, Direct Engagement), explain t…
Exercise 16.4
— The anti-hook is described as "the absence of a hook becoming the hook." Explain this using the conc…
Exercise 16.5
— *Correlation heatmap interpretation*
Exercise 16.6
— *Distribution exploration*
Exercise 16.7
— *Categorical comparisons*
Exercise 16.8
— *Regression exploration*
Exercise 16.9
— *Correlation heatmap*
Exercise 17.1
— *Static vs. interactive*
Exercise 17.10
— *Animated choropleth*
Exercise 17.11
— *Faceted interactive plot*
Exercise 17.12
— *Custom tooltips and formatting*
Exercise 17.13
— *HTML export comparison*
Exercise 17.14
— *COVID-style time series dashboard* (3-star)
Exercise 17.15
— *Interactive box plot exploration* (2-star)
Exercise 17.16
— *Building a simple Dash dashboard* (3-star)
Exercise 17.17
— *Dashboard with slider and dropdown* (3-star)
Exercise 17.18
— *Comparing plotly templates* (2-star)
Exercise 17.19
— *Multi-view coordinated exploration* (3-star)
Exercise 17.2
— *plotly.express vs. plotly.graph_objects*
Exercise 17.20
— *The complete interactive report* (4-star)
Exercise 17.21
— *plotly.graph_objects deep dive* (4-star)
Exercise 17.22
— *Dash with multiple callbacks* (4-star)
Exercise 17.23
— *Data preparation for plotly* (2-star)
Exercise 17.24
— *seaborn vs. plotly side-by-side* (2-star)
Exercise 17.25
— *From question to interactive visualization* (3-star)
Exercise 17.26
— Compute the **run quality score** $Q_{\text{run}}$ for the following run: - Depth gained: 18 m - Spa…
Exercise 17.27
— Compute the Dangerous Space Matrix (DSM) for a simplified scenario. Place 4 defenders at known posit…
Exercise 17.28
— A team's spatial entropy in the final third is $H = 1.8$ nats (using $K = 6$ zones). Compute the max…
Exercise 17.29
— Design a **pressing trigger detector** using pitch control. Define a pressing trigger as a moment wh…
Exercise 17.3
— *Choropleth requirements*
Exercise 17.30
— A club's analytics department has computed that their team creates an average of 35 m$^2$ of dangero…
Exercise 17.31
— Implement the **spatial value added** (SVA) metric described in Section 17.7.5. For a synthetic pass…
Exercise 17.32
— Using the concepts from this chapter, design a complete analytical pipeline for evaluating a team's …
Exercise 17.33
— Compare and contrast the Voronoi-based and pitch- control-based approaches to spatial analysis. Unde…
Exercise 17.34
— A recruitment analyst wants to identify centre-forwards who create significant space for team-mates …
Exercise 17.35
— Discuss two ethical or practical limitations of using tracking-data-based spatial models in professi…
Exercise 17.4
— *Dashboard callback model*
Exercise 17.5
— *Animation best practices*
Exercise 17.6
— *Interactive scatter plot*
Exercise 17.7
— *Interactive line chart*
Exercise 17.8
— Add two "ghost" players at $(0, 34)$ and $(105, 34)$ to represent the goalkeepers. How does this cha…
Exercise 17.9
— *Animated scatter plot*
Exercise 18.1
— *Pre-attentive features*
Exercise 18.10
— *Truncated axis demonstration*
Exercise 18.11
— *Pie chart replacement*
Exercise 18.12
— *Aspect ratio exploration*
Exercise 18.13
— Design a 3-episode serialized series on a topic of your choice. For each episode, specify: a) Conten…
Exercise 18.14
— *The design checklist in practice*
Exercise 18.15
— *Redesign a government chart* (3-star)
Exercise 18.16
— *Accessibility audit* (2-star)
Exercise 18.17
— *The misleading chart gallery* (3-star)
Exercise 18.18
— *Visualization for different audiences* (2-star)
Exercise 18.19
— *Annotation practice* (2-star)
Exercise 18.2
— Compare the three series architectures (episodic, serialized, anthology) across three dimensions: di…
Exercise 18.20
— *Complete redesign portfolio* (4-star)
Exercise 18.21
— *Design principles debate* (3-star)
Exercise 18.22
— *Ethics scenario analysis* (3-star)
Exercise 18.23
— *Tool selection and design* (2-star)
Exercise 18.24
— *End-to-end visualization workflow* (3-star)
Exercise 18.25
— *Teaching visualization principles* (3-star)
Exercise 18.3
— *Cleveland and McGill hierarchy*
Exercise 18.4
— The chapter introduces the "rhythm of retention" — alternating intensity levels across a long-form v…
Exercise 18.5
— *Color palette types*
Exercise 18.6
— Choose a YouTube essay from a creator you admire (minimum 10 minutes). Analyze its block structure: …
Exercise 18.7
— *Identifying misleading techniques*
Exercise 18.8
— *Colorblind-safe redesign*
Exercise 18.9
— *Before/after: Removing chartjunk*
Exercise 19.1
— Explain why the rule of thirds creates more dynamic compositions than center framing. Use the concep…
Exercise 19.10
— *Visualizing center and spread*
Exercise 19.11
— *Outlier detection function*
Exercise 19.12
— *Grouped descriptive statistics*
Exercise 19.13
— *Standard deviation intuition builder*
Exercise 19.14
— *Comparing describe() across subgroups*
Exercise 19.15
— *The effect of sample size on statistics*
Exercise 19.16
— *Robust vs. non-robust statistics*
Exercise 19.17
— *Misleading averages in the news*
Exercise 19.18
— *Simpson's Paradox and descriptive statistics*
Exercise 19.19
— *Elena's full vaccination analysis*
Exercise 19.2
— *Apply the SIFT method to the following claim: "A new study shows that drinking coffee reduces Alzhe…
Exercise 19.20
— *Comparing two groups rigorously*
Exercise 19.21
— *Building a descriptive statistics dashboard*
Exercise 19.22
— *Historical data investigation*
Exercise 19.23
— *Percentile-based analysis*
Exercise 19.27
— *Coefficient of variation*
Exercise 19.28
— *Recreating Anscombe's Quartet*
Exercise 19.29
— *The Datasaurus Dozen*
Exercise 19.3
— *Choosing the right measure*
Exercise 19.30
— *Design your own misleading statistic*
Exercise 19.4
— *Five-number summary interpretation*
Exercise 19.5
— Compare vertical and horizontal composition across three dimensions: (a) intimacy vs. context, (b) t…
Exercise 19.6
— *Z-score interpretation*
Exercise 19.7
— Take a photo of your current filming setup from the camera's perspective. Analyze it for: a) Rule of…
Exercise 19.8
— Film yourself saying the same line three times with different shot distances: (a) extreme close-up, …
Exercise 19.9
— *Complete descriptive profile*
Exercise 1:
— Shot A: 0.65 × 2 = 1.30 xPts - Shot B: 0.45 × 2 = 0.90 xPts - Shot C: 0.38 × 3 = 1.14 xPts - Shot D:…
Exercise 2 Solution:
— a) PIC S9(11)V99 COMP-3 (signed packed decimal, 11 integer digits, 2 decimal) - b) 'A' = Active, 'C'…
Exercise 2.1
— List the six phases of CRISP-DM in order. For each phase, write one sentence describing its primary …
Exercise 2.10
— For each of the following variables, identify the measurement scale (nominal, ordinal, interval, rat…
Exercise 2.11
— A SaaS company reports: "Our average customer lifetime value (CLV) is $14,200." Describe a scenario …
Exercise 2.12
— Map the five stages of the data pipeline to a specific business scenario of your choosing (e.g., a r…
Exercise 2.13
— Read the following claim and evaluate it critically, using concepts from this chapter:
Exercise 2.14
— The Athena Retail Group case in this chapter illustrated how three departments each had data support…
Exercise 2.15
— A product manager presents the following A/B test results:
Exercise 2.16
— Consider this scenario: A city government notices that neighborhoods with more police officers have …
Exercise 2.17
— A venture capital firm uses the following model to evaluate startup investments: they score each com…
Exercise 2.18
— Research Tyler Vigen's "Spurious Correlations" project (tylervigen.com). Find three correlations tha…
Exercise 2.19
— Find a real business case study where an organization's failure can be traced to a correlation/causa…
Exercise 2.2
— Define the following terms in your own words, providing a business example for each: - (a) Confoundi…
Exercise 2.20
— Research one of the following alternative data science methodologies and compare it to CRISP-DM: - (…
Exercise 2.21
— Investigate how a company you admire (or your current employer) handles the "last mile" problem. Thr…
Exercise 2.22
— "In business, acting on correlation is often rational even when causation hasn't been established." …
Exercise 2.23
— The chapter argues that the data science mindset emphasizes comfort with uncertainty, while business…
Exercise 2.24
— Consider the statement: "Data preparation consumes 60–80% of data science project time." Some argue …
Exercise 2.25
— A colleague argues: "We don't need a formal process like CRISP-DM. Our best insights come from smart…
Exercise 2.26
— You are the newly hired head of analytics at a regional grocery chain with 85 stores. Customer compl…
Exercise 2.27
— Select an industry you're interested in (healthcare, financial services, manufacturing, retail, educ…
Exercise 2.28
— Design a "data literacy assessment" for non-technical managers at your organization (or a hypothetic…
Exercise 2.3
— Explain the difference between structured and unstructured data. Give three examples of each that mi…
Exercise 2.4
— Name the four types of business questions in the analytics maturity framework. For each type, provid…
Exercise 2.5
— Describe the four measurement scales (nominal, ordinal, interval, ratio). For each scale, identify o…
Exercise 2.6
— What is the "last mile" problem in analytics? Identify three reasons why analytical insights often f…
Exercise 2.7
— A marketing director presents the following finding: "Customers who read our email newsletter purcha…
Exercise 2.8
— You are a data scientist at a mid-size software company. The CEO tells you: "We need to use AI to im…
Exercise 2.9
— Classify each of the following business questions as descriptive, diagnostic, predictive, or prescri…
Exercise 20.1
— *Three interpretations*
Exercise 20.11
— *The birthday problem (extended)*
Exercise 20.12
— *Monty Hall extended*
Exercise 20.13
— *Medical test Bayes simulation*
Exercise 20.14
— *Sampling variability experiment*
Exercise 20.15
— *Simulate P(at least one) problems*
Exercise 20.16
— *Random walk simulation*
Exercise 20.17
— *Monte Carlo estimation of pi*
Exercise 20.18
— *Simulating rare events*
Exercise 20.19
— *Elena's sampling strategy*
Exercise 20.20
— *The false positive paradox in real life*
Exercise 20.21
— *Probability in risk communication*
Exercise 20.22
— *Simulating a real-world process*
Exercise 20.23
— *Bayesian updating sequence*
Exercise 20.24
— *The coupon collector problem*
Exercise 20.25
— *Two-envelope problem*
Exercise 20.26
— *Simulating the St. Petersburg paradox*
Exercise 20.27
— *Simpson's Paradox revisited with probability*
Exercise 20.28
— *Probability calibration*
Exercise 20.29
— *Benford's Law simulation*
Exercise 20.30
— *Your own Monte Carlo*
Exercise 20.4
— *The gambler's fallacy*
Exercise 20.5
— *Conditional probability intuition*
Exercise 20.6
— *Bayes' theorem in words*
Exercise 20.9
— *Coin flip simulator*
Exercise 21.1
— *Discrete vs. continuous*
Exercise 21.10
— *Distribution fitting*
Exercise 21.11
— Margin of Error and Significance
Exercise 21.12
— *Binomial simulation vs. formula*
Exercise 21.14
— *Z-score probability calculator*
Exercise 21.15
— *Standard error exploration*
Exercise 21.16
— *Comparing distributions visually*
Exercise 21.17
— *Real data normality check*
Exercise 21.18
— *Inverse CDF problems*
Exercise 21.19
— *Elena's complete distribution analysis*
Exercise 21.2
— Absolute vs. Relative Risk: Drug Trial Analysis
Exercise 21.20
— *When the CLT breaks down*
Exercise 21.21
— *Normal approximation to the binomial*
Exercise 21.22
— *Distribution mixture*
Exercise 21.23
— *Log-normal distribution*
Exercise 21.24
— *Comparing populations with normal models*
Exercise 21.25
— *The multivariate normal*
Exercise 21.26
— *Bootstrap distribution*
Exercise 21.27
— *Power of normality tests*
Exercise 21.28
— *Build a distribution explorer*
Exercise 21.29
— *The German Tank Problem*
Exercise 21.3
— Base Rate Neglect: Airport Security Screening
Exercise 21.30
— *Your own distribution analysis*
Exercise 21.4
— *Z-score interpretation*
Exercise 21.5
— *CLT in plain English*
Exercise 21.6
— *Matching distributions*
Exercise 21.7
— Correlation and Causation: Identifying Causal Structures
Exercise 21.8
— *Binomial in context*
Exercise 21.9
— *scipy.stats exploration*
Exercise 22.1
— *Population vs. sample identification*
Exercise 22.10
— *Comparing two groups with CIs* ⭐⭐
Exercise 22.11
— *The Literary Digest in numbers* ⭐⭐
Exercise 22.12
— *Interpreting real-world CIs* ⭐⭐
Exercise 22.13
— *Sensitivity of CI to outliers* ⭐⭐
Exercise 22.14
— *Simulate the sampling distribution* ⭐⭐
Exercise 22.15
— *Bootstrap from scratch* ⭐⭐
Exercise 22.16
— *Visualize CI coverage* ⭐⭐
Exercise 22.17
— *Effect of sample size on CI width* ⭐⭐
Exercise 22.18
— *Stratified vs. simple random sampling simulation* ⭐⭐⭐
Exercise 22.19
— *Bootstrap for a correlation coefficient* ⭐⭐⭐
Exercise 22.2
— *Bias identification* ⭐
Exercise 22.20
— *The paradox of precision* ⭐⭐⭐
Exercise 22.21
— *Designing a sampling plan* ⭐⭐⭐
Exercise 22.22
— *When CIs mislead: the issue of multiple comparisons* ⭐⭐⭐
Exercise 22.23
— *Bayesian vs. frequentist confidence* ⭐⭐⭐⭐
Exercise 22.24
— *Project extension: Regional comparisons with CIs* ⭐⭐⭐
Exercise 22.25
— *The ethics of uncertainty communication* ⭐⭐⭐⭐
Exercise 22.26
— (Research) Audit a Real Platform's Automated Moderation
Exercise 22.27
— (Coding) Model Card for a Fake News Classifier
Exercise 22.28
— (Research) The FEVER Shared Task
Exercise 22.29
— (Coding) End-to-End Misinformation Detection Pipeline
Exercise 22.3
— *Standard error reasoning* ⭐
Exercise 22.30
— (Conceptual) Capstone: Design a Responsible Misinformation Detection System
Exercise 22.4
— *Confidence interval interpretation* ⭐⭐
Exercise 22.5
— *Confidence level trade-offs* ⭐⭐
Exercise 22.6
— *When the population is small* ⭐⭐
Exercise 22.7
— *Sampling strategies for the real world* ⭐⭐
Exercise 22.8
— *Computing confidence intervals by hand*
Exercise 22.9
— *Sample size determination* ⭐⭐
Exercise 23.10
— *Power calculation* ⭐⭐
Exercise 23.11
— *Before-and-after comparison* ⭐⭐
Exercise 23.12
— *Interpreting non-significance* ⭐⭐
Exercise 23.13
— *Reporting results correctly* ⭐⭐
Exercise 23.14
— *Simulate the null distribution* ⭐⭐
Exercise 23.15
— *Permutation test implementation* ⭐⭐
Exercise 23.16
— *Power simulation* ⭐⭐
Exercise 23.17
— *Multiple testing simulation* ⭐⭐⭐
Exercise 23.18
— *Complete hypothesis test workflow* ⭐⭐⭐
Exercise 23.19
— *Effect of sample size on p-values* ⭐⭐⭐
Exercise 23.2
— *P-value interpretation* ⭐
Exercise 23.20
— *The significance filter* ⭐⭐⭐
Exercise 23.21
— *Designing a study* ⭐⭐⭐
Exercise 23.22
— *Critiquing a published study* ⭐⭐⭐
Exercise 23.23
— *The ASA statement on p-values* ⭐⭐⭐⭐
Exercise 23.24
— *Project extension: Comprehensive analysis* ⭐⭐⭐
Exercise 23.25
— *Reflection: The limits of testing* ⭐⭐⭐⭐
Exercise 23.3
— *Type I and Type II errors* ⭐
Exercise 23.4
— *Statistical vs. practical significance* ⭐⭐
Exercise 23.5
— *The logic of "failing to reject"* ⭐⭐
Exercise 23.6
— *Choosing the right test* ⭐⭐
Exercise 23.7
— *Multiple testing reasoning* ⭐⭐
Exercise 23.8
— *Two-sample t-test by hand*
Exercise 23.9
— *Chi-square test interpretation*
Exercise 24.1
— *Interpreting correlation coefficients*
Exercise 24.10
— *Correlation matrix interpretation* ⭐⭐
Exercise 24.11
— *Partial correlation* ⭐⭐
Exercise 24.12
— *Correlation does not imply no confounding* ⭐⭐⭐
Exercise 24.13
— *When r = 0 doesn't mean no relationship* ⭐⭐
Exercise 24.14
— *Correlation exploration* ⭐⭐
Exercise 24.15
— *Simulating confounding* ⭐⭐
Exercise 24.16
— *Simpson's paradox simulation* ⭐⭐⭐
Exercise 24.17
— *Anscombe's quartet extended* ⭐⭐
Exercise 24.18
— *Correlation significance testing* ⭐⭐
Exercise 24.19
— *Project: Full correlation analysis* ⭐⭐⭐
Exercise 24.2
— *Spotting confounders* ⭐
Exercise 24.20
— *News article analysis* ⭐⭐⭐
Exercise 24.21
— *Designing an RCT* ⭐⭐⭐
Exercise 24.22
— *The chocolate-Nobel Prize paper* ⭐⭐⭐
Exercise 24.23
— *Ethical implications of causal claims* ⭐⭐⭐⭐
Exercise 24.24
— *Correlation in your daily life* ⭐⭐⭐
Exercise 24.25
— *The limits of observational data* ⭐⭐⭐⭐
Exercise 24.3
— *Three explanations for every correlation* ⭐
Exercise 24.4
— *Evaluating causal claims* ⭐⭐
Exercise 24.5
— *Simpson's paradox identification* ⭐⭐
Exercise 24.6
— *Pearson vs. Spearman* ⭐⭐
Exercise 24.7
— *The hierarchy of evidence* ⭐⭐
Exercise 24.9
— *Computing and interpreting correlations*
Exercise 25.1
— *Models as simplifications* ⭐
Exercise 25.10
— *Framing a prediction problem*
Exercise 25.11
— *When models mislead* ⭐⭐
Exercise 25.12
— *Choosing features wisely* ⭐⭐
Exercise 25.13
— *The bias-variance tradeoff in practice* ⭐⭐
Exercise 25.14
— *Interpreting train-test results* ⭐⭐
Exercise 25.15
— *Train-test split in practice*
Exercise 25.16
— *Visualizing overfitting*
Exercise 25.17
— *Comparing train and test scores* ⭐⭐
Exercise 25.18
— *The effect of training set size* ⭐⭐
Exercise 25.19
— *Baseline comparison* ⭐⭐
Exercise 25.2
— *Prediction vs. explanation* ⭐
Exercise 25.20
— *Random state exploration* ⭐⭐
Exercise 25.21
— *The model simplification paradox*
Exercise 25.22
— *Ethical analysis: predictive policing* ⭐⭐⭐
Exercise 25.23
— *The "just predict the average" challenge* ⭐⭐⭐
Exercise 25.24
— *Design your own modeling problem* ⭐⭐⭐
Exercise 25.25
— *Reflection: what changes now?* ⭐⭐⭐⭐
Exercise 25.3
— *Supervised vs. unsupervised* ⭐
Exercise 25.4
— *Identifying features and targets* ⭐
Exercise 25.5
— *The cardinal rule* ⭐
Exercise 25.6
— *Overfitting vs. underfitting* ⭐
Exercise 25.7
— *The bias-variance tradeoff in everyday life* ⭐⭐
Exercise 25.8
— *Baseline thinking* ⭐⭐
Exercise 25.9
— *The Goldilocks zone* ⭐⭐
Exercise 26.1
— *Interpreting slope and intercept* ⭐
Exercise 26.10
— *Baseline comparison* ⭐⭐
Exercise 26.11
— *Feature engineering* ⭐⭐
Exercise 26.12
— *Extrapolation danger* ⭐⭐
Exercise 26.13
— *Simple linear regression from scratch*
Exercise 26.14
— *Full workflow with train-test split*
Exercise 26.15
— *Multiple regression comparison* ⭐⭐
Exercise 26.16
— *Residual analysis* ⭐⭐
Exercise 26.17
— *Log transformation* ⭐⭐
Exercise 26.18
— *Feature scaling and coefficient comparison* ⭐⭐
Exercise 26.19
— *Overfitting with too many features* ⭐⭐⭐
Exercise 26.2
— *Understanding residuals* ⭐
Exercise 26.20
— *Predicted vs. actual plot* ⭐⭐
Exercise 26.21
— *The interpretation trap*
Exercise 26.22
— *When to stop adding features* ⭐⭐⭐
Exercise 26.23
— *Model comparison report* ⭐⭐⭐
Exercise 26.24
— *Real-world regression critique* ⭐⭐⭐
Exercise 26.25
— *Teaching linear regression* ⭐⭐⭐⭐
Exercise 26.3
— *Interpreting R-squared* ⭐
Exercise 26.4
— *Least squares intuition* ⭐
Exercise 26.5
— *Multiple regression coefficients* ⭐⭐
Exercise 26.6
— *When linear regression fails* ⭐⭐
Exercise 26.7
— *Multicollinearity* ⭐⭐
Exercise 26.8
— *Choosing features for a regression model*
Exercise 26.9
— *Reading a regression report* ⭐⭐
Exercise 27.1
— *Regression vs. classification* ⭐
Exercise 27.10
— *The cost of errors in healthcare* ⭐⭐
Exercise 27.11
— *Comparing models with different error profiles* ⭐⭐
Exercise 27.12
— *Probability calibration* ⭐⭐
Exercise 27.13
— *Basic logistic regression*
Exercise 27.14
— *Using predict_proba*
Exercise 27.15
— *Threshold exploration* ⭐⭐
Exercise 27.16
— *Confusion matrix visualization* ⭐⭐
Exercise 27.17
— *Handling class imbalance* ⭐⭐
Exercise 27.18
— *Complete vaccination classification* ⭐⭐
Exercise 27.19
— *Comparing regression and classification approaches* ⭐⭐⭐
Exercise 27.2
— *The sigmoid function* ⭐
Exercise 27.20
— *Feature scaling effect* ⭐⭐⭐
Exercise 27.21
— *The threshold as a policy decision*
Exercise 27.22
— *Ethical implications of classification in criminal justice* ⭐⭐⭐
Exercise 27.23
— *Model comparison essay* ⭐⭐⭐
Exercise 27.24
— *When probabilities beat predictions* ⭐⭐⭐
Exercise 27.25
— *Building a complete classification report* ⭐⭐⭐⭐
Exercise 27.3
— *Reading a confusion matrix* ⭐
Exercise 27.4
— *Precision vs. recall* ⭐⭐
Exercise 27.5
— *The threshold effect* ⭐⭐
Exercise 27.6
— *Class imbalance awareness* ⭐⭐
Exercise 27.7
— *Why linear regression fails for classification* ⭐
Exercise 27.8
— *Designing a classification system*
Exercise 27.9
— *Interpreting logistic regression output* ⭐⭐
Exercise 27:
— VORP of 6.5 represents 6.5 points per 100 possessions above replacement - Approximate wins: 6.5 * (1…
Exercise 28.1
— *A misinformation detection classifier has 85% sensitivity and 90% specificity. In a corpus where 15…
Exercise 28.10
— *Depth vs. accuracy curve*
Exercise 28.11
— *Random forest comparison*
Exercise 28.12
— *The effect of n_estimators*
Exercise 28.14
— *Permutation importance*
Exercise 28.15
— *Marcus's bakery decisions*
Exercise 28.16
— *The interpretability trade-off*
Exercise 28.17
— *Priya's NBA predictor*
Exercise 28.18
— *Jordan's grade predictor*
Exercise 28.19
— *Elena's policy tree*
Exercise 28.20
— *Model comparison table*
Exercise 28.21
— *The bias-variance trade-off in trees*
Exercise 28.23
— *Design a model selection strategy*
Exercise 28.24
— *Out-of-bag evaluation*
Exercise 28.25
— *Beyond random forests: gradient boosting preview*
Exercise 28.3
— *Information gain calculation*
Exercise 28.5
— *Bagging and bootstrap*
Exercise 28.7
— *Trees vs. linear models*
Exercise 28.9
— *Visualize and interpret*
Exercise 29.11
— *ROC curves for model comparison*
Exercise 29.12
— *Cross-validation comparison*
Exercise 29.13
— *Learning curve diagnosis*
Exercise 29.14
— *Regression evaluation*
Exercise 29.15
— *Elena's vaccination model evaluation*
Exercise 29.16
— *Marcus's sales prediction*
Exercise 29.17
— *The metric mismatch*
Exercise 29.18
— *Jordan's grading fairness*
Exercise 29.19
— *Threshold selection in practice*
Exercise 29.2
— *Confusion matrix from scratch*
Exercise 29.20
— *Metric selection matrix*
Exercise 29.21
— *Cross-validation edge cases*
Exercise 29.22
— *The full evaluation workflow*
Exercise 29.23
— *Designing an evaluation plan*
Exercise 29.24
— *Precision-recall curves*
Exercise 29.25
— *Custom scoring functions*
Exercise 29.3
— *Precision vs. recall scenarios*
Exercise 29.6
— *Cross-validation purpose*
Exercise 29.7
— *Regression metrics comparison*
Exercise 29.8
— *Confusion matrix in code*
Exercise 29.9
— *Classification report interpretation*
Exercise 2a:
— Restricted: 0.63 × 2 = 1.26 xPts - Paint: 0.40 × 2 = 0.80 xPts - Mid-range: 0.41 × 2 = 0.82 xPts - C…
Exercise 3 Solution:
— a) IBM offers the most widely recognized mainframe certifications relevant to COBOL. - b) IBM Certif…
Exercise 3.1
— *Variables as labels*
Exercise 3.11
— *Type conversion chain*
Exercise 3.12
— *Comparison expressions*
Exercise 3.13
— *f-string formatting*
Exercise 3.14
— *Augmented assignment*
Exercise 3.2
— *Type identification*
Exercise 3.20
— *Debug this: multiple errors*
Exercise 3.22
— *Temperature conversion*
Exercise 3.23
— *Data summary report*
Exercise 3.24
— *Course grade calculation*
Exercise 3.25
— *Cleaning messy strings*
Exercise 3.26
— *Data type detective*
Exercise 3.27
— *Building a data dictionary*
Exercise 3.28
— *Floating-point exploration*
Exercise 3.29
— *Data science lifecycle revisited (from Chapter 1)*
Exercise 3.3
— *Operator precedence*
Exercise 3.30
— *Jupyter workflow (from Chapter 2)*
Exercise 3.4
— *Assignment vs. comparison*
Exercise 3.6
— *Immutability of strings*
Exercise 3.8
— *Arithmetic with data*
Exercise 3.9
— *String methods practice*
Exercise 30.10
— *Model comparison pipeline*
Exercise 30.13
— *Missing value handling in pipelines*
Exercise 30.14
— *Examining grid search results*
Exercise 30.15
— *Elena's complete pipeline*
Exercise 30.16
— *Marcus's sales prediction pipeline*
Exercise 30.18
— *Deployment scenario*
Exercise 30.19
— *Cost-sensitive grid search*
Exercise 30.2
— *Assess the claim that social media misinformation was the primary cause of unexpected electoral out…
Exercise 30.20
— *End-to-end workflow design*
Exercise 30.21
— *Pipeline vs. manual workflow debate*
Exercise 30.22
— *Feature engineering within pipelines*
Exercise 30.23
— *Reflecting on Part V*
Exercise 30.24
— *Nested cross-validation*
Exercise 30.25
— *Building a reusable ML template*
Exercise 30.3
— *Parameter naming conventions*
Exercise 30.6
— *Reproducibility checklist*
Exercise 30.7
— *Your first pipeline*
Exercise 30.8
— *ColumnTransformer practice*
Exercise 31.1
— *Findings vs. insights*
Exercise 31.10
— *Narrative arc construction* ⭐⭐
Exercise 31.11
— *Dashboard design critique* ⭐⭐
Exercise 31.12
— *Translating numbers* ⭐⭐
Exercise 31.13
— *Building a narrative notebook* ⭐⭐⭐
Exercise 31.14
— *Designing a slide deck outline* ⭐⭐⭐
Exercise 31.15
— *Annotated visualization* ⭐⭐⭐
Exercise 31.16
— *Communication audit* ⭐⭐⭐
Exercise 31.17
— *Three versions of one story* ⭐⭐⭐
Exercise 31.18
— *Ethical communication dilemma* ⭐⭐⭐
Exercise 31.19
— *From notebook to narrative* ⭐⭐⭐
Exercise 31.2
— *Audience identification* ⭐
Exercise 31.20
— *The anti-dashboard* ⭐⭐⭐⭐
Exercise 31.21
— *Stakeholder simulation* ⭐⭐⭐⭐
Exercise 31.22
— *Cross-format communication plan* ⭐⭐⭐⭐
Exercise 31.23
— *Presentation rehearsal and feedback* ⭐⭐⭐
Exercise 31.24
— *Communication failure post-mortem* ⭐⭐⭐⭐
Exercise 31.25
— *The one-page portfolio piece* ⭐⭐⭐⭐
Exercise 31.3
— *The Pyramid Principle* ⭐
Exercise 31.4
— *Narrative arc identification* ⭐
Exercise 31.5
— *Spotting communication mistakes* ⭐
Exercise 31.6
— *Rewriting for a different audience* ⭐⭐
Exercise 31.7
— *Writing assertive slide titles* ⭐⭐
Exercise 31.8
— *Annotating a chart* ⭐⭐
Exercise 31.9
— *Writing an executive summary* ⭐⭐
Exercise 32.1
— *Identifying where bias enters the pipeline*
Exercise 32.10
— *Auditing a dataset* ⭐⭐
Exercise 32.11
— *The A/B test ethics* ⭐⭐
Exercise 32.12
— *Disparate impact analysis* ⭐⭐
Exercise 32.13
— *COMPAS deep dive* ⭐⭐⭐
Exercise 32.14
— *Facial recognition policy* ⭐⭐⭐
Exercise 32.15
— *Cambridge Analytica analysis* ⭐⭐⭐
Exercise 32.16
— *Ethical audit of the vaccination project* ⭐⭐⭐
Exercise 32.17
— *The trolley problem of data science* ⭐⭐⭐
Exercise 32.18
— *Designing an ethical data science practice* ⭐⭐⭐
Exercise 32.19
— *The cost of not being biased* ⭐⭐⭐⭐
Exercise 32.2
— *Understanding fairness definitions* ⭐
Exercise 32.20
— *Writing a data ethics statement* ⭐⭐⭐⭐
Exercise 32.21
— *Historical harms and data* ⭐⭐⭐⭐
Exercise 32.22
— *The future of data ethics* ⭐⭐⭐⭐
Exercise 32.23
— *Ethical case debate* ⭐⭐⭐
Exercise 32.24
— *Ethical impact assessment* ⭐⭐⭐⭐
Exercise 32.25
— *Reflection: your ethical compass* ⭐
Exercise 32.3
— *Proxy discrimination* ⭐
Exercise 32.4
— *Privacy and anonymization* ⭐
Exercise 32.5
— *Informed consent evaluation* ⭐
Exercise 32.6
— *The hiring algorithm* ⭐⭐
Exercise 32.7
— *The predictive policing dilemma* ⭐⭐
Exercise 32.8
— *Privacy vs. public health* ⭐⭐
Exercise 32.9
— *The credit scoring question* ⭐⭐
Exercise 33.1
— *Why reproducibility matters*
Exercise 33.10
— *Viewing git diffs* ⭐⭐
Exercise 33.11
— *Undoing mistakes in git* ⭐⭐
Exercise 33.12
— *Simulating a merge conflict* ⭐⭐⭐
Exercise 33.13
— *Pull request simulation* ⭐⭐⭐
Exercise 33.14
— *Code review practice* ⭐⭐⭐
Exercise 33.15
— *Writing a CONTRIBUTING.md* ⭐⭐⭐
Exercise 33.16
— *Full project setup* ⭐⭐⭐
Exercise 33.17
— *Reproducibility forensics* ⭐⭐⭐
Exercise 33.18
— *Git history detective* ⭐⭐⭐
Exercise 33.19
— *The reproducibility report card* ⭐⭐⭐⭐
Exercise 33.20
— *Environment debugging* ⭐⭐⭐
Exercise 33.21
— *Reproducibility across programming languages* ⭐⭐⭐⭐
Exercise 33.22
— *Docker for reproducibility* ⭐⭐⭐⭐
Exercise 33.23
— *Data versioning* ⭐⭐⭐⭐
Exercise 33.24
— *Team workflow design* ⭐⭐⭐⭐
Exercise 33.25
— *The reproducibility pledge* ⭐
Exercise 33.3
— *Identifying reproducibility problems* ⭐
Exercise 33.4
— *The .gitignore file* ⭐
Exercise 33.5
— *Initialize a repository* ⭐⭐
Exercise 33.6
— *Branching and merging* ⭐⭐
Exercise 33.7
— *Creating a virtual environment* ⭐⭐
Exercise 33.8
— *Writing a README* ⭐⭐
Exercise 33.9
— *Setting random seeds* ⭐⭐
Exercise 34.1
— *Spotting the generic portfolio*
Exercise 34.10
— *The before/after notebook transformation*
Exercise 34.11
— *Write a project description for your resume*
Exercise 34.13
— *LinkedIn profile upgrade*
Exercise 34.14
— *The interest inventory*
Exercise 34.16
— *The range assessment*
Exercise 34.17
— *Data source scavenger hunt*
Exercise 34.18
— *The STAR-D practice*
Exercise 34.19
— *Take-home simulation*
Exercise 34.20
— *Behavioral question bank*
Exercise 34.21
— *SQL practice for interviews*
Exercise 34.22
— *The six-month portfolio plan*
Exercise 34.23
— *Peer review exchange*
Exercise 34.25
— *The honest self-assessment*
Exercise 34.3
— *Reading like a hiring manager*
Exercise 34.5
— *Distinguishing portfolio from homework*
Exercise 34.6
— *Write your project introduction*
Exercise 34.7
— *Curate your visualizations*
Exercise 34.8
— *Write your project README*
Exercise 34.9
— *Set up your GitHub profile*
Exercise 35.1
— *Define your question*
Exercise 35.10
— *Statistical analysis*
Exercise 35.11
— *Build and evaluate models*
Exercise 35.12
— *Sensitivity analysis*
Exercise 35.13
— *Write the introduction*
Exercise 35.14
— *Write the conclusions*
Exercise 35.15
— *Write the limitations and ethical reflection*
Exercise 35.16
— *Polish all visualizations*
Exercise 35.18
— *Write the final README*
Exercise 35.19
— *Conduct peer review*
Exercise 35.2
— *Inventory your resources*
Exercise 35.20
— *Final submission and reflection*
Exercise 35.3
— *Set up the repository*
Exercise 35.4
— *Load and inspect all data*
Exercise 35.5
— *Clean the data with documented decisions*
Exercise 35.6
— *Merge and prepare the analytical dataset*
Exercise 35.7
— *Exploratory visualization set*
Exercise 35.8
— *Discover something surprising*
Exercise 35.9
— *Summarize exploration findings*
Exercise 36.1
— *The honest skills audit*
Exercise 36.10
— *The six-month roadmap*
Exercise 36.11
— *The accountability structure*
Exercise 36.12
— *The portfolio gap analysis*
Exercise 36.13
— *Writing your professional story*
Exercise 36.14
— *The learning resource evaluation*
Exercise 36.15
— *The conference and community plan*
Exercise 36.16
— *Letter to your future self*
Exercise 36.17
— *Letter to a future student*
Exercise 36.18
— *The one-year vision*
Exercise 36.19
— *Gratitude inventory*
Exercise 36.2
— *What did you learn that surprised you?*
Exercise 36.3
— *The skills you didn't know you'd need*
Exercise 36.4
— *Revisiting Chapter 1*
Exercise 36.5
— *Job posting analysis*
Exercise 36.6
— *Career path comparison*
Exercise 36.7
— *The informational interview plan*
Exercise 36.8
— *Day-in-the-life simulation*
Exercise 36.9
— *The three-skill priority*
Exercise 38.3
— *Reflect on three specific cognitive biases that you believe most influence your own information pro…
Exercise 4 Solution:
— a) RC = 0. All records processed without errors. - b) RC = 4. A small number of records failed but t…
Exercise 4.1
— *Basic conditional* ⭐
Exercise 4.10
— *While loop: countdown* ⭐
Exercise 4.11
— *While loop: find first match* ⭐⭐
Exercise 4.14
— *Function with conditional* ⭐⭐
Exercise 4.15
— *Function with a loop* ⭐⭐
Exercise 4.16
— *Multiple return values* ⭐⭐
Exercise 4.17
— *Default parameters* ⭐⭐
Exercise 4.18
— *Functions calling functions* ⭐⭐⭐
Exercise 4.19
— *Trace the output* ⭐⭐
Exercise 4.22
— *Trace a function call* ⭐⭐⭐
Exercise 4.23
— *Data quality report* ⭐⭐⭐
Exercise 4.24
— *Running total with threshold alert* ⭐⭐⭐
Exercise 4.25
— *Letter grade converter* ⭐⭐⭐
Exercise 4.26
— *Pseudocode first* ⭐⭐⭐
Exercise 4.27
— *Data validation pipeline* ⭐⭐⭐⭐
Exercise 4.28
— *Types and conditionals* ⭐⭐
Exercise 4.29
— *F-strings in loops* ⭐⭐
Exercise 4.3
— *Nested conditionals* ⭐⭐
Exercise 4.30
— *The data science lifecycle in code* ⭐⭐⭐
Exercise 4.4
— *Boolean expressions* ⭐
Exercise 4.5
— *Conditional with string data* ⭐⭐
Exercise 4.7
— *Accumulator pattern* ⭐
Exercise 4.8
— *Count with condition* ⭐⭐
Exercise 4.9
— *Loop with string formatting* ⭐⭐
Exercise 41.2
— *A researcher proposes to deploy a prebunking intervention to the entire user base of a social media…
Exercise 5 Solution:
— a) Essential -- this is the core skill - b) Essential -- fundamental to mainframe development - c) E…
Exercise 5.1
— *Choosing the right structure*
Exercise 5.10
— *Dictionary from two lists*
Exercise 5.11
— *Counting with dictionaries*
Exercise 5.12
— *Write and read a CSV*
Exercise 5.14
— *Building a frequency table*
Exercise 5.15
— *Set-based data cleaning*
Exercise 5.16
— *Weather data processing*
Exercise 5.17
— *Inverting a mapping*
Exercise 5.18
— *Grade distribution analysis*
Exercise 5.19
— *JSON data exploration*
Exercise 5.2
— *Mutable vs. immutable*
Exercise 5.20
— *Marcus's sales analysis*
Exercise 5.21
— *Data structure trade-offs*
Exercise 5.22
— *Designing a mini-database*
Exercise 5.23
— *From spreadsheet to code*
Exercise 5.24
— *Comparing file formats*
Exercise 5.26
— *Lifecycle with dictionaries (Chapter 1 + Chapter 5)*
Exercise 5.27
— *Functions with data structures (Chapter 4 + Chapter 5)*
Exercise 5.28
— *Type conversion meets data structures (Chapter 3 + Chapter 5)*
Exercise 5.29
— *Conditionals inside comprehensions (Chapter 4 + Chapter 5)*
Exercise 5.3
— *Dictionary access patterns*
Exercise 5.30
— *Jupyter notebook narrative (Chapter 2 + Chapter 5)*
Exercise 5.31
— *Beyond built-in: collections module*
Exercise 5.32
— *Real data challenge*
Exercise 5.4
— *Comprehension anatomy*
Exercise 5.5
— *Reading the error message*
Exercise 5.6
— *The file reading pattern*
Exercise 5.7
— *Set operations in plain English*
Exercise 5.8
— *Building a data record*
Exercise 5.9
— *Filtering a list of dictionaries*
Exercise 6 Solution:
— a) COMM-FUNCTION is a 4-byte field with 11 defined 88-level conditions: OPEN, CLOS, MODI, DEPT, WITH…
Exercise 6.1
— *EDA as conversation*
Exercise 6.11
— *Mode (most common value)*
Exercise 6.12
— *Percentile calculation*
Exercise 6.13
— *Filter and summarize*
Exercise 6.14
— *Year-over-year comparison*
Exercise 6.15
— *Data quality detective* (2-star)
Exercise 6.16
— *Pandemic impact analysis* (2-star)
Exercise 6.17
— *Regional deep dive* (3-star)
Exercise 6.18
— *Vaccine comparison* (2-star)
Exercise 6.19
— *Top and bottom performers* (2-star)
Exercise 6.20
— *Build a complete summary report* (3-star)
Exercise 6.21
— *Text-based bar chart* (3-star)
Exercise 6.22
— *Correlation by eye* (3-star)
Exercise 6.23
— *Coverage trajectory* (3-star)
Exercise 6.24
— *Write your own data dictionary* (3-star)
Exercise 6.25
— *EDA question generator* (4-star)
Exercise 6.26
— *Weather data exploration* (2-star)
Exercise 6.27
— *Bookshelf analysis* (2-star)
Exercise 6.28
— *Classroom grades* (3-star)
Exercise 6.29
— *Data science lifecycle in action* (1-star, Ch.1 review)
Exercise 6.3
— *Missing value categories*
Exercise 6.30
— *Functions for reuse* (2-star, Ch.4 review)
Exercise 6.5
— *Notebook narrative vs. code dump*
Exercise 6.6
— *Reproducibility checklist*
Exercise 6.7
— *Flexible data loader*
Exercise 6.8
— *Count unique values*
Exercise 6.9
— *Safe numeric extraction*
Exercise 7 Solution:
— a) **Legacy modernization**: The process of updating older systems to meet current business needs, w…
Exercise 7.1
— *The threshold concept*
Exercise 7.10
— *Creating computed columns*
Exercise 7.12
— *apply() with a custom function*
Exercise 7.13
— *describe() interpretation*
Exercise 7.14
— *Boolean indexing with multiple conditions*
Exercise 7.15
— *Weather station data*
Exercise 7.16
— *Book sales analysis*
Exercise 7.17
— *Vaccination data exploration* (3-star)
Exercise 7.18
— *Comparing pure Python and pandas*
Exercise 7.19
— *Debugging challenge*
Exercise 7.2
— *Series vs. DataFrame*
Exercise 7.20
— *Custom summary function*
Exercise 7.21
— *Before-and-after comparison essay*
Exercise 7.22
— *Build a mini-analysis pipeline* (4-star)
Exercise 7.23
— *Data grammar translation* (3-star)
Exercise 7.24
— *Investigating a pattern* (4-star)
Exercise 7.25
— *Build and analyze a classroom dataset*
Exercise 7.26
— *Exploring unfamiliar data* (3-star)
Exercise 7.5
— *Boolean indexing mechanics*
Exercise 7.6
— *Method chaining readability*
Exercise 7.7
— *Build a DataFrame from scratch*
Exercise 7.8
— *Selecting and filtering*
Exercise 7.M1
— *Vocabulary bridge* (Chapter 3 + 7)
Exercise 7.M2
— *Functions in two worlds* (Chapter 4 + 7)
Exercise 7.M3
— *Data structure evolution* (Chapter 5 + 7)
Exercise 7.M4
— *EDA revisited* (Chapter 6 + 7)
Exercise 7.M5
— *The big picture* (Chapter 1 + 7)
Exercise 8.1
— *The five types of mess*
Exercise 8.10
— *to_numeric with errors*
Exercise 8.11
— *Missing value audit function* ⭐⭐
Exercise 8.12
— *Cleaning a price column* ⭐⭐
Exercise 8.13
— *Standardizing country names* ⭐⭐
Exercise 8.14
— *Detecting implausible values* ⭐⭐
Exercise 8.15
— *Group-based imputation* ⭐⭐⭐
Exercise 8.16
— *Complete cleaning pipeline* ⭐⭐⭐
Exercise 8.19
— *The disappearing rows*
Exercise 8.2
— *Explain the engagement-accuracy trade-off in platform recommendation algorithms. Why do platforms h…
Exercise 8.21
— *The NaN equality trap*
Exercise 8.22
— *The imputation experiment*
Exercise 8.23
— *Design a cleaning strategy*
Exercise 8.25
— *Sensitivity analysis*
Exercise 8.26
— *Building a cleaning function*
Exercise 8.27
— *Your cleaning instincts*
Exercise 8.28
— *What surprised you?*
Exercise 8.29
— *Fuzzy deduplication*
Exercise 8.3
— *Cleaning as analysis*
Exercise 8.30
— *Automated data quality report*
Exercise 8.4
— *Why not just dropna()?*
Exercise 8.5
— *Data type consequences*
Exercise 8.6
— *Outlier or insight?*
Exercise 8.9
— *Duplicate detection*
Exercise 9.1
— *Join type selection*
Exercise 9.11
— *Method chain construction*
Exercise 9.12
— *Diagnosing a key explosion*
Exercise 9.13
— *Fixing a type mismatch*
Exercise 9.14
— *Complex melt with multiple id_vars*
Exercise 9.15
— *Merging messy country data* (2-star)
Exercise 9.16
— *Reshaping survey data* (2-star)
Exercise 9.17
— *Sales analysis pipeline* (3-star)
Exercise 9.18
— *Handling duplicates in a merge* (3-star)
Exercise 9.19
— *Weather data reshaping* (2-star)
Exercise 9.2
— *Wide vs. long identification*
Exercise 9.20
— *Vaccination equity analysis* (3-star)
Exercise 9.21
— *Self-join: Comparing countries within regions* (3-star)
Exercise 9.22
— *Building a complete report* (4-star)
Exercise 9.23
— *Performance awareness* (3-star)
Exercise 9.24
— *Chained debugging* (3-star)
Exercise 9.25
— *Multi-level groupby with unstack* (4-star)
Exercise 9.26
— *Movie ratings analysis* (2-star)
Exercise 9.27
— *Fitness tracker data* (3-star)
Exercise 9.28
— *Combining election data* (3-star)
Exercise 9.29
— *Full pipeline from loading to analysis* (3-star)
Exercise 9.3
— *Split-apply-combine in plain English*
Exercise 9.30
— *Debugging a multi-step analysis* (2-star)
Exercise 9.4
— *Predicting merge output*
Exercise 9.5
— *Method chaining readability*
Exercise 9.7
— *Basic merge practice*
Exercise 9.9
— *GroupBy aggregations*
Exercise type labels:
— **(A) Analytical** — Pen-and-paper derivation, proof, or calculation - **(C) Computational** — Requi…
Exercise Types:
— [Conceptual] — Understanding the framework - [Scenario] — Applying concepts to situations - [Applied…
Exercises
— Multiple difficulty levels, from foundational to research-level - **Quiz** — Self-assessment with de…
Exercises (exercises.md)
— Discussion questions, written assignments, and activities. Some require individual reflection; other…
exercises.md
— practice problems at four difficulty levels - **quiz.md** — self-assessment with answers and explana…
exhorters
— public speakers who could address the congregation on spiritual matters. While the exhorter role was…
Existing COBOL program: ACCTINQP
— Interface: COMMAREA (256 bytes) - Input: 10-byte account ID, 1-byte request type - Output: Account d…
Existing communities:
— Reddit communities (r/NewTubers, platform-specific subreddits) - Discord servers for creators in you…
Existing equipment:
— Table saw (SawStop PCS, 3HP): 240V, 15A continuous - Dust collector (Grizzly G0562, 1.5HP): 240V, 8A…
Exit
— Thank the customer, remind them to take their card, and return to the welcome screen.
Exit poll
— A survey conducted at polling places on Election Day in which voters who have just cast their ballot…
EXIT PROGRAM:
— In a **called program**: Returns control to the caller (same as GOBACK) - In a **main program**: Has…
Exit Strategy
— A plan for how a creator or creator-founded company will eventually transfer ownership, whether thro…
Expand the "Open Doors" policy
— when a guest reports discrimination, Airbnb finds them an alternative listing or hotel room at Airbn…
Expanded Storage
— a hardware feature of S/390 and early zSeries processors. Expanded Storage was faster than disk but …
Expanding contexts
— inhabiting more and more varied environments 2. **Sharing work-in-progress** — building in public; t…
Expanding emotional vocabulary
— developing precise language for the emotions she has been reorganizing out of existence (resentment,…
Expanding Window
— A computation over all rows from the beginning up to the current row (cumulative).
Expansion Tank:
— Required in any closed system (one with a backflow preventer) - Absorbs pressure from thermal expans…
Expansions:
— China has deployed extensive facial recognition infrastructure, including systems integrated with so…
Expectancy
— how likely you think success is - **Value** — how rewarding success would be - **Impulsiveness** — h…
Expectancy Violation Theory (EVT)
— Burgoon's framework proposing that violations of communicative expectations increase arousal and int…
Expectation value
— Ch 2.4 The average value of an observable $\hat{A}$ in state $|\psi\rangle$: $\langle\hat{A}\rangle …
expectation-mediated luck
— a form of social luck in which the expectations others hold and communicate about you shape the very…
Expected Assists (xA)
— The probability that a given pass will result in a goal, aggregated over all passes to produce a pla…
Expected Calibration Error (ECE)
— The weighted average absolute difference between predicted probabilities and observed frequencies ac…
Expected components (minimum):
— Online transaction processing (balance inquiry, fund transfer, loan payment) - Batch posting (end-of…
expected frequencies
— the counts you'd predict if the null hypothesis (equal distribution) were true.
Expected frequencies under independence:
— E(Thursday, Underdog Covers) = 123 * 830 / 1621 = 62.98 - E(Thursday, Favorite Covers) = 123 * 791 /…
Expected Goals (xG)
— The probability that a shot will result in a goal, based on factors including distance, angle, body …
Expected Goals Against (xGA)
— The total xG of shots conceded by a team, measuring the quality of chances they allow. (Chapter 7)
Expected high correlations:
— EPA/play (offense) and Yards per play (offense): r likely > 0.75, as both measure offensive efficien…
Expected Improvements:
— Higher frame rates for improved accuracy - Better ball tracking technology - Integration with biomet…
Expected Insight:
— Which zones have highest conversion? - What is the miss rate by zone? - Where do goalkeepers save mo…
Expected Metrics:
— Attacking team first contact win rate - Average location of first contact (x, y coordinates) - Distr…
Expected outcome:
— Unqualified: `ACCOUNT` (padded to 9 bytes) - Qualified: `ACCOUNT (ACCT-NO = 1001000123)` with correc…
EXPECTED OUTCOMES (3-YEAR)
— `[Outcome 1: e.g., "$15M in AI-driven revenue or cost savings"]` - `[Outcome 2: e.g., "10 AI models …
Expected output pattern:
— `n=10`: The final average may be noticeably different from 0.6 (e.g., 0.5000 or 0.7000). The maximum…
Expected Output:
— Show expected starters for the class - Compare to actual outcomes if data available
Expected Points (EP)
— Average points scored from a field position - Opponent's 5-yard line ≈ +6 EP - Own 20-yard line ≈ +0…
Expected Points (xPts)
— The expected number of league points from a match, derived from xG and xGA using a Poisson model to …
Expected Points = P(make) x Point Value
— [ ] **Shot quality measures difficulty**, not outcome - [ ] **Shot-making measures skill** beyond di…
Expected Points Added (EPA)
— Change in EP from one play - EPA = EP(after) - EP(before) - Common currency for comparing all plays
Expected Points papers
— Foundation for scoring probability 2. **Win Probability Added** - Burke's original methodology 3. **…
Expected post-implementation state:
— Platform will handle automated generation for approximately 75% of regulatory filings (reducing huma…
Expected Threat (xT)
— A framework that assigns a goal probability to every location on the pitch based on historical data,…
Expected trading patterns:
— 200 community members, maybe 20-50 will trade on any given market - Average 2-3 trades per participa…
Expected value
— The probability-weighted sum of possible outcomes of an action; the central concept in rational deci…
Expected Value Podcast
— Data-driven soccer analysis - Statistical concepts - Industry applications
Expected Value:
— Discrete: $E[X] = \sum_x x \cdot p(x)$ - Continuous: $E[X] = \int_{-\infty}^{\infty} x \cdot f(x) \,…
Experian, Equifax, and TransUnion
— the "Big Three" credit bureaus -- operate as data brokers in addition to their credit reporting func…
Experiential futures
— Creating immersive experiences that allow people to "inhabit" a future scenario. A workshop might si…
Experiment
— The Zeeman effect provides direct experimental verification of the symmetry-degeneracy connection. A…
Experimentation (Chapter 26):
— `run_ab_test` — chi-square test with uplift calculation and recommendation - `calculate_required_sam…
Experimentation (Days 31-60)
— Variable to test: _______________ - Hypothesis: _______________ - What I'll measure: _______________
expert
— level performance. He sees the pattern and responds, fluidly, without deliberation. An expert diagno…
expert blind spot
— the phenomenon where becoming an expert at something can actually make you worse at understanding ho…
Expert characteristics:
— Flexible, judgment-based AI use (do you have this?) - Efficient verification — checking what matters…
Expertise paradox
— The phenomenon by which deep expertise in a domain can, beyond a certain point, blind an expert to p…
expertise reversal effect
— the finding that instructional techniques effective for beginners become redundant or harmful for ad…
Experts underestimate cross-domain applicability
— Chapters referenced: (none yet)
EXPLAIN
— Whether to populate the PLAN_TABLE with access path information:
EXPLAIN baseline:
— All SQL statements explained and baselined before deployment - Automated comparison on every REBIND …
Explain it to a child
— simple words, everyday analogies, no jargon 3. **Identify the gaps** — where does the explanation br…
Explain the combinatorial view of creativity
— how creative ideas emerge from connecting existing knowledge in new ways, not from generating someth…
Explain the logic of bootstrap resampling
— the "big idea" is that you can learn about the population by cleverly reusing your sample. 2. **Cons…
Explain the mechanism
— not just that it happens, but how it happens 3. **Propose a specific policy change** — concrete, imp…
Explain the nuances of the 10,000-hour claim
— what the research actually shows versus what the popular version gets wrong - **Define deliberate pr…
Explain to a child
— forces simple language, everyday comparisons, no jargon 2. **Identify the gaps** — reveals where the…
Explain when nonparametric methods are needed
— the decision to use a nonparametric test is based on assumption violations, and students need to dia…
Explain why self-testing works on two levels
— as a memory-strengthening strategy (the testing effect from Chapter 7) and as a metacognitive monito…
Explain your answer in 2–3 sentences.
— **Question 12** [Essay]
Explain your choice in 2–3 sentences.
— **Question 4** [Short Answer]
EXPLAIN(YES) vs. EXPLAIN(ONLY):
— EXPLAIN(YES): Binds the package AND populates PLAN_TABLE - EXPLAIN(ONLY): Populates PLAN_TABLE witho…
explainability
— the ability to explain *why* an AI system reached a particular conclusion. If a physician tells you …
explainability-accuracy trade-off
— the observation that the most accurate models (deep neural networks, large ensembles) are often the …
explanatory style
— the characteristic way people explain bad events. People who explain bad events as: - **Permanent** …
Explicit authorization statement
— clear language that testing within the policy is "authorized" 2. **CFAA/CMA reference** — explicit s…
Explicit Missing Values
— Null, None, NaN, empty string - pandas represents as `NaN` (Not a Number) - Easy to detect: `df.isnu…
Explicit non-retaliation policies
— written policies that clearly prohibit adverse action against employees who raise ethics concerns in…
Exploit Selection or Development
— You find an existing exploit (in Metasploit, Exploit-DB, or elsewhere) or write your own. You config…
exploit stock
— the set of known options with predictable outcomes.
Exploitability:
— Is there a public exploit available? - Is the vulnerability being actively exploited in the wild (ch…
exploitation
— acting on what you already know works -- guarantees a reliable reward but risks missing superior alt…
Exploitation Timeline:
— **December 1, 2021:** First known exploitation in the wild (later attributed to Chinese state actors…
exploiting
— capitalizing on known information to obtain a reliable reward. If you try the Ethiopian place, you a…
Exploits
— Code that leverages a specific vulnerability. Each exploit targets a particular software version, co…
exploration
— a random reorientation that has no preference for any particular direction.
Exploratory analysis:
— Create scatterplots of $y$ vs. each numerical predictor. - Compute a correlation matrix among numeri…
Exploratory Data Analysis
— The EDA mindset · Descriptive statistics for managers · Visualization best practices · matplotlib an…
Exploratory Data Analysis for Football
— visualization techniques, pattern recognition, and the EDA mindset.
Explore the data:
— Scatterplots of $y$ vs. each $x$ - Correlation matrix among predictors (watch for multicollinearity)…
Explore-exploit tension
— The fundamental tradeoff between exploring new options (to discover better possibilities) and exploi…
explore/exploit ratio
— the proportion of the solo devoted to genuinely new material versus recycled patterns. And, cruciall…
Explore/exploit tradeoff
— The fundamental tension between gathering new information (exploring) and using existing knowledge f…
Exploring Options
— "What are the options as you see them?" - "What have you already considered and ruled out? Why?" - "…
Explosive (High EPA + Low Success):
— Big-play dependent - High variance - Can win shootouts, struggle in grind games
Explosive plays drive value
— Thompson's ability to generate big plays more than offset his additional turnovers.
Exponential decay weighting
— A recency weighting scheme in which a poll's weight decreases exponentially with its age: $w = e^{-\…
Exponential Distribution
— $X \sim \text{Exponential}(\lambda)$
Exposed Cloud Resources:
— Search for exposed Elasticsearch clusters, Redis instances, or RDS instances that may be accessible …
Exposing raw COBOL field names in JSON
— Translate `ACCT-CUST-LST-NM` to `accountCustomerLastName` - **Using HTTP POST for everything** — Use…
Exposition collapses into the Hook
— you have 2-3 seconds to establish the situation, often using text overlay, a visual, or a single lin…
Exposure (therapy)
— The evidence-based treatment for anxiety disorders based on repeated confrontation with feared stimu…
exposure luck
— the probability of being discovered by someone who couldn't have found you any other way. The mechan…
Exposure:
— Is the vulnerable system Internet-facing or internal-only? - Are there compensating controls (WAF, I…
Express.js (ShopStack API):
— Helmet middleware adds security headers - express-validator provides input validation - express-rate…
extended mind thesis
— the idea that cognition doesn't stop at the boundary of your skull. Your notebook, your phone, your …
Extended Parallel Process Model (EPPM)
— Kim Witte's (1992) framework for understanding fear appeals: effective fear appeals must produce hig…
Extended sequential (DSNTYPE=LARGE)
— allows sequential datasets larger than 65,535 tracks per volume - **Extended format VSAM** -- suppor…
Extensions for soccer:
— **Goal difference adjustment:** Scale the $K$-factor by the goal difference to reward dominant victo…
Extensions:
— Analyze pass *destination* heat maps to identify the most targeted zones. - Weight passes by progres…
Exterior envelope:
— Window flashing that wraps sill pans and integrates properly with the weather-resistant barrier - Si…
Exterior perimeter
— walk all four sides if possible. Foundation visible? Siding condition? Drainage?
Exterior:
— Are gutters clean and directing water away from the foundation? - Is grading sloped away from the ho…
External Exploitation Planning:
— Identify the most promising external attack surface based on FinanceForward's technology stack. - Re…
EXTERNAL NAME ACTVLDSP
— The load module name in the STEPLIB of the WLM-managed address space. This must match the PROGRAM-ID…
External pressure
— from researchers, media, and advocacy organizations — was necessary to compel action. Internal accou…
external regressors
— variables external to the time series that influence its behavior. Prophet (as we saw above with the…
External self-awareness
— accurate knowledge of how others experience you, how you land on them, what behavioral patterns they…
External Self-Awareness:
— I regularly seek feedback on how I come across in conflict. - I am not significantly surprised when …
External Stakeholders:
— Ownership group - Agents (during transfer negotiations) - Media (selectively) - Data providers and t…
External Stored Procedure
— A stored procedure implemented in a host language (COBOL, PL/I, C, Java) rather than in SQL PL. The …
External validation
— the likes, follows, performance reviews, and professional titles that Jordan monitored for decades —…
External validation dependency
— tying emotional state to metrics; bad video day = bad personal day; growth plateaus become identity …
External-to-Internal Pivot:
— Attempt to gain initial access through external-facing services. Consider: - Exploiting vulnerabilit…
Externalities
— costs imposed on uninvolved parties — are particularly acute in financial markets because financial …
Externality
— A cost or benefit that affects parties not directly involved in a transaction or decision; a source …
externalizing conversation
— the practice of separating the person from the problem.
Extinguisher Sizing:
— Minimum residential recommendation: 2.5 lb (adequate for a small fire) - Better: 5 lb or 10 lb (more…
Extract-Transform-Load (ETL)
— Data is extracted from a source (DB2), transformed (validated and reformatted), and loaded into a ta…
Extracted business rules:
— **BR-010:** Claims over $50,000 require pre-authorization - **BR-011:** Pre-authorization must not b…
Extracting Credentials:
— HTTP Basic Authentication transmits credentials in Base64 encoding (easily decoded). - Filter: `http…
Extraction pattern
— The recurring dynamic, traced throughout this textbook, of outside capital extracting wealth from Ap…
Extraneous load: Very high.
— The split-attention effect: The diagram and the algebra are physically separated (different parts of…
Extraversion
— One of the Big Five traits, characterized by sociability, assertiveness, and positive affect; modera…
extreme forecasts
— it pushes forecasters to report 0 or 1 regardless of their true beliefs! This is terrible for a fore…
Extrinsic motivation
— Motivation driven by external factors — rewards, punishments, social approval, or obligation — rathe…
eye dialect
— nonstandard spellings designed to visually represent dialectal pronunciation ("sez" for "says," "wuz…
F
F-string
— Python's formatted string literal syntax (introduced in 3.6). Allows embedding expressions inside st…
F1 score
— the harmonic mean of precision and recall:
Fabricated or heavily embellished reporting
— events that did not happen, quotes that were invented - **Manufactured stories** — reporters sent ov…
Facade Pattern
— A **design pattern** that provides a simplified interface to a complex subsystem, making it easier t…
Face
— In Goffman's and Brown and Levinson's frameworks, the public self-image that social actors need to m…
Face detection
— Finding faces in an image. This is the technology that draws a box around faces in your camera's vie…
Face matching
— Comparing the embedding against a database of known faces to find a match. This is where the "recogn…
Face the window
— light should fall on your face, not behind you 2. **Angle at 45 degrees** from the window for flatte…
Face-reenactment synthesis
— A deepfake technique in which the mouth and lip movements of a video subject are replaced with synth…
face-work
— the strategies, both linguistic and behavioral, through which face threats are managed, mitigated, a…
Facebook Papers
— revealed something remarkable: Facebook's own researchers had produced extensive internal studies de…
Facial landmark detection
— identifying the precise contours of lips, eyes, cheeks, and jawline to ensure virtual products are a…
facial symmetry
— the degree to which the left and right sides of a face mirror each other precisely.
Facilitate carefully
— set ground rules for discussing partisan politics in an academic context. - **Day 2:** Chapter 35. S…
Facilitating sounds like:
— "What do you actually want to come out of this?" - "What's the best possible outcome here, and what …
Facilitator script or talking points
— not a word-for-word script (that leads to stilted delivery), but key points, transitions, and specif…
Fact-based inoculation is preferable when:
— The specific false claims are known in advance (e.g., predictable myths about a new vaccine or a rec…
Fact-Checking
— Snopes (snopes.com) — general fact-checking - PolitiFact (politifact.com) — political claims - FactC…
Fact-checking as skill practice
— not just teaching that fact-checking exists, but training people to do it — shows promise. But the r…
Factors affecting earnings:
— Skill level and specialization - Time invested - Target selection strategy - Report quality - Consis…
Factors Affecting Remediation Cost:
— Development effort (hours x developer rate) - Infrastructure changes (hardware, software licenses, c…
Factors that predicted extended improvement:
— Entry age (18) meant more development runway - High basketball IQ enabling skill translation - Organ…
Factors:
— Current score - Time remaining - Possession - Field position
FACTORY
— Instance count is class-level data shared across all instances. 2. **OBJECT** -- Individual data ret…
Factory Pattern
— A **design pattern** that creates objects without specifying their exact class, delegating the creat…
FACTS Framework
— five questions to ask whenever you encounter an AI system or an AI claim.
FACTS Framework (from Chapter 1):
— **F — Function:** MedAssist performs image classification — it identifies potential abnormalities in…
Fahe network
— a collaborative of housing and community development organizations across Appalachia — has been work…
FAIL
— accumulator mismatch | | T12 | STEP060, record 100,000 | 1 min | Pass |
Failed training runs
— models that diverge, crash, or underperform and must be retrained > - **Hyperparameter search** — th…
Failure conditions:
— The model performs no better than account manager intuition - The model is built but never integrate…
Failure Domain Analysis
— Map every failure domain in your architecture (from Level 1 through Level 7). For each, document the…
Failure modes active:
— **Incentive structures (Ch.11):** Pharmaceutical companies spent billions marketing opioids to physi…
Failure symptoms
— what the operator sees (abend codes, messages) b) **Diagnostic steps** — what to check before restar…
Fair Housing Act (FHA)
— 1968 federal law prohibiting discrimination in residential real estate transactions, including mortg…
Fair Use
— A legal doctrine in the United States that permits limited use of copyrighted material without permi…
Fairness
— AI systems should treat all people fairly 2. **Reliability and Safety** — AI systems should perform …
Fairness criteria:
— Relevance score must not differ by more than 10 percentage points across age groups, gender groups, …
Fairness Doctrine
— FCC regulation (1949–1987) requiring broadcast licensees to present controversial public issues in a…
Fairness, Explainability, and Transparency
— Fairness definitions (and their conflicts) · Disparate impact · SHAP values · LIME · Model cards · D…
Fairness:
— Do I find it difficult to move forward when I believe an outcome was unjust? - Do I have a strong re…
Faithfulness problem
— The problem that post-hoc explanation methods (SHAP, LIME, etc.) produce approximations of model rea…
Fake experts
— Manufactured or misrepresented authority; presenting individuals without substantive expertise as cr…
Faker
— Description: Python library for generating realistic fake data (names, addresses, text, dates, etc.)…
Fall (before first freeze):
— Schedule furnace/boiler service — non-negotiable - Test CO detectors; replace batteries in all detec…
Fallback is NOT possible
— returning to the previous version requires a full restore from a pre-migration backup.
False
— The chapter explicitly argues that moral intuitions "are not nothing" and encode genuine moral wisdo…
false agreement
— the appearance of resolution that lacks substance.
False balance
— The presentation of two positions as equally supported when the actual evidential weight is strongly…
False consensus effect
— The tendency to overestimate how widely one's own opinions, behaviors, and experiences are shared by…
False context
— a genuine photograph (the content is real and unaltered) presented with false contextual claims abou…
false discovery rate (FDR)
— the expected proportion of rejected hypotheses that are false positives.
False equivalence / both-sides fallacy
— The analytical error of treating authoritarian and democratic propaganda as equivalent because both …
False expertise
— The deployment of credentials as a substitute for expertise: elevating contrarian voices whose crede…
false flag operations
— operations deliberately designed to appear to originate from a different actor.
False negative (Type II error)
— Failing to detect a signal or pattern that is actually present; the cost of being too conservative i…
false negative rates
— the error rates within each racial group. Northpointe is reporting **predictive values** — the accur…
False Nine
— A tactical role where the center forward drops deep into midfield to create space and receive the ba…
false pattern matching
— seeing deep structure where there is only surface similarity. This book will help you develop the sk…
false positive
— of telling a healthy woman she might have cancer.
False positive (Type I error)
— Detecting a signal or pattern that is not actually present; the cost of being too liberal in filteri…
false positive rate
— and it's exactly what the significance level controls.
False Positive Rate: 209 / (891 + 209) = 19.0%
— PPV: 349 / (349 + 209) = 62.5%
False Positive Rate: 532 / (990 + 532) = 35.0%
— PPV: 805 / (805 + 532) = 60.2%
False positive rates
— the rate at which the system incorrectly matches two different people — were **10 to 100 times highe…
false positives
— defendants the algorithm wrongly classified as dangerous.
False reporting
— using platform reporting systems as a harassment tool — is a form of harassment that weaponizes plat…
False.
— AutoML platforms can identify some data quality issues but do not eliminate the need for human data …
Falsetto (in males)
— Similar mechanical configuration to head voice - Characterized by incomplete glottal closure: the fo…
Falsy
— Python treats them as `False` in a condition:
Familiarity with SQL
— If you've used SQL before, Chapter 23 will feel familiar. If not, that chapter covers what you need …
Familismo
— The cultural orientation toward strong family connection and collective loyalty found in many Latin …
family mediator
— a trained professional who facilitates family communication — can provide structure that makes conve…
family meeting
— a structured gathering specifically for the purpose of addressing a shared family issue — can be use…
Fan capital
— Community-specific knowledge, skills, and relationships that confer status within a fan community (a…
Fan community
— A specific, identifiable group of fans sharing a common communication infrastructure, set of practic…
Fan economy
— All economic activity generated by fan communities, including official licensed merchandise, convent…
Fan patronage economy
— Direct fan-to-creator economic support through Patreon subscriptions, Ko-fi tips, and commission cul…
Fan project accounts
— dedicated accounts (primarily on Twitter and Instagram) organized around specific types of fan suppo…
Fan translation accounts
— dedicated Twitter and social media accounts that post rapid translations of BTS content. The most pr…
Fan wiki translation projects
— community wikis (most prominently Bangtan Wiki, available in multiple languages) that maintain trans…
Fan-created documentary content
— long-form interviews with community members, archival reconstructions of fandom events, convention c…
Fan-owned infrastructure
— Community infrastructure for fan activity that is owned and governed by the fan community rather tha…
Fan-to-pro pipeline
— The phenomenon by which fan creative communities function as unpaid talent incubators for the entert…
fancafe
— Official fan community platforms operated by K-pop entertainment companies, particularly popular in …
Fandom
— A social system organized around shared investment in a cultural object, characterized by structured…
fandom diaspora
— a period in which a community is scattered across platforms, maintaining shared identity while lacki…
Fandom-specific variation
— The aggregate distribution varies significantly by fandom. Fandoms with large female fan bases and i…
Fandom.com Exodus Coverage
— The 2022 Fandom.com backlash generated substantial fan community documentation. The Runescape wiki m…
Fanon
— Fan-produced interpretations of a source text that acquire the status of shared truth within a commu…
Fans
— Emotional hooks - Team branding prominent - Call to action - Mobile-first
Fans who violate "real fan" norms
— particularly women fans who engage with traditionally male-coded fandoms, casual fans who don't cons…
fansign
— A small-scale event in which K-pop fans can meet idol group members in person, often won through alb…
fansite
— A fan-operated social media account dedicated to documenting a specific K-pop idol through high-qual…
Fantasy Points Data
— Historical projections archive - Accuracy tracking - https://www.fantasypointsdata.com/
Fantasy Pros Accuracy
— https://www.fantasypros.com/nfl/accuracy/ - Historical accuracy rankings - Expert comparison - Metho…
FantasyPros
— Consensus projections 2. **ESPN** - ESPN projections 3. **Yahoo** - Yahoo projections 4. **Rotowire*…
Farm consolidation
— the process by which small farms were absorbed into larger operations or simply abandoned — had been…
Fast and transparent
— you can understand exactly why a score was assigned.
Fast thinking (System 1)
— Daniel Kahneman's term for automatic, intuitive, pattern-matching thought. System 1 is fast and ofte…
Fast Track
— Marks content that is essential for readers who want the core ideas without the full elaboration. If…
fast-and-frugal heuristics
— simple decision rules that use minimal information, minimal computation, and minimal time, yet often…
Fast.ai
— Practical deep learning - Top-down approach - https://www.fast.ai/
Fast.ai - Practical Deep Learning for Coders
— https://www.fast.ai/ - Free, practical deep learning course - Top-down teaching approach
Fast.ai NLP Course
— Free online course - Modern deep learning focus - Practical projects
Fast.ai Practical Deep Learning
— https://www.fast.ai/ - Practical, code-first approach to deep learning
FastAPI
— A modern, high-performance web framework for building APIs. If you train a model and want to serve p…
FastAPI backend
— 15 API endpoints, SQLAlchemy ORM, Alembic migrations 2. **React frontend** — Built with Vite, commun…
FastAPI Documentation
— Excellent official docs at fastapi.tiangolo.com.
Faster to write
— you express intent, not mechanics - **Faster to run** — pandas operates on entire columns at once us…
Fastest inline code completion while typing
— GitHub Copilot 2. **Complex multi-file changes from the terminal** -- Claude Code or Aider 3. **All-…
FASTSRT disqualifiers
— any of these prevent FASTSRT activation:
FASTSWITCH YES
— Uses the SWITCH phase to swap shadow datasets rather than copying data back. Requires that DEFINE NO…
Fat tails
— A property of probability distributions where extreme events are far more likely than a normal (Gaus…
Fatalism
— the belief that suffering in this world was God's will and that the proper Christian response was pa…
FATF Virtual Assets Contact Group publications
— Guidance on KYC for crypto asset service providers (CASPs) — relevant as crypto regulation expands.
fault-tolerant quantum computing (FTQC)
— a quantum computer with enough high-quality logical qubits to run textbook algorithms like Shor's fa…
Favor OO COBOL when:
— You are building a significant new subsystem (not modifying existing code) - Your team has OO experi…
Favor procedural COBOL when:
— You are maintaining existing production code - Your team is procedural-only - Your compiler has limi…
Favored archetypes:
— High-usage scorers with good efficiency - Point forwards with versatile stats - Shot-blocking rim pr…
favorite-longshot bias
— the tendency of casual bettors to overbet longshots (because the potential payoff is exciting) and u…
FBref
— Free aggregated statistics for major leagues. Good for learning to work with player/team statistics.…
FBref Expected Stats Guide
— Comprehensive metric explanations - xA and SCA definitions - League-wide data access - Link: fbref.c…
FBref Goalkeeper Statistics
— Type: Free resource - Features: Aggregated goalkeeper statistics
FBref Progressive Stats Guide
— Detailed metric definitions - League-wide data - Position benchmarks - Link: fbref.com
FBref/StatsBomb Definition:
— Passes that move the ball toward the opponent's goal by at least 10 meters from their starting point…
FC Python
— https://fcpython.com/ - Comprehensive soccer analytics tutorials - xG model building walkthrough - V…
FC Python Tutorials
— Soccer analytics in Python - Data collection and analysis - Beginner-friendly approach - Link: fcpyt…
FCA Enforcement Actions Database
— Searchable database of FCA final notices, including market manipulation enforcement - Available at: …
FCA Market Conduct Sourcebook (MAR)
— FCA's implementation guidance for market abuse prevention and surveillance obligations - Chapter MAR…
FCA Market Watch Newsletter
— Regular publications addressing surveillance expectations, observed market behaviours, and thematic …
FD
— File Description. A DATA DIVISION entry that describes the attributes and record layout of a file de…
FD (File Description) Clauses:
— **RECORDING MODE:** `F` (fixed), `V` (variable), `U` (undefined), `S` (spanned). Most COBOL files us…
Fear of intimacy
— A habitual tendency to avoid emotional closeness due to anticipated vulnerability, loss, or inadequa…
Fear of Missing Out (FOMO)
— The pervasive apprehension that others are having more rewarding experiences; associated with lower …
Fearless Fund
— fearlessfund.com A venture fund specifically investing in women of color entrepreneurs at the pre-se…
Feasibility
— This is the honesty check. A plan that assumes you'll grow from zero to 500,000 followers in six mon…
Feasibility (1-10):
— Data readiness — availability, quality, accessibility (0-3 points) - Technical complexity — model co…
FEAT
— The Monetary Authority of Singapore's Fairness, Ethics, Accountability and Transparency framework fo…
feature clustering
— grouping correlated features together and replacing each cluster with a single representative or agg…
Feature Engineering
— [ ] Score differential (primary feature) - [ ] Time remaining transformations (log, sqrt) - [ ] Poss…
Feature engineering for match prediction:
— Rolling averages of xG, xGA over the last $n$ matches (typically $n = 5$ or $n = 10$). - Elo or Pi-r…
Feature extraction
— Measuring the unique geometry of each face: the distance between the eyes, the shape of the jawline,…
Feature Flag
— A technique that allows enabling or disabling features in production without deploying new code. Use…
feature importance
— a score for each feature indicating how much it contributed to the model's predictions. This is comp…
Feature Importance Methods
— Permutation importance - SHAP values - Built-in importance
Feature leakage
— using a team's full-season win percentage to predict mid-season games. At game 40, you would only kn…
Feature Selection
— [ ] Shot location (x, y or distance + angle) - [ ] Defender distance at release - [ ] Shot clock - […
features
— measurable characteristics that might help distinguish spam from legitimate email. Engineers identif…
Features (known at application time):
— `credit_score`: Applicant's credit score (300-850) - `annual_income`: Self-reported annual income - …
Features to Consider:
— Distance to goal - Angle to goal - Shot technique - Match context (score, time)
Features:
— EPA per drive graph - Cumulative team EPA comparison - Key play identification (highest EPA moments)…
Federal Benefits (Sandra/Marcus):
— Eligibility verification → Mainframe (Sandra's pilot proved this — Section 34.4) - Benefits calculat…
Federal Benefits Administration (FBA)
— A federal government benefits system at Social Security/IRS scale. FBA's systems are the hardest mod…
Federal Coal Mine Health and Safety Act of 1969
— a landmark law that established, for the first time, mandatory federal health and safety standards f…
Federal economic development programs
— through the ARC, the POWER Initiative, and other channels — directed funds to McDowell County for in…
Federal Government (US):
— **FISMA (Federal Information Security Modernization Act):** Requires agencies to implement contingen…
Federal Reserve Operating Circulars 4, 6, and 8
— governing ACH, Fedwire funds, and FedNow participation - **NACHA Operating Rules** — the rule book f…
Federal tax obligations:
— **All winnings are taxable.** This includes winnings from sports betting, casino games, fantasy spor…
Federated Learning of Cohorts (FLoC)
— later replaced by the **Topics API** after FLoC was withdrawn following significant criticism.
Federated social media
— A network of interoperable servers built on the ActivityPub protocol (including Mastodon and Bluesky…
Federated systems
— from the European Union to federated databases to the federal structure of the United States governm…
Fee Assessment
— Score: 19. Two access paths (monthly batch and online inquiry), moderate data intensity. Implement a…
Fee structure (as of 2024-2025):
— **Trading fees**: 0% — Polymarket does not charge trading fees on most markets - **Gas fees**: Polyg…
Fee structure (play money / Mana):
— **Trading fee**: Dynamic based on liquidity pool mechanism - **No explicit fees**: Costs embedded in…
Fee structure (Sweepcash):
— **Redemption fee**: Varies by redemption method - **Trading cost**: Embedded in AMM pricing
Fee structure:
— **Trading fee**: 0% on trades themselves - **Profit fee**: 10% of profits on each market - **Withdra…
FEE_SCHEDULE
— Fee definitions for products and services.
feedback loop
— the AI's predictions become self-fulfilling prophecies. The data bias is not a one-time problem; it …
feedback loops
— cycles in which the system's biased output becomes the input for future training, reinforcing and am…
Feedback-seeking
— inviting information from others about their experience of you shrinks the Blind Spot and expands th…
Feeling thermometer
— A survey question that asks respondents to rate their warmth or coolness toward a person, group, or …
Fees and friction
— trading fees, winner's fees, and the bid-ask spread — erode your edge. The fee-adjusted EV formula s…
feme sole trader
— a married woman who, with her husband's consent (or sometimes by court order), could conduct busines…
Feminist standpoint epistemology
— The methodological position (associated with scholars including Sandra Harding and Dorothy Smith) th…
fentanyl
— a synthetic opioid approximately fifty to a hundred times more potent than morphine. Fentanyl was ch…
Fermi energy
— the energy of the highest occupied state.
Fermi sphere
— a sphere in $\mathbf{k}$-space of radius $k_F$. The condition that this sphere contains exactly $N$ …
Fermi velocity
— about 1/300 the speed of light.
Fermi's golden rule
— Ch 21.3 The transition rate from state $|i\rangle$ to a continuum of final states $|f\rangle$ under …
Fermi-Dirac applications:
— **White dwarfs:** Electron degeneracy pressure supports the star against gravitational collapse, up …
Fermion
— Ch 15.2 A particle with half-integer spin ($s = 1/2, 3/2, \ldots$). The wave function for identical …
Fermions (spin-1/2):
— Quarks: $u, d, c, s, t, b$ (each in 3 colors) + antiparticles - Leptons: $e, \mu, \tau, \nu_e, \nu_\…
FERPA (Family Educational Rights and Privacy Act)
— A US federal law enacted in 1974 that protects the privacy of student education records and gives pa…
FERPA does not directly regulate EdTech companies
— it regulates schools. If a school fails to impose adequate data protection requirements on its EdTec…
ferromagnetism
— the phenomenon that makes permanent magnets possible. Understanding it carefully is essential becaus…
FETCH
— Retrieves data rows from a table using RIDs provided by a child operator (usually IXSCAN). If you se…
Fetch, Parse, Transform, Output
— four stages, each with a clear responsibility.
Fetishization (racial)
— attraction to members of a racial group based on stereotypes that reduce individuals to racial arche…
few-shot multimodal learning
— learning new tasks from just a few interleaved image-text examples in the context window.
Few-Shot Prompting
— A **prompting** technique that provides the AI with several examples of the desired input-output pat…
Fewer calls to DB2
— Each call has fixed overhead for thread management, authorization checking, and result formatting 2.…
Feynman Lectures on Physics, Vol. III
— freely available at feynmanlectures.caltech.edu. Feynman's treatment of quantum mechanics starts wit…
Feynman Lectures on Physics, Vol. III, Ch. 4
— "Identical Particles." Feynman's discussion of the symmetrization postulate and its consequences. - …
Feynman's path integral formulation
— a completely different way of thinking about quantum mechanics. Instead of a wave function evolving …
FIAWOL
— "Fandom Is A Way Of Life" — was coined in the 1940s, representing one position in an ongoing debate …
FIBA Basketball
— https://www.fiba.basketball/ - International competition statistics
FICO score
— The dominant U.S. credit scoring model, produced by Fair Isaac Corporation, using five categories of…
Fiction film as propaganda vehicle
— The analytical insight that fiction films, by operating through narrative identification and suspens…
fiddle
— the same instrument as the violin, but with a different name, a different repertoire, and a differen…
FIDO2/WebAuthn
— Phishing-resistant by design (bound to the legitimate domain) > - **Number matching** — For push not…
Field Autopsy: Economics
— the field that mathematicized its theories to the point of unfalsifiability and responded to its gre…
Field Autopsy: Nutrition Science
— the field that made everyone distrust science.
Field Autopsy: Psychology
— the field with the most dramatic recent correction.
Field data manager
— The campaign staff member responsible for ensuring data flows correctly between the field organizing…
field experiment
— an experiment conducted in real-world conditions rather than a laboratory. This is its greatest stre…
Field Goal Attempt (52 yards):
— Expected make probability: ~60% - Make: +3 points, opponent gets ball at 25 = +3 - 0 EP ≈ +3.0 - Mis…
Field Goal Decision:
— [ ] Calculate distance (LOS + 17) - [ ] Check kicker's range accuracy - [ ] Assess weather/condition…
Field naming inconsistencies eliminated
— every program now uses the same field names (modulo prefix), making cross-program debugging and impa…
Field position matters most
— "Don't give them a short field" 2. **Take the points** - A field goal is "certain" points 3. **Trust…
Field Review: Trish McGovern
— **Section 1: Summary Finding**
Field specifications
— Each field in the input file is mapped to a column with its position, data type, and length. This fi…
Field theory (Bourdieu)
— Pierre Bourdieu's theoretical framework treating social life as structured fields in which agents co…
Field Tilt
— The proportion of a team's passes or touches that occur in the opponent's defensive third, indicatin…
FIFA EPTS (tracking data)
— Pitch dimensions: actual metres (105 x 68 for standard pitches) - Origin: centre of the pitch (0, 0)…
Figurative constant
— A COBOL reserved word representing a specific value: ZERO/ZEROS/ZEROES (numeric or character zero), …
Figure
— The top-level container in matplotlib, representing the entire canvas.
File 1: `player_stats.csv`
— Per-game statistics for 150 players across 30 teams.
File 2: `team_records.csv`
— Season records for all 30 teams.
File Description (FD) entries
— **WORKING-STORAGE data definitions** - **LINKAGE SECTION parameters** (for subprogram interfaces) - …
file drawer problem
— the non-significant results are stuck in researchers' file drawers, invisible to the scientific comm…
File matching/merging
— Two sorted files are interleaved to produce a single sorted output.
file object
— a Python object that represents a connection to a file on disk.
File recovery approaches:
— **MFT-based recovery:** If the MFT entry still exists, the file metadata is intact even though the f…
FILE SECTION
— The section of the DATA DIVISION that contains FD entries and their associated record descriptions f…
FILE STATUS
— A two-byte data item defined in the FILE-CONTROL paragraph that receives a status code after every I…
FILE STATUS IS status-variable
— Specifies a two-character field that receives the result of every I/O operation on this file. As Cha…
FILE STATUS IS ws-variable
— This is the most important clause for production-quality code. It tells COBOL to store a two-charact…
File storage
— saving outputs (reports, exports, processed data) somewhere accessible 2. **Shared data** — reading …
File System Tools
— `read_file(path)`: Read file contents - `write_file(path, content)`: Write or overwrite a file - `ed…
FILE-CONTROL
— The paragraph within the ENVIRONMENT DIVISION's INPUT-OUTPUT SECTION that associates COBOL internal …
File-Owning Region (FOR)
— Owns VSAM files and other CICS-managed resources. FORs handle file I/O requests from AORs via functi…
Fileless Malware:
— PowerShell scripts in process memory - .NET assemblies loaded entirely from memory - WMI event subsc…
Files:
— [Chapter Content](part-01-foundations/chapter-01-attention-economy/index.md) — ~10,000 words - [Exer…
filial piety
— found in many Asian, African, and Latin American cultural traditions — describes the moral obligatio…
Fill material
— soil brought in from elsewhere to grade a site — is the wildcard. Fill quality varies enormously. Pr…
FILLER
— A COBOL reserved word used as a data-name for data items that do not need to be referenced by name. …
Film Evaluation Best Practices
— What scouts look for - Position-specific criteria - Projection principles
Film Remains Essential
— Box scores showed the Pistons won - Film showed how and why they won
Filming strategy:
— Day 1: Film a specific drawing with deliberate camera angle, lighting, and framing. Choose a recogni…
FILTER
— Applies a predicate to filter rows. Typically used for predicates that cannot be pushed down to the …
filter bubble
— a personalized information universe that reinforces your existing preferences and shields you from d…
Filter replacement frequency:
— 1-inch filters: Check monthly, replace every 1–3 months - 4-inch deep-media filters: Replace every 6…
filtered report
— apply filters first, then generate the report on the filtered subset. *(Chapters 5, 6)*
Filters
— built-in transformations applied with the pipe character:
Final 15 minutes: Teach it.
— Explain cellular respiration out loud, as if teaching a friend who's never heard of it. If she stumb…
Final book state:
— Bids: Order 1 — Buy 20 at $0.50 - Asks: Order 3 — Sell 5 at $0.52 - Spread: $0.52 - $0.50 = $0.02 …
FINAL CALL
— Guarantees DB2 will make the CLOSE call even if the query is cancelled. Without this, you risk resou…
Final Checks:
— [ ] Spell-check completed (including technical terms) - [ ] No tracked changes or comments remaining…
Final decision:
— [ ] HIRE — first choice - [ ] SECOND CHOICE — hold while first choice confirmed - [ ] ELIMINATE — re…
FINAL EXAM
— Cumulative, 120 minutes.
Final Portfolio due end of Week 9.
— ## Week 10: Capstone Presentations and Final Exam
Final Solution
— using bureaucratic euphemism ("resettlement," "special treatment") and restricting information flows…
Finals Adjustment:
— Moved Tucker into starting lineup against Suns - Reduced Lopez minutes against smaller Phoenix lineu…
FinanceForward Threat Model:
— Identify FinanceForward's crown jewels: What would APT29 want from a financial services company? Con…
Financial calculation checks:
— Are all monetary calculations performed in COMP-3 (packed decimal)? - Are rounding rules applied con…
Financial confrontations:
— State your salary target before the other party states theirs (anchoring); treat "no flexibility" as…
Financial Control:
— [ ] Do they work exclusively for you? - [ ] Can they make their own profit or loss decisions? - [ ] …
Financial cost:
— Each confirmatory workup costs approximately $800-$1,200 in specialist visits and lab tests. - Total…
Financial distress indicators
— estimated credit score ranges, debt-related consumer patterns, income volatility markers — are commo…
Financial functions
— ANNUITY and PRESENT-VALUE -- replace complex formulas with single function calls for loan payment an…
Financial hygiene:
— Separate business account - Invoice professionally for all brand payments - Track income and expense…
Financial outcomes:
— Commercial revenue growth: PSG's commercial revenue increased significantly post-Neymar - Shirt sale…
Financial patterns
— penny distribution, compound interest, loan amortization, claim proration — all require careful atte…
Financial readiness:
— [ ] 24 months of documented, categorized revenue records - [ ] Clear separation of personal and busi…
Financial Services (EU):
— **DORA (Digital Operational Resilience Act):** Effective January 2025, DORA requires EU financial en…
Financial warning signs:
— Betting more than he can afford to lose (defined as money allocated for essentials like rent, food, …
Financial/Economic Markets:
— Average spreads: 2-4 cents (will the Fed raise rates?) - Spreads tighten leading up to announcements…
Financial:
— **GBP 20 million (approximately $26 million)** fine from the UK Information Commissioner's Office (I…
FinCEN BOI Compliance Guide for Small Entities
— FinCEN's own compliance guide for small companies subject to CTA reporting. Useful as a practitioner…
FinCEN Exchange
— US public-private information sharing program facilitating dialogue between financial institutions a…
Find a policy document in your real life
— an expense reimbursement policy, a return policy, a service-level agreement, a pet policy for an apa…
Find comparable by matching:
— Size within 2" height, 10 lbs weight - Speed within 0.05s - Similar production profile
Find the Traceback
— read bottom to top (CEEMAIN → main → subprograms → failure) 2. **Find "Exception" status** — that's …
Find your most valuable fans
— the comments with the highest positive sentiment tend to come from your most engaged community membe…
Finding a Mentor:
— Look for someone 5-10 years ahead of you on the career path you want to follow - Approach potential …
Finding closed from prior audit:
— The 2016 finding about the outdated DR plan was formally closed. The IG acknowledged "significant im…
Finding Documentation:
— Every finding follows a consistent template: ID, title, severity, CVSS, affected systems, descriptio…
Finding requiring attention:
— IMS recovery still depends on a small team (3 people). While this is improved from the previous sing…
Finding:
— 42% of carries came when ahead by 7+ (clock-killing mode) - EPA was -0.12 when ahead (low-value carr…
Findings and Recommendations:
— Prioritized list of findings - Each finding includes: description, evidence, business impact, ATT&CK…
Findings from the academic literature:
— **Favorite-longshot bias.** Longshots (unlikely outcomes) tend to be slightly overpriced, and favori…
Findings:
— The diagonal has the highest values (each position is most similar to itself). - Off-diagonal values…
Fine structure
— Ch 18.1 The splitting of hydrogen energy levels due to relativistic corrections and spin-orbit coupl…
fine structure constant
— one of the most important dimensionless numbers in all of physics.
Fine-Tuning
— The process of further training a pre-trained AI model on a specific dataset to specialize its behav…
FineWeb / FineWeb-Edu
— Description: High-quality filtered web text from HuggingFace, with an educational content subset par…
Finextra
— Trade publication covering financial services technology broadly, with RegTech as a regular theme.
Finite square well:
— Finite number of bound states. Wavefunctions penetrate into classically forbidden regions. - Transce…
fire
— deliberate, controlled burning of the forest understory — to manage the landscape. Burning cleared t…
fire door
— it must be code-compliant (typically 20-minute rated). Do not substitute a hollow-core door. - Full …
fire-sale externalities
— a classic reinforcing loop). Lower asset prices triggered more margin calls. More margin calls force…
FireEye
— a private cybersecurity company. FireEye detected the intrusion when they noticed that their own red…
Firehose of falsehood
— RAND/StratCom analysis of Russian propaganda strategy: high-volume, high-speed, internally contradic…
Firmware Attacks:
— Firmware extraction and reverse engineering - Hardcoded credentials and encryption keys - Command in…
First 15 seconds:
— What hook type is used (question, contrast, story-in-progress, bold claim, demonstration, problem)? …
First 5 Games Post-Injury:
— Record: 0-5 (from 1-3 with Rodgers/pre-injury) - ATS Record: 1-4 - Average margin: -8.2 points - Mod…
First 8 Weeks:
— Combined opponent record: 63-73 (.463) - Adjusted for strength: Effectively +1.5 SOS - Expected reco…
First Edition
— *"The best way to understand AI is to build it."*
First Edition � 2026
— *Covering GnuCOBOL 3.x and IBM Enterprise COBOL 6.x*
First Half (Games 1-41):
— Role: Sixth man - Minutes per game: 24 - Net Rating On: +6.5 - On/Off: +8.2
First Line (Operations):
— Who receives pentest findings? - Who is responsible for remediation? - What SLAs should apply?
First month — systems assessment:
— **Change all locks or rekey them.** Previous owners, contractors, and neighbors may have keys. - **S…
First quantization approach:
— The wavefunction is $\Psi(\mathbf{r}_1, \sigma_1, \mathbf{r}_2, \sigma_2, \ldots, \mathbf{r}_{100}, …
First Quarter:
— Minutes 0-6: Starting five - Minutes 6-12: First substitution wave (typically two bench players)
First Role: Analyst, NFL Team
— Salary: $58,000 (significant cut from finance) - Responsibilities: Opponent analysis, draft evaluati…
First-Attempt Success Rate
— Whether the AI produces usable code on the first try 2. **Iteration Count** — How many follow-up pro…
First-Come, First-Served (FCFS)
— process tasks in the order they arrive. This is a queue.
First-mover advantage
— The competitive benefit gained by being the first actor to enter a new market, technology, or domain…
First-order in time
— so that the probability density $\rho = \psi^\dagger\psi$ is automatically positive-definite, just a…
First-output scoring:
— Used directly with minor edits: 1.0 - Good foundation, moderate editing needed: 0.7 - Useful but sig…
First-party cookie
— A cookie set and readable only by the website the user is directly visiting.
FISA (Foreign Intelligence Surveillance Act)
— A US federal law enacted in 1978 establishing a special court (the FISA Court) that authorizes surve…
Fiske (1992)
— "Cultural economy of fandom": distinguished financial economy (money) from fan cultural economy (soc…
FISMA High
— the most stringent baseline, because a compromise or outage could result in "severe or catastrophic …
Fit the regression line:
— Slope: $b_1 = r \cdot \frac{s_y}{s_x}$ - Intercept: $b_0 = \bar{y} - b_1\bar{x}$ - Equation: $\hat{y…
fitness
— a measure of how successfully that organism survives and reproduces in its environment. Natural sele…
Fitness indicator hypothesis
— The evolutionary argument that humor production signals underlying cognitive resources and genetic q…
Fitness landscape
— See *adaptive landscape*. The mapping of possible configurations to their fitness or performance; or…
Five Civilized Tribes
— a term that itself reflects the assimilationist framework of the era, as if "civilization" were some…
Five Core Questions
— The CML framework: Who created this message? What creative techniques attract attention? How might d…
Five filters
— The five structural mechanisms in the Propaganda Model through which information is biased before re…
Five Major Approaches to Tuning
— **Pythagorean:** Pure fifths everywhere except one "wolf fifth" that absorbs the entire comma - **Ju…
Five recurring themes
— the Hype-Reality Gap, Human-in-the-Loop, Data as Strategic Asset, Build vs. Buy, and Responsible Inn…
Five security levels work together
— sign-on, transaction, resource, command, and surrogate security are complementary layers, not altern…
Five self-awareness practices
— the conflict journal, the pre-confrontation self-check, the body-scan awareness practice, the post-c…
Five-Layer Model
— A framework identifying five simultaneous levels of any conflict: triggering event, stated positions…
Five-part anatomical framework
— The analytical structure used throughout this book: source, message content, emotional register, imp…
FiveThirtyEight
— Game predictions - WP methodology articles - https://fivethirtyeight.com/
FiveThirtyEight - NBA
— https://fivethirtyeight.com/sports/nba/ - Data-driven NBA analysis and prediction models
FiveThirtyEight CARMELO Projections
— Documentation: https://fivethirtyeight.com/features/how-our-nba-projections-work/ - Silver, N. & Fis…
FiveThirtyEight Data
— Curated datasets - Sports focus - https://github.com/fivethirtyeight/data
FiveThirtyEight NFL Elo Methodology
— https://fivethirtyeight.com/methodology/how-our-nfl-predictions-work/ - Detailed Elo implementation …
FiveThirtyEight RAPTOR
— Documentation: https://fivethirtyeight.com/features/how-our-raptor-metric-works/ - Successor to CARM…
FiveThirtyEight Soccer SPI Model
— fivethirtyeight.com/methodology/how-our-club-soccer-predictions-work Documentation of FiveThirtyEigh…
FiveThirtyEight Sports
— Statistical sports analysis - Football Elo ratings and predictions - Visualization examples
FiveThirtyEight Sports Data
— Curated sports datasets - Methodology documentation - https://github.com/fivethirtyeight/data
Fix approaches:
— Verify all called programs are in the STEPLIB/JOBLIB/link list. - Check that the CALL target is corr…
Fix it with:
— Combining conditions using `and` / `or` - Guard clauses: check disqualifying conditions first, retur…
Fix:
— Ensure Docker Desktop has at least 4 GB of memory allocated (Settings > Resources > Memory). - Alway…
fixation
— the tendency to persist with an approach that isn't working, unable to see alternatives.
Fixed appliances:
— Electric range (10 kVA nameplate, NEC table at 8 kW for single unit) = 8,000 VA - Electric dryer (5,…
Fixed Components (10 games):
— 6 divisional games (each team 2x) - 4 games vs one division in each conference (rotating annually)
Fixed mindset
— Dweck's term for the implicit belief that abilities are fixed traits that cannot be substantially ch…
fixed mindset response
— interpreting a setback as evidence of permanent limitation rather than as information about what she…
Fixed-format
— The traditional COBOL source format where specific columns have designated purposes: 1--6 (sequence …
Fixed-Point Arithmetic
— Arithmetic operations performed on numbers with a fixed number of decimal places, as opposed to floa…
Fixes:
— Use `python3 my_script.py` instead of `./my_script.py`. - If you must run it directly: `chmod +x my_…
flag (include debug information) and optionally
— debug** (enable runtime checks) or **-fdebugging-line** (compile D-lines):
Flag any ambiguous variables
— ones where the classification isn't clear-cut. Write a sentence explaining why you chose the classif…
Flag any valve that won't operate
— it needs replacement before it's needed in an emergency. A stuck shutoff valve is no shutoff valve a…
FLAG(I)
— show all messages (Informational and above) - **FLAG(W)** -- show Warnings and above - **FLAG(E)** -…
Flags (on/off indicators):
— End-of-file indicator - First-record indicator - Application-valid indicator - Individual validation…
flak
— the term Chomsky and Herman used for organized criticism, harassment, and legal pressure directed at…
flashbulb memories
— vivid, detailed memories of where you were and what you were doing when you heard dramatic news. The…
Flashing and transitions:
— Visible gaps at chimney flashing - Metal that appears to be lifting, corroded, or separated - Valley…
Flashlight or headlamp
— essential for attic, crawlspace, mechanical room, and under-sink inspection. A headlamp is better be…
Flask
— A lightweight Python web framework for building web applications and APIs. Known for its simplicity …
Flat Files (Parquet, CSV, JSON):
— Best for individual analysis projects and data sharing - No infrastructure overhead - Easy to versio…
flat minima
— regions where the loss is low across a wide neighborhood of parameter values. - **Large batches** pr…
Flattens emotion
— eliminates vocal dynamics that create emotional engagement - **Loses authority** — upward inflection…
Flesch-Kincaid Grade Level
— A readability formula that estimates the US school grade level required to understand a text, based …
FLICC
— Fake experts, Logical fallacies, Impossible expectations, Cherry picking, Conspiracy theories: Cook'…
Flickering at low dim levels
— **Strobing** (rapid on-off flashing) - **Buzzing from the bulb or the switch** - **Limited dimming r…
Flip sign
— In extreme cases, the coefficient can reverse direction entirely. A variable that appeared to *incre…
Flirtation
— Playful or ambiguous behavior that signals romantic or sexual interest while maintaining deniability…
Floating point precision
— financial calculations have rounding traps: ```python import pytest
Flooded, not just upset:
— Repetition: returning again and again to the same point, often with increasing intensity, regardless…
Floor Condition
— Walk slowly across every floor surface, particularly in areas that receive moisture (kitchens, bathr…
Floor General:
— PTS/100: 20, TS%: 0.560 - AST%: 45, TOV%: 16 - USG%: 22, 3PAr: 0.30
Flow
— Csikszentmihalyi's concept of the state of complete absorption in a challenging, skill-matched activ…
Flow and curiosity
— Csikszentmihalyi's flow state (Chapter 2) requires clear goals and immediate feedback. Curiosity gap…
Flow state
— Mihaly Csikszentmihalyi's concept of complete, effortless absorption in a challenging activity. Flow…
Flow states
— described by Csikszentmihalyi as optimal experience characterized by complete absorption, effortless…
fluency
— the ease with which you process the text. Each rereading makes the words more familiar, the sentence…
Fluent Python, 2nd Edition
— Luciano Ramalho (O'Reilly, 2022)
Fock space
— a direct sum of $n$-particle Hilbert spaces for all $n = 0, 1, 2, \ldots$ — and operators can create…
Fock state (number state)
— Ch 4.4, Ch 34.2 An eigenstate of the number operator: $\hat{N}|n\rangle = n|n\rangle$. For the harmo…
Fock states
— and $n$ is the number of photons in that mode. From this single idea, an extraordinary edifice follo…
Fock states vs. coherent states
— the HOM effect requires Fock state inputs ($|1,1\rangle$). Coherent state inputs produce no HOM dip.
Focus group
— A small-group qualitative research method in which a moderator facilitates discussion among 6–12 par…
Focus on reliability
— Real-time sports systems must work during the game—reliability is paramount.
Focused
— tests one behavior, not five 2. **Independent** — doesn't depend on other tests or shared state 3. *…
Focused (spotlight) attention
— narrow, concentrated, directed. When you are trying to solve a difficult problem, read a complex tex…
Fogg Behavior Model
— Fogg's framework: B = MAP; behavior occurs when Motivation, Ability, and Prompt are simultaneously p…
Follow the style guide
— practitioner tone, second person, encouraging but direct 3. **Respect the citation honesty system:**…
Follow the style guide:
— Narrative tone: story-driven, never smug - Second person for engagement, first person plural for ana…
Follow-Through Funnel
— The sequence of touches a new follower experiences as they move from first discovery through engagem…
Follow-Up Resources
— AI ethics policy document - Quick reference cards (see Appendix G) - Contact information for AI ethi…
Follow-Up:
— Provide support for remediation questions (typically included in engagement fee for 30 days) - Docum…
Follower Churn
— The rate at which an account loses followers over a given period. Some follower loss is normal; sust…
Following TCP Streams:
— Right-click on any packet in a TCP connection and select "Follow > TCP Stream" to see the complete c…
FOMO (Fear of Missing Out)
— fear that others are having more rewarding experiences; amplified by social media content
Fonagy (mentalizing / reflective function)
— Peter Fonagy's concept of the capacity to understand behavior in terms of underlying mental states; …
food frequency questionnaires (FFQs)
— asking participants to recall and estimate their average consumption of dozens or hundreds of food i…
Food:
— A chest freezer (3 cubic feet) served as a long-term backup food store: he kept it 90% full of froze…
foodways
— the full complex of food-related practices, including production, preservation, preparation, and con…
Foot-in-the-door technique
— Commitment/consistency influence technique: beginning with a small request to establish compliance, …
Football Analytics Blog
— Technical deep dives into football metrics.
Football Analytics Summit Proceedings
— Annual conference papers - Industry best practices - Emerging methodologies
Football Analytics Tutorials
— Multiple community repositories - Search: "football analytics python" - Example notebooks and code
Football examples:
— **Right-skewed**: Individual play yards, player salaries, recruiting rankings - **Left-skewed**: Com…
Football Outsiders
— https://www.footballoutsiders.com/ - Pioneering football analytics site - DVOA metric and analysis -…
Football Outsiders Methods
— Documentation of professional football analytics methodologies at footballoutsiders.com/methods.
Football Path
— Playing or coaching experience - Transition to analytical role - Credibility with football people
Football Perspective
— `https://www.footballperspective.com/` - Historical kicking analysis - Fourth-down tendencies - Stat…
Football Skills:
— Understanding of schemes and strategy - Familiarity with positions and roles - Knowledge of league s…
Football Slices / McKay Johns
— Data visualization and analytics content focused on making complex analysis accessible and visually …
Football Study Hall (SB Nation)
— Recruiting efficiency metrics - Development analysis - https://www.footballstudyhall.com/
Football Writers Association of America
— All-America selections - Award voting
Football-Data.co.uk (football-data.co.uk)
— Free downloadable CSV files with historical match results and bookmaker odds for major European socc…
Football-Data.co.uk:
— Historical match results and betting odds for dozens of leagues - Covers many leagues back to the 19…
Football-Specific Knowledge
— Offensive and defensive schemes - Personnel groupings and formations - Down-and-distance strategy - …
footballmodelling.net
— A community resource for football prediction models, including implementations of Dixon-Coles and re…
For "no, they are not real instruments":
— What is lost when the physical coupling between performer body and vibrating material is removed? - …
For "yes, they are real instruments":
— Begin with the acoustic output question: if the output is acoustically identical, what makes the sou…
For $2p_{1/2}$ ($l = 1$, $j = 1/2$):
— Relativistic: $-2.64 \times 10^{-5}$ eV - Spin-orbit: $-3.01 \times 10^{-5}$ eV - Darwin: $0$ eV (be…
For $2s_{1/2}$ ($l = 0$, $j = 1/2$):
— Relativistic: $-1.47 \times 10^{-4}$ eV - Spin-orbit: $0$ eV (because $l = 0$) - Darwin: $+2.26 \tim…
For 3 AM waking:
— If awake 20+ minutes: get up, do quiet non-stimulating activity, return when sleepy - Write the thou…
For abandoning p-values:
— The ASA's 2016 statement on p-value misuse - The role of p-values in the replication crisis - Bayesi…
For AI developers and data scientists:
— Ethics by design: building fairness considerations into the development process - Documentation obli…
For AI product managers, evaluate:
— Problem prioritization — given five potential AI projects, how do they evaluate and rank them? - Sta…
For AI-generated code:
— Run the code and test it against known inputs and expected outputs - Review the logic — does it actu…
For AI-generated images:
— Look for telltale artifacts: extra fingers on hands, inconsistent text, impossible physics - Check m…
For all employees:
— Appropriate reliance on AI outputs: when to defer, when to question - Recognizing potential AI error…
For all platforms:
— Clear and transparent terms of service - Notice-and-takedown mechanisms for illegal content - Transp…
For analytical essays (10.21, 10.23):
— Quality of argument and engagement with chapter concepts: 40% - Use of evidence and specific example…
For analytical exercises (9.1, 9.3, 9.4):
— Accuracy of conceptual definitions: 30% - Quality of reasoning and argument: 40% - Use of evidence f…
For anxiety:
— *Psychoeducation:* Understanding the anxiety maintenance loop (avoidance, safety behaviors, interoce…
For any text claim:
— [ ] **Verify citations independently.** If the content references studies, statistics, or expert quo…
For Attackers/Red Teams:
— Reduced AD enumeration from hours to minutes - Automatically identified attack paths invisible to ma…
For bad events (the critical analysis):
— Permanent vs. temporary ("This will always be this way" vs. "This happened this time") - Pervasive v…
For Basketball Beginners
— NBA.com beginner's guide - YouTube tutorials on basketball fundamentals - Watch several games with c…
For Binary Predictions:
— **Accuracy:** % correct predictions - **Brier Score:** Mean squared probability error (lower = bette…
For Black defendants who did NOT reoffend:
— 44.9% were incorrectly classified as medium or high risk (false positive rate)
For Black defendants who DID reoffend:
— 28.0% were incorrectly classified as low risk
For borrowing clubs:
— Access talent they cannot afford to purchase - Fill short-term squad gaps without long-term commitme…
For campaign decision-making under uncertainty:
— A 75% win probability means a real 25% loss probability — plan for it - Scenario analysis tells you …
For campaign strategy:
— Campaigns operating in unfavorable structural environments face a steeper climb; campaigns in favora…
For case analyses (10.5, 10.9, 10.13):
— Accuracy of economic analysis: 30% - Depth of case research: 30% - Connection to chapter concepts: 2…
For centers (Position = 5):
— Higher expected BLK% and DRB% - Blocks weighted slightly less (expected production) - Steals weighte…
For civic and political engagement:
— Recognize that state-sponsored operations primarily target existing divisions and grievances — the e…
For civic participation:
— Recognize that voter suppression messaging specifically targets your participation — the claim that …
For classification (e.g., churn prediction):
— Value of a true positive = value of the intervention (e.g., retained revenue) minus the cost of the …
For clutch as a skill:
— What evidence supports this view? - What psychological factors might enable clutch performance?
For data scientists, evaluate:
— Problem framing ability — give a vague business scenario and assess how the candidate structures the…
For Defenders:
— Provided visibility into AD attack surfaces for the first time - Enabled proactive remediation of at…
For depression:
— *Behavioral activation:* Systematically scheduling and engaging in activities that provide a sense o…
For design exercises (9.13, 9.14, 9.16):
— Creativity and feasibility of design: 30% - Grounding in evidence and theory: 30% - Consideration of…
For different emphases:
— *Policy focus*: Spend extra time on Chapters 9, 12, 13, 17, and 19. Add a policy brief assignment. -…
For Dome/Warm Weather Teams (NO, LV, ARI, etc.):
— Ramirez becomes more attractive - his weaknesses are mitigated - Anderson still valuable for consist…
For each email, specify:
— Send timing (immediate / Day 2 / Day 5 / etc.) - Subject line (include a test A/B variant) - Opening…
For each entry, specify:
— Abend code - Context (which jobs/steps it applies to, or ALL) - Recovery action (RESTART_STEP, EXTEN…
For each exterior door, record:
— Location and type (entry, patio/sliding, garage man door) - Core type if known (solid vs. hollow) - …
For each factor, compute the "partial score"
— the contribution of that factor to the overall score, holding all other factors at their observed va…
For each item on your list:
— Who holds the data? (Your device? The app company's cloud? Your employer?) - Did you read the privac…
For each item with unclear or weak ownership:
— Can this be formally assigned to your business entity? - Should it be trademarked? - Is it currently…
For each platform, document:
— Follower/subscriber count - Posting frequency (how many posts in the last 7 days) - Average engageme…
For each role:
— Write the full role assignment prompt (using the templates from Section 9.19 as a guide) - Run the p…
For each scenario, work through:
— What does the capital do that revenue cannot? - What are the costs (financial, strategic, creative) …
For each stakeholder group, specify:
— **Engagement method:** What process will be used? Options range across a spectrum from information p…
For each study session:
— After studying (immediately): rate your confidence for each topic, 1-4 scale. - The next day (delaye…
For each tension, apply all five frameworks:
— Utilitarian: Who benefits, who is harmed, and by how much? - Deontological: Are any rights violated?…
For each tier, specify:
— Product name and format (course, template, membership, service, etc.) - Target buyer (who is this fo…
For each transaction, specify:
— Number of screens and their purpose - COMMAREA structure - TSQ usage (if any) - TDQ usage (if any) -…
For each tripping circuit, propose a solution:
— Load redistribution (move some devices to a different circuit)? - Add a new circuit? - Repair or rep…
For each window, record:
— Location (which room, which wall direction — north, south, east, west) - Type (double-hung, casement…
For efficiency:
— If we could identify winning tickets before training, we could train much smaller networks from the …
For EIFS (synthetic stucco):
— Note any areas where the surface seems to flex when pressed gently - Check around windows and doors …
For election analysis:
— Start any race analysis with a structural baseline before looking at polls. What do economic conditi…
For empirical exercises (9.5, 9.6, 9.7):
— Understanding of research methods: 35% - Critical evaluation of evidence: 35% - Identification of li…
For Essential Entities:
— Administrative fines up to 10 million euros or 2% of total worldwide annual turnover - Supervisory p…
For evaluating election-related information:
— Apply the source question: Who is claiming election irregularities? Do they have specific evidence, …
For evaluating media and information:
— Apply the source origin question to all information: who created this, for what audience, with what …
FOR EXCEPTION
— Names the table to check and an exception table where violating rows are copied. You must create the…
For Executive Audiences:
— Frame adversarial examples as "model manipulation" that can cause incorrect decisions - Frame prompt…
For factual claims, verify before sharing:
— Trace claims to primary sources (the actual study, the actual quote, the actual event) rather than s…
For fans:
— Understanding game dynamics - Historical comparisons
For fiber cement:
— Any chips, cracks, or impact damage? - Examine cut ends at corners, around windows, and at grade-lev…
For full-time hunters:
— Bug bounty income is variable and unpredictable - Build a financial buffer (6+ months of expenses) b…
For guards (Position = 1-2):
— Lower expected BLK% - Blocks weighted more heavily (rare production) - Steals weighted at baseline
For images:
— [ ] **Check image metadata** using a tool like Jeffrey's Exif Viewer — authentic photographs carry m…
For Important Entities:
— Administrative fines up to 7 million euros or 1.4% of total worldwide annual turnover - Generally su…
For Large Data (> 1 GB):
— Store on cloud storage (S3, Google Cloud, etc.) - Version with timestamps in filenames - Document da…
For large platforms (medium-tier):
— Notice and action mechanisms with user appeals - Additional transparency reporting - Cooperation wit…
For lending clubs:
— Develop young players through competitive experience - Reduce wage bill for surplus players - Mainta…
For managers and business leaders:
— Questions to ask before deploying AI - Your accountability for AI outcomes in your area - The procur…
For media:
— Broadcast graphics - Storytelling - Fan engagement
For Medium Data (10 MB - 1 GB):
— Use Git LFS (Large File Storage) - Or keep data separate and document how to obtain it
For ML engineers, evaluate:
— System design — given a model and a set of requirements, how would they design the production system…
For music, this means:
— Information theory can tell us how predictable each note is given its context, but it cannot tell us…
For MVP-Level Players:
— Higher premiums (injury risk more impactful) - Career-ending coverage options - Performance decline …
For network theory:
— *The Tipping Point* by Malcolm Gladwell — engaging introduction to network dynamics (note: some clai…
For new websites — write a site architecture plan:
— What pages does your initial site need? (Homepage, About, Lead Magnet Landing Page, Contact) - What …
For one-way ANOVA:
— df1 = k - 1 (number of groups minus 1) - df2 = N - k (total observations minus number of groups)
For opinions and interpretations:
— Label them clearly as your perspective, not as fact - Show your work — what information led you to t…
For Patterson's Team:
— Need to scheme more explosive plays - Current efficiency won't win against elite defenses - Consider…
For policy analysis:
— Evaluate counter-disinformation proposals against both their claimed effectiveness and their potenti…
For policy proposals (10.12, 10.18):
— Problem identification and framing: 25% - Policy mechanism specificity and feasibility: 35% - Analys…
For probability intuition:
— *How Not to Be Wrong* by Jordan Ellenberg — accessible, brilliant mathematics with real-world applic…
For producing polls that enter aggregations:
— Methodological transparency improves quality ratings and ultimately quality weighting - Disclosing l…
For quantitatively advanced students:
— Direct them to the "Advanced" and "Deep Dive" boxes, which provide greater mathematical depth. - Cha…
For quantitatively anxious students:
— Reassure them that the *concepts* are more important than the mathematics. They need to understand w…
For reading aggregations:
— Always look at which polls are included, not just the headline average - Check whether aggregators a…
For reading probabilistic forecasts:
— Read the confidence interval or scenario range, not just the win probability headline - Ask: what co…
For regression (e.g., demand forecasting):
— Under-prediction cost = lost sales, stockouts, missed revenue opportunities - Over-prediction cost =…
For regularization:
— The lottery ticket hypothesis suggests that much of the network's capacity is redundant. Regularizat…
For Rivera's Team:
— Increase deep attempts (his deep ball EPA is solid) - Better pass protection would amplify his produ…
For serendipity:
— *The Serendipity Mindset* by Christian Busch — the current leading scientific treatment
For Small Data (< 10 MB):
— Include in Git repository - Track changes with normal commits
For Spread Predictions:
— **MAE:** Mean absolute margin error - **RMSE:** Root mean squared error (~11-12 points typical) - **…
For stucco (traditional):
— Any hairline cracks? Map their width and location (thin hairlines vs. structural-concern-width crack…
For TalkTalk:
— **$77 million (GBP 60 million)** in total costs (remediation, customer compensation, lost revenue) -…
For Teams Needing Immediate Contributors:
— Weight floor over ceiling - Focus on athletes who can defend - Be cautious of "project" prospects
For Teams Needing Kickoff Help:
— Sterling provides dual value - Consider carrying Sterling as kickoff specialist alongside another FG…
For Teams with Multiple Second-Round Picks:
— Use model-identified prospects as primary targets - Accept higher bust rate for upside - Draft-and-s…
For teams:
— In-game decision making - Player evaluation - Game planning
For Technical Audiences:
— Provide specific attack parameters (epsilon values, query counts, success rates) - Include reproduci…
For the 23 programs with inline definitions:
— Each of the 23 programs must be individually edited to add the new field - Each edit must be reviewe…
For the 62 programs using the copybook:
— Update the CUSTOMER-RECORD copybook once - Recompile all 62 programs (the new field is automatically…
For the Attackers:
— The 15-year-old received a 12-month youth rehabilitation order - A 16-year-old accomplice received s…
For the luck-skill debate:
— *The Success Equation* by Michael Mauboussin — the most systematic treatment of luck vs. skill acros…
For the media/platform context (Part II):
— Tim Wu, *The Attention Merchants* — the history of attention capture - Or any recent journalism abou…
For the philosophical foundations (Part I):
— Plato's *Meno* (short, freely available) — on the nature of knowledge - Carl Sagan, *The Demon-Haunt…
For the political context (Part VI):
— Steven Levitsky & Daniel Ziblatt, *How Democracies Die* — democratic backsliding context
For the psychological foundations (Chapters 3–5):
— Daniel Kahneman, *Thinking, Fast and Slow* — particularly Chapters 1, 11, and 12
For the psychology of luck:
— *The Luck Factor* by Richard Wiseman — the foundational popular book on luck science; some of the re…
For Thompson's Team:
— Continue aggressive downfield approach - Work on reducing interceptions in standard situations - Lev…
For Those Wanting More Context
— *The Book of Basketball* by Bill Simmons: Entertaining history - *Basketball on Paper* by Dean Olive…
For understanding generalization:
— The hypothesis suggests that what matters is not the total number of parameters but the structure of…
For vinyl siding:
— Any cracked, broken, or missing panels? - Panels that have pulled away from the wall or are no longe…
For white defendants who did NOT reoffend:
— 23.5% were incorrectly classified as medium or high risk
For white defendants who DID reoffend:
— 47.7% were incorrectly classified as low risk (false negative rate)
For white defendants:
— Among those who did not reoffend: approximately 23% were scored high risk (false positives) - Among …
For wireless attacks (Chapter 25):
— USB Wi-Fi adapter with monitor mode and packet injection support - Recommended chipsets: Realtek RTL…
For wood siding:
— Any areas of paint failure (peeling, cracking, blistering)? - Probe suspected soft areas with a scre…
For You Page (FYP)
— a full-screen, vertically scrolling feed of short-form videos selected by the platform's recommendat…
Forcible exposure to success
— literally physically moving learned-helpless dogs to the other side of the shuttle box — helped them…
Forecaster A:
— (0.9 - 1)² = 0.01 - (0.9 - 1)² = 0.01 - (0.9 - 0)² = 0.81 - (0.6 - 1)² = 0.16 - (0.6 - 0)² = 0.36 Su…
Forecaster B:
— (0.7 - 1)² = 0.09 - (0.7 - 1)² = 0.09 - (0.3 - 0)² = 0.09 - (0.65 - 1)² = 0.1225 - (0.35 - 0)² = 0.1…
Forecasting can:
— Extrapolate existing trends using principled mathematical methods - Quantify the typical uncertainty…
Forecasting cannot:
— Predict unprecedented events (recessions, pandemics, competitor actions) - Be more accurate than the…
Foreign keys create relationships
— a column in one table holds the primary key of a row in another table. This is how you link customer…
Forensic surveillance
— Retrospective surveillance that uses stored data to reconstruct past behavior, movements, or communi…
Foresight
— systematic methods for identifying possible futures and their governance implications - **Engagement…
Forest
— forestapp.cc A phone-blocking app that gamifies focus: you "plant a tree" when you start studying, a…
forest communities
— each adapted to a specific combination of elevation, aspect (which direction a slope faces), moistur…
Forgetting `fig.tight_layout()` before save/show
— labels get cut off - [ ] **Bar chart y-axis not starting at zero** -- visually misleading - [ ] **Ov…
Forgetting `r` prefix
— `"\b"` is a backspace; `r"\b"` is a word boundary 2. **Using `re.match()` when you mean `re.search()…
Forgetting `return`
— function prints instead of returning, caller gets `None` 2. **Mutable default argument** — `def f(it…
Forgetting `self`
— every method needs it as the first parameter, every attribute access uses `self.` 2. **Mutable class…
Forgetting `super().__init__()`
— parent attributes never get set, causing `AttributeError` later 2. **Using inheritance when composit…
Forgetting to activate venv
— Packages install globally instead of in project 2. **Not pinning versions** - Builds become non-repr…
Forgotten recompilation
— Changing a copybook without recompiling all consuming programs leads to data corruption.
Form validation
— Manual validation as shown earlier works for simple cases. WTForms with Flask-WTF provides robust va…
Formant
— A resonant frequency peak in the spectral envelope of a sound, produced by resonances of the vocal t…
formants
— amplify specific frequency ranges in the singer's harmonic series while suppressing others. Differen…
Format and style requirements:
— Use a professional business report format with clear section headers - Open with a one-paragraph exe…
Format changes:
— No talking. Ever. Natural process sounds only. - Camera distance: 6-12 inches from subject (macro te…
Format experiments:
— Length: Try one video 20% longer than your baseline. Try one 30% shorter. Do length changes affect c…
Format licensing
— you have developed a show format (a specific type of challenge, a competition structure, a distinct …
Format specifiers
— the code after `:` inside `{}` — control how the value is displayed:
format virality
— the video's value wasn't just in being watched but in being *replicated*. The viral coefficient was …
Format:
— PDF is the standard delivery format (prevents accidental editing) - Include clickable hyperlinks in …
FORMATION
— [ ] **1. Choose your state of formation.** In most cases, form in the state where you live and prima…
forms of capital
— and these forms are mutually convertible, though the conversions are often invisible.
Formula:
— Gas: $/BTU = (Gas price per therm) ÷ (AFUE × 100,000 BTU/therm) - Heat pump: $/BTU = (Electricity pr…
Formulas are best when:
— The answer needs to be exact (not approximate) - You need to compute the answer quickly (simulation …
Forrester Research
— various reports on mainframe modernization and workforce planning. Available through organizational …
Forrester: The State of Mainframe
— Industry analysis of mainframe economics, talent, and technology trends.
Fortune telling
— Predicting a negative future outcome as though it were certain.
Fortune's Wheel (Rota Fortunae)
— A pre-modern metaphor for fate, depicting a wheel turned by the goddess Fortuna (or Fortune), raisin…
Forward pass (from Section 11.3.2):
— **z**^[1] = [0.5, -0.45, 0.1]^T - **a**^[1] = ReLU(**z**^[1]) = [0.5, 0.0, 0.1]^T - *z*^[2] = 0.6 - …
Forwarding limit
— WhatsApp's 2019 design intervention restricting "frequently forwarded" messages to five contacts max…
Forwards:
— Moderate historical efficiency - "Stretch four" revolutionized power forward position - Small forwar…
Foundation (Days 1-7)
— Platform chosen: _______________ - Channel name: _______________ - First 3 video concepts (ranked): …
Foundation chapters are non-negotiable
— Chapters 1-6 provide the vocabulary and conceptual toolkit for everything else 2. **Each remaining p…
foundation models
— large models pre-trained on broad data that can be adapted to a wide range of downstream tasks. This…
Foundations of Political Analytics
— The age of political data, history of polling, political data ecosystem, thinking like an analyst 2.…
Foundations Phase
— the period where initial pilot projects prove (or disprove) the value of ML for specific business pr…
Founded / launch date:
— **Primary platform:** - **Secondary platform(s):** - **Current monthly revenue:** $ - **Revenue targ…
Four career paths
— data analyst, data scientist, ML engineer, and data engineer — with honest descriptions of daily wor…
Four COBOL programs
— recompile against the new copybook 2. **Java web portal** — update the ClaimRecord Java class 3. **P…
four criteria
— The cluster of standards used in this chapter to assess persuasion ethics: truthfulness of claims, r…
four different public health intervention programs
— a vaccination-focused campaign, a nutrition education program, a community fitness initiative, and a…
Four Families, Four Vibrating Elements
— Chordophones: stretched strings (harmonic series, determined by Mersenne's Laws) - Aerophones: air c…
Four Horsemen (Gottman)
— John Gottman's term for four communication patterns predictive of relationship dissolution: contempt…
Four Minute Men
— Network of 75,000 CPI-organized volunteer speakers who delivered standardized pro-war messages in th…
Four regulatory approaches
— command-and-control, principles-based, co-regulation, and self-regulation — each carry distinctive s…
four smaller clients had sporadic revenue
— appearing in only two or three months of the year. Maya had been treating these as "active clients."…
Four weeks after deployment:
— Sandra had not sent Priya a "can you pull the sales numbers" message once - The finance team process…
Four-fifths rule
— A regulatory heuristic under which a selection (approval) rate for a protected group that is less th…
Fourier series
— A mathematical representation of a periodic function as a sum of sinusoidal components (harmonics) a…
Fourier transform
— A mathematical transformation that decomposes a time-domain signal into its constituent frequency co…
Fourth Amendment
— Constitutional protection against unreasonable searches and seizures; requires warrants based on pro…
Fourth Down Decision:
— [ ] Calculate conversion probability - [ ] Determine EP for success - [ ] Determine EP for failure -…
Fourth Quarter:
— Snow tapered slightly - Buffalo added field goal - Colts unable to mount drives
Fowler-Nordheim tunneling
— tunneling through a triangular barrier.
Foxfire Approach to Teaching
— a methodology in which students learn academic skills (writing, research, interviewing, editing, pho…
Foxfire archives
— Particularly strong for material culture and community traditions in southern Appalachia - **Louie B…
fragile against targeted attack
— or, more relevant to cascading failures, fragile against the failure of a hub.
Fragile to maintenance
— If a programmer adds a paragraph between 2100 and 2199, it becomes part of the THRU range. This is a…
Fragility
— The property of being harmed by volatility, uncertainty, and stressors; the opposite of antifragilit…
Fragmentation indicators:
— z/OS: REORG REPORTONLY output, NEARINDREF/FARINDREF in RTS - LUW: REORGCHK output, OVERFLOW and F1-F…
fragmented
— each concept exists as an isolated skill in her memory, disconnected from the others and from any re…
frames
— interpretive schemas that define a problem, assign blame, and suggest solutions — that resonate with…
Frames are physically failing
— rotted wood frames, cracked vinyl, frames that are pulling away from the rough opening. At this poin…
Framework and Libraries:
— FastAPI for the endpoint - Pydantic v2 for request/response models - SQLAlchemy 2.0 with async sessi…
Frameworks/
— Bundled frameworks and dynamic libraries.
framing
— how she positioned the same type of content to activate share triggers.
Framing and Composition
— what your eyes see first, and how to control it.
Framing effect
— The phenomenon in which the way an issue is presented — the words used, the aspects highlighted, the…
Framing Language That Works
— "I want to share something that's been affecting my performance..." (work) - "I'd like to understand…
Framing quality:
— Studs that are straight, plumb, and set consistently — walls without bow or waviness - Blocking inst…
France created quality chances
— Their average shot was worth 0.12 xG (league average ~0.09) - They generated the 3rd highest total x…
France Defenders (Varane, Umtiti)
— Both benefited from excellent midfield structure - France's tactical setup encouraged build-up from …
France:
— PPDA: 16.8 (low pressing) - Defensive line: 42.1m (deep) - High turnovers: 3 - Possession: 38.6%
Frances Haugen
— The Facebook whistleblower who disclosed tens of thousands of internal documents in 2021 showing the…
Franchise Impact:
— Lost championship window (2012-15 Bulls were contenders) - Ticket/merchandise revenue decline - Dimi…
Fraternal organizations
— lodges, social clubs, women's auxiliaries — created networks of support and solidarity. These organi…
Fraud detection engine
— needs transaction changes within 2 seconds of commit 2. **Data warehouse loader** — needs all table …
Fraud detection trigger flow
— end-to-end design from wire transfer submission through event capture, fraud scoring, and alert gene…
Fraud Scoring (currently 40 min serial):
— 2 partitions for resilience - Target: 18-20 minutes per partition - Independent of interest calculat…
FRAUD_INVESTIGATION
— Parallel investigation process for flagged claims. | Attribute | Type | Notes | |-----------|------|…
Fraunhofer lines
— are caused by elements in the Sun's cooler outer atmosphere absorbing specific wavelengths from the …
Free and Rebind strategies:
— **REBIND** — Optimizes using current statistics. If an error occurs (e.g., a table was dropped), the…
Free Black communities
— Communities of free people of African descent in antebellum Appalachia, formed through manumission, …
free clinic movement
— volunteer-staffed clinics that provide basic medical, dental, and vision care to people who cannot a…
Free Induction Decay (FID)
— a damped sinusoid at the Larmor frequency. This is precisely analogous to the ring of a struck bell:…
Free particle:
— Continuous spectrum. Plane waves are not normalizable. - Physical states are wave packets. They move…
Free rider problem
— A situation in which individuals benefit from a collective resource without contributing to its main…
Free throw percentage: 64.9%
— Well below the 70% threshold - Risk multiplier: 1.30 - This was THE critical data point that models …
Free throw percentage: 84.9%
— Elite FT% strongly correlates with NBA three-point shooting - Projected shooting improvement likely
Free tool workflow for brand-consistent visuals.
— **Canva** (free tier is adequate for most creators): build brand templates with your colors and font…
Free-format
— A COBOL 2002 source format that removes column restrictions, allowing code to start in any column. I…
Freedmen's Bureau
— formally the Bureau of Refugees, Freedmen, and Abandoned Lands — was established by Congress in Marc…
Freedom
— freedom.to A distraction blocker that works across all devices. Schedule focus sessions in advance a…
Freedom papers
— Legal documents proving a free Black person's status, required to be carried at all times and essent…
Freelance and Consulting:
— Independent consulting offers higher income and flexibility but requires business skills - Bug bount…
Freelancers Union
— freelancersunion.org The Freelancers Union is not a traditional labor union but an advocacy organiza…
Freelancers Union Legal Services Partnership
— freelancersunion.org The Freelancers Union maintains partnerships with attorneys who offer discounte…
FREESPACE(ci-percent ca-percent):
— `ci-percent` — Percentage of each CI to leave free during initial load or reorganization. Free space…
Freeze Frame
— A snapshot of all player positions at the moment of a key event (e.g., a shot), providing spatial co…
freeze_panes
— A worksheet property that makes a specific row and/or column remain visible while the rest of the sh…
Freezing Rain/Sleet:
— Most dangerous condition - Extreme footing issues - Rarely played through (games postponed)
Frequency
— The number of complete oscillation cycles occurring per second, measured in hertz (Hz). For sound, f…
frequency analyzer
— it performs in biological tissue what a spectrum analyzer does electronically, decomposing a complex…
Frequency vs. mode number plot
— showing the linear relationship fₙ = n × f₁ for a string. This plot makes the harmonic series visual…
Frequentist methods
— p-values, confidence intervals, hypothesis tests -- dominate scientific practice. A p-value is the p…
Frequentist probability
— An interpretation of probability as the long-run frequency of outcomes over many repeated trials. Co…
FREQVAL COUNT 20 MOST
— Collects the 20 most frequently occurring values for each column. This helps the optimizer recognize…
Freygish mode
— the Phrygian dominant scale; fifth mode of the harmonic minor; characteristic of klezmer and Arabic …
friction
— are the moments when the viewer is pulled out of the experience and reminded that they're watching a…
Friday (1 hour):
— Engage with comments on Thursday's pillar content - Review analytics from the week
Friend A (modeler) likely biases:
— **Overconfidence:** Friend A may be too certain that the model is sound and dismiss Friend B's conce…
Friend B (bankroll provider) likely biases:
— **Loss aversion:** The pain of watching a 12% decline in capital is psychologically more intense tha…
Friends of Tracking
— Academic tutorials - Code implementations - Research presentations - Link: youtube.com/friendsoftrac…
Friends of Tracking - Defensive Metrics Tutorial
— Platform: YouTube - Focus: Python implementation of defensive metrics - Level: Intermediate
Friends of Tracking - Set Piece Analysis Tutorial
— Platform: YouTube - Focus: Python implementation of set piece analysis - Level: Intermediate
Friends of Tracking Data Science
— github.com/Friends-of-Tracking-Data-Science Open-source implementations of various soccer analytics …
Friends of Tracking GitHub
— github.com/Friends-of-Tracking-Data-Science Open-source implementations of pitch control models, Vor…
Friends of Tracking Lecture Series
— YouTube playlist. A multi-part lecture series covering tracking data analysis, including Voronoi dia…
Friends of Tracking Tutorials
— https://github.com/Friends-of-Tracking-Data-FoTD - Code from video tutorials - xG model implementati…
Friends of Tracking YouTube Channel
— Video tutorials on soccer analytics - xG and pass analysis implementations - Python code examples - …
Friends of Tracking: Computer Vision Series
— YouTube playlist. Practical tutorials on applying CV techniques to soccer, including player detectio…
Friendship is foundational
— the strongest predictor of long-term satisfaction in Gottman's studies is the quality of the friends…
friendship-to-romance pathway
— the tendency in lesbian courtship for relationships to develop from existing friendship, with a grad…
Frisson
— A pleasurable tingling sensation, often described as "chills" or "goosebumps," experienced in respon…
FROM
— Identify the source table(s) 2. **WHERE** — Filter individual rows 3. **GROUP BY** — Form groups (co…
From 3,000 to 18,600 followers in four months
— 6.2x growth during a period when her content quality and posting frequency stayed the same. The only…
From Chapter 12 (Privacy and Surveillance):
— We examined the GDPR and CCPA as privacy regulations. How do these privacy-specific regulations inte…
From Chapter 4 (Data):
— How does the concept of "data is never neutral" apply to the surveillance data collected by systems …
From Chapter 6 (Computer Vision):
— We learned that computer vision systems identify patterns in images. How does understanding how thes…
From Chapter 7 (AI Decision-Making):
— We learned that AI decisions are probability estimates, not truths. How does this insight change how…
From Chapter 9 (Bias and Fairness):
— In Chapter 9, we discussed how different definitions of fairness can conflict. Apply this to facial …
From charting services (PFF, SIS):
— Individual player grades - Pressures allowed per player - Run blocking grades by zone - Penalties
From mechanics, you should be comfortable with:
— Newton's laws and their application to one-dimensional and two-dimensional motion - Energy conservat…
From Model to Production — MLOps
— The deployment gap · MLOps overview · Model serving patterns · Monitoring and drift detection · Feat…
FROM path OF DEL
— Loads from a delimited file. Other formats: ASC (fixed-position), IXF (DB2 exchange format), CURSOR …
From play-by-play:
— Sacks and QB hits allowed - Rushing yards and success rates - Time to throw (via tracking) - Scrambl…
From the attic:
— In daylight, look for pinpoints of light coming through the decking — indicates holes or gaps - Look…
From the club's perspective:
— Longer contracts protect the transfer value asset - Longer contracts lock in current wages (benefici…
From the player's perspective:
— Longer contracts provide income security - But limit future earning potential if performance improve…
From tracking data (Next Gen Stats):
— Time in pocket - Yards before contact - Separation at catch point
Front Office
— Support contract negotiations - Inform draft strategy - Advise on trades
front stage
— the region of social life where performances occur, where we consciously present a managed version o…
Frontal lobe
— executive function, planning, voluntary movement, language production; contains the prefrontal corte…
Frontend
— React: https://react.dev - Next.js: https://nextjs.org/docs - MDN Web Docs: https://developer.mozill…
Frontend Technologies:
— HTML/CSS framework (Bootstrap, Tailwind, Material UI) - JavaScript framework (React, Angular, Vue.js…
Frontend:
— React.js single-page application - Next.js for server-side rendering - Hosted on Vercel
frontiersman
— these iconic figures of Appalachian identity are defined by a masculinity that leaves no room for qu…
Frozen Dataclass
— A Python **dataclass** with `frozen=True`, making instances immutable and hashable. Useful for value…
FTC (Federal Trade Commission)
— US government agency that regulates advertising and commercial endorsements, including creator spons…
FTC Disclosure
— A requirement from the US Federal Trade Commission that creators clearly and conspicuously disclose …
FTC Endorsement Guides (Updated 2023)
— federalregister.gov The Federal Trade Commission's updated Endorsement Guides are the primary regula…
FTC.gov
— for marketing disclosure requirements, endorsement guidelines, advertising standards - **HHS.gov** —…
Fugue
— A contrapuntal compositional technique in which a subject (short melodic theme) is introduced in one…
Full alertness
— high arousal, focused attention - **Relaxed awareness** — lower arousal, diffuse attention - **Mind-…
Full Citations:
— Russakovsky, O., Deng, J., Su, H., et al. (2015). ImageNet large scale visual recognition challenge.…
Full creative freedom AND mainstream visibility
— AO3's content policy allows the full range of fan creative tradition; Twitter and Instagram's advert…
Full packet capture (PCAP):
— Complete recording of all network traffic - Highest fidelity but enormous storage requirements - Too…
Full Pipeline
— Build end-to-end pipeline: Kafka → Stream Processor → Redis → WebSocket → Dashboard.
FULL YES
— Full image copy. Omit for incremental. - **SHRLEVEL REFERENCE** — Allows concurrent read access but …
Full-back / wing-back metrics add:
— **Crosses per 90 and cross accuracy** - **Carries into the final third per 90** - **Assists and xA p…
Full-text search
— `tsvector`, `tsquery` for searching document content - **JSON columns** — store and query JSON data …
Fully Autonomous:
— Immutable smart contracts - No governance or upgradeability - No identifiable operator
Fully Centralized (e.g., Kalshi):
— Central operator controls all functions - Clear regulatory entity - Traditional enforcement tools ap…
fully collateralized
— the total capital posted by both sides always equals the maximum payout.
Fully Indoor (8 teams):
— AT&T Stadium (Cowboys) - Caesars Superdome (Saints) - Mercedes-Benz Stadium (Falcons) - U.S. Bank St…
fully transcribed
— a complete, verbatim written record of the spoken conversation. Transcription is labor-intensive (ex…
Fumbles:
— "Fumbles" vs "Fumbles Lost" - Some sources count both, others only lost fumbles
function
— but the function lives on a server thousands of miles away. When you log into a website with your Go…
FUNCTION ACOS(argument)
— Returns the arc cosine (in radians). Argument must be between -1 and 1.
FUNCTION ASIN(argument)
— Returns the arc sine (in radians). Argument must be between -1 and 1.
FUNCTION ATAN(argument)
— Returns the arc tangent (in radians).
Function Calling
— An AI capability where the model can identify when a function (tool) should be called, generate the …
FUNCTION COS(argument)
— Returns the cosine of the argument (in radians).
Function creep
— The gradual expansion of a surveillance system's purpose beyond its original stated scope. Function …
FUNCTION DATE-OF-INTEGER-PART
— wait, the correct function is **FUNCTION YEAR-TO-YYYY** (available in some implementations) or the m…
FUNCTION SIN(argument)
— Returns the sine of the argument (in radians).
FUNCTION TAN(argument)
— Returns the tangent of the argument (in radians).
function words
— a grammatical category that includes:
functional fixedness
— not about a physical object, but about the concept of "interpretation" itself. She was fixed on inte…
functional morality
— the idea that a system can be a moral agent in a functional sense even if it lacks consciousness or …
Functional plasticity
— changes in which brain regions are recruited for particular tasks. After brain injury, undamaged reg…
Functional requirements:
— Read all projects from `maya_projects.csv` that are marked "Invoiced" and have an invoice date in th…
functional strategy
— how each function (marketing, operations, finance, HR) supports the business unit's competitive posi…
functions
— the mechanism for packaging your loop code into reusable, named units. The `generate_weekly_summary`…
Functions:
— `=RSQ(known_y's, known_x's)` — returns $R^2$ - `=SLOPE(known_y's, known_x's)` — returns $b_1$ - `=IN…
Fund Transfer
— Score: 22. Multiple access paths, high data intensity (debit account, credit account, transaction lo…
fundamental attribution error
— the tendency to attribute others' behavior to their internal dispositions while underweighting the s…
Fundamental frequency (F0)
— perceived as pitch — is influenced by testosterone during puberty. Women on average prefer lower-pit…
Fundamental frequency (f₀)
— The lowest frequency component of a complex periodic tone, which typically corresponds to the percei…
fundamental mode
— has the string bowing in a single arc, with nodes only at the fixed endpoints. The string fits exact…
fundamental particle
— the irreducible unit from which all larger structures are built. The symphony's four movements are a…
fundamental rights
— such as freedom of expression — there is an argument that it should be treated as high risk even if …
Fundamentals model
— An election forecasting model that predicts electoral outcomes using pre-campaign structural variabl…
Fundamentals prior
— A baseline estimate of electoral outcome based on structural factors (state lean, economic indicator…
Funding
— Who pays? What do they want? 2. **Research** — What gets studied? What's rewarded? 3. **Evaluation**…
Funding and conflict of interest:
— Who funded the research? Industry-funded research on media effects — particularly research produced …
Funnel
— A model representing the stages a potential audience member or customer moves through, from initial …
Funnel structure
— A question sequencing approach that begins with wide, open questions and progressively narrows towar…
furnace villages
— in otherwise rural areas. These villages had their own stores, housing, sometimes churches and schoo…
Further Reading
— Kahneman, Daniel. *Thinking, Fast and Slow*. Farrar, Straus and Giroux, 2011. - Duke, Annie. *Thinki…
Further Reading (further-reading.md)
— Annotated bibliography for going deeper. Includes original research articles, book chapters, and acc…
Further Reading:
— Turing, A. M. (1950). "Computing Machinery and Intelligence." *Mind*, 59(236), 433--460. - Copeland,…
fusiform face area
— neural hardware dedicated exclusively to face recognition. Your brain can detect and evaluate a face…
futarchy
— a form of governance in which prediction markets replace (or supplement) deliberation, debate, and v…
Future SOS (projected):
— Uses opponent power ratings - Accounts for home/away split - More stable than actual records
Fuzzing Enhancement:
— ML-guided fuzzers learn input grammars and target code paths more efficiently - Models trained on cr…
fuzzywuzzy / rapidfuzz
— Fuzzy string matching - Name standardization - https://github.com/maxbachmann/RapidFuzz - For matchi…
G
Gabor uncertainty principle
— An acoustic analog of the Heisenberg uncertainty principle, stating that a signal cannot be simultan…
gain-before-feedback
— is the fundamental limit of any live sound system.
Gait recognition
— A biometric surveillance technique that identifies individuals based on the distinctive pattern of t…
gambler's fallacy
— the belief that a losing streak makes a win "due" -- is a direct violation of this assumption.
Game 6 Summary:
— Total EP lost from suboptimal decisions: ~2.5 points - Final margin: 3 points - **Conclusion:** Cons…
Game Context
— Importance of field position - Clock management basics - Situational football (red zone, third down,…
Game Context:
— Date: June 19, 2016 - Teams: Cleveland Cavaliers vs Golden State Warriors - Series: Tied 3-3 - Stake…
Game Development:
— Game engines (Unity, Unreal, Godot) with built-in editors - Asset management tools (for sprites, mod…
Game Line:
— Total: 48.5 - Home team -3.5 - Home implied: 26.0 - Away implied: 22.5
Game Preparation
— Detailed opponent tendencies - Matchup-specific strategies - Real-time adjustments based on tracking…
Game Simulation
— using Monte Carlo methods to simulate thousands of game outcomes and generate probability distributi…
Game Stacks:
— QB + WR from same team - QB + WR + opposing WR (shootout stack) - RB + DEF opposing (blowout stack)
Game State
— The current score differential during a match, which influences team behavior (e.g., teams trailing …
Game Structure
— Four quarters, 15 minutes each - Four downs to gain 10 yards - Scoring: touchdown (6), PAT (1 or 2),…
Game Style Differences:
— Shorter three-point line (until recently harmonized) - Different foul rules - FIBA-style play tends …
Game Theory for Sports Analytics
— Platform: Various - Focus: Applying game theory to penalty analysis - Level: Intermediate
Game Time Actual:
— Temperature: 22°F - Wind: 22 mph, gusting to 35 mph - Heavy, lake-effect snow - Visibility: Poor (< …
Game-Level Data
— One row per game (or per team-game) - Traditional box score statistics - Compact and easy to work wi…
game-like elements
— achievements, competition, status markers — generates social currency because people want to show of…
Game-to-Game Recovery:
— Back-to-back game adjustments - Travel distance considerations - Practice intensity modifications
Gamelan Music
— The Gong Structure: Balinese and Javanese gamelan orchestras organize their music around a system of…
Games Rested:
— Home games: 8 (estimated lost ticket/concession revenue: $800K) - National TV games: 3 (league fines…
Gaming problem
— The risk that known explanation requirements enable organizations to design AI systems that produce …
Gamow peak
— the narrow energy window where fusion reactions actually occur. Gamow's tunneling theory is the foun…
Gamow's alpha decay theory
— the WKB tunneling formula applied to the nuclear Coulomb barrier explains half-lives spanning 24 ord…
GANDALF
— Google, Amazon, Netflix, DBS, Apple, LinkedIn, Facebook. The idea was not to compete with these tech…
GANDALF Days
— hackathon-like events where teams across the bank identified problems, built prototypes, and tested …
Gap Control Metrics
— Assignment-based evaluation - Yards before contact attribution - Scheme responsibility
Gaps between walls and ceilings or floors
— **Visible separation at the chimney** (chimneys settle independently of the house and can pull away …
Garage or outbuildings
— condition often reflects owner's general maintenance approach.
Garbage Time Effects
— Some statistics accumulated in blowouts (both directions) - Did not distinguish high-leverage from l…
GARP (Global Association of Risk Professionals)
— The FRM curriculum includes stress testing; GARP's publications and risk intelligence platform cover…
Gartner
— various reports on IT knowledge management, workforce planning, and mainframe strategy. Available th…
Gartner: Mainframe Modernization
— Annual reports on mainframe strategy and modernization approaches.
Gas and oil system annual tasks:
— Professional combustion analysis (measures combustion efficiency and CO in the flue) - Heat exchange…
Gate control theory
— Melzack and Wall's framework: pain experience is modulated by a "gate" in the spinal cord regulated …
Gate valve
— Looks like a round wheel or spigot handle. Requires multiple full turns to open or close. Common in …
Gatekeeper
— A person or institution with the power to control access to an opportunity, resource, or network. Ga…
Gatekeeping
— The function of editors, publishers, and broadcast standards personnel who control what content reac…
gates
— the forget gate, input gate, and output gate---each of which is a sigmoid-activated layer that outpu…
GATEWAY CHAPTER
— This chapter establishes the architectural foundation for all of Part III. Chapters 14–18 assume you…
Gateway topology
— Document the deployment: - Number of gateway nodes and their locations - External load balancer conf…
Gather artifacts
— copy the final versions of any code generated in the conversation. 3. **Start a new conversation wit…
Gauge bosons (spin-1):
— Photon $\gamma$ (electromagnetic) - $W^+, W^-, Z^0$ (weak) - 8 gluons $g$ (strong)
Gauge reading
— automatically monitoring analog pressure and temperature gauges
Gaussian boson sampling
— Xanadu's approach. Use squeezed states and linear optics to perform sampling problems believed to be…
Gaussian distribution
— The normal (bell curve) distribution that describes many natural phenomena with thin tails; dangerou…
Gaze aversion
— looking away — has a more complex role than simply indicating disinterest. Strategic gaze aversion c…
Gaze Cueing
— The visual attention effect where humans automatically direct their attention toward whatever the su…
GB00B1YW4409:
— Frequency test: 2,500,000 / 800,000,000 = 0.313% → Below 1%. **FAIL.** - Size test: 2,500,000 / 18,0…
GB00BH4HKS39:
— Frequency test: 380,000 / 45,000,000 = 0.844% → Below 1% threshold. **FAIL.** - Size test: 380,000 /…
GB00BJQSQH41:
— Frequency test: 95,000 / 12,000,000 = 0.792% → Below 1%. **FAIL.** - Size test: 95,000 / 580,000 = 1…
GBANK.TXN.NOTIFY
— Real-time transaction notifications to mobile app - **GBANK.INQUIRY.REQUEST** / **GBANK.INQUIRY.REPL…
GBP-dependent
— multiple members are accessing the pageset concurrently for read/write. Pages must flow through the …
GCDSALIM
— Maximum size of the GCDSA. Default is 256M. Increase for regions that heavily use coupling facility …
GCP Considerations:
— Smaller market share means fewer third-party integrations and a smaller community - Enterprise sales…
GCP Enumeration:
— Cloud Storage: `storage.googleapis.com/
` or `
.storage.googleapis.com` - Firebase dat…
GCP Strengths for AI:
— Deepest AI research heritage — many foundational ML innovations originated at Google - TPUs (Tensor …
GCP-Specific Vulnerabilities:
— Service account key files stored in code repositories - Overly permissive primitive roles (Owner, Ed…
GDG
— Generation Data Group. A z/OS dataset organization that maintains multiple versions (generations) of…
GDG Housekeeping Checklist
— Verify GDG limit is set appropriately (too low = premature rolloff, too high = wasted DASD) - Monito…
GDP per capita
— wealthier countries can afford both higher health spending and better vaccination infrastructure. (2…
GDPR
— General Data Protection Regulation; EU comprehensive privacy law establishing individual rights and …
GDPR (EU/EEA)
— **To the supervisory authority:** Within **72 hours** of becoming aware of the breach, unless the br…
GDPR (General Data Protection Regulation)
— The European Union's comprehensive data protection law, in force since May 2018, which establishes r…
GDPR requirements:
— Users must explicitly consent to their social media data being used for credit decisions (consent mu…
GDPS Configuration Design
— Select the GDPS technologies for each tier. Design the storage replication topology (how many sites,…
Gemini in Google Sheets
— workspace.google.com/products/gemini Available with Google Workspace Gemini add-on. Integrated direc…
Gemini:
— Strong at current information with web access - Can struggle with very long structured output consis…
Gender breakdown
— **Age range** - **Top territories** (geographic distribution) - **Follower activity:** Hour-by-hour …
Gender gap
— The difference in political preferences between men and women. In the United States, women have vote…
gender performativity
— the idea that gender is not an expression of some inner essence but a repeated enactment of norms — …
General contractor
— bid after plans and scope are defined 4. **Specialty trades** — either through the GC or independent…
General guidance:
— Use **COMP-3** for all monetary amounts and financial calculations - Use **COMP** for counters, subs…
General HFA research
— Understand fundamentals 2. **NFL-specific studies** - Football context 3. **COVID data analysis** - …
General ledger
— The master accounting record that contains all financial transactions of an organization, organized …
General Pattern:
— Most skills peak in mid-to-late 20s - Athletic attributes decline earlier than skill-based attribute…
General patterns across all platforms:
— All models hallucinate more on obscure topics, recent events, and specific numerical data - All mode…
General purpose
— good default | | 8192-16384 | Sequential access dominant, large records |
General-purpose LLMs
— GPT-4, Claude, Gemini, and their successors — are not COBOL-specific but are remarkably capable with…
Generalization
— performing well on new data — is the whole point. Everything else (the splits, the baselines, the co…
generalization effect
— that inoculation against one attack produces resistance to different attacks — was one of McGuire's …
generalization puzzle
— motivates much of the research discussed later in this chapter, including the double descent phenome…
generalized eigenstates
— elements of the larger space that satisfy the eigenvalue equation in a distributional sense.
generalized expectancies
— not fixed personality traits. He understood locus of control as a belief system that was formed thro…
Generate Your Own
— Create realistic synthetic events for testing:
Generates revenue
— you still need this to be a business, not just a hobby
Generating and plotting a pure sine wave at 440 Hz
— the simplest possible periodic sound, the "ideal" A note that real musical tones approximate but nev…
Generating Hypotheses
— Why do some teams perform better in the red zone? - What distinguishes elite receivers from average …
Generation
— Data is created through human activity, sensors, transactions, or deliberate collection. 2. **Collec…
generation effect
— by writing down what he knows first, he's strengthening existing memories and exposing specific gaps…
Generational cohort effects
— The influence of shared historical, technological, and cultural context on the values, behaviors, an…
Generational fan cultures
— the Gen X zine era, the Millennial LiveJournal era, the Gen Z Discord/TikTok era — carry different t…
Generational luck
— The luck of being born into a particular historical cohort with access to specific technological, ec…
Generational replacement
— the slow process by which older cohorts die and younger cohorts enter the electorate — is one of the…
Generative Adversarial Network (GAN)
— A machine learning architecture in which two neural networks — a generator and a discriminator — com…
Generative AI — Large Language Models
— The transformer story · How LLMs are trained · Capabilities and limitations · Hallucination · Major …
Generative AI — Multimodal
— Beyond text · Image generation (DALL-E, Midjourney, Stable Diffusion) · Audio and speech · Video gen…
Generative Model
— A model that learns the underlying distribution of data and can generate new synthetic examples. App…
Generative Models
— Ho, J., Jain, A., & Abbeel, P. (2020). "Denoising Diffusion Probabilistic Models." NeurIPS.
generative note-taking
— any approach to notes that forces you to generate something new rather than reproduce something old.…
generative processing
— your notes should contain *your* thinking, not just the speaker's words.
Generativity vs. Stagnation
— Erikson's Stage 7 psychosocial development task; the challenge of investing in the next generation v…
Generator
— The Hermitian operator $\hat{G}$ from which a continuous unitary transformation is built via exponen…
Generic ballot
— A survey question asking respondents whether they prefer to vote for the "Republican Party candidate…
Generic Profile:
— Protects multiple datasets matching a pattern using wildcard characters (`*` and `**`). - Example: A…
genetic algorithms
— computer programs that solve problems by imitating the process of natural selection. You start with …
Genius Sports (geniussports.com)
— Official data rights holder for many NCAA sports and several international leagues. Live data feeds …
Genogram
— A visual representation of family relationships across at least three generations; used in family sy…
Genre conventions:
— What genre is this? What conventions does it follow? What conventions does it break?
Gensim
— Topic modeling - Word2Vec, Doc2Vec - Large corpus handling
gentrification
— the process by which an influx of wealthier residents transforms a community's character and displac…
Genuine advantages of vinyl:
— No painting required — ever - Low routine maintenance (annual hosing off is typically sufficient) - …
Genuine advice videos
— but her advice was surface-level compared to creators who'd been building expertise 2. **Story time …
Genuine Apology Template
— six elements, structured but not scripted - **Forgiveness vs. Reconciliation Distinction Table** — c…
Genuine disadvantages:
— Cannot be repaired — only replaced. A damaged panel requires removing the panels above it to unlock …
Genuine empathy
— entering the other person's experience of the harm 5. **Commitment to change** — concrete indication…
Genuine enthusiasm
— visible fascination signals deep engagement with the material. People who don't care about a topic d…
Genuine question
— A question to which the asker genuinely does not know the answer; rooted in curiosity; creates safet…
Genuine success stories
— These are accurate information shared in good faith. They are not misinformation, disinformation, or…
genuinely endorsing the rationale
— understanding why it matters and actually caring about that reason.
Genuinely not required:
— Any prior knowledge of construction, engineering, or the trades - Math beyond arithmetic (a few chap…
Geofence warrant
— A type of search warrant that compels a technology company (typically Google) to provide law enforce…
Geographic "neutral" rivalries:
— NYG vs NYJ (same stadium) - LAR vs LAC (same stadium)
Geographic fit:
— Maya works remotely-first; local travel is acceptable - She requires virtual-first capability; if th…
Geographic Information System (GIS)
— Software systems that store, analyze, and visualize spatial data. In political analytics, GIS tools …
geographic isolation
— the mountains cut communities off from the broader currents of American culture, preserving older fo…
Geolocation
— The process of determining where a photograph or video was taken using visual features, maps, and ge…
geometric acoustic simulation
— computer software that models the behavior of sound in a proposed hall before a single stone is laid…
Geometric anomalies
— Shapes that don't fit their context. A circle among squares. A diagonal line in a field of horizonta…
geometric object
— often shortened to "geom" — is the visual mark that represents data on the chart. Common geometric o…
Geometric phase
— Ch 29.4, Ch 32.2 A phase acquired by a quantum state that depends on the geometry of the path traver…
Geophony
— sounds from the physical, non-living environment: wind, water, rain, thunder, geological activity. T…
Gephi
— Interactive visualization - Large network support - https://gephi.org/
German-speaking settlers
— primarily from the Palatinate region of southwestern Germany, but also from Württemberg, Baden, Hess…
GET
— retrieves data. Used when a user navigates to a URL. No side effects expected — the server should re…
Get game-time forecasts
— Not daily averages 2. **Use stadium location** - Not city center 3. **Check roof status** - Retracta…
Get Next (GN)
— Sequential retrieval. Moves forward in hierarchical sequence from the current position. Like a curso…
Get Next within Parent (GNP)
— Sequential retrieval constrained to the current parent. If you are positioned on a customer, GNP ret…
GET OUT AND CALL 911 NOW:
— You smell burning electrical odor (plastic/rubber burning smell) - You see smoke from any outlet, fi…
Get professional help if:
— You have a heat pump and are unfamiliar with O/B wiring - You need to run new wire (may involve wall…
Get Unique (GU)
— Direct retrieval. Jumps directly to a specific segment based on fully qualified SSAs. Like a SQL `SE…
Get user input
— what kind of conversion, and what value? 2. **Convert the value** — apply the right formula 3. **Dis…
GETMAIN
— A CICS command that allocates a block of storage. Used when a program needs dynamic memory beyond it…
ggplot2
— R visualization package - Publication-quality graphics - Special teams visualizations
ggplot2 / Matplotlib / Seaborn
— Creating EPA visualizations - Publication-quality graphics - Extensive documentation
ggraph
— ggplot2 for networks - Beautiful visualizations
ggsoccer (R)
— GitHub: Torvaney/ggsoccer - Use: Soccer pitch visualization in R
Ghigau
— usually translated as **Beloved Woman** or War Woman. The Ghigau held a seat in the council, had the…
ghost data
— information about people, places, or phenomena that were never recorded in the first place.
Ghosting
— Ending a relationship or ceasing communication without explanation; most common in early-stage digit…
Ghostwriting
— The practice of producing content — articles, scripts, newsletters — that is published under someone…
GIAC Certified Forensic Analyst (GCFA)
— **Focus:** Digital forensics, memory analysis, timeline analysis, advanced incident response - **Cos…
GIAC Certified Incident Handler (GCIH)
— **Focus:** Incident handling methodology, common attack techniques from a defender's perspective - *…
GIAC Penetration Tester (GPEN)
— **Vendor:** GIAC / SANS - **Cost:** ~$979 exam only; ~$8,525 with SANS SEC560 course - **Format:** 8…
GIAC Web Application Penetration Tester (GWAPT)
— **Vendor:** GIAC / SANS - **Cost:** ~$979 exam only; ~$8,525 with SANS SEC542 course - **Format:** 7…
Gift Card and Store Credit Abuse:
— If ShopStack supports gift cards, test for balance manipulation, code predictability, and transfer a…
Gift economy vs. market economy
— Fan patronage (Ko-fi, Patreon) and zine communities maintain gift economy characteristics even as th…
gift exchange
— A community event in which participants write fan works for assigned recipients; AO3's built-in coll…
Gift fic
— fan fiction written specifically as a birthday gift, a thank-you, or a treat for a specific person —…
Gifting
— The practice of brands sending products to creators without a paid agreement, with the implicit or e…
Gig Economy
— The broader labor market of short-term, project-based, or freelance work. Many creators enter the cr…
GigaSpeech
— Description: 10,000 hours of English audio from audiobooks, podcasts, and YouTube. Designed as a lar…
Giggling directed toward the target
— **Touching one's own face or hair** in the apparent awareness of being watched - **Primp and preen b…
Gilovich-Tversky hot hand study
— The landmark 1985 study by Thomas Gilovich, Robert Vallone, and Amos Tversky demonstrating that the …
Ginseng digging
— the most dramatically market-oriented activity in the forest economy, and one we will examine in det…
git
— a version control system that tracks every change to every file in a project, lets you go back to an…
GitHub
— Your portfolio home base. Learn GitHub Pages if you want a free personal website. - **Kaggle Dataset…
GitHub Actions
— GitHub's built-in **CI/CD** platform. Automates workflows triggered by events like pushes, pull requ…
GitHub Actions CI workflow:
— Runs tests with pytest - Checks code style with `flake8` (PEP 8 compliance) - Builds the Docker imag…
GitHub Copilot
— https://github.com/features/copilot — AI coding assistant with COBOL support.
GitHub Football Data Repositories
— Community-maintained datasets - Historical play-by-play - Cleaned and processed data
GitHub Profile:
— Maintain an active GitHub profile with: - Tools you have developed (even small utilities) - CTF writ…
GitHub Repositories:
— FiveThirtyEight Elo data - nflverse data packages - Open-source rating implementations
GitHub repository structure:
— `main` branch → deploys to production automatically if CI passes - `staging` branch → deploys to sta…
GitHub's own documentation
— `docs.github.com` — is the authoritative reference for everything GitHub-related. The "Getting Start…
Given Data:
— Team A is coming off their bye week (Week 7 bye) - Team B played last week (normal rest) - Both team…
Given EP values:
— 1st & 10 at own 25: +0.2 EP - 2nd & 3 at own 32: +0.9 EP - 1st & 10 at own 42: +1.4 EP - 2nd & 8 at …
Given:
— $P(\text{disease}) = 0.01$, so $P(\text{no disease}) = 0.99$ - $P(\text{positive} \mid \text{disease…
GIVING clause
— An optional phrase in arithmetic statements (ADD, SUBTRACT, MULTIPLY, DIVIDE) and SORT/MERGE that di…
Giving feedback:
— Be specific ("Extract lines 45–52 into a function" not "this is messy") - Distinguish blocking from …
GLAAD Creator Program
— glaad.org GLAAD's creator and media programs provide media training, industry connection, and advoca…
Glassdoor
— https://www.glassdoor.com/ - Salary reports and company reviews
Glicko-2 parameters:
— $\mu$: Rating on the Glicko-2 scale (related to Elo by $\mu = (R - 1500) / 173.7178$) - $\phi$: Rati…
glitch
— An unintended game mechanic exploited by speedrunners and other players; discovering and categorizin…
global
— they're accessible throughout the module:
Global ARMY
— meaning the pan-national community that operates primarily in English and uses globally accessible p…
Global COVID-19 Data (Johns Hopkins)
— Available on GitHub. Wide-format time series data that must be melted into long format before analys…
Global Relay's Annual State of Compliance Report
— Industry survey on compliance trends and challenges.
Global Relay's Compliance Blog
— Practitioner-oriented coverage of communications compliance, surveillance, and RegTech.
global surveillance supply chain
— the network of technology companies, mostly based in the US, Israel, and Europe, that develop survei…
global, stable, internal
— "I failed because I am fundamentally inadequate (internal) in a way that will never change (stable) …
GlobalBank Core Banking System
— A legacy banking application handling accounts, transactions, and reporting. You'll watch it evolve …
GlobalBank Nightly Batch Window
— **11:00 PM** — Online regions quiesce, batch window opens - **11:15 PM** — Extract jobs pull daily t…
Glossary
— Comprehensive definitions of all key terms - **Answers to Selected Exercises** — Solutions to marked…
glottis
— the gap between the two **vocal folds** (commonly but incorrectly called "vocal cords") housed insid…
GLUE (General Language Understanding Evaluation)
— URL: https://gluebenchmark.com - Description: A collection of nine sentence- and sentence-pair-level…
Glymphatic system
— the brain's cerebrospinal fluid-based waste-clearance mechanism; most active during slow-wave sleep;…
GnuCOBOL
— An open-source COBOL compiler (formerly OpenCOBOL) that translates COBOL to C, then compiles the C t…
GnuCOBOL Community
— Forums and mailing lists for the open-source COBOL compiler. - **Micro Focus Community Forums** — Di…
GnuCOBOL Discussion Forum
— SourceForge forum for GnuCOBOL-specific questions and issues.
GnuCOBOL FAQ
— Includes specific guidance on compiling and linking subprograms, static vs. shared library linking, …
GnuCOBOL FAQ — "How do I compile nested programs?"
— Practical guidance on building and testing nested program structures with GnuCOBOL.
GnuCOBOL FAQ — Indexed Files
— Documentation on how GnuCOBOL implements indexed file support, including configuration options for d…
GnuCOBOL FAQ: Arithmetic and Precision
— Notes on how GnuCOBOL implements arithmetic, including differences from IBM Enterprise COBOL.
GnuCOBOL FAQ: Interfacing with C
— Practical guide to COBOL-C interoperability using the free GnuCOBOL compiler. - **IBM Z Xplore** (ht…
GnuCOBOL FAQ: Sort/Merge
— Documentation on how GnuCOBOL implements the SORT and MERGE verbs, including platform-specific consi…
GnuCOBOL Programmer's Guide
— Comprehensive documentation for GnuCOBOL, including installation, compiler options, and language ext…
GnuCOBOL Report Writer Documentation
— Notes on Report Writer support in GnuCOBOL, including known limitations and compatibility with IBM E…
Go for it
— Attempt to convert the fourth down 2. **Punt** - Give the ball to the opponent deep 3. **Field goal*…
Go for it:
— Conversion probability (4th & 3): ~55% - Convert: New 1st down at 32, EP ≈ +2.0 - Fail: Opponent at …
GO is skipped.
— ### Exercise 5: DD Statement Matching A COBOL program has the following FILE-CONTROL paragraph:
GO TO loop
— The backward GO TO to 2100-X creates an implicit loop that should be PERFORM UNTIL. 3. **Inline READ…
GO TO statement
— A COBOL statement that transfers control unconditionally to a named paragraph or section. Considered…
GOAD (Game of Active Directory)
— Automated vulnerable AD lab deployment - **BadBlood** — Populates an AD environment with vulnerable …
Goal Line Rushing
— TD rate by distance - Formation analysis - Personnel optimization
Goal Threat:
— Non-penalty expected goals (npxG) per 90 - Shot volume and shot quality - npxG per shot (shot select…
Goal-Creating Action (GCA)
— The two offensive actions (such as passes, dribbles, or shots) directly leading to a goal. A broader…
goal-directed learning
— it encodes information about which actions and cues predict reward, shaping the brain's model of how…
Goalkeeper Podcast Networks
— Focus: Goalkeeper-specific content - Relevance: Technical context for analytics
goalkeeper-analytics (Python)
— Various GitHub repositories - Use: Specialized goalkeeper analysis functions
Goalkeeper-Specific Analysis Channels
— Channels: Various YouTube - Focus: Technical breakdown with statistical context
Goals for next quarter:
— One use case to develop further - One use case to stop or significantly reduce - One new capability …
Goals met:
— Organic Chemistry: All four mechanisms explained from memory, 9/10 on novel substrates. **MET** (req…
Goals Prevented
— The difference between expected goals (PSxG) and actual goals conceded
Goals vs. Needs
— Goals are outcome-dependent (requiring the other person's agreement, apology, or action); needs are …
Goals vs. Needs Analysis
— the distinction between outcome-dependent goals (theirs to give or withhold) and internal needs (you…
GOBACK:
— In a **called program**: Returns control to the caller - In a **main program**: Terminates the run u…
god class
— a class that tries to do everything, violating the single responsibility principle.
Goffman's dramaturgical analysis
— The sociological framework (Erving Goffman) that understands social life as performance: front stage…
Goldberg v. Kelly (1970)
— US Supreme Court precedent establishing due process requirements for government benefit terminations…
golden record
— a single, authoritative representation of each entity that serves as the definitive version across t…
Golden Ticket Properties:
— Default validity: 10 years - Survives password resets (except krbtgt password reset) - Works even if…
Goldstone bosons
— massless particles that correspond to oscillations along the flat directions of the broken-symmetry …
gongan
— repeating cycles defined by the gong, the largest and lowest-pitched instrument. Each gongan is a co…
Good candidates:
— A conversation you have been postponing for weeks or months that genuinely needs to happen - An ongo…
Good genes hypothesis
— The evolutionary hypothesis that female preference for symmetrical, masculine, and otherwise costly-…
Good Practices:
— Use clear, descriptive cell headers with Markdown - Keep cells focused on single tasks - Move reusab…
Good Quality Sources:
— Established analysts' blogs - FBref explanations - Conference presentations
good quantum numbers
— the quantum numbers that remain well-defined even in the presence of the perturbation.
Good reasons to add capital:
— Your strategy has been profitable over a meaningful sample size. - New opportunities have arisen tha…
Good scope for a portfolio project:
— Can be completed in 15-25 hours of focused work - Uses one to three data sources - Requires meaningf…
Goodhart's Law
— "When a measure becomes a target, it ceases to be a good measure." The principle that optimizing for…
goodness of fit
— the match between a child's temperament and their caregiving environment.
Google AI Blog
— Language model advances - BERT and transformers
Google AI Blog - Sports
— https://ai.googleblog.com/ - ML/CV research with sports applications
Google and YouTube
— **Facebook and Instagram** - **Twitter** - **LinkedIn** - **Venmo**
Google BigQuery Public Datasets
— Description: Petabytes of publicly available datasets queryable via SQL. Includes GitHub activity da…
Google Cloud Platform (GCP)
— **Compute Engine**: Virtual machines - **Cloud Run**: Serverless containers (excellent for Docker-ba…
Google Colab Network Analysis Notebooks
— Free computational resources - Pre-configured environments - Shareable analyses
Google Digital Garage
— learndigital.withgoogle.com Free digital marketing certification from Google, including modules on a…
Google Engineering Practices
— Code Review (https://google.github.io/eng-practices/review/) Google's internal code review guideline…
Google for Startups Black Founders Exchange
— google.com/startups Google's accelerator programs for Black and Latino founders include mentorship f…
Google Gemini
— Gemini: https://gemini.google.com - API Documentation: https://ai.google.dev/docs - Google AI Studio…
Google GKE (Google Kubernetes Engine):
— Workload Identity for GCP service account binding - GKE Autopilot enforces hardened security baselin…
Google Images
— broadest coverage; use "Tools > Time" filter to identify earliest indexed appearance 2. **TinEye** —…
Google Machine Learning Crash Course
— https://developers.google.com/machine-learning/crash-course - Free, quick introduction with TensorFl…
Google Scholar
— scholar.google.com - Free search across academic literature; many PDFs directly accessible
Google TPUs
— custom-designed tensor processing units, now in their fifth generation, offering price/performance a…
Gotchas:
— EBCDIC conversion must handle packed decimal, signed numeric, and redefined fields correctly. A sing…
GOTV (Get Out the Vote)
— Campaign activities designed to increase turnout among voters who already support the campaign. GOTV…
GOTV Resource Requirement:
— Estimated doors/phone dials needed per conversion: ___ - Total contacts needed: ___ - Volunteer hour…
GOTV universe
— The group of voters a campaign prioritizes for get-out-the-vote outreach: expected supporters with b…
Govern, Map, Measure, Manage
— provide a coherent structure for organizational AI risk management.
Governance
— [ ] Governance structure selected and documented - [ ] Program sponsor named with clear authority an…
Governance culture
— built through leadership commitment, training, incentives, psychological safety, and workflow embedd…
governance gap
— the widening distance between the speed and scale of AI deployment and the capacity of governance in…
Governance infrastructure:
— Data governance council formed (representatives from each department, meeting monthly) - Access revi…
Governance metrics:
— Percentage of models reviewed before deployment - Number of bias incidents detected and resolved - R…
Governance operating models
— centralized, federated, and hybrid — determine how governance authority is distributed across the or…
Governance responses:
— The FCC issued a declaratory ruling in February 2024 that AI-generated voices in robocalls violate t…
Governance Risk
— **Parameter changes**: Protocol governance may change fee structures, collateral factors, or other p…
Governance:
— No data governance framework exists - No one has the title "data owner" for any dataset - Privacy co…
Government
— Government systems (tax processing, Social Security, veterans' benefits) process enormous volumes of…
Government and Research
— U.S. Department of Energy, Energy Efficiency and Renewable Energy (EERE): energy.gov/eere - U.S. Env…
Government and Statistical Data
— data.gov — US federal datasets - Bureau of Labor Statistics (bls.gov) — labor, employment, wages - C…
Government exemptions
— the Act includes broad exemptions for government data processing in the interest of "sovereignty and…
Government intelligence:
— CISA (U.S. Cybersecurity and Infrastructure Security Agency) - FBI Internet Crime Complaint Center (…
GPS Vest
— A wearable device embedded with Global Positioning System receivers, accelerometers, and gyroscopes,…
GPS/Wearable Tracking:
— Players wear vests with GPS and accelerometer sensors - Provides position plus physical metrics (acc…
GPU training
— the network was split across two GPUs due to memory constraints - **Local Response Normalization** (…
Grace Hopper's 1984 Letterman Interview
— A delightful television appearance where Rear Admiral Hopper explains computing concepts (including …
Graceful degradation
— The property of a system that loses functionality gradually rather than catastrophically when compon…
Grade Calculator
— student project that grows from simple to sophisticated 2. **Elena Vasquez** — nonprofit data analys…
Grade conversion:
— All five criteria fully Met: Grade A - Four criteria fully Met, one Partial: Grade A - Three criteri…
Grade Scale:
— A: 61-68 points (90%+) - B: 54-60 points (80-89%) - C: 47-53 points (70-79%) - D: 41-46 points (60-6…
Gradient
— The direction and rate of steepest change in a function or landscape; the information used by gradie…
Gradient ascent
— also called **hill climbing** -- is the mirror image: moving in the direction of the gradient, going…
Gradient Boosted Trees (XGBoost):
— Handles non-linear relationships - Feature importance interpretable - Fast inference for real-time a…
Gradient Boosted Trees (XGBoost, LightGBM)
— Automatically capture interactions and non-linearity - Often achieve better predictive accuracy - Re…
Gradient Boosting
— An ensemble machine learning method that builds sequential decision trees, each correcting the error…
Gradient Boosting (XGBoost, LightGBM):
— Often best performance - Handles missing values - Requires careful tuning - Risk of overfitting
Gradient descent
— An optimization process in which a system moves incrementally in the direction of greatest improveme…
Grading criteria:
— Technical feasibility and specificity (10 points): Do the proposed solutions actually work? Are spec…
Grading notes:
— Phase 1 entries (Chapters 1-13) should be graded more leniently on cross-domain range, as students a…
Grading Rubric:
— Beginner exercises: Completion and correctness - Intermediate exercises: Code quality, documentation…
Grading Summary:
— Part I (Multiple Choice): 16 points - Part II (True/False): 10 points - Part III (Short Answer): 40 …
Gradual Expansion
— one adjacent topic at a time (recommended for most) 2. **Parallel Track** — run established content …
Graduated commitment
— The mechanism by which small incremental steps toward compliance make larger compliance more likely;…
Graduated rollout strategies:
— **Shadow mode:** The AI system runs alongside the existing system, generating predictions that are l…
Grafana Documentation
— https://grafana.com/docs Documentation for the unified monitoring dashboard platform. Covers Prometh…
grammar
— a set of rules that constrains what can come next. Like linguistic grammar, it reduces the space of …
Grammarly
— grammarly.com AI-powered proofreading and style checking. The free tier catches grammar and spelling…
Grand Bulletins
— official campaign dispatches read aloud in churches and town squares — combined inflated victory rep…
granny midwife
— a term that was simultaneously a description and a title of respect. The granny midwife was typicall…
granny woman
— the woman recognized as having the most extensive knowledge of plant medicine — was one of the most …
Granovetter's weak ties
— See: Weak ties. Named for sociologist Mark Granovetter whose 1973 paper "The Strength of Weak Ties" …
GRANT
— Gives a privilege to a user, group, or role - **REVOKE** — Removes a privilege from a user, group, o…
Graph data
— Data about the relationships among users in a social network, which can be analyzed to reveal commun…
Graph Neural Network (GNN)
— A neural network architecture designed to operate on graph-structured data. Well-suited to modeling …
graph-tool
— High-performance - Visualization - https://graph-tool.skewed.de/
GraphQL integration
— Query a GraphQL API (simulated) for project data 2. **WebSocket integration** — Connect to a WebSock…
GraphQL Official Documentation
— The specification and best practices for GraphQL API design. - https://graphql.org/learn/
GraphQL-Specific Attacks:
— Test for introspection exposure in production (query `{__schema{types{name}}}`). - Attempt query dep…
graviton
— the hypothetical quantum particle of gravity. There is no musical instrument that uses closed-loop s…
Gray divorce
— The trend of divorce among couples over 50, which has increased in recent decades while divorce rate…
Gray-market fan economy
— Commercial fan merchandise that exists in legal gray space: original fan-made designs depicting copy…
GRC Integration:
— Pentest results feed risk registers, compliance evidence, and board reporting - GRC platforms automa…
Grease (kitchen drains):
— Never pour grease down the drain - Use enzymatic cleaners monthly for maintenance - Hydrojetting is …
Great concert halls
— Vienna, Carnegie, Elbphilharmonie — achieve their legendary status through combinations of shape, si…
Great Gatsby Curve
— The empirical relationship, documented by economist Miles Corak, between income inequality and inter…
Great Valley
— a long, relatively flat corridor that stretches from Pennsylvania's Lebanon Valley through Virginia'…
Great Wagon Road
— the primary migration route for Scotch-Irish, German, and English settlers moving south from Pennsyl…
Greater Good Science Center (UC Berkeley)
— greatergood.berkeley.edu Research-backed resources on empathy, compassion, forgiveness, mindfulness,…
greedy
— they match as much text as possible.
greedy decoding
— always choosing the most probable next token:
greedy-choice property
— where locally optimal choices lead to globally optimal solutions. Before using greedy, you need to c…
Greek League Statistics (2012-13):
— Games: 26 - Minutes per game: 24.7 - Points per game: 9.5 - Rebounds per game: 5.0 - Assists per gam…
Green Corn Ceremony
— known in Cherokee as the Great New Moon Festival or, in some traditions, the Busk (from a Creek word…
Green flags (markers of higher quality):
— [ ] Pre-registered hypothesis and analysis plan (check osf.io or clinicaltrials.gov) - [ ] Large, di…
Green Flags:
— They provide detailed technical documentation during scoping - They have conducted previous assessme…
Green's RAPM by Lineup Type:
— Traditional (with standard center): +4.2 - Small ball (Green at center): +8.1 - Difference: +3.9 poi…
griefing
— Deliberate harassment of other players within a game — sabotaging teammates, interfering with others…
Grinding (Low EPA + High Success):
— Ball control offense - Limited ceiling - Wins with defense and field position
Groove
— The perception of a rhythmic pattern as inducing a desire for bodily movement, associated with "feel…
Gross margin growth rate
— Revenue growing while margins compress could mean the business is discounting more aggressively or p…
Gross pay
— regular hours times hourly rate, plus overtime at 1.5x 2. **Federal tax withholding** -- using progr…
gross rating point (GRP)
— a unit that represents 1 percent of the target audience exposed to an advertisement once. Buying 500…
Ground game
— The field operations component of a campaign, including voter registration, canvassing, phone bankin…
Ground rods
— One or two copper-clad steel rods, at least 8 feet long, driven into the earth near the foundation. …
Grounded SAM
— a pipeline that can segment any object described in text:
group
— a concept we will explore in section 16.4. For now, notice that applying any of these operations to …
Group 2: Professional historians
— PhDs with faculty positions in history departments, with extensive experience evaluating historical …
Group 3: Professional fact-checkers
— journalists employed at major fact-checking organizations (PolitiFact, FactCheck.org, others) as the…
Group Assignments:
— **Group 1 (Government):** Argue that the third-party doctrine applies. Prepare a 5-minute opening ar…
group fairness
— they evaluate whether the system treats *groups* equitably. **Individual fairness**, proposed by Dwo…
Group Item
— A COBOL data item that is subdivided into one or more subordinate items. A group item does not have …
Group moves do not convert
— they copy bytes. Elementary moves between numeric types perform conversion. This single distinction …
Group name
— up to 8 characters, e.g., `DSNDBGP` - **Group attach name** — the name that applications use to conn…
Group polarization
— The tendency for discussion among like-minded group members to shift average positions toward more e…
Group roles (4–5 people):
— Marcus - A DoorDash policy representative - An employment lawyer specializing in gig economy - A wor…
Group services
— members can form named groups and be notified when members join or leave - **Signaling services** — …
Group theory
— The branch of abstract algebra studying the properties of mathematical groups — sets of elements wit…
GroupBy
— A pandas object that holds the result of splitting a DataFrame by one or more columns, before the ap…
grouping
— are the structural transformations at the heart of data wrangling. They don't change the *values* in…
Grouping related paragraphs
— Sections make the program's logical structure visible in the source code.
grouping symmetry
— a consistent pattern of metric accents that repeats identically every measure. Hemiola applies a **r…
Groups (assign roles before class):
— **Gaggle representative:** Present the product's safety benefits, data practices, and terms of servi…
Groupthink
— Janis's term for the mode of thinking in highly cohesive groups where the desire for unanimity overr…
Grow
— Occasionally, a coefficient *increases* when you add other variables. This happens when the added va…
Growth
— new elements entering a system over time 2. **Positive feedback** — success breeding more success (p…
Growth (Days 61-90)
— Collaboration target (1 creator to reach out to): _______________ - Community initiative: __________…
Growth Analytics (Chapter 24):
— `load_platform_csv` — load and standardize platform CSV exports - `calculate_growth_rate` — period-o…
Growth analytics:
— New subscriber graph over time - Paid conversion rate (free to paid subscriber conversion) - Churn r…
Growth Hacking
— Rapid experimentation across marketing channels and product features to identify the most efficient …
Growth mindset
— Dweck's term for the implicit belief that abilities can be developed through dedication and learning…
Growth Score
— A composite metric weighting share rate, save rate, and engagement rate to indicate whether content …
Growth time-lapse
— Captures incremental change invisible in real-time (plant growing, building constructed). Creates AW…
GRPBY
— Performs GROUP BY aggregation. May operate on sorted or hashed input.
GRS operates in two modes:
— **GRS Ring:** Enqueue requests circulate around a logical ring of all Sysplex members. Every member …
GSE (Guide Share Europe) — CICS Working Group
— European user group with technical presentations on CICS performance from major European financial i…
Guaranteed delivery
— messages are persistent and transactional - **Network independence** — source and target can be on d…
Guard Clause
— An early return at the beginning of a function that handles special cases, reducing nesting and impr…
Guards with sub-65% FT in college:
— 45% bust rate (vs. 25% baseline) - Average NBA career WS: 18 (vs. 35 for guards with 80%+ FT) - Thre…
Guards:
— Historically least efficient (most difficult shots) - TS% has increased most dramatically - Three-po…
Guidance Notes:
— The scope document should be signed before any testing begins. No exceptions. - If the scope changes…
Guided Practice (10–15 minutes)
— Have your client practice the strategy in real time, with you there to guide and give feedback. - Th…
Guidelines for extended family conflict:
— Choose timing deliberately. A family gathering is almost never the right venue for a significant con…
Guidelines:
— For sequential processing: At least 2 data buffers per string (number of concurrent I/O operations).…
Guiding questions for each dimension:
— What specific community practices are *enabled* by this dimension? - What specific practices are *co…
Guiding questions:
— Can you name a prominent dissenter in your field who challenged the consensus? What happened to them…
Gut-brain axis
— the bidirectional communication network between the gastrointestinal tract and the central nervous s…
Gutter Guard Performance Summary:
— Basic screen: reduces large debris, minimal cost, still need cleaning - Foam insert: not recommended…
Gutter Sizing Rules of Thumb:
— Up to 800 sq ft of roof draining to one run: 5-inch gutter, 2x3 downspout - 800–1,200 sq ft: 5-inch …
Gutters and fascia:
— Granules accumulating in gutters — normal in small amounts, excessive amounts mean shingles are losi…
H
HA Banking Transaction Processing System
— Each chapter adds a production-grade component to a high-availability banking transaction processing…
Habermas's public sphere ideal
— inclusive, rationally organized, publicly oriented discourse — provides a normative standard against…
Habit loop
— Duhigg's formulation of the habit structure: cue → routine → reward; and Clear's extension: cue → cr…
Habit stacking
— Clear's technique of anchoring a new behavior to an existing reliable routine: "After I do X, I will…
Habitica
— gamified habit tracking; useful for extrinsically motivated users building initial habit momentum.
habitual routines
— the same routes, the same people, the same environments. Routine reduces cognitive load but also red…
Habitus (Bourdieu)
— The embodied dispositions, values, and ways of perceiving and acting that are acquired through class…
HackerOne by the numbers (as of 2024):
— Over $300 million in bounties paid to researchers - Over 3,000 customer programs - Researchers from …
HackTheBox Official
— Machine discussion, hints, study groups - **TryHackMe Official** — Room help, community challenges -…
Hair (bathroom drains):
— Mesh drain covers prevent accumulation ($3–$8 each) - Drain stick (Zip-It) removes hair clogs in min…
Hair cells
— Mechanosensory receptor cells of the inner ear that transduce mechanical vibrations into electrical …
Halal dating
— Courtship conducted within Islamic religious guidelines, emphasizing modesty, family involvement or …
Half-court (after 8 seconds):
— Frequency: 82% of possessions - Average EPV at start: 0.98 - Average points scored: 1.00
Half-Court Offense:
— Set defense - Even numbers - Structured plays available - Lower but more consistent efficiency - Gre…
Half-Space
— The tactical zones between the central channel and the flanks, approximately between the penalty are…
half-spaces
— the narrow corridors between the centre of the pitch and the wide areas---have received increasing a…
Hallucination
— the tendency of large language models to generate confident-sounding but factually incorrect stateme…
Hallucination (LLM)
— The phenomenon by which a large language model generates text that is confident and fluent but factu…
hallucinations
— a term we'll explore in depth in Section 8.2.
Halo effect
— The cognitive bias in which a positive evaluation in one domain (e.g., physical attractiveness) infl…
Hamiltonian
— Ch 2.3 The operator corresponding to the total energy of the system: $\hat{H} = \hat{T} + \hat{V}$ (…
hamon
— the wavy line visible on a polished katana. The hamon is not decorative. It is the physical record o…
HANDLE CONDITION
— An older CICS command that establishes a label to branch to when a specified condition occurs. Consi…
Handle the case where no selection is found
— the user pressed Enter without typing 'S' anywhere 4. **Calculate the TSQ item number** from the scr…
Hands dominate the frame
— the person's face is often NOT visible 3. **Text zones** at top and bottom carry recipe information …
Hands-On Demo
— Creator physically performs the concept. Best for: processes, experiments, cause-and-effect; activat…
Happy path
— normal, expected input: ```python def test_gross_margin_standard_case(): assert calculate_gross_marg…
Haptic escalation
— the progressive movement toward more intimate touch — follows cultural scripts that both parties typ…
Harassment (sexual)
— Unwanted sexual attention, advances, or conduct that creates a hostile, intimidating, or offensive e…
hard attention
— the model is selecting a single input position. Soft attention (where weights are distributed) compu…
Hard beat cuts
— every cut lands on a drum hit, bass drop, or strong musical beat. Creates a driving, percussive visu…
Hard constraints (must never be violated):
— Every shift must have the minimum required number of nurses - No nurse works more than 5 consecutive…
hard labels
— one-hot encoded targets where the correct class has probability 1 and all others have probability 0.…
Hardcoded dates
— She replaced static dates with dynamic date arithmetic so reports stay accurate over time. 2. **NULL…
Hardware Attacks:
— Physical access to debug ports (UART, JTAG, SWD) - Bus snooping and manipulation (SPI, I2C) - Side-c…
Hardware Extraction:
— UART/JTAG dump (as described above) - SPI flash reading - eMMC reading (for devices using eMMC stora…
Hardware Failures
— A single disk in a RAID array fails (common — happens weekly in large data centers) - An entire stor…
Hardware failures:
— Disk failure (single drive or entire storage array) - Memory failure (ECC error, DIMM failure) - CPU…
Harlan County, Kentucky
— from Cherokee territory to coal kingdom to opioid crisis to uncertain future. One county's history m…
Harlem Capital
— harlemcapital.vc A venture capital firm with an explicit mission to invest in 1,000 diverse founders…
Harmonic
— A sinusoidal frequency component of a complex tone that is an integer multiple of the fundamental fr…
Harmonic oscillator (quantum)
— Ch 4 The quantum system with potential $V(x) = \frac{1}{2}m\omega^2 x^2$. Energy levels are $E_n = (…
Harmonic series
— The sequence of frequencies that are integer multiples of a fundamental: f₀, 2f₀, 3f₀, 4f₀, ... The …
Harold Lasswell
— Political scientist whose 1927 *Propaganda Technique in the World War* established propaganda studie…
Harriet Lerner
— *Why Won't You Apologize?* (2017): The anatomy of effective and failed apologies - **Robert Enright*…
Hartree--Fock method
— a self-consistent procedure that remains the foundation of modern atomic and molecular calculations.
Hartree-Fock equations
— a set of coupled integro-differential equations:
Harvard Business Review
— The practitioner-facing venue where much of the sponsorship, pivot, and career capital research has …
Harvard Study of Adult Development
— one of the longest longitudinal studies in history, following Harvard graduates from the 1930s throu…
Harvesting behavioral surplus
— using data beyond what's needed for service improvement to predict and modify behavior for advertise…
Hash Extraction:
— Extract SAM hashes from compromised workstations - Extract NTDS.dit from the domain controller - Cap…
hash function
— a function that converts a key into an array index. This is exactly how Python's `dict` works behind…
Hash Table
— The data structure underlying Python's `dict` and `set` types. Provides O(1) average-case lookup, in…
Hashed Storage
— Passwords processed through a one-way cryptographic hash function. The original password cannot be r…
HashiCorp Vault Documentation
— https://developer.hashicorp.com/vault Documentation for secrets management that some hybrid architec…
hashing
— a function that converts a business key into an integer suitable for use as an RRN.
Hashtag
— A word or phrase preceded by the # symbol used to categorize content and make it discoverable by use…
Hashtag tiers:
— 1-2 niche-specific tags (small, engaged audience — #educationalscience, #tiktokpsychology) - 1-2 med…
Hawk-Eye Innovations
— Multi-sport tracking - Computer vision approaches - Industry standard reference
Hawking radiation
— and this radiation causes the black hole to slowly shrink and eventually evaporate. But Hawking's ca…
Hawks
— those who prioritize price stability -- effectively set a lower threshold for inflationary signals. …
Hayekian knowledge problem
— Friedrich Hayek's insight that economically relevant knowledge is dispersed among millions of indivi…
Hayflick limit
— that is built into the biology of normal cells. And the mechanism, identified in the 1970s and 1980s…
Hazard Function
— In survival analysis, the instantaneous rate of an event (e.g., returning from injury) at time t, gi…
HAZARDOUS MATERIAL HISTORY
— Lead paint test performed?: (Y / N) _____ Date: _____ Result: _______________ - Lead paint disclosur…
Head Coach:
— Limited time—wanted 60-second overview maximum - Primary questions: "Are we improving?" and "Where a…
Head Voice (Upper Register)
— Vocal folds: thin, long, stretched by cricothyroid muscle - Glottal waveform: partial closure or inc…
Head-Related Impulse Response (HRIR)
— a short impulse response (typically 128–512 samples at 44.1 kHz sample rate, corresponding to 3–12 m…
Head-Related Transfer Functions (HRTFs)
— are essentially the acoustic "fingerprint" of how your particular ear shape modifies sounds from eac…
Header block
— Team-wide context that is the same for every prompt (technology stack, conventions, quality standard…
Header versioning
— `Accept: application/vnd.securefirst.v2+json`. More "RESTful" but harder for consumers to implement …
Headline
— one sentence capturing the key insight 2. **Context** — 2-3 sentences on why the analysis was done 3…
Headspace
— headspace.com Structured meditation for beginners and experienced practitioners; evidence base for s…
Health (Inferred):
— Health insurance status: Unknown/possibly employer or university - Interest categories: Fitness, men…
Health anxiety exploitation
— The deliberate use of health-related fears to make audiences receptive to claims that serve the prop…
Health check configuration
— Define what "healthy" means: - CICS IPIC connections active - MQ connection active - SSL certificate…
Health data
— Medical records, genetic information, mental health status - **Financial data** — Bank accounts, cre…
Health metrics to evaluate:
— **Maintenance activity:** When was the last commit? Are issues being addressed? - **Community divers…
Health plan administration
— managing member eligibility, benefits, and claims (similar to insurance) - **Hospital billing system…
Health-signaling features
— clear skin, bright eyes, lustrous hair, muscle tone, absence of lesions or asymmetry — may function …
Healthcare
— Claims processing, eligibility determination, and billing systems handle complex rule sets and large…
Healthcare (US):
— **HIPAA Security Rule (§164.308(a)(7)):** Requires a contingency plan including data backup plan, di…
healthcare services
— including prenatal care, childhood vaccination, and dental care — to communities that had no access …
Healthcare-Specific Concerns:
— **SSRF in Medical Device Integration:** MedSecure integrates with medical devices via HL7 FHIR APIs.…
HEAP parameters explained:
— **Initial size (32768):** The first heap segment allocated at program init. Too small → immediate he…
Heart of Texas
— a page claiming to represent Texas conservatives and ultimately accumulating 254,000 followers, more…
Heat pump annual tasks:
— Clean outdoor coil (gentle garden hose rinse — don't use pressure washer) - Check refrigerant charge…
Heat:
— Wood stove in the main living area, capable of heating the entire ground floor; 3 cords of seasoned …
Heating Degree Day (HDD) futures
— settle based on cumulative heating degree days during a contract month, providing a prediction of co…
heatmap
— A chart that encodes a matrix of values as colors. Rows and columns are categorical; cell color repr…
Heaven's Gate (1997)
— Internet as both recruitment tool and isolation mechanism - Loaded language that made death cognitiv…
hedge
— intentionally misreporting on one question to reduce risk across a portfolio of questions. For examp…
Hedge/Trap:
— Screener's defender jumps out on ball handler - Requires quick recovery - Creates help rotations, po…
Hedgehogs
— experts who explained everything through one big idea or theoretical framework, and who gave confide…
hedging
— language that softens assertions and marks them as provisional. Hedges include phrases like "I think…
Hedonic adaptation
— the psychological process by which people return to a relatively stable level of happiness after sig…
Hedonic adaptation (hedonic treadmill)
— The tendency to return to a relatively stable level of wellbeing following positive or negative life…
Height Measurements:
— Height without shoes - Height with shoes - Wingspan - Standing reach
heirloom varieties
— open-pollinated cultivars that had been selected and saved by mountain families for generations, ada…
Heisenberg cut
— is necessary for the formalism to make predictions (you need to identify what is being measured and …
Heisenberg picture
— Ch 7.5 A formulation of quantum mechanics where states are fixed and operators evolve: $\hat{A}_H(t)…
Heisenberg uncertainty principle
— A fundamental principle of quantum mechanics stating that the position and momentum of a particle ca…
Helen Lewis
— Sociologist and activist widely regarded as a founder of Appalachian Studies, who insisted that scho…
helical edge states
— pairs of counter-propagating channels with opposite spin. In the simplest case (a single pair), spin…
Hello Alice Grant Programs
— helloalice.com Hello Alice maintains a comprehensive directory of grants available to diverse small …
hellsite
— An affectionate nickname for Tumblr, acknowledging both its dysfunctional features and its community…
Helmholtz resonators
— cavity resonators tuned to a specific problematic mode. A Helmholtz resonator consists of a cavity c…
Help Defense:
— Elite positioning - Anticipates plays before they develop - Communicates defensive assignments
helpless captive
— the woman seized by Indigenous peoples, whose suffering and rescue justify white expansion. The seco…
Helpline Numbers (Repeat for Emphasis)
— **US:** National Council on Problem Gambling, 1-800-522-4700 (24/7) - **UK:** GamCare, 0808-8020-133…
Hemingway Editor
— hemingwayapp.com Readability analysis that flags passive voice, adverb overuse, and complex sentence…
Her approach:
— She checks the newspaper's `robots.txt` — the archive section is allowed. - She reads the Terms of S…
Her typical video:
— Setup: "Here's my outfit for today" [3 seconds] - Middle: Shows outfit from different angles [25 sec…
Her voice and personality
— warm, conspiratorial, genuinely excited about psychology 2. **The content quality** — real research,…
Heralded single photons
— spontaneous parametric down-conversion (SPDC) creates photon pairs; detecting one "heralds" the pres…
herbal medicine
— the identification, preparation, and application of plant-based remedies for illness and injury. Thi…
Hercules
— An open-source IBM mainframe emulator that runs on Windows, Mac, or Linux - **GnuCOBOL** — A free, o…
Herding
— The adjustment of polling results toward the industry consensus to avoid publishing outlier estimate…
Herding (polls)
— The tendency of polling firms to publish results that cluster around the consensus estimate or aroun…
Hermitian operator
— Ch 6.4 An operator satisfying $\hat{A}^\dagger = \hat{A}$. Equivalently, $\langle\phi|\hat{A}|\psi\r…
Hernando de Soto expedition
— The first major European expedition through the interior Southeast, 1539–1543, which brought the fir…
heroic genius myth
— the idea that great discoveries are produced by exceptional individuals whose brilliance transcends …
Herself
— she needs operational charts to spot trends and make decisions 2. **Her accountant** — who wants a c…
heterogeneity
— how much the effect sizes vary across studies beyond what would be expected from sampling error alon…
Heteronormativity
— The cultural assumption that heterosexuality is the normal, default, or superior form of sexual orie…
Heuristic
— A mental shortcut or rule of thumb that enables quick decisions under uncertainty; effective in many…
Hexadecimal
— A base-16 numbering system using digits 0--9 and letters A--F. Used extensively in mainframe computi…
HHS HIPAA Security Rule Guidance
— The Department of Health and Human Services provides guidance documents that interpret the Security …
Hidden Brain
— NPR Shankar Vedantam's podcast on unconscious patterns in human behavior. Not specifically about lea…
Hidden GO TO
— Some argue that GO TO within a THRU range is still GO TO, and the arguments against GO TO still appl…
Hierarchical Clustering:
— No need to specify K upfront - Dendrogram visualization - Computationally expensive for large data
hierarchical sequence
— a depth-first, left-to-right traversal of the tree. For the banking hierarchy above, the hierarchica…
Hierarchical surveillance
— Surveillance directed downward through organizational or social hierarchies — employers watching emp…
Hierarchy and Reporting Lines
— Who are the executives and department heads? - How many layers of management exist? - Which departme…
Hierarchy of needs
— Maslow's motivational framework positing a pyramid of needs (physiological, safety, love/belonging, …
High
— PEP status (no PEP indicators): Low - Adverse media (no results, but absence is noted): Low - Countr…
High (address within policy):
— Open-source license compliance gaps in AI-generated code - Missing data processing agreements with A…
high bias
— they systematically miss patterns — but **low variance** — they give similar predictions regardless …
High color contrast
— A bright, saturated color against a desaturated background. One red thing in a sea of gray.
High Concentration at Top:
— Curry: 25% of team Win Shares - Top 3 (Curry, Klay, Draymond): 54% of team Win Shares
High Confidence Sources:
— Academic papers (peer-reviewed) - StatsBomb methodology documentation - Opta official documentation
high contrast and visual vibrancy
— the maximum visual energy between two colors. This makes thumbnails eye-catching and attention-grabb…
High EPA, Low CPOE:
— Receivers create YAC that compensates for inaccuracy - QB throws deep successfully despite low compl…
High HFA (+0.5 to +1.0):
— Seattle (crowd design) - Kansas City (crowd noise) - Green Bay (weather/tradition) - Denver (altitud…
High Interest, Low Power:
— Residents of Black and Latino neighborhoods targeted by prediction boxes — highest stake, minimal fo…
High legal risk:
— Using personal data (GDPR, CCPA, HIPAA, other privacy law implications) - Using AI in hiring, lendin…
High moral hazard risk:
— Individual health or death events - Specific terrorist attack occurrences - Targeted corporate failu…
High persistence AND high synchrony
— No platform excels at both. AO3 and Reddit have excellent persistence; Discord has excellent synchro…
High Positive Correlations:
— Points and field goal attempts (r ≈ 0.85): Volume scoring relationship - Minutes and points (r ≈ 0.7…
High Power, High Interest:
— LAPD leadership — had authority to deploy and continue the system; directly measured by crime statis…
High Power, Lower Interest (initially):
— City Council — had budget authority but limited engagement with technical details - State-level elec…
High Q environments (singing resonances):
— Hard, reflective surfaces (tile, stone, hard plaster) have very low acoustic absorption coefficients…
High reliability domains:
— Grammar, writing mechanics, style - Common programming languages and standard patterns - General bus…
High reliability situations:
— Standard CRUD operations in frameworks he knew well - Boilerplate configuration for common tools (Do…
High risk
— systems used in contexts where errors could have serious consequences for health, safety, or fundame…
High Risk (rest recommended):
— ACWR > 1.5 - Subjective fatigue > 7/10 - HRV < 70% of baseline - Back-to-back second game - Recent i…
High ROI (use AI aggressively):
— Documentation generation for programs with no existing documentation (5-10x productivity gain) - Cop…
High scale AND community safety
— Scale and safety trade off against each other systematically. Twitter/X's scale comes with harassmen…
High scoring with poor team offense
— May indicate inefficient volume 2. **Many rebounds with poor team rebounding** - May indicate stat-p…
High Shannon entropy ≠ structural sophistication
— Her composition: higher conditional entropy (more statistically unpredictable) - Bach's chorale: low…
High tackles can indicate:
— Aggressive defensive style (positive) - Compensation for poor positioning (negative) - High involvem…
High trust (verify only edge cases):
— Standard implementations of well-established patterns - Boilerplate code generation - Simple utility…
high volume, low context, and asymmetric cost
— low for the rejector, unchanged for the rejected. This architecture interacts specifically with reje…
High watch time
— the content was genuinely good and the pacing was solid. No reason to leave. - **High save rate** — …
High-context vs. low-context cultures
— Hall's distinction between cultures that embed meaning in context (high-context) versus those that r…
High-context/low-context communication
— Hall's framework distinguishing cultures where communication relies on shared context and nonverbal …
High-contrast motion
— Something moving against a static background, or moving differently from its surroundings.
High-demand roles:
— **AI Product Manager.** Manages AI-powered products and features. Requires understanding of AI capab…
High-impact landing page tests:
— Headline: benefit-focused ("Finally understand your finances") vs. problem-focused ("Stop losing mon…
High-Intensity Events:
— Accelerations above 3 m/s^2 - Decelerations (braking) above 3 m/s^2 - Direction changes at speed
High-intensity rivalries (increased HFA):
— GB vs CHI - DAL vs WAS - PIT vs BAL - SF vs SEA
High-Intensity Running
— Running at speeds above a defined threshold (typically 7.5 m/s or 21.8 km/h). Tracked via GPS and us…
High-Level Qualifier (HLQ)
— The first (leftmost) qualifier of a *dataset name*. On z/OS, the HLQ is typically the TSO user ID or…
High-Leverage Moments Identified:
— The Block and Irving's three both showed in leverage analysis - Clutch time (final 5 minutes) proper…
High-Line Systems:
— Sweeper actions p90 > 1.0 - Pass completion > 80% - Comfortable under pressure
High-luck physical contexts:
— Conferences (relational value > informational value — active participation required) - Communities (…
High-quality signals:
— Multi-sentence responses that reference specific content - Personal sharing ("This happened to me wh…
High-reliability code tasks (Raj's Zone 1):
— Boilerplate file structure for standard patterns (REST endpoints, database models) - Unit test scaff…
High-risk AI obligations in Annex III apply
— the primary deadline for financial services firms | | 2 August 2027 | High-risk AI in Annex I (produ…
high-risk AI systems
— the category most relevant to autonomous systems — the EU AI Act imposes detailed requirements:
High-signal indicators:
— New capability demonstrated on diverse, practical tasks (not just one impressive example) - Capabili…
High-speed shared memory
— accessible from every z/OS system in the sysplex 2. **Lock management** — a hardware-assisted global…
HIGH-VALUE
— A figurative constant representing the highest value in the current collating sequence. In EBCDIC, H…
HIGH-VALUE / HIGH-VALUES
— Represents the highest character in the collating sequence (X"FF"). Used as a sentinel value in sort…
High-Value Pick-and-Roll Ball Handlers:
— Create EPV above 1.20 consistently - Make correct reads based on defense - Can score and pass effect…
High-Value Screeners:
— Roll with good timing and angles - Finish efficiently at rim (high conversion) - Can pop for three w…
Higher Pace Eras (1960s, 1980s):
— More possessions = more opportunity for Win Shares - Wilt's 247 WS in 14 seasons benefited from pace
Higher rates of cancer
— including lung, kidney, and colon cancers — than communities in other parts of Appalachia or the nat…
Higher-level plot types
— one function call produces what would take 15 lines of matplotlib 2. **Built-in statistical summarie…
Highest performing:
— Shock/Surprise — the most universal emotion; communicates "something unexpected happened" - Curiosit…
Highlighted datasets:
— COVID-19 case surveillance (millions of rows --- good for large-data practice) - BRFSS (Behavioral R…
Highly emotional memories from the past
— Vivid confidence does not mean accuracy. Think of three very vivid memories. What was your emotional…
Highly satisfied couples have conflict
— they simply resolve it more effectively and repair more quickly than distressed couples - **Conflict…
Hikvision and Dahua
— the world's two largest video surveillance equipment companies — supplied cameras and integrated sys…
Hilbert space
— An abstract mathematical space of infinite dimension in which vectors represent quantum states, and …
Hilbert space formalism
— vectors in abstract inner product spaces, with eigenvalue decompositions, superposition principles, …
hillbilly stereotype
— the image of the Appalachian mountain person as backward, violent, ignorant, sexually deviant, and g…
Hindman Settlement School
— a permanent, year-round residential institution that would become the first rural settlement school …
hindsight bias
— the well-documented tendency to believe, after learning an outcome, that you "knew it all along." Hi…
Hints and Guidance:
— The pre-engagement phase is where many real-world engagements go wrong. An incomplete scope leads to…
Hints for estimation:
— BAT-001 (Transaction journal extract): I/O-bound (reading sequential journal) - BAT-002 (Transaction…
Hints:
— BAT-001 (extract) has no predecessors — it's the entry point. - BAT-002 (sort) needs the extract out…
HIPAA
— Health Insurance Portability and Accountability Act: privacy and security of protected health inform…
HIPAA API Requirements:
— All API calls must be logged with sufficient detail for audit trails - PHI must be encrypted in tran…
HIPAA Evolution:
— Original Security Rule (2003): Administrative, physical, and technical safeguards - HITECH Act (2009…
Hire additional analysts
— budget constrained; approved for one additional hire (not enough) 2. **Implement a full ML replaceme…
Hire consultants when:
— You need to move fast and lack internal capability. - The project is a one-time initiative (an AI st…
Hiring Decision Thresholds:
— **Strong Hire:** Weighted score >= 4.0, no competency below 3 - **Hire:** Weighted score >= 3.5, no …
His approach:
— He scrapes three pages per day (one per store) — minimal server impact. - He checks each store's `ro…
Hispanic Star
— hispanicstar.com A national movement and network supporting Hispanic and Latinx visibility and leade…
Histogram
— shape of the overall distribution 2. **Box plot by segment** — comparison across groups 3. **Correla…
HISTOGRAM NUMQUANTILES 100
— Collects histogram statistics with 100 quantile divisions. Histograms provide the optimizer with dat…
Historical Accuracy and Depth
— Are your claims factually correct? Does the history cover all eight required sections with sufficien…
Historical Analysis
— Track historical recruiting accuracy - Development efficiency over time - Recruiting trends analysis
Historical analysis:
— Trend charts for any metric over days, weeks, or months - Compare current performance against baseli…
Historical and Structural Features:
— `incumbency`: Binary indicator for whether the candidate's party holds the presidency. - `term_lengt…
historical bias
— the training data accurately reflects a history of gender-imbalanced hiring, and the AI learns to re…
Historical comparison features:
— Similarity scores to historical transfers that succeeded/failed - Percentile rankings relative to pl…
Historical Context
— Places the current pattern in its intellectual history. Who discovered it, when, and why does that m…
Historical Correlation:
— Teams with poor medical staff have more injuries - Artificial turf associated with specific injuries…
Historical Data (2010-2020):
— Average ACL tears per season: 8-12 - Percentage non-contact: ~70% - Position distribution: Roughly e…
Historical data for picks 15-25 at WR:
— 40 players drafted - 22 became starters (32+ starts) - 6 made Pro Bowl - 8 busted (career AV < 10) -…
Historical data is inherently incomplete
— Statistics we take for granted today were not always recorded 2. **Sources may disagree** - Even off…
Historical Data:
— 2022: 95 targets, 70 rec, 950 yards, 6 TDs - 2023: 130 targets, 100 rec, 1,300 yards, 10 TDs
Historical decline
— From ~4 points (1950s) to ~2.3 points (2020s) 2. **Six components** - Crowd, travel, familiarity, re…
Historical demand:
— `demand_yesterday`: Yesterday's actual demand (MWh) - `demand_last_week`: Demand 7 days ago - `deman…
Historical evidence:
— The Open Science movement succeeded because it built a broad coalition *before* launching its critiq…
historical method
— a disciplined practice of recording, preserving, and analyzing human memory as a form of evidence ab…
Historical NFL/CFB Results
— Available on Kaggle - Multiple decades - Clean format
Historical Note
— Paul Adrien Maurice Dirac (1902--1984) was one of the most original thinkers in the history of physi…
Historical Performance
— Weighted recent seasons 2. **Opportunity Metrics** - Targets, carries, snap share 3. **Efficiency Me…
Historical Performance (2012-2019):
— Home record: 55-17 (.764) - Home margin: +10.2 points - Away record: 44-28 (.611) - Away margin: +3.…
Historical Reporting:
— Accounting trace data collection and reporting - Trend analysis (performance over time) - Workload c…
Historical Spread Accuracy:
— ~50.5% home/favorite cover rates - Nearly perfectly calibrated
Historical Template Check
— Does this communication resemble the Big Tobacco template: manufactured uncertainty about establishe…
Historical trend stats:
— R-squared: 0.74 (trend explains 74% of monthly variation — a moderate fit) - Monthly growth rate: ap…
History creator's video:
— Similar proportional performance for the history channel - New subscribers who came from Marcus's me…
History full of parallel independent discovery
— Chapters referenced: (none yet)
hit count
— AO3's public view counter for individual works; a metric of community attention that is visible on t…
HMDA (Home Mortgage Disclosure Act)
— 1975 federal law requiring covered financial institutions to report data on mortgage applications an…
Hola America
— An advertising and creator agency focused specifically on connecting Latinx creators with brands see…
Hold + react (3-5 seconds)
— Let the viewer absorb the after, then show the emotional reaction (the person seeing their transform…
Hold variants (GHU, GHN, GHNP)
— Identical to GU, GN, GNP, but they establish a **hold** on the retrieved segment, allowing you to su…
Holding / defensive midfielder:
— Tackles and interceptions per 90 - Pass completion % (short and medium) - Pressure success rate - Ba…
holding other variables constant
— the idea that a regression coefficient tells you the effect of one predictor *while controlling for …
Holiday Lighting Quick Checklist
— Inspect every string before use; discard damaged sets - Use outdoor-rated lights and cords for outdo…
Holistic cognition
— A cognitive style characterized by attention to context, relationships, and the field as a whole; mo…
Hollinger & Duncan NBA Show
— Two veteran analysts discuss league topics
Hollinger's Draft Review (ESPN Archive)
— Historical draft grades - Retrospective analysis
Holly Herndon and Mat Dryhurst
— Musicians who have developed tools and frameworks for ethical AI music creation, including the Spawn…
Hollywood Blacklist
— The practice, operating from the late 1940s through the early 1960s, of excluding from employment in…
holonomy
— that depends on the solid angle subtended by the loop. This is a classic result of differential geom…
Home Advantage:
— ~2.5 points (down from 3.0 historically) - ~48 Elo points - Continues to decline over time
Home Court Advantage:
— Game played in Oakland (Warriors home) - Historical home team wins ~60% in Game 7s - Warriors had be…
Home Field Advantage
— quantifying the value of playing at home and what factors drive it.
Home Field Advantage Deep Dive
— moving beyond the standard 2.5-3 point home advantage to understand what drives it, how it varies by…
Home Field Neutralization:
— Standard HFA: Near zero (both traveling) - Crowd factor: Neutral NFL fans, slight Chiefs popularity …
Home Team (-3.5):
— QB: Healthy (Elite tier) - RB1: Out (Above average tier) - WR1: Questionable, 50% (Pro Bowl tier) - …
HOMEOWNER DIY:
— Testing and resetting GFCIs - Replacing GFCI outlets (power off at breaker) - Replacing standard out…
Hominy
— corn kernels treated with lye to remove the hull and release nutrients — was another staple, eaten w…
Homomorphism
— See *isomorphism*. A structural correspondence between systems that preserves some (but not all) rel…
homonormativity
— the project of incorporating gay and lesbian relationships into the dominant heteronormative framewo…
homophily
— the well-documented social tendency for people to associate with others who share their demographic …
honest advocacy
— The PRSA ethical standard that PR practitioners can legitimately advocate for clients but must do so…
Honest communication
— explaining what the model can and cannot say about individual accounts
Honest reflection:
— What would you do differently if you ran this project again? - What specific technique from this ana…
honest signals
— physical or behavioral traits that are difficult or costly to fake, and that therefore correlate rel…
Honest teaching means saying:
— Assertiveness is harder for some people than for others, not because of individual character, but be…
Honesty
— including transparency with stakeholders about decisions that affect them — requires that an organiz…
Honesty:
— Have you documented known limitations and technical debt? - Have you identified single points of fai…
Hong-Ou-Mandel effect
— two identical photons at a 50:50 beam splitter always exit the same port. The $|1,1\rangle$ output i…
Hook
— The opening moments of a piece of content — typically the first 3–15 seconds of a video, the subject…
Hook (seconds 0–3):
— Describe exactly what happens visually and auditorily - Hook type and what promise it makes: - Would…
Hook (serendipity)
— Christian Busch's term for the element of an encounter or piece of communication that creates the po…
hook bank
— a running document of hook ideas, categorized by type:
Hook deployment
— How often do you share what you're working on with people outside your immediate circle, in ways tha…
hook method pattern
— the base class defines extension points that subclasses can customize.
hookup culture
— The social norm system, not just the behavior, in which casual sexual encounters are ideologically p…
hope
— not as an emotion but as a political practice. Hope, in this sense, is the disciplined commitment to…
Hopewell Interaction Sphere
— and the broader pre-contact trade networks that preceded and succeeded it — you need a map and a sen…
Horizon 1 (0-12 months): Quick Wins and Foundation
— Retire dead applications (the 38% from Sandra's assessment) - Establish the modernization toolchain …
Horizon 1 (Months 1–6): Foundation
— Data remediation programme for client master data (target: LEI completion to 95%, address currency t…
Horizon 2 (12-36 months): Strategic Modernization
— Execute the refactoring plan for the "Refactor" applications - Begin IMS-to-DB2 migrations (if appli…
Horizon 2 (Months 7–18): Capability Build
— Revive and complete the partially-implemented regulatory reporting engine (scope: all eight planned …
Horizon 3 (Months 18+): Transformation Direction
— AI-enhanced transaction monitoring (deferred until clean data and calibrated baseline are in place) …
Horizon of significance
— Taylor's concept of the framework of what matters within which choices have weight and meaning.
Horizontal axis: Time
— the signal's temporal progression from left to right - **Vertical axis: Frequency** — from low (bott…
Horizontal scaling
— Adding another AOR and distributing workload via dynamic routing. More expensive (another region to …
Horizontal shoot (for YouTube):
— Side-angle camera at eye level - Horizontal orientation (16:9) - Focus on Kai's personality + cookin…
Hormones (attraction-relevant)
— Key molecules discussed include testosterone (associated with libido and, in some contexts, dominanc…
Hospital discharge data
— matched to voter registration records - **Web browsing histories** — matched to social media profile…
Host Variable
— A COBOL data item referenced within an *embedded SQL* statement. Host variables are prefixed with a …
Host-Only:
— Creates an isolated network between the host and VMs - VMs can communicate with each other and with …
Hosting:
— Who hosts it? You? Someone you bring in? - If someone new — how would you find them, and how would a…
Hot hand fallacy
— The mistaken belief that a person who has recently experienced success is more likely to continue su…
Hot Leg A
— carries 120 volts - **Hot Leg B** — carries 120 volts - **Neutral** — the reference point, at 0 volt…
Hot Reload
— A development feature that automatically updates a running application when source code changes, wit…
hot-spot policing
— the practice of concentrating police resources in the specific geographic locations where crime data…
house edge
— the mathematical advantage the sportsbook holds. It is extracted through the vig. No matter which si…
House effect
— The systematic tendency of a particular polling firm to produce results that favor one party or cand…
House effects
— Systematic directional bias in a specific pollster's results relative to other pollsters; estimated …
hovertemplate
— A string that controls the content and format of a plotly hover tooltip. Uses `%{x}`, `%{y}`, `%{cus…
How CTFs Build Skills:
— Force you to learn new techniques under time pressure - Expose you to vulnerability types you might …
How each table is accessed
— full table scan, index scan, index-only access, or something else - **Which indexes** are used, and …
How frames argue implicitly:
— *Problem definition* assumes a causal structure without stating it: "the crime problem" assumes crim…
How important are my own concerns?
— This speaks to the assertiveness dimension. If your interests are central, low-assertiveness modes w…
How important are the other party's concerns?
— This speaks to the cooperativeness dimension. If they have legitimate stakes, low-cooperativeness mo…
How important is the ongoing relationship?
— Relationships with long futures require more care about how "winning" any single conflict affects th…
How Incentive Structures Manufacture Error
— the business model of being wrong.
How is feedback delivered
— in ways that confirm competence (informational) or ways that feel controlling and evaluative? 3. **H…
How it happened
— not as an excuse, but as a transparency about process: "I found research that confirmed the narrativ…
How it works:
— The central team defines data standards, naming conventions, and quality requirements - All data-rel…
How much would it cost to corrupt an Augur market?
— ## Background: Augur's Dispute Mechanism
How the system works
— the physics, mechanics, and logic behind it - **How to recognize when it's failing** — early warning…
How the web works
— at least enough to understand HTTP requests and responses. - **APIs** — the structured, polite way t…
How to abstract effectively:
— Replace specific nouns with general categories (patient becomes "complex system," surgeon becomes "s…
How to Access:
— Web interface at fbref.com with comprehensive tables and filters - No official API, but the site is …
How to address it:
— Be honest about which roles will change and which will not. Vague reassurances ("AI won't replace an…
How to build real software
— CLI tools, web apps, REST APIs, databases, full-stack applications - **How to apply software enginee…
How to disclose correctly:
— Must be clear and conspicuous — visible and unavoidable, not buried at the end of a description - Mu…
How to do it:
— Close your notes and write everything you remember on a blank page. - Use flashcards (but shuffle th…
How to extend:
— Change `random_seed` to see different short runs. - Replace `rng.integers(0, 2, total_flips)` with `…
How to find a mediator:
— **Association for Conflict Resolution — Mediator Locator** — acrnet.org — Searchable directory of AC…
How to find one:
— **Psychology Today Therapist Finder** — psychologytoday.com/us/therapists — The most widely used dir…
How to find them:
— Ask in creator communities (Discord servers, Reddit communities for creators in your niche) for atto…
How to formulate prompts
— The experienced developer thinks aloud while writing prompts, explaining what they include and why. …
How to practice shuttle diplomacy well:
— Be transparent about your role. "I want to be honest with you — I've talked to her and she's also ta…
How to read the replication status ratings:
— **Well-replicated**: Reproduced many times across labs, populations, and materials. High confidence.…
How to read this:
— **CICSHIGH** and **CICSPROD**: PIs below 1.0 (0.82 and 0.79) — performing better than goal. This is …
How to read:
— Read with a problem in mind. Carry your unsolved problems with you while reading, as Elliott carried…
How to stop an infinite loop:
— Press `Ctrl+C` in the terminal. - In VS Code, click the trash can icon in the terminal panel.
How to translate effectively:
— Identify the *mechanism* that makes the source solution work (in the pit stop: standardized roles, d…
How to use these cards:
— For quick exam review: read the Core Concept and Actionable Takeaway for each chapter. - For deep re…
How to use these exercises:
— Tier 1 and 2 exercises can be completed in a Python file or directly in the Python REPL. - Tier 3 ex…
How to use this table:
— For P(Z <= z): Read the value directly. - For P(Z > z): Compute 1 - P(Z <= z). - For P(-z < Z < z): …
How to write well:
— Start with the question, not the code. Your reader should understand what you're investigating in th…
Howard Dean's fifty-state strategy
— implemented during his tenure as chair of the Democratic National Committee from 2005 to 2009 — was …
Howard University Center for Entrepreneurship
— One of several HBCU-based entrepreneurship programs providing education, mentorship, and community f…
HPA axis
— Hypothalamic-pituitary-adrenal axis; the neuroendocrine system governing the stress response through…
HR consultation
— with the understanding that HR serves the organization, not the individual employee. An HR consultat…
HR involvement is appropriate when:
— Conduct involves legally protected characteristics (discrimination, harassment) - Conduct rises to t…
HR involvement may be premature when:
— The conflict is an interpersonal work-style dispute below legal threshold - Direct resolution hasn't…
HRTF (Head-Related Transfer Function)
— The direction-dependent filtering imposed on a sound by the diffraction and reflection properties of…
HSJOIN
— Hash join. The left child builds the hash table, and the right child probes it. Check the estimated …
HTML
— HyperText Markup Language; the structured text format used to define web page content and layout.
HTML (HyperText Markup Language)
— The standard markup language for creating web pages. Defines the structure and content of a webpage.…
HTTP
— HyperText Transfer Protocol; the communication standard between clients (browsers, scrapers) and web…
HTTP (Hypertext Transfer Protocol)
— The protocol used for communication between web browsers/clients and servers. Methods include GET, P…
HTTP-based management interfaces
— **Telnet** is still used to manage some network infrastructure devices - Internal clinical applicati…
httpOnly cookies:
— Protected from **XSS** — JavaScript cannot access httpOnly cookies, so even injected scripts cannot …
HTTPS
— blend with normal web traffic; tools: curl to a controlled server 3. **ICMP tunneling** — encode in …
https://physics.nist.gov/cgi-bin/ASD/ie.pl
— Complete tabulation of ionization energies for all elements. Use to verify the trends discussed in S…
HUAC
— The House Un-American Activities Committee, a permanent standing committee of the U.S. House of Repr…
Hub (network)
— A highly connected node in a network that serves as a central routing point for information and rela…
Hub-and-Spoke (Point Guard Dominant):
— High centrality for primary ball handler - Few triangles - Efficient but predictable
HubSpot Academy
— academy.hubspot.com Free certification courses in email marketing, content marketing, social media s…
Hudl Sportscode
— hudl.com/products/sportscode Industry-standard video analysis platform used for tactical tagging and…
Hudl/Wyscout
— Type: Video analysis platform - Set Piece Features: Clip tagging and analysis
Hugging Face Transformers
— Pre-trained models - BERT, RoBERTa, GPT - Easy fine-tuning
HuggingFace Datasets Hub
— URL: https://huggingface.co/datasets - Description: Centralized repository hosting 100,000+ datasets…
HuggingFace ecosystem
— a collection of open-source libraries that has become the standard toolkit for working with pre-trai…
HuggingFace Inference API
— Description: Free-tier access to thousands of hosted models for quick experimentation. - Chapters: 3…
Human baselines:
— Metaculus community median (typically 100–500 forecasters per question) - A panel of 15 superforecas…
Human beings have evolved biological systems
— hormonal, neural, genetic — that provide the raw material for sexual and romantic attraction. These …
Human Errors
— A developer runs an unqualified DELETE or UPDATE in production - A DBA drops the wrong table or tabl…
Human errors:
— Accidental DROP TABLE or DELETE without WHERE clause - Misconfigured parameters causing performance …
Human faces with strong emotion
— The fusiform face area processes faces faster than any other visual element. Faces with extreme expr…
Human Factors:
— **Notification Fatigue:** Repeated interruptions erode the user's attention and judgment - **Desire …
human knowledge
— the hidden architecture that connects every field, the universal patterns that repeat from cell biol…
Human override capability
— supply chain managers could override model predictions for categories with obviously disrupted patte…
Human Oversight (Article 14)
— [ ] Design the system to enable effective human oversight during the period of use - [ ] Enable over…
Human review included:
— A review by a member of the central ML team for models in high-impact contexts (search ranking, pric…
human review points
— moments where a practitioner reviews the intermediate output, edits it if necessary, and approves it…
Human-Machine Interfaces (HMIs)
— Operator stations that display process data and allow operator control.
HumanEval
— A **benchmark** of 164 Python programming problems used to evaluate AI code generation models. Measu…
HUMINT (Human Intelligence)
— Intelligence gathered through interpersonal contact, including informants, undercover agents, and hu…
Humor authenticity
— The quality of humor that reflects a person's genuine comedic sensibility rather than a performed or…
Humor compatibility
— The degree to which two people share a comedic sensibility; a stronger predictor of relationship sat…
Humor Styles Questionnaire (HSQ)
— Rod Martin's instrument measuring four styles of humor: affiliative, self-enhancing, aggressive, and…
Hungarian immigrants
— a category that included ethnic Magyars, Slovaks, Ruthenians, and other groups from the multi-ethnic…
Hunt & Thomas, "The Pragmatic Programmer"
— While not COBOL-specific, chapters on defensive programming, assertions, and "dead programs tell no …
Hurricane Strap Requirements by Region
— Florida and the Gulf Coast: Required since the 1990s (after Hurricane Andrew), now part of the Flori…
hustle locus
— "success is entirely within your control if you just work hard enough" — has several problems:
Huun-Huur-Tu
— formed in 1992 and consisting of four musicians from Tuva — brought this tradition to international …
Hybrid (e.g., early Polymarket):
— Decentralized settlement but centralized order book - Identifiable operator but decentralized infras…
Hybrid (Star with Movement):
— One or two primary hubs - Secondary connections between wings - Balances predictability and efficien…
Hybrid approach
— supplement collaborative filtering with content-based features (product descriptions, categories), s…
Hybrid Architecture Document
— the definitive reference showing how your system's z/OS core, cloud periphery, API gateway, event me…
Hybrid Cloud
— IBM's strategy of integrating z/OS with cloud platforms (IBM Cloud, AWS, Azure) creates demand for a…
hydraulic fracturing
— universally known as **fracking** — and **horizontal drilling** technologies. These technologies, wh…
hydraulic systems
— building a physical machine with levers and water chambers to represent the economy.
Hydrogen atom
— Ch 5 The simplest atomic system: one proton and one electron interacting via the Coulomb potential $…
hydrostatic pressure
— the same force that makes deep-sea equipment need to be pressure-rated. Hydrostatic pressure is not …
Hylleraas-Undheim-MacDonald theorem
— means the linear variational method gives upper bounds on *all* eigenvalues, not just the ground sta…
hyperbolic paraboloid
— a three-dimensional architectural form. He submitted this observation to Le Corbusier, who immediate…
Hypergamy
— The tendency, documented most strongly in heterosexual populations and historically grounded context…
Hypermodern Python
— Claudio Jolowicz (https://cjolowicz.github.io/posts/hypermodern-python-01-setup/) A series of articl…
Hyperparameter tuning
— grid search, random search, and Bayesian optimization — systematically optimizes model configuration…
hyperparameters
— settings that are not learned from data but must be chosen by the practitioner. A random forest has …
Hyperpersonal communication
— A pattern in computer-mediated communication in which text-based exchange produces higher levels of …
Hyperphysics — Acoustics
— hyperphysics.phy-astr.gsu.edu/hbase/Sound/ Georgia State University's Hyperphysics site includes wel…
HyperPhysics — Hydrogen Fine Structure
— [hyperphysics.phy-astr.gsu.edu](http://hyperphysics.phy-astr.gsu.edu/) Clear, diagrammatic explanati…
Hypotheses to Test:
— Does conversion rate decline as shootout progresses? - Do teams shooting first have an advantage? - …
Hypotheses:
— $H_0$: The two populations have the same distribution (the values from one group are equally likely …
Hypothesis
— A Python library for **property-based testing** that automatically generates test inputs to find edg…
hypothesis testing
— the formal framework for answering questions like "is this difference real?" Sam's question about Da…
Hysteresis
— The phenomenon whereby a system's state depends on its history, not just current conditions; a phase…
I
I have a laptop or desktop computer
— Follow the LUW path. Start with Section 4.2. - **I have mainframe access through my employer** -- Fo…
I will review my risk portfolio when:
— [ ] A core stability asset is threatened or lost - [ ] A calculated bet pays off significantly (do I…
I-position
— a calm, non-defensive statement of one's own values or perspective, without demanding that the other…
I/O characteristics of batch programs:
— Input comes from files (sequential, VSAM, DB2 tables), not from the keyboard. - Output goes to files…
I/O characteristics of interactive programs:
— Input comes from the keyboard (ACCEPT from CONSOLE or SCREEN SECTION). - Output goes to the screen (…
I/O Optimization:
— [ ] All critical-path datasets use half-track optimal BLKSIZE - [ ] BUFNO=20-30 for large sequential…
I/O savings:
— Compressed data means fewer pages to read from disk. Buffer pool hit ratios improve because more dat…
i360
— The Republican-aligned voter file and analytics vendor associated with the Koch network.
Iatrogenesis
— Harm caused by the healer; originally a medical term, extended to any situation where well-intention…
IBM Academic Initiative:
— Over 200 universities worldwide have access to z/OS through IBM Z Xplore - Free cloud-hosted mainfra…
IBM ADDI Dependency Analysis:
— Traces data flow across programs (field A in program X feeds field B in program Y via a shared file)…
IBM API Connect Documentation
— Complete reference for API Connect, including the API Manager, Developer Portal, Gateway, and Analyt…
IBM Batch Toolkit for z/OS
— Utilities for managing batch job flows, checkpoint/restart, and sequential file operations.
IBM Certification C1000-047 (DB2 11.1 DBA for LUW)
— Advanced DDL topics including tablespace design, index strategies, online schema changes, and storag…
IBM Certifications
— *IBM Certified System Programmer — z/OS*: Validates deep z/OS system programming knowledge. Respecte…
IBM Certified Database Administrator - DB2 LUW
— REORG, RUNSTATS, BACKUP, RESTORE, ROLLFORWARD, LOAD, and EXPORT are all covered in the exam objectiv…
IBM CICS Community
— Active community forum for CICS practitioners. Questions about topology design, CICSPlex SM configur…
IBM CICS Community — Recovery Forum
— Active discussion forum for CICS recovery questions. Topics frequently include indoubt resolution pr…
IBM CICS Developer Center
— Code patterns, tutorials, and sample applications for CICS web services. Includes a "Hello World" RE…
IBM CICS GitHub
— Open-source tools and samples for CICS modernization, including REST API generators and testing fram…
IBM CICS Performance Analyzer (CICS PA)
— IBM's primary tool for CICS performance analysis. Processes SMF 110 records and produces reports on …
IBM CICS Security Verification Tool
— Automates the verification of CICS security configurations against best practices. Available as a Su…
IBM Cloud Blog: Database Category
— Regular articles on Db2 on Cloud features, performance tips, and customer stories. https://www.ibm.c…
IBM Cloud Direct Link
— Dedicated network connectivity between on-premises data centers and IBM Cloud. https://cloud.ibm.com…
IBM Cloud VPC Documentation
— Configuring Virtual Private Clouds, subnets, security groups, and private endpoints for Db2. https:/…
IBM COBOL Cafe
— IBM's community forum for COBOL developers. Discussions often touch on program structure, coding sta…
IBM Compiler Options for OO COBOL:
— `THREAD` - Required for OO COBOL programs that use Java interoperability - `RENT` - Reentrant code, …
IBM Data and AI Community
— IBM's community forums for Db2 users. Includes discussion boards, technical articles, and access to …
IBM Data Community Forums
— Active forums where DB2 DBAs discuss utility strategies, troubleshoot problems, and share maintenanc…
IBM Data Replication: CDC for Db2
— Technical guide for configuring Change Data Capture replication from DB2 z/OS and Db2 LUW to cloud t…
IBM Data Server Manager
— Web-based monitoring and administration tool for DB2 LUW. Provides real-time monitoring dashboards, …
IBM Data Studio
— Free IDE for working with DB2 on z/OS, including stored procedure development for API-based data acc…
IBM Database Conversion Workbench (DCW)
— Free tool available from IBM for Oracle-to-DB2 schema and stored procedure conversion. Search for "D…
IBM Database Migration Guide
— Strategies and tools for migrating to Db2 on Cloud from on-premises environments. https://cloud.ibm.…
IBM DB2 13 for z/OS Documentation
— SQL Reference: https://www.ibm.com/docs/en/db2-for-zos/13 - Covers all data types, CREATE TABLE synt…
IBM Db2 for Linux, UNIX, and Windows Documentation
— Search for "Db2 LUW" on IBM Documentation. The Db2 11.5 documentation set covers installation, SQL r…
IBM Db2 for LUW 11.5 Knowledge Center
— docs.ibm.com — The complete reference for all SQL, administration commands, configuration parameters…
IBM Db2 for z/OS 13 Knowledge Center
— The complete reference for z/OS-specific utilities, commands, and subsystem configuration.
IBM DB2 for z/OS Community
— Forum discussions on partition key selection, DPSI vs. NPSI trade-offs, and rolling window automatio…
IBM Db2 for z/OS Documentation
— Search for "Db2 for z/OS" on IBM Documentation (ibm.com/docs). Look for the "Db2 12 for z/OS" collec…
IBM DB2 for z/OS: SQL Reference
— Complete SQL syntax reference including all SQLCODE values and SQLSTATE mappings. - **IBM DB2 for z/…
IBM Db2 Knowledge Center: "Security"
— Covers authentication, authorization, LBAC, RCAC, audit policies, and encryption configuration. The …
IBM Db2 on Cloud Documentation
— Complete reference for provisioning, connecting, managing, and scaling Db2 on Cloud instances. https…
IBM Db2 on Cloud: Getting Started Tutorial
— Step-by-step guide to provisioning and connecting to your first Db2 on Cloud instance. https://cloud…
IBM Db2 on Cloud: High Availability
— Details on the multi-zone HA configuration, automatic failover, and RPO/RTO characteristics. https:/…
IBM Db2 Operator for Kubernetes
— Documentation for the Db2uCluster custom resource and operator-based deployment on OpenShift and Kub…
IBM DB2 SQL Reference
— For the specific SQL syntax of all queries demonstrated in this chapter, including MON_GET functions…
IBM Db2 Warehouse on Cloud Documentation
— Reference for the analytics-optimized managed service, including BLU Acceleration, data loading, and…
IBM Debug Tool for z/OS
— Interactive debugger that allows setting breakpoints, inspecting data values, and stepping through C…
IBM Dependency Based Build (DBB)
— https://www.ibm.com/docs/en/dbb — Build automation for z/OS that understands COBOL dependencies.
IBM Developer — CICS
— Code patterns, tutorials, and API documentation for CICS TS. Particularly useful for Liberty JVM ser…
IBM Developer: "COBOL interoperability with Java"
— Tutorial on calling COBOL from Java and Java from COBOL, building on BY VALUE parameter passing conc…
IBM Developer: COBOL String Handling
— Articles and tutorials on using COBOL string facilities for modern data interchange, including XML a…
IBM Developer: Db2
— Articles, tutorials, and code samples for DB2 application development.
IBM developerWorks (now IBM Developer)
— Tutorials and sample code for DB2 DDL on both platforms. Search for "DB2 CREATE TABLE best practices…
IBM DeveloperWorks: "Understanding DB2 logging"
— Deep-dive into log architecture, log buffer management, and log-related performance tuning.
IBM DFSORT (ICETOOL)
— z/OS utility for sorting, merging, copying, and reformatting sequential files. Often used in JCL ste…
IBM DS8000 Series documentation
— For understanding FlashCopy, Metro Mirror, and Global Mirror at the storage level. These technologie…
IBM Enterprise COBOL for z/OS Documentation
— IBM's official language reference and programming guide. Available free online at IBM Documentation.…
IBM Enterprise COBOL for z/OS: Language Reference
— Chapter on Compiler-Directing Statements, COPY statement section. The definitive reference for COPY …
IBM Enterprise COBOL for z/OS: Programming Guide
— "Using copy libraries" section. Practical guidance on copybook organization, SYSLIB concatenation, a…
IBM Enterprise COBOL: Best Practices
— IBM Redpaper or Redbook (search IBM Redbooks for "COBOL best practices"). Provides IBM's own recomme…
IBM Fault Analyzer for z/OS
— Automatically analyzes ABENDs and produces human-readable diagnostic reports including the failing i…
IBM File Manager for z/OS
— Utility for inspecting and editing VSAM and sequential files using COBOL copybook layouts. Invaluabl…
IBM heritage
— IBM's coding standards for decades recommended PERFORM THRU with EXIT paragraphs. Many large enterpr…
IBM Hyper Protect Crypto Services
— FIPS 140-2 Level 4 certified HSM for the highest level of key management security. https://cloud.ibm…
IBM IMS Community on LinkedIn
— Discussions on IMS best practices and modernization.
IBM InfoSphere Data Replication
— Documentation for configuring CDC (Change Data Capture) on DB2 for z/OS and LUW, including log-based…
IBM Key Protect
— Key management service for encryption at rest. BYOK configuration and key rotation. https://cloud.ib…
IBM MQ and CICS Integration Patterns (SG24-8374)
— Covers MQ as a 2PC participant in CICS transactions, MQ connection recovery, and shared queue archit…
IBM MQ Explorer
— GUI tool for managing MQ queues, monitoring messages, and testing MQ programs.
IBM MQ for z/OS Programming Guide
— Covers the MQPUT, MQGET, and MQOPEN calls used in the COBOL examples in section 22.3. The chapters o…
IBM MQ for z/OS: Application Programming Reference
— https://www.ibm.com/docs/en/ibm-mq — COBOL MQI API reference including MQPUT, MQGET, and all data st…
IBM MQ: Designing and Implementing Solutions
— IBM Redbooks. Comprehensive guide to MQ architecture and programming including COBOL examples.
IBM OMEGAMON for CICS
— Real-time CICS monitoring tool that provides graphical dashboards for task counts, storage usage, di…
IBM OMEGAMON for DB2 Performance Expert
— Real-time and historical DB2 performance monitoring including thread-level analysis, lock contention…
IBM Quantum Learning
— Interactive tutorials on quantum error correction, including hands-on exercises using IBM's quantum …
IBM Rational Developer for z/OS (RDz)
— IDE with copybook navigation, cross-reference analysis, and expanded source viewing.
IBM Redbook: "IBM DB2 Certification Guide"
— IBM has published certification study guides as Redbooks for various DB2 versions. Search the IBM Re…
IBM Redbooks
— IBM Redbooks (redbooks.ibm.com) publish in-depth technical guides written by IBM specialists and cus…
IBM Redbooks: "Batch Modernization on z/OS"
— Covers how modular COBOL batch programs can be incrementally modernized using techniques that depend…
IBM Redbooks: "COBOL Application Modernization"
— Discusses how nested programs interact with modernization strategies, including when to refactor nes…
IBM Redbooks: DFSORT Tricks
— Collection of practical DFSORT examples and patterns commonly used in production environments.
IBM Research: AI for Database Management
— IBM publishes research on AI-assisted database administration, including automatic indexing, workloa…
IBM Skills Academy
— Structured learning paths for IBM certifications. - **Coursera / edX** -- Several universities offer…
IBM Spectrum Protect (TSM) documentation
— For understanding how archive logs and backup images are managed by enterprise backup infrastructure…
IBM Support — CICS Recovery APARs
— Search for APARs related to CICS recovery to stay current on known issues and fixes. Recovery-relate…
IBM Support: DFSORT FAQ
— Frequently asked questions about DFSORT including MERGE syntax, OUTFIL for multiple outputs, ICETOOL…
IBM Systems Magazine (archived)
— formerly IBM Systems Magazine, now IBM Z and LinuxONE Community Published technical articles on Para…
IBM TechU / IBM Z Day
— IBM's technical conferences include sessions on DB2 version migration, with specific guidance on Com…
IBM TechU — API Economy Sessions
— IBM's technical conference includes sessions on API exposure from z/OS, including live demonstration…
IBM TechU — CICS Advanced Recovery Sessions
— Deep-dive sessions on CICS recovery internals, two-phase commit optimization, and Sysplex-aware reco…
IBM TechU — CICS Deep Dive Sessions
— IBM's technical conference includes multi-hour deep dives on CICS internals, including dispatcher me…
IBM watsonx Code Assistant for Z
— https://www.ibm.com/products/watsonx-code-assistant-z — AI-powered COBOL understanding and Java conv…
IBM Wazi
— https://www.ibm.com/products/wazi — Cloud-native z/OS development and testing environments.
IBM Z and LinuxONE Community
— https://community.ibm.com/community/user/ibmz-and-linuxone/home IBM's community platform for z/OS pr…
IBM Z as a Service (ZaaS)
— Full z/OS environment in the cloud - **Wazi as a Service** — Development and test z/OS instances - *…
IBM Z Career Resources
— https://www.ibm.com/z/careers — Job listings, training paths, and career guides for mainframe profes…
IBM Z Content Solutions: z/OS Batch Modernization
— IBM's curated collection of articles, Redbooks, and tutorials on modern batch processing patterns in…
IBM Z Modernization Center
— https://www.ibm.com/z/modernization — Resources, tools, and case studies for mainframe modernization…
IBM Z Open Editor
— Advanced COBOL editing, includes copybook support - **COBOL Lint** — Basic static analysis
IBM Z Security Community
— https://community.ibm.com/community/user/ibmz-and-linuxone/communities/community-home?communitykey=5…
IBM Z Software Pricing Reference
— IBM's official documentation of MLC and sub-capacity pricing mechanics. Updated periodically. Unders…
IBM Z Xplore
— Free hands-on learning platform for mainframe development. Includes exercises on data description an…
IBM Z Xplore Learning Paths
— Structured exercises within the Z Xplore platform, progressing from basic TSO navigation through COB…
IBM Z YouTube Channel
— IBM's official channel for mainframe content, including DB2-related presentations, demos, and confer…
IBM z/Architecture Principles of Operation
— Chapter on "Packed Decimal Instructions." For readers who want to understand exactly how the hardwar…
IBM z/OS Connect Documentation
— Getting Started guide (ACL implementation) 3. **IBM MQ Kafka Connector Documentation** (event mesh i…
IBM z/OS Connect EE
— Middleware that reads COBOL copybooks and automatically generates RESTful API definitions for mainfr…
IBM z/OS Connect EE Documentation
— The complete reference for z/OS Connect EE installation, configuration, and administration. Start wi…
IBM z/OS DFSMS: Using Data Sets
— Comprehensive guide to z/OS dataset management including sequential datasets, PDSs, VSAM, and GDGs. …
IBM z/OS MVS JCL Reference — "COND parameter"
— Documents how JCL uses return codes to control job step execution, providing the operational context…
IBM z/OS MVS System Codes
— Complete reference for system ABENDs (S0C7, S0C4, etc.) and user ABENDs. Essential for diagnosing pr…
IBM z/OS Skills Events and TechU
— IBM's annual technical conference for z/OS professionals. Attending (or presenting) keeps you curren…
IBM z/OS: Bridging the Past and the Future
— IBM Redbooks publication. Covers the architectural evolution of z/OS and strategies for modernizatio…
IBM-MAIN mailing list
— Active community of z/OS professionals. Searchable archives contain decades of practical REXX and au…
IBM-specific details:
— `DISPLAY UPON SYSOUT` sends output to the SYSOUT DD statement in the JCL, which typically goes to a …
IBM. "API Economy on z/OS" white paper.
— Strategic overview of exposing mainframe capabilities as APIs, including business case analysis, arc…
IBM. "IBM InfoSphere Data Replication for z/OS"
— Product documentation for IBM's log-based CDC solution. Covers DB2 log reading, change capture confi…
IBM. "z/OS Unicode Services"
— Documentation for z/OS Unicode conversion services, including support for UTF-8, UTF-16, and various…
ICA (International Compliance Association)
— UK-based compliance professional body with AML/KYC certification programs. int-comp.org.
ICCPR Article 20
— The provision of the International Covenant on Civil and Political Rights requiring states to prohib…
ICCV (International Conference on Computer Vision)
— Biennial major conference
Ice cores
— samples drilled from glaciers and ice sheets in Greenland, Antarctica, and other cold regions — cont…
ICF catalog
— Integrated Catalog Facility. The z/OS catalog structure that maps dataset names to physical volume l…
IDCAMS
— An IBM utility program (Access Method Services) used to define, alter, delete, and manage *VSAM* dat…
IDE (Integrated Development Environment)
— A software application that provides comprehensive facilities for software development, typically in…
Ideal types
— simplified, abstracted representations that different communities can fill in with local detail. A d…
Idealization
— The tendency in early romantic attraction to perceive a partner more positively than their behavior …
idempotent
— safe to execute multiple times. If the compensation itself fails and is retried, it must produce the…
Idempotent design prevents duplicate processing
— use unique transaction IDs and state checks so operations are safe to retry.
Identical database schema
— the standby must be a restored image of the primary (same structure, same data) 2. **Compatible DB2 …
Identical particles
— Ch 15.1 Particles of the same species (e.g., two electrons) that are fundamentally indistinguishable…
identification
— identifying the map with the territory, the word with the thing, the model with reality. He argued t…
IDENTIFICATION DIVISION
— The first of COBOL's four divisions. Contains the PROGRAM-ID paragraph (required) and optional infor…
Identification reveals a long stakeholder list:
— Patients who receive scans — their diagnoses, treatment, and survival outcomes depend on the tool's …
Identification Section (all subtypes):
— Job name, job number, JES job ID - Step name and program name - System ID (critical in sysplex envir…
Identification:
— `game_id` - Unique game identifier - `play_id` - Play number within game - `posteam` / `defteam` - P…
identified
— he personally values the strategic contribution it would make, and he genuinely believes in the idea…
identified stranger
— a neighbor you have nodded to but never spoken with, a regular at your gym whom you see three times …
identifier
— matches a data name - A **literal** — matches a literal value - A **COBOL word** — matches a reserve…
Identifier replacement surprises
— Identifier REPLACING only matches complete words; use pseudo-text for partial matches.
Identify a text corpus
— party manifestos, speeches, social media posts. 2. **Define a populism dictionary** — words and phra…
Identify and handle missing data
— the decision of how to handle missing values can change results, and students need to understand the…
Identify areas for further study
— students should leave knowing what comes next (graduate stats, data science, research methods). 3. *…
Identify leverage points
— places in the system where small changes can have large effects - **Offer evidence-based techniques*…
Identify production anomalies
— Young age with production - Extreme improvement - Position-unusual skills
identify source before selecting solution
— is the key insight from this case study. Most homeowners' first instinct when air quality is a conce…
Identify sources of bias
— sampling bias, response bias, and confounding are concepts students will use for the rest of the cou…
Identify the components of the mainframe ecosystem
— z/OS, JCL, CICS, DB2, VSAM -- and explain how COBOL programs interact with each component
Identify the conditions that produce flow states
— those rare, magical periods of deep, effortless-feeling focus - **Apply at least two practical strat…
Identify the Implicit Audience
— Who is this advertisement addressed to, explicitly and implicitly? - What does the advertisement ass…
Identify the Legal Baseline
— What constitutional framework governs? (First Amendment for U.S. federal action; other frameworks fo…
Identify the message
— What question should this chart answer? 2. **Audit the encodings** — Is each visual element the best…
Identify the pain point
— Start with a real problem the team is experiencing. 2. **Propose a convention** -- A team member dra…
Identify the Source
— Who paid for this advertisement? - Is the stated source the actual funding source? Are there front o…
Identify the strategic ambiguity mechanism
— what interpretation does it invite if received well, and what interpretation is available if it's no…
Identify the three strongest transfers
— the mappings where the structural similarity is deepest. For each, articulate the abstract schema in…
Identify the trigger
— why now? What crossed a threshold? 3. **Map the pattern** — what is recurring? What is the theme? Na…
Identify universal experience
— something most people have encountered 2. **Articulate what nobody says** — the thought everyone has…
Identify where the client is incorporated
— the client's country may have specific requirements for authorization 3. **Identify where personal d…
Identify your highest-priority concern
— the single most important problem your analysis revealed. (You may have found many problems; the ref…
Identify your target emotion
— what should the viewer feel most at the end? 2. **Choose your arc pattern** — which shape serves you…
Identifying a Zinsco Panel:
— Panel door often tan, cream, or brown - Breakers are distinctive: multicolored plastic handles (ofte…
Identifying Characteristics:
— **Panel door:** Often gray or tan metal, may have the name "Federal Pacific Electric," "FPE," or "St…
Identifying Constraints:
— Testing windows and blackout periods - Systems that must not be disrupted (production databases, med…
Identifying data needs:
— What variables are required? - What time period is relevant? - What competitions or teams should be …
Identifying Doubt Manufacturing
— [ ] Does the claim emphasize uncertainty rather than asserting an alternative explanation? This is t…
Identifying your application
— good practice and sometimes required: ```python headers = { "User-Agent": "AcmeCorp-Analytics/1.0 (p…
Identity
— viewers tagged the person they recognized in the sketch ("@mom this is literally you"). Secondary tr…
Identity (all clients)
— Government-issued photo ID (non-expired) - Proof of address (< 3 months)
Identity and Access Management:
— Azure Active Directory (Entra ID) as primary identity provider. - Hybrid configuration with on-premi…
Identity Erosion
— The process by which a creator's authentic identity and creative voice are gradually replaced by a p…
identity erosion through parasocial optimization
— the process by which creators progressively reshape their identity, content, and self-expression to …
Identity foreclosure
— Marcia's term for a premature identity commitment without exploration; often involves adopting paren…
identity fragmentation
— the feeling of being divided between two selves, neither of which is fully authentic. The profession…
Identity fusion
— the collapse of the boundary between self and brand — is a creator-specific phenomenon that most men…
Identity is the story we tell about who we are
— an integrative narrative that organizes personality, roles, values, history, and future direction in…
Identity layer (Aadhaar)
— biometric identity for authentication - **Payments layer (UPI)** — instant mobile payments between b…
Identity loss
— the loss of a role, a self-concept, or a way of being in the world that mattered. The career that de…
Identity moratorium
— Marcia's term for the period of active exploration without commitment; associated with anxiety but a…
identity narratives
— the stories people construct about their own lives. McAdams argues that identity is not a fixed trai…
Identity protection limit
— The reduced effectiveness of inoculation when the target false belief is identity-embedded, i.e., a …
Identity resolution
— The technical process of linking records from different data sources to construct a unified profile …
identity signaling
— communicating to their social circle: "This is the kind of person I am."
Identity Threat
— A threat to a person's core sense of self — their competence, integrity, values, or character — whic…
Identity Verification
— [ ] Certified copy of unexpired government-issued photo ID (passport preferred) - [ ] Independent ve…
Identity-based habits
— Clear's framework for habit formation that prioritizes identity ("who do I want to be?") over outcom…
Identity-based targeting
— Digital advertising directed at specific, identified individuals (via voter file matching), as oppos…
identity-embedded
— when holding it is part of how a person defines their membership in a valued social group.
Identity-protective cognition
— A specific form of motivated reasoning in which factual claims are evaluated based on their implicat…
Identity:
— You are genuinely excited about building an organization, not just scaling personal output: __/5 - Y…
ideological radicalization
— users progressively recommended more extreme versions of content they have already engaged with, reg…
Ideological sorting
— The process by which the two major political parties have become more internally homogeneous ideolog…
idol
— A K-pop entertainer who is the focus of fan community attachment — typically a member of a group. Th…
IDUG (International DB2 Users Group)
— https://www.idug.org — The largest community of DB2 professionals. Technical library, conference pre…
IDUG Annual Conferences
— Migration and schema evolution are perennial topics at IDUG conferences. Look for presentations tagg…
IDUG Conference Presentations
— IDUG makes many of its conference presentations available to members. These are often the most pract…
idug.org
— IDUG's technical library contains thousands of presentations from DB2 practitioners. Search for "opt…
IEEE 754-2008 (Floating-Point Arithmetic)
— The standard that defines DECFLOAT behavior. Relevant if you use DECFLOAT(16) or DECFLOAT(34) for fi…
IEEE Standards Association
— IEEE's Ethically Aligned Design framework (now in its second edition) provides a comprehensive norma…
IF
— The fundamental COBOL conditional statement. Supports nested IF, IF/ELSE, and compound conditions us…
If DORA Major Incident:
— Initial notification: within 4 hours of classification - Intermediate report: within 72 hours of cla…
If gambling:
— Winnings are reported as "other income" on Line 8 of Schedule 1 - Losses are deductible only as item…
If Green Bay extends at "elite" rates:
— Total investment risk: ~$45M over contract - Expected performance decline: Regression to ~20th ranke…
If investment:
— Gains are capital gains (short-term or long-term) - Losses are deductible against gains plus up to $…
If Jackson opts in:
— Portland pays $22M for projected ~1.2 VORP - $/VORP: ~$18M (well above market) - Limits flexibility …
If Jackson opts out:
— Creates $22M in cap space - Allows pursuit of replacement options - Risk: May need to overpay for re…
If NO wins (Republican wins):
— Loss on Kalshi = $0.51. - Payout from PredictIt = $1.00, but settlement fee = 10% of ($1.00 - $0.49)…
If no — LP(64) strategy:
— Which tables move above the bar? _______________ - Below-bar working storage after migration: ______…
If risk had been reported qualitatively
— "Our exposure is substantial and the models may underestimate extreme scenarios" — senior management…
if statement
— the simplest form of a **conditional**. Let's break down every piece:
If successful (60% probability):
— You have 1st and 10 from opponent's 42-yard line - Expected Points from opponent's 42: approximately…
If unsuccessful (40% probability):
— Opponent has ball at your 40-yard line - Expected Points for opponent there: approximately +2.1 EP -…
If YES wins (Democrat wins):
— Payout from Kalshi = $1.00 (no settlement fee). Net from Kalshi = $1.00 - $0.51 = $0.49. - Loss on P…
If you are drawn to applications:
— Identify a domain problem (healthcare, climate, education, materials science) and build an end-to-en…
If you are drawn to engineering:
— Deploy a model to production---even a small personal project---and handle the full lifecycle: data, …
If you are drawn to research:
— Read the top 10 most-cited papers from the last NeurIPS or ICML. Reimplement at least one. - Pick an…
If you are drawn to safety and governance:
— Study the mechanistic interpretability research from Anthropic and DeepMind in depth. - Participate …
If you are new to databases entirely
— perhaps a COBOL programmer who has been handed DBA responsibilities, or a computer science student w…
If you go for it:
— Probability of conversion × Value of first down at that spot - Probability of failure × Cost of oppo…
If you have product sales:
— AOV = Total product revenue ÷ Number of orders - If you don't have data yet: define your planned pro…
If you loved algorithms (Ch 17-20):
— Solve problems on LeetCode, HackerRank, or Project Euler - Implement a data structure from scratch (…
If you loved Crypts of Pythonia (game-adjacent):
— Expand the text adventure with new rooms, items, and quests - Build a different genre (roguelike, pu…
If you loved data and automation (Ch 7-10, 21-24):
— Build a budget tracker that reads your bank's CSV exports - Create a script that monitors a website …
If you loved OOP and design (Ch 14-16):
— Build a card game with proper class hierarchies - Create a simulation (ecosystem, traffic, economics…
If you need a refresher:
— *Computer Science Distilled* by Wladston Ferreira Filho - Harvard CS50 (free on YouTube/edX) — Weeks…
If you punt:
— Expected net punt distance × Value of opponent having ball at that field position
If You Smell Propane or Fuel Oil
— Propane: Evacuate immediately. Do not operate any electrical switches (including light switches — ev…
If you suspect stalkerware on your device:
— Use a secondary device for sensitive communications while investigating. - Contact the National Dome…
If you want more on apology and forgiveness:
— *Why Won't You Apologize?* — Harriet Lerner (2017). Focuses specifically on what makes apologies gen…
If you want more on cross-cultural communication:
— *The Culture Map* — Erin Meyer (2014). Maps eight dimensions of cultural difference in communication…
If you want more on feedback and accountability:
— *Thanks for the Feedback* — Douglas Stone and Sheila Heen (2014). Focuses on the receiver's side of …
If you want more on trauma and the body:
— *The Body Keeps the Score* — Bessel van der Kolk (2014). The essential trauma text. Explains why cer…
If you're learning a language:
— Don't just memorize vocabulary lists (shallow). Use new words in sentences you create (deep). Connec…
If you're learning a professional skill:
— Don't just read about the skill or watch someone else do it (shallow). Try it yourself, reflect on w…
If you're struggling but making partial progress
— it's probably desirable. You can feel yourself inching toward understanding. You're activating relev…
If you're studying history:
— Don't just memorize dates and names (shallow). Ask *why* events happened and *how* they connect to o…
If you're studying math or physics:
— Don't just re-read worked examples (shallow). Cover the solution and try to solve the problem yourse…
If your range hood recirculates:
— Recirculating hoods remove grease and odor but return moisture and combustion gases to the kitchen. …
If your resolution is low:
— Your forecasts are not differentiating between events that happen and events that do not. - Focus on…
If your system does not use computer vision:
— Could computer vision be added to your system? Would it help or create new risks? - Does your system…
If your system processes visual information:
— What types of visual tasks does it perform? (Classification, detection, segmentation, facial recogni…
Ignition failure:
— Check for adequate gas pressure and gas line capacity. - Confirm the unit's venting is unobstructed.…
Ignore when:
— The source is anonymous or has no connection to your life - Engaging would give the content more vis…
Ignoring expected completion probability
— A 5-yard checkdown ≠ 5-yard comeback route - Always compare to expectation
Ignoring rate limits
— Results in IP blocking and unreliable data collection 2. **Not validating data** - Garbage in, garba…
Ignoring the client's threat model
— A pentest should simulate realistic threats, not generic ones. 2. **Overlooking credential attacks**…
Ignoring VORP
— Drafting QBs early when replacement QBs are adequate 2. **Chasing TDs** - TD rates regress heavily; …
igraph
— R network library - Fast algorithms - CRAN package
ILD (Interaural Level Difference)
— The difference in sound pressure level between the two ears, arising from the acoustic "shadow" cast…
illegible knowledge
— the tacit, local, experiential knowledge that legibility projects tend to destroy.
illusion of fluency
— recognition ≠ understanding
Illusion of invulnerability
— excessive optimism; willingness to take extreme risks 2. **Collective rationalization** — discountin…
Illusion of unanimity
— false perception that group members agree; silence taken as consent
Illusory correlation
— The tendency to perceive a relationship between two variables when no such relationship exists, or w…
Illusory truth effect
— The increase in perceived truthfulness of a claim through repeated exposure.
Image Processing:
— Real-time video processing at 25-50 fps using GPU-accelerated computing - Player detection using mac…
Image security is foundational
— Vulnerable base images, embedded secrets, and supply chain compromises start at the build stage and …
Image Signing and Verification
— Use cosign or Notary to sign images and enforce signature verification at deployment time via admiss…
Image-Level Threats:
— Vulnerable base images with known CVEs - Embedded secrets (API keys, passwords) in image layers - Ma…
ImageNet (ILSVRC)
— URL: https://www.image-net.org - Description: 1.28 million training images across 1,000 classes. The…
ImageNet features transfer broadly
— even to domains as different as satellite imagery, medical imaging, and industrial inspection.
Imagination
— brain generates predictions (computes probability distributions) 2. **Tension** — arousal as event a…
Imagined community
— Benedict Anderson's concept of the sense of belonging to a national group whose existence one cannot…
Immediacy
— Any arriving trader can execute instantly rather than waiting for a natural counterparty. 2. **Price…
Immediate
— no delay between activation and order cancellation 2. **Comprehensive** — cancels orders on all trad…
Immediate (30 days):
— Update privacy policy to reflect current data practices and publish. - Clear the backlog of late DSA…
Immediate (call professionals):
— Termite tube found at center pier — call a licensed pest inspector for a full termite inspection. If…
Immediate (Quick Wins, Week 1-2):
— DEBT-046: Update outdated dependency with known CVE (security) - DEBT-044: Remove unused dependencie…
Immediate (this season, under $200 total):
— Weatherstripping replacements - Threshold seal replacements - Window caulk repairs - Garage door sea…
Immediate (this week)
— [ ] Set a recurring quarterly calendar block: "AI Practice Review" - [ ] Create or update your effec…
Immediate actions (this month):
— Replace HVAC filter - Water quality test - Investigate NW corner moisture/drainage - Set up propane …
Immediate consequences:
— VitraMed's Series C funding round was delayed by four months. Two potential investors withdrew. The …
Immediate fix
— clean input data in CLM-ADJUD:
Immediate impact (CBNC4500):
— Elapsed time: 2:47 (unchanged from pre-checkpoint; the 4-minute overhead was offset by the better co…
Immediate impact:
— Parents received a phone call saying their newborn may have a serious metabolic disorder. - They wer…
Immediate Mitigations:
— Apply Microsoft's patches immediately - Disable the Print Spooler service on systems that do not req…
Immediate Recovery (Within the Conversation)
— "Let me start that over — I said it badly." - "I'm getting in my own way here. Can I try again?" - "…
Immediate relief:
— Take a planned break with a return date. Tell your audience: "I'll be back on [date]." The specifici…
Immediate remediation:
— Marketing CRM migrated to secure platform (2 weeks) - Decommissioned legacy systems permanently dele…
Immediate repair items (8 total):
— Missing smoke detector on second floor - GFCI protection absent at both bathrooms and kitchen - Hand…
Immediate Response:
— Major QB injury: 3-5 point line movement - Star player: 1-2 point movement - Role player: 0.5 or les…
Immediate rollback
— Deploy the previous version as soon as a problem is detected. This is the simplest and most reliable…
Immediate water extraction:
— Use a wet-dry vacuum or submersible pump for standing water. - Open windows and run dehumidifiers an…
immediately erases all its content
— before you've written a single byte. There is no undo. This is the file I/O equivalent of `rm` — it …
Immediately involve counsel if:
— You believe you may have already violated a legal obligation through AI use (trade secret disclosure…
Immediately:
— nflfastR EP model documentation - Big Data Bowl data dictionary for current year
Immigrant communities
— Italian, Hungarian, Polish, and other groups arriving in the coalfields during this exact period — w…
Immigrant housing
— for Italian, Hungarian, Polish, and other European immigrant miners — was often grouped in distinct …
immigrants
— Italians, Hungarians, Poles, Slovaks — recruited from the industrial cities of the Northeast or dire…
immigrants from Southern and Eastern Europe
— Italians, Hungarians, Poles, Slovaks, Czechs, and others — recruited from Ellis Island or from the i…
immutable
— they represent completed financial events and must not be modified (a regulatory requirement). Pendi…
Impact
— *Producing meaningful change in teams, organizations, communities*
Impact (1-10):
— Revenue potential or cost savings (0-3 points) - Strategic alignment with organizational priorities …
Impact Assessment:
— SQL injection in patient search could expose Protected Health Information (PHI) for all patients - C…
impact factor
— a number assigned to each journal that represents the average number of citations received by papers…
Impact metrics:
— Business value generated by AI projects (measured in collaboration with business units) - Number of …
Impact on file processing:
— Files sorted on one platform may not be correctly sorted on another - The balanced line algorithm as…
Impact on markets:
— Market 1 (Winner): Continues --- the replacement candidate runs under "Democratic Party nominee" cat…
impact receipt
— a structured check after a significant conversation where you invite the other person to describe th…
Impact:
— Passing severely limited - Field frozen solid - One of coldest games ever
impasse
— Phase 1 of the insight process. She'd exhausted the approaches available within her current framing.…
Impedance
— See *Acoustic impedance.* In electronics, impedance (Z) is the complex ratio of voltage to current, …
Impersonation
— You create a fake account impersonating a credible news organization or public figure, learning how …
Impersonation of authoritative sources
— campaign communications designed to look like election authority notices, government documents, or o…
Implant devices:
— Network implants (LAN Turtle, Packet Squirrel) - USB rubber ducky / Bash Bunny for keystroke injecti…
Implement systematic betting processes
— checklists, decision rules, automated guardrails, and review cycles --- that enforce discipline inde…
Implement these calculations yourself
— do not import the `statistics` module or `numpy`. The point is to practice the algorithms.
implementation fidelity
— the drug is the same drug, the dosage is the same dosage, the protocol is the same protocol. Educati…
Implementation intention
— Gollwitzer's if/then planning format: "If [situational cue], then I will [behavior]"; highly effecti…
Implementation intentions
— "When situation X occurs, I will do behavior Y" — extend goal-setting to address the implementation …
implementation-dependent
— the sort utility may place them in any order. The `WITH DUPLICATES IN ORDER` clause guarantees that …
Implications for bettors:
— Greater market access as more jurisdictions legalize - More standardized consumer protections global…
Implications for business AI:
— A recommendation engine that reveals too much about its scoring logic can leak customer purchase pat…
Implications for Farida:
— Post-trade APA publication for OTC trades in this bond: end of trading day (standard illiquid deferr…
Implications for quantum mechanics:
— All observables (Hermitian operators) have real eigenvalues. - Eigenstates of a Hermitian operator c…
Implications for soccer:
— Larger samples lead to more precise estimates - Even non-normal data (like goals, which follow a Poi…
Implications:
— How much do I need this agreement? (Inversely related to BATNA quality) - How much do they need this…
Implicit association
— An automatic, unconscious association between concepts that influences behavior and judgment without…
Implicit Association Test (IAT)
— Greenwald, McGhee, and Schwartz's (1998) computer-based measure of implicit associations; assesses a…
Implicit audience
— The imagined target reader/viewer that the message is designed for, as revealed by the prior beliefs…
Implicit cognition
— mental processing that occurs without deliberate intention or awareness — influences virtually every…
Implicit Missing Values
— Data that should exist but doesn't - Harder to detect (requires knowing what should be there) - Exam…
implicit premises
— that the argument requires but does not state?
implicit regularization
— the idea that SGD itself has an inductive bias toward simpler solutions, as discussed in Chapter 10.
Implied probabilities:
— Yankees (-135): 135 / (135 + 100) = 135 / 235 = 57.45% - Red Sox (+120): 100 / (120 + 100) = 100 / 2…
implied probability
— the probability of an outcome that the odds encode:
Implied probability from individual legs:
— Leg 1: 1/1.80 = 55.56% - Leg 2: 1/2.10 = 47.62% - Leg 3: 1/1.50 = 66.67% - Combined: 0.5556 x 0.4762…
Import checker
— verifies all imports resolve. (7) **Complexity checker** — flags overly complex functions. (8) **Dep…
import substitution
— producing locally what would otherwise have had to be imported at great cost across mountain roads t…
Importance level
— higher importance gets a higher base priority range - **Performance Index** — within an importance l…
Important because:
— Shows opportunity level - Indicates team's confidence in receiver - Correlates with raw production -…
Important behaviors:
— Skipped rows are silently omitted from the result set. There is no indication of how many rows were …
Important caveats for t-SNE:
— **Distances between clusters are not meaningful** — two clusters that appear far apart in a t-SNE pl…
Important Caveats:
— ACWR can be misleading after extended rest (low chronic load) - Individual baselines vary significan…
Important Considerations:
— Always set crawl scope to prevent testing unauthorized targets - Respect `robots.txt` during authori…
Important Entities:
— Postal and courier services - Waste management - Chemical manufacturing - Food production and distri…
Important Guidelines:
— Respect robots.txt and rate limits - Add delays between requests (3+ seconds recommended) - Cache re…
Important notes about class conditions:
— The NUMERIC test on a `PIC X` field checks that every character is a digit (0-9). Spaces, decimal po…
Important Notes:
— The API is undocumented and subject to change without notice - Requires specific headers to avoid be…
Important practical considerations for FID:
— Always use the same Inception checkpoint and preprocessing for all comparisons. - FID is sensitive t…
Important public interest reasons
— **Legal claims** - **Vital interests** of the data subject
Important Windows Task Scheduler settings:
— **Run whether user is logged on or not** — required for the task to run unattended - **Run with high…
Imported Error
— what happens when fields borrow ideas from other fields and they calcify faster because of borrowed …
Impossible expectations
— Demanding a standard of certainty that would disqualify virtually any empirical finding, applied sel…
Impostor Syndrome
— The persistent belief that one's success is undeserved and that one will eventually be exposed as in…
Impression
— A single instance of content being displayed to a user, regardless of whether they interact with it.…
Impression management
— the more deliberate, sustained shaping of how one is perceived — occupies a middle position. Everyon…
Impressions
— how many times the platform showed your content to a potential viewer - **Reach** — how many unique …
Improved Interoperability:
— Standardized interfaces for calling C, Java, and Python functions - Portable binary data formats for…
Improvement from Run A to Run C:
— Reduction: 10,000,000 - 71,943 = 9,928,057 fewer EXCPs - Percentage improvement: (9,928,057 / 10,000…
Improvisation is constrained exploration
— not random, not scripted, but a dynamically guided traversal of a structured phase space. The constr…
impulse response
— the complete record of how it responds to an instantaneous, broadband burst of sound energy. If you …
IMS
— Information Management System. IBM's hierarchical database and transaction management system for z/O…
IMS DB
— The database component of *IMS*, providing hierarchical data storage organized as segment types with…
IMS organizes data hierarchically
— segments in parent-child trees, not rows in flat tables. Understanding the hierarchy is prerequisite…
IMS TM
— The transaction management component of *IMS*, providing online transaction processing similar to *C…
IMS Transaction Manager (IMS TM):
— IMS TM manages online transaction processing with terminals, message queues, and program scheduling.…
IMS-COBOL Integration Patterns:
— Sequential batch processing: XRST, GN loop, periodic CHKP, final CHKP. - Online inquiry: GU IO-PCB, …
IN
— Passed from caller to procedure. The procedure can read but should not modify (DB2 won't send modifi…
In 1,000 employees tested:
— 50 have COVID: 48.5 test positive (true positives), 1.5 test negative - 950 don't have COVID: 4.75 t…
In 1,000 symptomatic patients tested:
— 300 have COVID: 225 test positive (true positives), 75 test negative (false negatives — missed!) - 7…
In 10,000 people tested:
— 30 have COVID: 29.1 test positive (true positives), 0.9 test negative - 9,970 don't have COVID: 49.9…
In a pit or box at the curb
— In mild climates and many suburban areas, the meter is in a concrete or plastic box flush with the g…
In an anechoic chamber
— a room specifically designed to absorb all reflected sound, eliminating room resonance and echo — th…
In anxiety:
— *Overestimation of threat probability:* "There is a high chance this will go badly." - *Overestimati…
In AWS:
— IBM MQ on Amazon ECS (containerized queue manager): `SFCLOUD01` - Inbound queue: `SF.NOTIFY.INBOUND`…
In confrontation, autonomy threats look like:
— Being given ultimatums - Having decisions made for you without consultation - Being told you have no…
In confrontation, certainty threats look like:
— Not knowing the agenda or purpose of a conversation before it starts - Ambiguous feedback (being tol…
In confrontation, fairness threats look like:
— Feeling that rules are applied differently to different people - Being blamed for outcomes that were…
In confrontation, relatedness threats look like:
— Feeling that the other person sees you as an obstacle rather than a person - Sensing hostility or co…
In confrontation, status threats look like:
— Being corrected in front of others - Having your expertise or competence questioned - Being given fe…
In depression:
— *All-or-nothing thinking:* "I failed at this task. I'm a failure." - *Overgeneralization:* "This wen…
In Every Room, Look For
— **Ceiling stains** — any discoloration, rings, or soft spots in the ceiling material. Water stains c…
In medias res
— Latin for "in the middle of things" — means beginning your video mid-action. The viewer is dropped i…
In Non-Triple-Double Games:
— Record: 14-26 (35.0%) - Average margin: -4.1 points
In or near each sleeping area
— outside each bedroom door or inside each bedroom - **Within 10 feet of each bedroom door**
In Scope:
— All systems that store, process, or transmit cardholder data - All systems connected to the CDE - Al…
In support of the concern:
— Personalization does reduce exposure to cross-cutting political content (Bakshy, Messing, and Adamic…
In terms of people:
— County adult population: ~500,000 - Estimated hypertension prevalence: 32.8% to 41.2% - Estimated nu…
In the calm regime:
— Market-making strategies are more profitable (spreads can be tighter because the risk of adverse sel…
in the first possible moment.
— ## Discussion Questions
In the next month, I will:
— [ ] Complete my first independent project (not from this book) - [ ] Share what I have learned with …
In the next three months, I will:
— [ ] Build something that solves a real problem for someone other than myself - [ ] Make my first con…
In the next week, I will:
— [ ] Choose one project idea that excites me and begin working on it - [ ] Set up my personal AI tool…
In the next year, I will:
— [ ] Develop deep expertise in at least one domain or technology area - [ ] Build a portfolio of proj…
In the volatile regime:
— Market-making is riskier (wider spreads are needed to compensate for information asymmetry). - Trend…
In this chapter, you will learn to:
— Manipulate probabilities using the sum rule, product rule, and Bayes' theorem - Work with discrete a…
In this chapter, you will:
— Integrate the four recurring themes into a unified analytical framework you can carry forward - Witn…
In transit
— Moving between client and server over the network 2. **At rest** — Stored on disk (database files, b…
In Triple-Double Games:
— Record: 33-9 (78.6%) - Average margin: +8.2 points
In your 500-word memo, address:
— Why these two countries? What specific theoretical dimension do they allow you to examine? - What do…
In your community:
— Are potholes more common in some neighborhoods than others? Why? - How does air quality in your city…
In your daily life:
— Is the "express" checkout lane at the grocery store actually faster? - Does the weather affect your …
In your equivalence section, address:
— What specific concepts in your study might not translate cleanly across your two chosen countries? -…
In your interests:
— Does home-field advantage matter more in some sports than others? - Are sequels generally rated lowe…
In your work or school:
— Does class size affect student performance in your department? - Does the day of the week affect pro…
In-class format (suggested):
— Opening statements: 3 minutes each side - Cross-examination: 5 minutes each side (the opposing team …
In-Feed Ad
— An advertisement that appears within a platform's normal content feed, formatted to resemble organic…
In-Game Analytics
— Live shot quality assessment - Lineup impact monitoring - Fatigue indicators
In-group favoritism
— Systematic positive evaluation of in-group members relative to out-group members.
In-group favoritism / out-group derogation
— The tendency to evaluate members of one's own social group (in-group) more favorably than members of…
In-Group Preference Ratio (IPR)
— a statistical measure of how much more likely users are to match with members of their own racial gr…
In-group strengthening
— Featuring community members reinforces "this is OUR community" — strengthening parasocial bonds not …
In-Memory Execution
— Meterpreter is injected directly into a running process's memory space. No files are written to disk…
In-person requests:
— Bohns's studies of face-to-face requests consistently find that actual compliance rates are roughly …
in-place
— they rearrange elements within the original list without allocating significant extra memory.
In-scope assets typically include:
— Specific domains and subdomains (e.g., `*.example.com`) - Mobile applications (iOS and Android) - AP…
In-scope vulnerability types typically include:
— Remote Code Execution (RCE) - SQL Injection - Authentication/Authorization bypass - Cross-Site Scrip…
In-season adjustment
— Reduce injury impact over time - Teams adapt to absence
In-Season:
— Workload monitoring - Neuromuscular maintenance training - Fatigue-based substitution guidelines - R…
Inaccessible without opening walls:
— All piping inside wall cavities - All wiring inside wall cavities - Ducts that were furred into or b…
Inaction regrets tend to "exacerbate"
— they increase in intensity over time, because: - The counterfactual is infinite — the "what if" has …
inattention
— a failure to engage analytical processing at the moment of encounter. People share false headlines n…
inattentional blindness
— the failure to perceive a fully visible, salient stimulus when attention is directed elsewhere — dem…
incentive misalignment
— when the structures that fund, produce, evaluate, and reward knowledge are designed in ways that sys…
Incident response:
— Define severity levels (P1-P4) with response time requirements - Runbook for common API incidents (g…
Incident Summary
— What happened, when, and what was the impact? b) **Timeline** — A minute-by-minute or hour-by-hour t…
incidental collection
— the acquisition of US persons' communications that happen to involve foreign intelligence targets. W…
incidentaloma
— a mass discovered incidentally on medical imaging that would never have been found if the imaging ha…
Include complete context
— Full stack traces, relevant code, environment details, and what you have already tried.
Include correlation IDs
— Assign a unique ID to each request and include it in every log entry, enabling you to trace a reques…
INCLUDE LOGS
— Includes the necessary archive logs in the backup image so that the backup is self-contained for rec…
Include the complete trace
— Do not truncate it 2. **Include relevant source code** — Show the code at the key lines referenced 3…
Included:
— Yards gained - First downs - Touchdowns - Turnovers - Field position
Inclusive Perspectives and Community Engagement
— Does the history attend to diverse voices — Black, Indigenous, immigrant, women, LGBTQ+, working-cla…
Income Statement Accounts (Temporary):
— **Revenue (4000-4999)**: Income earned. Examples: Product Sales (4100), Service Revenue (4200), Inte…
incomplete
— there must be "hidden variables" that determine the outcomes in advance.
Incomplete because:
— High volume doesn't mean high efficiency - May reflect lack of options, not quality - Doesn't accoun…
Incongruence signals:
— Smiling while describing something painful or frightening - Nodding while saying "no" or shaking the…
Inconsistencies found:
— `device`: "mobile" vs. "Mobile", "desktop" vs. "Desktop", "smart_tv" vs. "Smart TV" — 7 categories s…
Inconsistency
— creators who post sporadically lose audience faster than those who post on schedule - **Algorithm ch…
inconsistent calibration
— the person does not have a systematic model of when to trust AI and when not to. They may be over-tr…
Inconsistent categories
— the same thing spelled different ways. "Male," "male," "M," "m," "MALE." "New York," "NY," "N.Y.," "…
Increase presence in HackerNews
— post more frequently, start or join discussions, build a reputation over time 2. **Add one adjacent …
Increased bet frequency
— placing bets outside normal patterns, including bets on unfamiliar sports or markets to "get action.…
Increasing Data Availability
— Player tracking becoming standard across leagues - Biometric and load management data expanding - Vi…
Increasing the file size
— If the load factor has crept above 80%, allocate a larger file (typically 150% of the current record…
INCREMENTAL
— Captures all pages modified since the last full backup. Recovery requires the full plus one incremen…
incremental building
— starting with a simple, working version and progressively adding complexity. This approach mirrors h…
INCREMENTAL DELTA
— Captures pages modified since the last backup of any kind (full, incremental, or delta). Recovery re…
Incremental introduction
— each surveillance technology introduced with a compelling specific rationale - **Ubiquity** — when s…
Incrementally experiment
— you can try variations of an expression one at a time, adjusting based on what you see, without edit…
incubation effect
— the well-documented phenomenon in which a problem you've been working on intensely and then set asid…
Incumbency effects and candidate quality metrics
— **Fundraising data** (which the Federal Election Commission makes public on a quarterly basis) - **R…
INDDN(SYSREC)
— Specifies the DD name for the input dataset containing the data to load.
Indeed
— https://www.indeed.com/ - Aggregates many job postings
Independence
— Never become dependent on a single vendor for critical capabilities. Maintain alternatives. The arch…
Independence and dependence
— **Expected value and variance**
independent
— if they measure genuinely different aspects of the underlying reality. If all your metrics are corre…
independent elementary items
— data items that stand alone and are not part of any group hierarchy. They must have a PICTURE clause…
Independent framing
— the title and context are original, not referencing a textbook assignment; (2) **Decision justificat…
Independent self-construal
— self understood as bounded, autonomous, defined by internal traits
Independently verifiable
— not one party's opinion 2. **Mutually acknowledged as relevant** — both parties agree it's the right…
index
— pandas's way of labeling each row. By default, the index is just sequential integers starting at 0, …
Index (composite)
— A single summary measure created by combining multiple related survey questions or variables. For ex…
Index Review:
— Identify unused indexes (indexes that consume space and INSERT/UPDATE CPU but are never chosen by th…
INDEX(ALL)
— Collect index statistics for all indexes defined on tables in the tablespace. Alternatively, specify…
index.md
— Main content (8,000–12,000 words) - **exercises.md** — 25–40 practice problems (⭐ to ⭐⭐⭐⭐) - **quiz.…
indexing
— building a lookup table that maps words to the pages that contain them.
Indexing strategy
— what indexes beyond the primary key, if any?
Indian Classical Music
— The Tala System: Indian classical music is organized around *tala* (rhythmic cycles). Many talas hav…
Indian Gaming Regulatory Act (IGRA)
— The 1988 federal law that established the legal framework for tribal gaming operations, affirming tr…
Indian Removal Act (1830)
— Federal legislation authorizing the president to negotiate removal treaties with Indigenous nations …
Indian Reorganization Act of 1934
— Franklin Roosevelt's attempt to reverse the disastrous assimilation policies of the previous half-ce…
Indianapolis Colts (4-12)
— Wild card via AFC South - Indoor dome team (Lucas Oil Stadium) - Pass-heavy offensive scheme - Limit…
Indicator area
— Column 7 in fixed-format COBOL. An asterisk (*) marks a comment line, a hyphen (-) marks a continuat…
Indicator Variable
— In *embedded SQL*, a halfword (*PIC S9(4) COMP*) variable associated with a host variable. Indicates…
Indicators a wall is likely not load-bearing:
— It runs parallel to the floor joists - It sits between floors with no corresponding wall or beam bel…
Indicators a wall may be load-bearing:
— It runs perpendicular to the floor joists above (joists typically span the short dimension of the ho…
Indicators of Deserialization:
— Magic bytes in cookies/parameters: `rO0AB` (Java), `O:` (PHP), `\x80` (Python pickle) - Content-Type…
Indicators of High Maturity (Level 4-5):
— Continuous testing program (pentesting, red teaming, bug bounty) - Metrics-driven security program w…
Indicators of higher differentiation:
— I can maintain my own position in a conversation with my family even when they pressure me to agree.…
Indicators of Low Maturity (Level 1-2):
— This is their first penetration test - No vulnerability management program exists - Patching is ad h…
Indicators of lower differentiation:
— When family tension rises, I feel compelled to take someone's side or smooth things over. - I change…
Indicators of Medium Maturity (Level 3):
— Regular penetration testing cycle (annual or more frequent) - Vulnerability management program with …
Indicators of potential inauthenticity:
— Account created very recently (within days or weeks of the activity you are observing) - Posts at ti…
Indicators of strong essays:
— Applies patterns to a genuinely novel situation (not repeating book examples) - Demonstrates underst…
Indicators of weak essays:
— Merely lists patterns without analyzing their interaction - Repeats examples from the text without n…
Indigenous peoples
— the Cherokee and other nations who still lived in or near the mountains during this period — had the…
Indirect costs:
— Customer churn (the Ponemon data shows an average 2.5% increase in customer turnover following a bre…
Indirect exposure pathways:
— Has domestic political discourse around military conflicts shaped how your target community is perce…
indirect reciprocity
— a mechanism first formalized by Richard Alexander and later developed by Martin Nowak and Karl Sigmu…
Indirect value:
— Faster time-to-insight: Promotional analysis that took 2 days now takes 2 hours, enabling the team t…
Indistinguishability
— the cancellation requires the two photons to be identical in every degree of freedom. Any distinguis…
indistinguishable
— identical in every degree of freedom: frequency, polarization, spatial mode, and arrival time. If th…
Individual agency
— real, limited, achievable through structured practice; the six-step personal framework.
Individual Findings:
— [ ] Consistent template for all findings - [ ] Specific affected systems (not just IP addresses) - […
Individual Level (optional):
— Personal prompt collections and preferences. - Tool customizations within the bounds of team configu…
Individual Lineman Grading
— PFF methodology overview - Win rate calculations - Attribution challenges
Individual resilience
— the cognitive and analytical capacities of individual citizens to evaluate claims and resist manipul…
individual rights
— privacy rights, data access rights, consent rights — are necessary but not sufficient for data equit…
Individual Rights:
— Right of access (know what data is held) - Right to rectification (correct inaccurate data) - Right …
Individual Shot Level:
— xA = xG of shot created - Single passes range from 0.02 to 0.50+ xA
INDIVIDUAL_CUSTOMER
— Subtype for personal customers.
Individualism-collectivism
— Hofstede's dimension of cultural variation from individual-primary to group-primary values
Individuation
— each subject becomes a distinct, classifiable object of knowledge 2. **Permanence** — the record is …
Indoor (no weather):
— Cowboys, Saints, Falcons, Vikings - Raiders, Rams/Chargers, Cardinals, Lions
Indulgence vs. Restraint
— the extent to which cultures allow relatively free gratification of basic natural human drives versu…
Industrial Protocols
— Modbus (serial and TCP), DNP3, EtherNet/IP, OPC UA, S7comm, IEC 61850, BACnet. These protocols were …
Industry Applications of AI
— Financial services · Healthcare · Manufacturing · Retail (beyond Athena) · Professional services · E…
Industry Path
— Experience in tech, finance, or consulting - Demonstrated ability to apply methods to new domains - …
Industry resources.
— Participate in industry working groups on AI governance (e.g., Partnership on AI, IEEE standards bod…
Industry route:
— Experience in betting industry or related quantitative field (finance, consulting, technology) - Tra…
Industry Snapshot: Banking
— 92 of the world's top 100 banks use IBM mainframes - Core banking COBOL codebases range from 5 milli…
Industry tolerance
— A rights-holder's decision not to enforce copyright despite a plausible legal basis. Not a license; …
Inert knowledge
— you know it but don't think to use it | **Bridging** — practice applying concepts to new contexts, e…
Inference
— using trained models — is cheap per query but collectively enormous, and grows with every new user a…
inferential indicator
— a linguistic cue that signals the conclusion follows from what precedes it. Common conclusion indica…
Inferential statistics
— Statistical methods that draw conclusions about a *population* from a *sample*. In survey research, …
Inferred data
— Data generated by analysis of observed patterns — characteristics that the data subject never provid…
infinite loop
— the program runs forever (or until you press Ctrl+C to kill it).
Infinite scroll
— design removing natural stopping points from content feeds
Infinite square well:
— Energies: $E_n = n^2\pi^2\hbar^2/(2ma^2)$ - Wavefunctions: $\psi_n = \sqrt{2/a}\sin(n\pi x/a)$ - Ort…
inflection point
— the moment in Phase 2 where growth switches from accelerating to decelerating. Before the inflection…
Influencer
— A creator with an established audience whose recommendations carry commercial weight. The term is br…
Influencer Marketing
— The practice of brands paying creators to promote their products or services to the creator's audien…
Influencer marketing platforms:
— **AspireIQ** — Brand partnership marketplace, weighted toward established creators - **Creator.co** …
info
— Version, description, contact for the mainframe team - **servers** — Your z/OS Connect endpoints (de…
Info.plist
— The application's configuration file, similar to Android's manifest. Contains bundle identifier, ver…
Infodemic
— The rapid spread of both accurate and inaccurate information during a health crisis, creating confus…
Information (as currency)
— The concept that information is the fundamental medium of exchange across all domains — physical, bi…
information advantage
— the ability to make decisions based on superior information. In capital markets, information advanta…
information aggregation
— how prediction markets combine the private information of many traders into accurate aggregate forec…
Information asymmetry
— A situation in which one party in a transaction or relationship possesses more or better information…
Information available to OKC:
— Three consecutive years of declining efficiency - Clear defensive liabilities - High usage rate/iso-…
Information Control
— [ ] Does the organization discourage or prohibit access to outside media, perspectives, or relations…
information delivery
— explaining openings, analyzing positions, identifying tactical patterns, answering questions at any …
information diet
— the totality of sources, platforms, formats, and habits that constitute a person's epistemic environ…
Information Disclosure + IDOR = Data Breach
— Find an endpoint that leaks sequential user IDs - Use the IDs with an IDOR vulnerability to access o…
Information disorder
— Umbrella term for the full range of problematic information phenomena - **Misinformation** — False c…
Information entropy
— In information theory, the average amount of information (surprise) contained in a message, measured…
Information environment
— The totality of political information available to citizens through all channels — news media, socia…
Information environment preparation
— creating the conditions in which future disinformation will be more readily accepted, by seeding dou…
Information environment resilience
— the structural features of the media landscape that maintain conditions for informed public delibera…
Information Factors:
— Injuries (varies by player impact) - Lineup changes - Back-to-back games
information fiduciaries
— entities that owe duties of care, confidentiality, and loyalty to the individuals whose data they ho…
Information Flow:
— Official report: Full market adjustment - Social media rumors: Partial adjustment - Game-time announ…
Information foraging
— A framework, adapted from animal foraging theory, that models how people search for and gather infor…
information foraging theory
— a framework developed by Peter Pirolli and Stuart Card at Xerox PARC in the 1990s, drawing on an ana…
Information Gathering:
— Browser type, version, and plugins - Operating system - Screen resolution - Internal IP address (via…
Information literacy
— sometimes called information fluency — focuses primarily on the evaluation of information sources: t…
Information Overload
— A condition in which the volume of available information exceeds an individual's capacity to process…
Information resilience
— The capacity of an individual to maintain calibrated beliefs, evaluate sources critically, and resis…
information theory
— Shannon's broader framework of which the sampling theorem is one result. Shannon showed that data ca…
Information Uncertainty
— Injury reports are often vague ("questionable") - Game-time decisions create last-minute uncertainty…
information warfare
— The systematic use of information and information capabilities to achieve strategic political, milit…
Information-theoretic interpretation:
— During "tension" (approach to a cadence, building dominant chord): the listener's prediction model g…
Informational (daily report):
— SMF 101 accounting summaries by plan - Buffer pool statistics trends - Utility execution summary - T…
informational constraints
— foreign keys that are declared but not enforced (`NOT ENFORCED`). These are used when the applicatio…
informed beginner curiosity
— you know enough about a domain to ask the good questions but not so much that your mental frameworks…
informed consent
— the idea that participants should know they're in a study and agree to participate. This principle e…
infrasound
— felt in the body but not consciously heard, produced by earthquakes, volcanoes, and certain large pi…
Infrastructure
— Who controls the digital infrastructure? What dependencies exist, and what are their governance impl…
Infrastructure as Code (IaC)
— Managing and provisioning infrastructure through machine-readable configuration files rather than ma…
Infrastructure design:
— 6 Azure VMs: Standard_E16s_v5 (16 vCPU, 128 GB RAM) running RHEL 8 - Micro Focus Enterprise Server l…
Infrastructure development
— watch enabling constraints reaching meaningful scale 2. **Hobbyist-to-professional transition** — si…
Infrastructure Diagram:
— Produce a complete infrastructure architecture diagram showing: - All C2 servers (with hostnames, IP…
Infrastructure Fixes (Operations Team):
— Patching (specific CVEs and patch identifiers) - Configuration hardening (firewall rules, service co…
Infrastructure Information Disclosure:
— Examine HTTP headers, error messages, and API responses for AWS account IDs, region names, resource …
Infrastructure investment:
— Raleigh data center: two z14 LPARs (CNBDR01, CNBDR02) with 60% of Charlotte's processing capacity - …
Infrastructure markers:
— Electricity pole configurations (wooden pole vs. concrete, single arm vs. multiple) - Street width a…
Infrastructure OPSEC:
— Use dedicated, compartmentalized infrastructure for each engagement - Register domains that appear l…
Infrastructure:
— Two IBM z16 Model A01 frames (production + DR) - Parallel Sysplex: CNBPLEX with four LPARs (CNBPROD1…
Infrequent updates
— prices can change monthly or more often - **Time-intensive** — half a day per cycle, consumed by mec…
Inharmonicity
— The deviation of the overtone frequencies of a real instrument from the ideal harmonic series. In pi…
Inheritance
— SavingsAccount IS-A Account. It shares all Account behavior and adds interest-specific behavior. 2. …
INITIAL
— A clause on a PROGRAM-ID that specifies the program is in its initial state each time it is called (…
initial condition
— can determine the final outcome, especially when the landscape has multiple basins. This is path dep…
initial conditions
— the starting state of the system determines how the energy is distributed across the available modes…
Initial Conditions:
— It is Monday morning - The market price is **$0.30** (30% implied probability) - There have been rum…
Initial Focus:
— Building data infrastructure from scratch - Developing proprietary metrics and models - Creating pla…
Initial framing
— First plausible explanation establishes vocabulary and metaphor 2. **Vocabulary adoption** — Field a…
Initial response
— The creator responds (or doesn't). The initial response sets the tone for everything that follows. D…
Initial Response (2:00-3:00 AM):
— IR team activated via PagerDuty - Affected workstation identified: WS-BILL-023 - Memory captured rem…
Initial runs calculation:
— Input file: 10 GB = 10,240 MB - Memory available: 256 MB - Initial runs = 10,240 / 256 = 40 runs
Initial Setup
— [ ] Create your effectiveness journal (spreadsheet with date, task type, time estimates, iteration c…
INITIALIZE
— A COBOL statement that sets data items to predetermined values based on their category: alphanumeric…
INITIALIZE statement
— A COBOL statement that sets data items to default values: alphanumeric items to spaces, numeric item…
initiation style discrepancy
— one partner initiates because they spontaneously feel desire; the other does not initiate because th…
Injection Attacks:
— Test all input fields for SQL injection, including less obvious vectors: sort parameters, filter exp…
Injection testing:
— Test all input fields for SQL injection - Check for Server-Side Template Injection (SSTI) - Test for…
Injury impact:
— Neymar missed approximately 40% of possible matches through injury during his PSG tenure - This sign…
Inline LOB trade-offs:
— Pro: Eliminates additional I/O for small LOBs. Row retrieval is a single page read. - Pro: Improves …
Inline PERFORM
— A PERFORM statement with the executed statements coded directly between PERFORM and END-PERFORM, rat…
Inline snippets
— Short excerpts illustrating a specific concept, embedded in the chapter text. 2. **Full examples** —…
Inner Circle Positions:
— **FBI Director:** Argue that exceptional access to encrypted communications is necessary for law enf…
Inner Life prompts:
— What am I avoiding right now, and why? - What emotion am I carrying that I haven't named? - What is …
Inner product
— Ch 2.4, Ch 8.2 The scalar $\langle\phi|\psi\rangle = \int\phi^*(x)\psi(x)\,dx$ (position representat…
innovators
— a tiny fraction (roughly 2.5 percent) of adventurous, risk-tolerant farmers who tried the new seeds …
Inoculation (psychological)
— A counter-propaganda technique, developed from analogy with biological immunization, in which pre-ex…
INOCULATION CAMPAIGN FINAL BRIEF
— **Campaign Title:** *A clear, descriptive title that identifies the campaign's target community and …
Inoculation theory
— McGuire's persuasion resistance framework: exposure to weakened arguments plus refutation builds imm…
INOUT
— Bidirectional. The caller passes a value; the procedure can modify it and the caller sees the modifi…
INPUT
— handles errors on all files opened for input - **OUTPUT** -- handles errors on all files opened for …
Input data (per request):
— `employee_name` (str) - `leave_type` ("vacation", "sick", "personal", "bereavement", "unpaid") - `da…
Input features:
— Shot location (x, y coordinates) - Defender distance at release - Shot clock time - Touch time befor…
INPUT PROCEDURE section executes completely
— all OPEN, READ, RELEASE, and CLOSE operations happen here 3. After the INPUT PROCEDURE finishes, the…
Input record layout:
— Application header (ID, date, branch, loan officer) - Customer information (name, SSN, DOB, address,…
Input Validation
— Filter and sanitize user inputs before they reach the LLM > 2. **Output Validation** — Never trust L…
Input variables:
— Current production: 27.7 PPG, 12.5 RPG, 5.9 APG, 14.4 WS - Age: 24 (prime years ahead) - Durability:…
Inputs to merit are unequally distributed
— developing merit requires resources (time, stability, education, tutoring) that structural luck dist…
Inputs:
— Current hours per week spent on [the task] - Your estimated hourly value (annual revenue / working h…
INSENSITIVE
— The result set is a snapshot; changes are not visible - **SENSITIVE STATIC** — The result set size i…
INSERT
— Appends to existing data. Alternatives: REPLACE (truncate and reload), RESTART (restart a failed loa…
Inside the window:
— Sharing challenges you've overcome or are actively working through - Showing the process, including …
Inside Zone:
— Attack between the tackles - Quick decisions - More consistent, lower variance
Insider dealing
— engaging in insider dealing or attempting to engage in insider dealing.
Insider threat playbook:
— Detection criteria - Legal and HR coordination requirements - Evidence preservation (heightened chai…
INSIGHT
— The history of CICS architecture is a 50-year lesson in the same principle that drives microservices…
Insight Timer
— insighttimer.com Free large library; community features; wide variety of teachers and traditions.
INSPECT
— A COBOL statement that examines and optionally modifies characters or groups of characters in a data…
INSPECT statement
— A COBOL statement for counting and replacing characters within a data item. Supports TALLYING (count…
INSPECT TALLYING
— Counts occurrences of characters or strings 2. **INSPECT REPLACING** -- Substitutes characters or st…
Inspection paradox
— A probability puzzle: when you arrive at a bus stop, you will on average wait longer than the averag…
INSPECTIONS
— [ ] Framing inspection: passed / date: _______ - [ ] Electrical rough-in inspection: passed / date: …
Inspiring action
— sharing information on how to volunteer or help | **Poverty tourism** — filming yourself "helping" v…
Installation considerations:
— The unit must be level side-to-side; tilted slightly (1/4 inch) toward the outside so condensate dra…
Installation requirements for SMD:
— A continuous, sealed vapor barrier must cover the entire crawlspace floor (this is a prerequisite — …
Instance sizing:
— Instance type: ________________ - Number of instances: __________ - Pricing model: [ ] On-demand [ ]…
Instances:
— Surgery: tissue feel, spatial intuition, body-reading - Cooking: sensory calibration, contextual sea…
Instant hook
— No setup required; the visual IS the joke, making it the fastest attention capture in a scroll envir…
instanton action
— the classical action for the trajectory that traverses the barrier in imaginary time.
InStat
— Type: Commercial platform - Defensive Features: Defensive action tracking
Institute of International Finance (IIF)
— Industry body that publishes practitioner guides on regulatory stress testing; particularly useful f…
Institutional forbearance
— The norm, identified by Levitsky and Ziblatt, of restraining from using legal powers to their maximu…
Institutional governance focus
— Goes beyond personal awareness to examine how organizations, regulators, and societies manage data r…
Institutional luck
— The luck created or destroyed by the design of organizations and institutions — the rules, processes…
Institutional memory
— The accumulated knowledge, procedures, and cultural practices that enable an organization to functio…
Institutional Memory:
— When analysts leave, their knowledge should not leave with them - Documentation of all active models…
Institutional resilience
— the structural features of democratic institutions that make them resistant to capture and manipulat…
Institutional Review Board (IRB)
— a committee that evaluates whether the benefits of the research justify the risks to participants an…
institutional sclerosis
— borrowing, perhaps unconsciously, a medical term for the hardening of arteries that restricts blood …
institutional serendipity engineering
— the organizational structures, policies, and cultures that transform a failed experiment into a prod…
Institutional trust
— The degree to which an audience believes a communicating institution is competent, honest, and actin…
Institutional trust damage is the lasting output
— the most significant consequence of the fraud claims, as measured by subsequent research, is not the…
Instrument identification:
— Field 41: ISIN of the instrument - Field 42: MIC code of the trading venue - Field 43: The TVTIC — T…
Instrumental variable
— A variable used in observational research to approximate the conditions of a randomized experiment. …
Instruments:
— Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure (Regulation S-K, S-1, 1…
Insufficient allies
— all three dissenters faced opposition from more powerful institutional actors without sufficient coa…
insufficient questions
— if the user selects a category/difficulty combination with fewer questions than rounds requested, in…
Insulation Assessment
— Type of insulation (batt fiberglass / blown fiberglass / cellulose / spray foam / combination): ____…
Insurance
— Insurance applications require complex rate calculations, actuarial computations, and policy adminis…
INTEGER, DECIMAL, VARCHAR
— Convenience cast functions:
integrated
— truly part of who she is as a distinct person, rather than who she learned to be?
integrated locals
— union chapters where Black miners and white miners sat in the same hall, voted on the same contracts…
Integrated photonics
— fabricating beam splitters, phase shifters, and waveguides on silicon chips, reducing loss per compo…
Integration (acculturation)
— Berry's acculturation strategy in which both cultural heritage and new cultural context are maintain…
Integration (Part IV):
— [ ] MQ cluster topology - [ ] Queue inventory with naming conventions - [ ] Message flow diagrams - …
integration curve
— the trajectory of a new player's pairwise chemistry scores over their first $N$ matches:
Integration strategies:
— **The unexpected heartfelt moment:** Comedy video that takes an unexpected genuine turn — the humor …
Integration strategy
— maintaining heritage culture while participating in new culture; generally best outcomes
Integration testing
— verifying that all components of the system work together correctly in a staging environment that mi…
Integration-Heavy Applications
— Combining multiple services with event routing, concurrent processing, and best-effort error handlin…
Integration/QA
— For quality assurance testing - **Preview** — Ephemeral environments for pull request review (suppor…
Integration:
— Nightly batch extract for regulatory reporting data (Pattern 1) - CDC for analytics data warehouse a…
Integrity
— consistency between stated values and actual behavior — requires that an organization's public commi…
Integrity Controls (164.312(c)):
— RACF dataset profiles preventing unauthorized modification - DB2 referential integrity and check con…
integrity of the agent
— the personal projects and commitments that make someone who they are. - His Gauguin example: some mo…
Intellectual Freedom
— *Pursuing ideas without constraint; forming independent views; thinking for myself*
Intellectual honesty
— The willingness to consider that things you currently believe might be wrong. - **Comfort with ambig…
Intellectual Property (IP)
— Legal rights that result from intellectual activity in the industrial, scientific, literary, and art…
Intellectually curious
— willing to engage with research and nuance, not just looking for bullet points - **Practically motiv…
Intelligence from certificate inspection:
— **Certificate authority**: Commercial CAs vs. Let's Encrypt vs. internal CA - **Organization details…
Intelligence is not fixed
— how you learn matters more than how "smart" you are 2. **The central paradox** — strategies that FEE…
Intensity
— the physiological and psychological activation is disproportionate to the actual level of threat.
Intent transparency
— Disclosure of the communicator's persuasive goal; the audience knows not only who is communicating b…
intent-impact gap
— the distance between what you meant to communicate and what the other person actually received (Ston…
Intent-to-treat (ITT)
— Analysis comparing treatment-assigned and control-assigned groups regardless of whether treatment wa…
Intention
— A statement of what you commit to being, doing, or maintaining in a conversation, regardless of how …
Inter-Language Communication (ILC)
— The practice of COBOL programs calling or being called by programs written in other languages (C, Ja…
interaction
— the effect of one variable depends on the level of another.
Interaction features
— differences, ratios, and products of corresponding team statistics --- capture matchup dynamics that…
Interaction Features:
— Physical profile combinations - Style matchup indicators
Interaction Terms
— Score × Time interactions - Field position effects
Interactions between groups
— the marriages across ethnic lines, the friendships between Italian and Hungarian families, the momen…
Interactions:
— Click drive to filter plays - Hover play for description - Filter by quarter, team, play type - Togg…
Interactive Features:
— Click any cell to see play-by-play breakdown - Filter by formation, personnel, or time period - One-…
Interactive Practice
— LeetCode (easy problems) - HackerRank Python challenges - Exercism Python track
Interactive Tutorials:
— Codecademy Python Course - DataCamp Introduction to Python - Python.org Official Tutorial
intercept
— the predicted value of $y$ when $x = 0$ - $b_1$ is the **slope** — the predicted change in $y$ for e…
Interception
— A defensive action where a player reads and cuts out an opponent's pass before it reaches its intend…
Interdependent self-construal
— self understood as embedded in relationships and social roles
interdict
— a suspension of all sacraments in a kingdom — as a propaganda weapon, framing political disobedience…
Interest Calculation
— Score: 18. Single access path (nightly batch), but high data intensity and used by regulatory report…
Interest Calculation (currently 80 min serial):
— 6 partitions by account number range - Target: 12-15 minutes per partition - No dependency on postin…
Interest Graph
— TikTok's core recommendation approach: connecting users to content based on observed interests rathe…
Interest Rate
— Annual percentage rate from 0.000% to 99.999%. Three decimal places required for precision.
Interest Rate: DISPLAY vs. COMP-3
— `PIC 9(2)V9(3) DISPLAY` = 5 bytes - `PIC 9(2)V9(3) COMP-3` = 3 bytes
INTEREST_RATE_SCHEDULE
— Rate tiers for products.
Interests
— The underlying needs, goals, and concerns that a stated position is attempting to address. Often com…
Interfaces
— Metasploit can be accessed through multiple interfaces:
Interference
— the anxiety prevents engagement with important life domains: avoidance of social situations, inabili…
Interference (constructive/destructive)
— The superposition of two or more waves producing a resultant wave of greater amplitude (constructive…
interference pattern
— alternating bands of high and low particle density, with some positions receiving *fewer* particles …
intergenerational transmission
— not through genetics alone, but through the relational patterns that are enacted and modeled.
Interim Measures to Consider:
— Suspend AI system pending investigation - Implement additional human review for AI-assisted decision…
Interior security:
— Server room access controls - Network closet security - Clean desk policy compliance - Document hand…
Interior storm windows
— adding a well-sealed interior storm window creates a wide air gap (often 4+ inches from the existing…
Interior vs. Edge Pressure
— Comparative value analysis - Scheme-specific impact - Position-specific evaluation
Interior: basement or crawlspace first
— the most revealing space in the house. Look before anything else, while your eyes are fresh and you'…
INTERIOR: BASEMENT/CRAWLSPACE (check first)
— [ ] Musty odor? - [ ] Visible staining on floor or walls (tide marks, mineral deposits)? - [ ] Efflo…
Interior: room by room
— floors, walls, ceilings, windows, plumbing fixtures in kitchens and bathrooms.
interleaving experiments
— a technique where the old and new models each select some ads for the same query, and the results ar…
interlocking
— each part has gaps that are filled by another part, so that the combined ensemble produces a density…
Intermediate Lab:
— Multiple attacker VMs (Kali, Parrot, Commando VM) - Windows Active Directory environment (DC + works…
Intermediate outcomes:
— Performance on source evaluation tasks using real (not constructed) content - Observed information-s…
internal colonialism
— the treatment of a domestic region as a colony — as a framework for understanding the Appalachian co…
internal colonialism thesis
— the argument that Appalachia functions as a domestic colony within the American economy — rests on s…
internal conformity assessment
— no mandatory third-party auditor is required. The provider must follow a defined conformity assessme…
internal governance
— the organizational structures, frameworks, and practices that determine how data is actually managed…
Internal Network Exploitation:
— From the initial foothold, enumerate the internal network. - Attempt to exploit vulnerabilities iden…
Internal Network:
— Creates an isolated network between VMs only - The host cannot access this network - **No Internet a…
Internal self-awareness
— clarity about your own emotions, values, motivations, and behavioral patterns — is what most people …
Internal Self-Awareness:
— I can name what I'm feeling with precision during difficult conversations. - I understand the values…
Internal server
— run the application on one of Acme's intranet servers, managed by Marcus's team 2. **Cloud hosting**…
Internal transition:
— Moving from another role within a club (e.g., scout, video analyst, sports scientist) - Adding analy…
Internal working model
— In attachment theory, a mental representation of self, others, and relationships formed through earl…
internal working models
— unconscious mental representations of: - Whether the attachment figure is reliable, available, and r…
Internalization
— The process by which external cultural standards become incorporated into one's self-evaluation crit…
Internally homogeneous
— customers within a segment are similar to each other - **Externally heterogeneous** — customers in d…
International
— Financial Action Task Force: fatf-gafi.org — 40 Recommendations, mutual evaluations, typologies repo…
International Association for Metacognition
— metacognition-association.org An academic organization for researchers studying metacognition. Their…
International Coaching Federation (ICF)
— coachingfederation.org/find-a-coach — The primary professional credentialing body for coaches. Maint…
International Compliance Association (ICA)
— UK-based compliance professional body with AML certificate programs. int-comp.org.
International cooperation:
— Information-sharing agreements between regulators - Harmonization efforts through organizations like…
International Fact-Checking Network (IFCN)
— A credentialing body established by the Poynter Institute in 2015 that certifies fact-checking organ…
International Journal of Central Banking
— Publishes central bank research; significant coverage of stress testing and macro-prudential policy.
International Leagues
— Less scouting coverage - Age-based production often overlooked - Different playing styles undervalue…
International Mediation Institute (IMI)
— imimediation.org — Provides a competency-based credentialing framework for professional mediators. A…
International Regulations:
— GDPR Article 32 requires regular testing of security measures; pentesters must handle personal data …
International:
— Gamblers Anonymous: www.gamblersanonymous.org
Internet of Things (IoT)
— The expanding network of internet-connected physical objects embedded with sensors, software, and co…
Internet required
— no offline development - **Shared system** — performance may vary depending on other users - **Sessi…
Internet Research Agency (IRA)
— A Russian private company funded by Yevgeny Prigozhin and linked to Russian state intelligence, whic…
interoceptive awareness
— the practice of attending to the body's internal signals (hunger, heartbeat, breath, muscle tension,…
Interpret coefficients:
— Exponentiate each coefficient: $e^{b_i}$ = odds ratio - "For each one-unit increase in $x_i$, the od…
Interpret individual predictors:
— Coefficient: "For each one-unit increase in $x_i$, predicted $y$ changes by $b_i$, **holding all oth…
Interpret results with effect sizes (Cramer's V)
— reinforcing the lesson from Chapter 17 that significance alone is not enough.
Interpret with caution
— context matters 4. **Compare to alternatives** — what else could we measure?
Interpret your results:
— Under 40 PSI: low pressure; investigate PRV, pipe condition, or call utility - 40–80 PSI: normal ran…
Interpretable model
— A model whose decision logic is directly legible to humans without post-hoc approximation — decision…
Interpretation
— [ ] I've interpreted every result in context (not just "significant" or "not significant") - [ ] I'v…
Interpretation cautions:
— **Sample size matters enormously.** Even 50 shots provides insufficient data to reliably identify fi…
Interpretation Challenges
— Raw coordinates need context - "Separation" depends on how you measure it - Quarterback decisions ar…
Interpretation Guidelines:
— |r| < 0.3: Weak - 0.3 ≤ |r| < 0.6: Moderate - |r| ≥ 0.6: Strong
Interpretation of the new plan:
— Step 1: Access ACCOUNTS via IX_ACCT_TYPE (an index on ACCT_TYPE). MATCHCOLS = 1 — but wait, the pred…
Interpretation of the old plan:
— Step 1: Access ACCOUNTS via IX_ACCT_CUST with MATCHCOLS = 1 on CUST_ID. For a typical customer with …
Interpretation:
— Positive covariance: Variables tend to move together - Negative covariance: Variables tend to move o…
Interpreting db2pd buffer pool output:
— **HitRatio**: Should be above 95% for OLTP workloads. Below 80% requires immediate investigation. - …
Interpreting mean vs. median:
— Mean = Median: roughly symmetric distribution - Mean > Median: right-skewed (pulled up by high outli…
Interpreting Output:
— **R-squared:** Proportion of variance explained (e.g., 0.92 = 92%). An R-squared of 0.92 means 92% o…
Interpreting RACR:
— **RACR > 1.0**: Gaining more yards than targeted (YAC contribution) - **RACR = 1.0**: Perfect conver…
Interpreting the accounting report:
— **Class 1 minus Class 2** = time spent outside DB2 (application processing, network) - **Class 2 min…
Interpreting your results:
— **Mostly 3s and 4s:** You've built a strong foundation. You're ready for CS2, personal projects, and…
Interpreting your score:
— **16-20:** Strong serendipity architecture. Design interventions targeting the one or two lowest-sco…
Interquartile Range (IQR) method
— Calculate the IQR (Q3 - Q1) for each feature. Points below Q1 - 1.5 * IQR or above Q3 + 1.5 * IQR ar…
interregnum
— the period after the old metaphor has been recognized as inadequate but before a new metaphor has be…
Interrupt pattern
— A deliberate disruption of the behavioral rhythm of an escalating conversation, using physical or ve…
intersection point
— it existed simultaneously in the art cluster and the K-pop fandom cluster. When K-pop fans (who were…
intersection points
— topics that live at the boundary between two clusters. "K-pop fan art" was simultaneously in the art…
intersectional
— a term coined by the legal scholar **Kimberle Crenshaw** in 1989 to describe the way that multiple f…
intersectional solidarity
— a place where the Navajo uranium legacy, the Appalachian coal legacy, the Cancer Alley petrochemical…
Intersectionality
— Crenshaw's (1989) framework for understanding how multiple social identities (race, gender, class, e…
Intersexual choice
— differential mate selection by one sex based on observable traits in the other sex; the exercise of …
Interval (musical)
— The perceptual distance between two pitches, defined by the frequency ratio between them (in just in…
IntervalTrigger
— for regular intervals:
Intervention strategies:
— **The courtroom analogy.** In a criminal trial, the jury does not calculate "the probability the def…
Intervention strategy:
— Establish a classroom norm early: when someone (including the instructor) uses anthropomorphic langu…
Intervention Tracking (Weeks 3-4 only):
— Intervention 1: Executed? (Yes / Partial / No) — What specifically happened? - Intervention 2: Execu…
Interview questions:
— When and how did you first become a fan of [X]? - How old were you? What was happening in your life …
Interviews with Keith Goldner
— Various podcasts *Goldner's work on expected points and other advanced metrics is foundational to mo…
intestate succession
— state laws that determine who inherits. In most states, the result was that the property became join…
Intimacy
— the warmth, closeness, and connectedness you feel with a partner; the sense of being known and knowi…
Intimacy Equilibrium Model
— Argyle and Dean's model proposing that people maintain a comfortable intimacy level in interaction b…
Intimacy indicators:
— How much personal information does this creator share? (Life events, health, relationships, finances…
Intraclass correlation (ICC)
— A measure of the degree to which units within a cluster (e.g., households within a precinct, precinc…
Intrasexual competition
— competition among members of the same sex for mating access, typically producing elaboration of comp…
Intrinsic function
— A built-in function invoked with the FUNCTION keyword. Examples include FUNCTION CURRENT-DATE, FUNCT…
Intrinsic motivation
— Motivation driven by the inherent interest, enjoyment, or value of an activity itself; associated wi…
Introduction
— A plausible wrong idea enters the field 2. **Adoption** — It gains traction, gets cited, enters text…
Introduction to nflfastR
— Step-by-step data loading - Basic EPA analysis - Visualization examples
Introductory AI Literacy Course (8 weeks):
— Week 1: Chapters 1–2 (What AI is, how it thinks) - Week 2: Chapters 3–4 (Mental models, trust) - Wee…
Introductory/launch pricing
— explicitly communicating that the launch price is a limited-time offer — is transparent and generall…
Intrusion upon seclusion
— physically or electronically intruding into someone's private space 2. **Public disclosure of privat…
Intuition
— A plain-language explanation designed to build gut-level understanding before formal definitions. Wh…
Intuitive appeal
— Feels true on a gut level 2. **Usefulness to powerful interests** — Economic constituency maintains …
Invalid inputs
— what happens when bad data arrives: ```python def test_gross_margin_zero_revenue_returns_zero(): # S…
Invalidated the Privacy Shield
— finding that the framework failed to provide protection "essentially equivalent" to EU law, for the …
Invariance
— A property that remains unchanged under a transformation; the mathematical heart of symmetry and con…
invariant
— a quantity that must remain constant before and after every trade:
inventory risk
— the risk that the position moves against them before they can unwind it. If a market maker has sold …
Inversely proportional to string length
— doubling the length halves the frequency (one octave lower); halving the length doubles the frequenc…
Invest in new capability when:
— A capability has clear potential to address a specific, real limitation in your current practice - M…
Invested heavily in model development
— building sophisticated systems with substantial engineering resources 2. **Underinvested in monitori…
invested spectatorship
— the viewer has a stake in the outcome because they influenced it.
Investigate information gaps
— Why is this player undervalued? - Is it correctable or fundamental?
INVESTIGATE YOURSELF FIRST, THEN DECIDE:
— Single outlet not working → Check for tripped GFCI on that circuit, check breaker - Lights flickerin…
Investigation examples:
— Do suspension rates differ significantly by race after controlling for school size and poverty level…
Investigation needed:
— Opponent adjustment - Filter to neutral game scripts - Check turnover regression - Split by situatio…
Investigative powers (Article 58(1)):
— Order controllers and processors to provide information - Conduct data protection audits - Carry out…
investment differential
— the difference in experience between a new viewer and a long-time viewer. When a channel has rich wo…
Investment:
— Marcus's time building initial infrastructure: approximately 80 hours (one-time) - Team training tim…
InVID/WeVerify
— A browser extension tool for video verification, supporting keyframe extraction, metadata analysis, …
Invisible Affected Parties:
— All residents of LAPD prediction-box neighborhoods who experienced intensified policing — affected b…
Invisible license
— The informal arrangement created by consistent non-enforcement without formal permission. Creates no…
Invisible:
— He rewrote his cognitive framing of the role. He had been thinking of himself as "head of marketing …
invoices.csv
— Invoice history: `invoice_id, client, date_issued, amount, due_date, paid_date, status`.
Invoicing
— The administrative process of billing clients for completed work. Creators should invoice promptly, …
INVOKE statement
— A COBOL 2002 statement that calls a method on an object in object-oriented COBOL programs.
IOC formats:
— **STIX/TAXII:** Structured Threat Information eXpression for sharing threat intelligence - **OpenIOC…
IP readiness:
— [ ] Brand name trademarked (or in process) - [ ] Clear ownership of all content in the library - [ ]…
IQR Fence Method:
— Lower fence = Q1 - 1.5 * IQR - Upper fence = Q3 + 1.5 * IQR - Values beyond the fences are flagged a…
IRB (Institutional Review Board)
— An ethics review body charged with protecting the rights and welfare of human research subjects; the…
iron industry
— one of the earliest industrial activities in the mountains — was another.
Iron Law of Oligarchy
— A sociological principle holding that any organization, regardless of its democratic goals, tends to…
IRS
— Tax return processing, refund calculation, audit selection - **Social Security Administration** — Be…
Irving's 3-Pointer WPA:
— Pre-shot: GSW 50% - Post-shot: CLE 85% - WPA: +0.35 (one of highest single-play WPA in Finals histor…
IS (Intent Share)
— the member may read pages from this pageset - **IX (Intent Exclusive)** — the member may read or upd…
IS INITIAL
— Specifies that the program's working storage is re-initialized every time it is called. Without this…
Is it a count of events with no fixed upper bound?
— Yes (goals, runs, penalties) --> Consider **Poisson** (or negative binomial if overdispersed). - No …
Is paid data necessary?
— If your analysis requires data not available through free sources (real-time feeds, player tracking,…
Is the data available on a reference site?
— **Yes:** Check if `pandas.read_html()` can extract it directly. If not, use `requests` + `BeautifulS…
Is the quantity continuous or discrete?
— Continuous (margins, ratings, efficiency metrics) --> Consider **normal** (or t-distribution for hea…
Is there a public API?
— **Yes:** Use the `requests` library with proper rate limiting and caching. - **No:** Continue to ste…
Is this construct:
— ☐ Attitudinal (opinions, evaluations, preferences) - ☐ Behavioral (past actions, reported behavior) …
Is this exception based on a real, verifiable fact
— or on an assumption you'd prefer to believe? 2. **Would someone who knows you well and cares about y…
Is your portfolio predominantly:
— [ ] Highly concentrated (most investment in 1–2 correlated domains) - [ ] Moderately diversified (in…
Ising anyons
— can perform some but not all quantum gates topologically. Experiments by Willett et al. (2009, 2013)…
ISO 20022 Financial Messaging Standard
— The international standard for financial electronic data interchange. The pain.001 (customer credit …
ISO 27001 Evolution:
— 2005 edition: 133 controls in 11 domains - 2013 revision: 114 controls in 14 domains - 2022 revision…
ISO 3166-1 (Country Codes)
— Referenced in data type selection for language, country, and currency columns. Using ISO-standard co…
ISO 8601
— International standard for date and time representations (YYYY-MM-DD format). Understanding ISO 8601…
ISO 8601: Date and Time Format
— The standard your APIs and file exports should use for date representation. Eliminates the ambiguity…
ISO/IEC 1989:2002
— The COBOL 2002 standard that added TRIM, TEST-NUMVAL, TEST-NUMVAL-C, RANDOM, E, PI, and other functi…
ISO/IEC 1989:2014
— The COBOL 2014 standard that added CONCATENATE, SUBSTITUTE, FORMATTED-CURRENT-DATE, and other modern…
ISO/IEC 1989:2014 — Programming Language COBOL
— The international COBOL standard defines the formal semantics of nested programs, COMMON, GLOBAL, an…
ISO/IEC 1989:2023
— The official COBOL language standard. Expensive to obtain from ISO, but draft versions circulate in …
ISO/IEC 9075:2023 (SQL Standard)
— The international standard that defines the SQL language, including DDL syntax for CREATE TABLE, con…
ISO/IEC JTC 1/SC 42
— The joint technical committee responsible for international AI standardization has produced standard…
Isolate the new workload
— if a new batch query is scanning CUSTOMER, move it to a different buffer pool or schedule it outside…
Isolates preference from situation
— removes trailing/leading bias 2. **Predicts future efficiency** - correlates with offensive quality …
Isolating the program from terminal details
— The MPP works with logical message fields rather than screen positions or control characters. 2. **E…
ISOLATION
— Controls the locking behavior:
Isolation Defense
— Points per possession allowed - Shooting percentage allowed - Turnover rate generated - Frequency de…
isometric scaling
— every property changes in lockstep with size, and a bigger animal is just a scaled-up version of a s…
isomorphic
— they share the same structure. Both involve diagnosing the root cause of a problem through hypothesi…
isomorphic problems
— problems with different surface features but identical underlying structures. The solution in both c…
Isomorphism
— A structural correspondence between two systems that preserves all relevant relationships; the deepe…
Isotonic Regression
— Non-parametric calibration - scikit-learn implementation
Isotonic regression:
— Advantage: Non-parametric and can correct any monotonic miscalibration pattern, no matter how comple…
ISPF
— Interactive System Productivity Facility. A full-screen editor and dialog manager used on z/OS for e…
ISRT (Insert)
— Adds a new segment occurrence to the database. You fill the I/O area with the segment data and speci…
Issue
— someone reports a bug or proposes a feature 2. **Discussion** — the community discusses whether and …
Issue affinity model
— A predictive model that estimates which political issues are most salient to a given voter, used to …
Issue framing
— Presenting the same event or policy in terms of different dimensions or aspects.
Issue ownership
— The phenomenon in which parties or candidates are perceived as more competent and trustworthy on cer…
Issue Volume:
— Documentation-related issues dropped from approximately 20/month to 4/month (80% reduction, exceedin…
Issue Voting
— Positional issues: specific policy alternatives exist; spatial model predicts choosing the closer ca…
Issue: `import soundfile` fails on Linux
— Install the system library: `sudo apt-get install libsndfile1` - Then reinstall: `pip install soundf…
Issue: `pip` installs to the wrong Python
— Always activate your virtual environment first before running pip - Use `python -m pip install ...` …
Issues found:
— `signup_date` and `last_active` are stored as text, not dates - `sessions` is float instead of integ…
Issues Identified:
— `gameId` is a string (should be usable for joins) - `down` is a string (should be integer) - `yardsG…
It attracts the wrong kind of attention
— regulators, plaintiffs' lawyers, and journalists look for companies whose AI claims exceed their AI …
It does not say:
— Individual outcomes become more predictable - Past outcomes "balance out" future ones (that's the ga…
It does NOT tell you:
— How close your bound is to the true $E_0$ - A lower bound (you need additional methods for that) - G…
It is designed specifically to improve performance
— not to perform, but to improve 2. **It involves immediate, accurate feedback** — you know whether yo…
It is helpful but not strictly required to know:
— Hermitian and unitary matrices - Diagonalization - Vector spaces as abstract structures (not just ℝⁿ…
It may also be amplifying and simplifying
— organizing a complex, inconsistent human being into a coherent psychological origin story that expla…
It may be capturing something true
— that Richard did withhold warmth in meaningful ways; that the achievement-reward dynamic was real; t…
IT Support/Help Desk
— "I'm from the IT department. We've detected unusual activity on your account and need to verify your…
It tells you:
— An upper bound on $E_0$ (guaranteed by the theorem) - An approximate ground state wavefunction - How…
It tests a small unit of logic
— typically a single function or method. 2. **It is automated** — it runs without human intervention a…
It was designed without security
— The original DNS protocol (RFC 1035, 1987) includes no authentication or integrity verification. - *…
ITD (Interaural Time Difference)
— The difference in arrival time of a sound at the two ears, used by the auditory system to localize s…
Iteration
— the act of repeating a process — is one of those ideas that fundamentally changes how you think abou…
Iterative Refinement
— The core practice of vibe coding: generating code with AI, reviewing it, providing feedback, and req…
ITIL v4: Service Operation
— The ITIL framework for IT service management includes Event Management and Incident Management proce…
ITPRA
— Imagination, Tension, Prediction, Reaction, Appraisal: Huron's five-phase model of musical emotional…
IXSCAN
— Scans an index. The properties show which index is used and which predicates are applied. If IXSCAN …
J
Jack Tales
— a group of stories featuring a clever, resourceful young man named Jack who outwits giants, devils, …
Jack-of-All-Trades
— A creator who produces content across many topics, formats, or platforms without a clear niche focus…
Jake Thompson
— Best EPA per dropback, highest total value 2. **Marcus Rivera** - Balanced efficiency, room for grow…
Jake Thompson (Tech Institute)
— Traditional Stats: 64.2% completion, 3,512 yards, 31 TD, 11 INT - Passer Rating: 148.2
James Harden trade (2012):
— High-volume scorer - Elite rim attacker - Developing three-point shooter - Shot profile aligned with…
James Okafor
— Team Lead, Claims Processing James has been in insurance IT for twenty years, the last twelve at Med…
James Ortiz (44)
— VP of Marketing. James is results-oriented and not particularly technical. He cares about the accura…
Jan Vecer, "Mathematical Analysis of Soccer"
— Columbia University course. Covers Poisson regression, Elo ratings, and betting market efficiency.
JavaScript
— The programming language of the web browser. Essential for **frontend** web development and increasi…
Javier Fernandez, "Wide Open Spaces"
— MIT SSAC 2018. The original conference presentation of the Gaussian influence model. Available on Yo…
Jayson Tatum:
— 5× All-Star - 3× All-NBA First Team - Career Win Shares (through 2023-24): ~65 and climbing - Projec…
JCL
— Job Control Language. The command language used on z/OS to define jobs, specify programs to execute,…
JCL for IMS Batch:
— DFSRRC00 is the IMS region controller invoked by JCL. - The PARM field specifies region type, progra…
JDBC isolation levels map to DB2 isolation levels
— but the names do not match intuitively. READ_COMMITTED = CS, REPEATABLE_READ = RS, SERIALIZABLE = RR…
Jealousy (romantic)
— An emotional response to perceived threat to a valued relationship; distinguished from envy (wanting…
Jeff Mann
— a poet, memoirist, and novelist from Hinton, West Virginia — has written extensively about the exper…
Jeffersonian democracy
— the vision of a republic of independent small farmers, suspicious of centralized financial power, ho…
JES2/JES3
— Job Entry Subsystem. The z/OS component that receives jobs, schedules them for execution, and manage…
JESMSGLG
— System messages, including security (RACF) failures 2. **JESJCL** — Expanded JCL (with all symbolics…
JILA BEC Homepage
— [jila.colorado.edu](https://jila.colorado.edu/) The group that created the first BEC maintains a web…
Jinja2
— The most widely used Python templating engine. If you have used Flask, you have used Jinja2. It prod…
jitter
— variations in the timing of when samples are clocked out of a DAC (or clocked into an ADC). In a per…
Job
— A unit of work submitted to z/OS for execution, defined by JCL statements. A job consists of one or …
Job 1: SPLIT
— Splits the input file into 4 partitions using DFSORT. Runs first, serially.
Job 3: MERGE
— Merges the four partition output files using DFSORT MERGE. Runs after all four PROCESS jobs complete…
Job A (CPU-heavy):
— CPU time: 45 minutes - I/O wait: 8 minutes - DB2 time: 12 minutes - Elapsed: 52 minutes
Job B (I/O-heavy):
— CPU time: 5 minutes - I/O wait: 40 minutes - DB2 time: 3 minutes - Elapsed: 43 minutes
Job Boards and Listings
— TeamWork Online (primary sports job board) - LinkedIn - Indeed - Team websites (career pages) - Conf…
job count
— **Average response time** (for response time goals) - **Average velocity** (for velocity goals) - **…
Job crafting
— the proactive process of redesigning work tasks, relationships, and meaning from within a role, with…
Job name
— the most common classifier - **Job class** — useful for broad categories - **Accounting information*…
Job orientation
— relating to work primarily as a means to external ends (income, security, time for other activities)…
Job orientation statements:
— The most important things in my life happen outside work - I work primarily to earn the money that e…
Job security
— Failed 4th downs generate criticism 2. **Outcome bias** - Failed attempts are remembered more than p…
JOB Statement
— The first statement in a JCL job stream, identified by //jobname JOB. Specifies the job name, accoun…
Job step
— A single program execution within a *job*, defined by an EXEC statement in JCL. Each step can execut…
Jobs 2A–2D: PROCESS-P01 through PROCESS-P04
— Four parallel jobs, each running program ACCTPROC with its partition number in the PARM. Each job re…
Joe Manchin
— the Democratic senator from West Virginia who had won election in 2010 and reelection in 2018 by pos…
Johari Window
— a four-quadrant model (developed by Luft and Ingram) mapping the relationship between self-knowledge…
John Stones
— Highest volume progressive passer - England's possession-oriented approach inflated opportunities - …
JOIN (Jobs or Income Now)
— affiliated with Students for a Democratic Society (SDS) — organized Appalachian migrants in Uptown a…
Join communities
— Feedback from peers accelerates learning
Join methods
— nested loop, merge scan, and hash join — each have scenarios where they excel and scenarios where th…
Join the community
— Sports analytics and data engineering communities are welcoming and helpful.
JOINs
— the mechanism for combining data from multiple tables in a single query. You will learn INNER JOIN, …
joint accounts
— a single account held by multiple customers. With a simple FK (CUSTOMER_ID in ACCOUNT), each account…
Jordan
— 34-year-old marketing manager; ambitious, prone to anxiety and overthinking; navigating work stress,…
Jordan (Voice-First Style):
— Full voiceover narrating every step - Background music at low volume - Vocal personality: warm, conf…
Jordan Advantages:
— Higher peak WS/48 (0.268 vs. 0.218) - More 20+ WS seasons (3 vs. 1) - Higher WS in championship cont…
Jordan Ellis
— 22-year-old first-generation college student majoring in sociology at a mid-size state university (f…
Jordan's moderate impact:
— Only 45% of his 28,000 new followers stayed — many had followed for the eclipse joke specifically an…
Josephson junction
— a thin insulating barrier between two superconductors, through which Cooper pairs tunnel.
Journal entry
— An accounting record that documents a financial transaction, specifying the accounts debited and cre…
Journal of Financial Stability
— Leading academic journal for systemic risk and stress testing research. Schuermann (2014), Borio et …
Journal of Labor Economics
— The primary venue for quantitative research on career trajectories, earnings dynamics, and labor mar…
Journal of Quantitative Analysis in Sports
— Peer-reviewed research - Methodological advances - Applied sports statistics
Journal of Risk
— Technical journal covering quantitative risk management, including stress testing methodology papers…
Journal of Sports Analytics
— Peer-reviewed academic journal - Regular xG methodology papers - IOS Press publication
Journal of Sports Economics
— Economic analysis of sports including betting markets
Journal of Vocational Behavior
— Career self-management and structured reflection (particularly the Hall, Yip, and Doiron 2018 study …
Journaling
— Even brief daily writing increases self-awareness and supports the processing of difficult material …
Journals:
— *Big Data & Society* (SAGE) — open access, interdisciplinary - *AI & Society* (Springer) — long-runn…
JSON
— the web's format. You learned to load flat JSON with `pd.read_json()`, flatten nested structures wit…
JSON (JavaScript Object Notation)
— A lightweight data interchange format used by most soccer data providers (including StatsBomb) to st…
JSON (RFC 8259)
— The JSON data interchange format specification. Understanding the spec helps debug JSON GENERATE out…
JSON GENERATE
— A COBOL statement (Enterprise COBOL 6.1+) that converts a COBOL data structure to JSON text. Enables…
JSON PARSE
— A COBOL statement (Enterprise COBOL 6.1+) that parses JSON text and populates a COBOL data structure…
JSON Schema
— Standard for defining JSON document structure. Useful for formalizing your canonical data model and …
JSTOR
— jstor.org — Archive of academic journals. Limited free access for registered users; full access thro…
jubilee
— the systematic cancellation of debts -- appears in some of the earliest legal codes in human history…
Juche ideology
— North Korea's state ideology, developed by Kim Il-sung, whose core principle is self-reliance. Juche…
Jud Süß
— 1940 Nazi historical drama; the most analytically significant example of fiction film used as propag…
Judge James Eversole
— produced years of violence between 1887 and 1894. At least a dozen people were killed. The conflict …
Judgment heuristic
— See: Heuristic. Mental shortcuts used to make judgments quickly. In probability reasoning, heuristic…
Judy Bonds
— West Virginia activist who led the fight against mountaintop removal coal mining as executive direct…
Julian dates
— Day-of-year requires leap year awareness. Day 60 is March 1 in a common year but February 29 in a le…
July 2017
— Reports emerge of parents and teenagers in the United Kingdom raising alarm about the feature. The N…
July 28, 2014
— Rudder publishes "We Experiment on Human Beings!" The post describes three OkCupid experiments in de…
junction table
— a new entity that sits between the two original entities and has a one-to-many relationship with eac…
June 2014
— Facebook emotional contagion paper is published. Controversy erupts. Facebook issues a statement. Re…
June 2017
— Snap Map launches globally. The default setting shares users' locations with all Snapchat friends. C…
June:
— Check exterior paint condition; note any areas needing attention - Inspect deck (they added a small …
Jupyter
— Install: `pip install jupyter` - Verify: `jupyter notebook`
Jupyter notebook
— the tool you'll use for the rest of this course.
Jurisdictions (choose two):
— European Union (GDPR framework) - United Kingdom (Information Commissioner's Office guidance) - Cali…
Just intonation
— A tuning system in which all intervals are tuned to simple integer frequency ratios drawn from the h…
Just right:
— "I analyzed 10 years of USDA crop yield data to investigate whether organic farming productivity has…
just transition
— a transition away from fossil fuels that does not leave coalfield communities behind. They argue tha…
Just-so story
— in evolutionary biology, a post-hoc narrative that is internally plausible but lacks specific falsif…
Justification:
— Team's conversion rate: 62% overall, higher on short yardage - Expected value strongly favors going …
JWT Testing Checklist:
— Decode all JWTs and examine the `alg` header - Test `"alg": "none"` with an empty signature - If RS2…
K
K-Factor Selection:
— 20-25: Stable, slow adaptation - 28-32: Balanced (most common) - 40+: Very responsive, high volatili…
K-Means Variations
— K-Means++ - Mini-batch K-Means
K-Means:
— Simple and fast - Requires specifying K - Assumes spherical clusters - Sensitive to initialization
Kafka Producer/Consumer
— Set up local Kafka and build producer/consumer for play-by-play events.
Kaggle
— NLP competitions - Shared notebooks
Kaggle / GitHub Community Datasets
— Various scraped odds datasets appear periodically. Notable: the Pinnacle closing line dataset for NF…
Kaggle API
— Description: Programmatic access to download competition data, public datasets, and submit predictio…
Kaggle Competitions
— Data cleaning is often key to winning - Learn from top solutions - https://www.kaggle.com/competitio…
Kaggle Datasets
— URL: https://www.kaggle.com/datasets - Description: Community-contributed datasets spanning virtuall…
Kaggle Datasets (kaggle.com)
— Numerous sports datasets contributed by the community. Quality varies. Notable datasets include hist…
Kaggle Datasets:
— Various soccer datasets uploaded by community members - Quality and documentation vary significantly…
Kaggle Football Datasets
— Cleaned datasets - Competition data - https://www.kaggle.com/datasets
Kaggle Learn
— Interactive ML tutorials - Practice competitions - https://www.kaggle.com/learn
Kaggle NBA Datasets
— https://www.kaggle.com/datasets - Search for NBA historical data
Kaggle NFL Big Data Bowl
— Tracking data samples - Annual competitions - Creative feature engineering
Kaggle NFL Data
— `https://www.kaggle.com/datasets` - Play-by-play datasets - Special teams subset available
Kaggle NFL Datasets
— Various competition datasets - Tracking data available - https://www.kaggle.com/datasets?search=nfl
Kaggle NFL Play-by-Play
— Historical play data 2. **nflfastR data** - Cleaned NFL data 3. **Sports Reference** - Historical st…
Kaggle: Data Cleaning Course
— Free, interactive tutorials - Real dataset examples - https://www.kaggle.com/learn/data-cleaning
Kahneman's dual-process theory
— Daniel Kahneman's framework dividing cognition into System 1 (fast, automatic, intuitive) and System…
Kairos
— The Greek concept of "the opportune moment" — the right time to act. In contrast to chronos (chronol…
kaleido
— A separate Python package required for plotly's static image export (`write_image`). Not included wi…
Kali Linux
— Primary attack platform (free download) - **VirtualBox or VMware** — Virtualization (VirtualBox is f…
Kalshi
— CFTC-regulated Designated Contract Market (DCM) - **PredictIt** — Operated under a CFTC no-action le…
Kalshi API documentation
— [trading-api.readme.io](https://trading-api.readme.io/). Kalshi's API documentation covering market …
Kalshi Documentation
— https://kalshi.com/docs/ - Kalshi's official API documentation and fee schedule.
Kalshi's Arguments:
— The CFTC exceeded its statutory authority by treating all election contracts as categorically imperm…
Kanawha Valley salt works
— The largest industrial enterprise in antebellum Appalachia, producing millions of bushels of salt an…
Kanban
— An **agile** methodology that visualizes work on a board with columns representing stages (To Do, In…
Kantian ethics
— named for the eighteenth-century German philosopher Immanuel Kant — holds that the fundamental moral…
Kaplan-Meier Estimator
— A non-parametric statistic used to estimate the survival function from censored data. In soccer, app…
karma
— literally "action" in Sanskrit — is widely known in Western popular culture but is frequently misund…
Karun Singh's Blog
— Original xT creator - Technical implementations - Model refinements - Link: karun.in/blog
Karun Singh, "Introducing Expected Threat (xT)"
— karun.in. The original blog post introducing the xT framework, with code and visualisations.
KC -3
— smallest uncertainty relative to edge, most efficient market for the model's strength; (2) **BUF ML*…
KDD Sports Analytics Workshop
— At ACM KDD conference - Academic focus on sports ML/data mining
Keeling Curve
— continuous measurements of atmospheric CO2 concentration taken at the Mauna Loa Observatory in Hawai…
Keep a record
— document what you removed and why, in the commit message and in the change log.
Keep authorization documents accessible
— carry physical and digital copies during physical tests.
Keiko Tanaka (29)
— Marketing Coordinator, 2 years at Greenfield. Keiko handles campaign execution and basic reporting. …
Keith Galli
— pandas tutorials - Data science projects - Clear, practical approach
Kelly Criterion Derivation:
— The Kelly criterion maximizes the expected logarithm of wealth, which is equivalent to maximizing th…
Kentucky Committee for Mothers and Babies
— later renamed the Frontier Nursing Service — with a plan that was unprecedented in American healthca…
Kentucky Poet Laureate
— a recognition that placed a Black Appalachian woman at the center of the state's literary identity f…
Kept:
— USB condenser microphone (genuine quality improvement — audio floor) - One LED light panel with diff…
Kerberoasting:
— Enumerate and attack all service accounts with SPNs
kernel
— across the image, checking whether a particular pattern is present at each location. One filter migh…
Kernel Density Estimation (KDE)
— A non-parametric method for estimating the probability density function of a variable. Used to creat…
Ket
— Ch 8.1 A vector in Hilbert space, written $|\psi\rangle$. The ket encodes the complete quantum state…
Key (musical)
— The tonal center of a musical passage, defined by a tonic pitch and the diatonic scale built on that…
Key Achievements:
— Promotion to the Premier League after 74 years away - Consistent overperformance relative to budget …
Key activities:
— Install Anaconda and create your project notebook - Complete all Chapter 3 and 4 coding exercises --…
Key adjustment factors:
— Efficiency decline steeper than typical - Defensive metrics showing accelerated decline - Style of p…
Key Adjustments:
— Wind (15+ mph): -10% to -15% accuracy - Rain: -5% accuracy - Cold (<35°F): -3% to -5% accuracy - Art…
Key advantages over Metro Mirror:
— **Distance:** Because replication is asynchronous, XRC can operate over any distance — continental o…
Key advantages:
— Massive scalability: arrays of $>1000$ atoms have been demonstrated - Reconfigurable connectivity: a…
Key applications:
— Government surveillance of political organizations implicates First Amendment associational rights (…
Key areas:
— Backend services (bet processing, trading platforms, settlement engines) - Frontend and mobile devel…
Key argparse patterns to understand:
— `action="store_true"` creates a boolean flag - `action="version"` handles `--version` automatically …
Key audio moments:
— Rind crunch (3 seconds) — triggers "crinkling" ASMR response - Blade through flesh (2 seconds) — tri…
Key augmentation choices for medical imaging:
— **Conservative color jitter:** Color information (redness, pigmentation) is diagnostically important…
Key capabilities:
— Set breakpoints at COBOL paragraph names or statement numbers - Step through code line by line - Dis…
Key CCPA/CPRA provisions:
— Right to know what personal information is collected - Right to delete personal information - Right …
Key CFTC Spoofing Cases for Study
— *CFTC v. Navinder Singh Sarao* (2015/2016): Foundational spoofing case; see the complaint and settle…
Key challenges encountered:
— **Class imbalance**: Fraudulent transactions represented only 0.12% of all transactions. The team us…
Key Changes for Report Writers:
— The Attack Requirements (AT) metric replaces the less granular Attack Complexity - The naming conven…
Key changes in CSF 2.0
— **Govern function:** Elevates governance and supply chain risk to a top-level function, reflecting t…
Key Chapters:
— Chapter 3: Linear Methods for Regression (ridge regression) - Chapter 7: Model Assessment and Select…
key character diversity
— it distributes the Pythagorean comma so that each key has slightly different sized intervals, giving…
Key characteristics of red teaming:
— **Objective-based:** Red teams pursue specific objectives (e.g., access the crown jewels, exfiltrate…
Key characteristics:
— Zero trading fees make Polymarket attractive for active traders - The order book model (CLOB — Centr…
Key concepts from this chapter:
— **Pixels and features:** Images are grids of numbers; vision systems learn to extract hierarchical f…
Key concepts to emphasize:
— The DB2 product family is not a single product: DB2 for LUW, DB2 for z/OS, and Db2 on Cloud serve di…
Key Concepts:
— **Endpoint**: URL that returns specific data (e.g., `/games`, `/plays`) - **Parameters**: Filters fo…
Key Conditions of the Letter:
— Markets limited to **5,000 traders** (later informally treated as 5,000 per contract) - Individual p…
Key considerations:
— *Sampling* -- Who is interviewed matters enormously. Interviewing only corporate executives about da…
Key constraints:
— **Distance:** Metro Mirror is synchronous, meaning every write must complete on both the primary and…
Key Content Blocks:
— The five cracks in classical physics (blackbody, photoelectric, spectra, Compton, diffraction) - Pla…
Key Contents:
— Complete BPM formula and coefficients - Position estimation methodology - Team adjustment details - …
Key Contributions:
— First systematic application of regression to basketball lineup data - Demonstration that raw plus-m…
Key Creative Commons types:
— CC BY = Credit required, commercial OK - CC BY-NC = Credit required, no commercial use - CC0 = No re…
Key data characteristics:
— 14,782 speeches from 2018 through early 2026 - 847 unique speakers - 50 states represented - Median …
Key DBPM inputs
— Steal Percentage (STL%) - Block Percentage (BLK%) - Defensive Rebound Percentage (DRB%) - Team defen…
Key decisions in Phase 1:
— Hired a small analytics team (2-3 people) with direct access to ownership - Established data subscri…
Key decisions to make:
— What information do you need to evaluate a return? - Which rules are absolute (always apply) vs. con…
Key decisions:
— SCHABKHI gets Continuous availability because the transaction journal and CICS-accessed VSAM files m…
Key Departments for Social Engineering Targeting
— **IT/Help Desk**: Often the first target for pretexting calls. Help desk staff are trained to be hel…
Key Derivation Functions (KDFs)
— Modern best practice. Algorithms like bcrypt, scrypt, Argon2, and PBKDF2 are specifically designed f…
Key design choices:
— **Group buffer pool sizing:** Kwame worked with Lisa Tran to size the group buffer pools (GBPs) base…
Key design decisions:
— **SCPRODHI gets Continuous availability**: If the primary volume is unavailable, z/OS automatically …
Key design elements:
— Use modular block structure (section 18.1) for all YouTube videos - Apply all Part 3 short-form skil…
Key design parameters:
— Target population: Low-to-moderate propensity registered Democrats and unaffiliated voters in the th…
Key differences:
— **Semantic content:** Linguistic sentences have propositional meaning (they can be true or false, th…
Key Differentiators:
— Specialization: focus on specific industries (healthcare, financial services) or testing types (clou…
Key directories:
— `/usr/bin/` — Most security tools are installed here as executable binaries - `/usr/share/` — Data f…
Key disadvantages:
— **RPO > 0:** You will lose the transactions that were committed at the primary site but hadn't yet b…
Key distinction:
— `Timedelta(days=30)` = exactly 30 days (calendar-unaware) - `DateOffset(months=1)` = one calendar mo…
Key Distinctions
— **Legal compliance vs. ethical practice**: compliance is the floor; ethics asks what is right above …
Key distinctions:
— EL is what the bank expects to lose on average — it is priced into loan rates and covered by provisi…
Key DORA Concepts:
— **Classification trigger**: Date of detection, not date of recovery - **Major incident criteria**: D…
Key engineering decisions:
— The team used scikit-learn for feature engineering and classical ML, and PyTorch for the deep learni…
Key Evidence:
— Mountain topography did create physical barriers to travel and communication before railroads. - App…
Key FCA Manipulation Cases
— *FCA v. Swift Trade Inc.* (2013): £8M penalty; first significant UK layering enforcement action; the…
Key features:
— Consent-based framework with "deemed consent" for certain specified purposes - Rights of data princi…
Key feedback area
— the concatenated key of the current position
Key filing types consulted:
— **Form 3** (Campaign committee receipts and disbursements): Used for candidate campaign totals, item…
Key Finding 1:
— Result: ___________________________________________________________________ - Visual: ______________…
Key Finding 2:
— Result: ___________________________________________________________________ - Visual: ______________…
Key Finding 3 (if applicable):
— Result: ___________________________________________________________________ - Visual: ______________…
Key findings to reference consistently:
— Electronic music has highest spectral centroid (bright, high-frequency energy) - Indian classical ha…
Key Findings:
— Approximately 15% of Fortune 500 companies had at least one subdomain vulnerable to takeover - AWS s…
Key FISA Sections:
— *Title I (Traditional FISA Orders)*: Authority for surveillance of specific foreign powers or their …
Key Frameworks Referenced in This Book
— Flask: https://flask.palletsprojects.com - FastAPI: https://fastapi.tiangolo.com - SQLAlchemy: https…
Key function vocabulary:
— **Domain:** The set of valid inputs. For $f(x) = \sqrt{x}$, the domain is $x \geq 0$ (you cannot tak…
Key Functions:
— `make_classification()` — Binary or multi-class classification with controllable separability - `mak…
Key GOES capabilities:
— **Visible imagery:** High-resolution cloud images (at 0.5 km resolution for the primary channel) upd…
Key governance conditions for the pilot:
— All alternative data sources entered into the data catalog before any data is ingested - The `DataLi…
Key ideas:
— A **stack** supports `push`, `pop`, and `peek`. It's used for undo systems, bracket matching, backtr…
Key identities:
— Rodrigues: $H_n(\xi) = (-1)^n e^{\xi^2}\frac{d^n}{d\xi^n}e^{-\xi^2}$ - Recursion: $H_{n+1} = 2\xi H_…
Key implementation considerations:
— **Event schema versioning.** Events emitted from COBOL programs will evolve as the COBOL programs ch…
Key implementation details:
— **Orchestration vs. Choreography.** In orchestration, a central saga orchestrator (typically a cloud…
Key incidents:
— **The Biden robocall (January 2024):** An AI-generated voice clone of President Biden was used in ro…
Key infrastructure:
— FastAPI application deployed on AWS ECS (Elastic Container Service) - PostgreSQL on AWS RDS with Row…
Key Insight
— The completeness relation is the single most useful computational tool in Dirac notation. The techni…
Key Insights:
— The **accuracy-interpretability trade-off** means that the most accurate systems are often the harde…
Key instruments:
— **AMLR (Anti-Money Laundering Regulation):** Regulation (EU) 2024/1624 — directly applicable uniform…
Key legal provisions:
— DPA 2018 Schedule 2, paragraph 14: crime and taxation exemption from data subject rights - POCA 2002…
Key light
— primary light at 45 degrees, diffused, above eye level. The main illumination source. 2. **Fill ligh…
Key Limitation:
— Does not account for legitimate differences in qualifications or risk between groups - Can require a…
Key limitations of reported MOE:
— Assumes probability sampling - Captures only random sampling error - Does NOT capture coverage bias,…
Key Limitations:
— Heavy offensive bias - Defense only through STL/BLK - No shot difficulty adjustment - Position-blind…
Key LOAD options:
— `RESUME NO REPLACE`: Delete existing data and load new data. - `LOG NO`: Do not log individual row i…
Key management rules:
— Master keys: dual control, annual rotation - Data encryption keys: ICSF CKDS, quarterly rotation, RA…
Key markers:
— Exaggerated or unverifiable threat language ("existential," "invasion," "extinction") - Pairing the …
Key MCMC concepts for practitioners:
— **Warmup/burn-in:** The chain needs time to "find" the high-probability region of the posterior. Dis…
Key Metrics and Their Meanings
— **RT60** (1.8–2.2 s for symphony): overall liveness and warmth - **C80** (-2 to +2 dB for orchestra)…
Key Metrics:
— Offensive Rating: 114.5 (2015-16), 115.9 (2016-17) - eFG%: 56.3% (2016-17, historical high) - Pace: …
Key milestones:
— **1995:** Netscape launches first commercial bug bounty program - **2004:** Mozilla formalizes its b…
Key Models:
— `GaussianCopulaSynthesizer` — Fast, parametric; best for well-behaved numerical data - `CTGANSynthes…
Key moments:
— Ch. 1: Frustration with random-seeming virality - Ch. 4: Discovers she's been committing the hot-han…
Key numbers:
— Heralded entanglement rate: ~1 event per hour (very low!) - Detection efficiency: ~96% (near-unity f…
Key OBPM inputs
— True Shooting Percentage (TS%) relative to league average - Usage Rate (USG%) for volume context - A…
Key observations from optimization:
— The four correlated Senate races (P1-P4) received significantly reduced allocations compared to thei…
Key observations from the true regime statistics:
— The Volatile regime (Phase 3) has roughly 2-3x the price change standard deviation of the Stable reg…
Key observations:
— RoBERTa achieves the highest accuracy, consistent with its improved training recipe. - DistilBERT is…
Key Offerings:
— 200+ interactive labs covering all major web vulnerability classes - Detailed written explanations o…
Key orchestration concepts:
— **Directed Acyclic Graphs (DAGs):** Pipelines are defined as DAGs — a series of steps with dependenc…
Key parameter:
— **MAXRBLK**: Maximum number of 4 KB blocks for the RID pool. Total size = MAXRBLK x 4 KB.
Key parameters (2024-2025):
— $T_1 \sim 100$-$500\,\mu$s - $T_2 \sim 50$-$300\,\mu$s - Single-qubit gate time: $\sim 20$-$50$ ns -…
Key Parameters:
— $\varepsilon$ (`eps`): The radius of the neighborhood around each point - `min_samples`: The minimum…
Key Pass
— A pass that leads directly to a shot attempt, regardless of whether the shot results in a goal. (Cha…
Key patterns used:
— **EAFP for file operations:** Try to open/read, catch specific exceptions - **Retry loops for input:…
Key people in this case:
— **Oliver Hartley**: Cornerstone's Chief Risk Officer, responsible for overall ICAAP ownership - **Fe…
Key People:
— **Kwame Mensah:** Chief Systems Architect, 30 years on the platform. Started as a COBOL programmer i…
Key percentiles:
— 25th percentile (Q1): First quartile - 50th percentile (Q2): Median - 75th percentile (Q3): Third qu…
Key Performances:
— Eastern Conference Semifinals vs. Philadelphia: 34.7 PPG - Game 7 buzzer-beater - NBA Finals MVP
Key Physical Metrics Explained:
— **Total distance:** The total distance covered by a player during a match or training session. A typ…
Key points:
— `PROGRAM-ID` is the only required paragraph. The name must follow your compiler's rules (typically 1…
Key practical tips:
— Always call `model.train()` before training and `model.eval()` before evaluation. This is the most c…
Key predictions:
— The spread $A - B$ is increasing in $\pi$ (more informed traders → wider spread) - The spread is inc…
Key principles applied:
— Each segment introduces max 2-3 new items (respects working memory) - Visual and verbal channels are…
Key principles for ML on-call:
— **Clear ownership:** Every production model has a designated owner and an on-call rotation - **Runbo…
Key principles for RegTech
— **Principle 3 (Accuracy and Integrity):** Risk data must be accurate and reliable. Reconciliation be…
Key Principles:
— Highlight the vulnerability with inline comments (using `# <--` or similar) - Show both the maliciou…
Key properties of SHAP:
— **Local accuracy:** SHAP values sum to the actual prediction. - **Consistency:** If a feature's cont…
Key properties:
— **Additivity.** SHAP values sum to the model's prediction minus the base value. - **Consistency.** I…
Key Providers:
— **Catapult:** The largest provider of GPS/wearable tracking in professional sports. Catapult devices…
Key provisions:
— **Parent/student rights:** Parents (and students over 18) have the right to inspect education record…
Key Questions Answered:
— P(home wins by 10+)? - P(total > 45)? - P(overtime)? - Expected score distribution
Key questions for analysis:
— Apple's epsilon values reportedly range from 1 to 8 per data type, with a daily per-user budget of 1…
Key questions to ask:
— Does the provider use your data to train future models? (Most enterprise agreements now include opt-…
Key questions:
— Does the system perform differently for different demographic groups (defined by race, gender, age, …
Key Race Dynamics:
— State demographics: ~38% white non-Hispanic, ~32% Hispanic/Latino, ~18% Black, ~12% Asian/other - Re…
Key reference points:
— SecureFirst TCPIPSERVICE: Port 8443, MAXPERSIST(120), SOCKETCLOSE(00,00,30) - SecureFirst pipeline: …
Key RegTech relevance
— Transaction reporting accuracy is a key area of FCA/ESMA supervisory focus; systematic errors attrac…
Key relationships:
— Every 3 dB increase ≈ doubling of intensity - Every 10 dB increase ≈ perceived doubling of loudness …
Key Requirements:
— Conformity assessment before deployment - Registration in EU AI Act database - Risk management syste…
Key Resources:
— Play-by-play endpoints - Player tracking data - Box score data
Key responsibilities:
— Setting opening lines and managing line movement throughout the betting cycle - Monitoring competito…
Key results:
— At 23 people: P(match) ≈ 0.5073 — just over 50%! - At 50 people: P(match) ≈ 0.9704 — over 97%! - At …
Key rights under CCPA/CPRA:
— **Right to know** — What personal information is collected, how it's used, and with whom it's shared…
Key risk factors include:
— Acute:Chronic Workload Ratio (ACWR) - Total distance covered in training (meters) - High-speed runni…
Key Roles:
— **Director/VP of Analytics**: Sets strategic direction, interfaces with leadership - **Strategy Anal…
Key routing concepts:
— **Default Gateway:** The router that a host sends packets to when the destination is not on the loca…
Key rules for JSON GENERATE:
— The JSON field names are derived from the COBOL data-name identifiers. For this reason, use mixed-ca…
Key rules for safe column addition:
— The column should allow NULLs (no NOT NULL constraint) or have a DEFAULT value. - Adding a column wi…
Key rules to internalize:
— P(not A) = 1 - P(A) — the complement rule - P(A or B) = P(A) + P(B) - P(A and B) — the addition rule…
Key rules you probably remember:
— **Addition and subtraction** are performed left to right: $10 - 3 + 2 = 9$. - **Multiplication and d…
Key rules:
— Adding a negative number subtracts - Subtracting a negative number adds - The sign of the result fol…
Key Screening Lists:
— **OFAC SDN List** (US): US-mandated for US persons and dollar transactions globally - **HM Treasury …
Key season-level insights:
— **xG is predictive of future goals.** A team that underperforms xG by 10 goals in the first half is …
Key Sections:
— 1.1 AI Is Everywhere (And You Might Not Notice) - 1.2 What Do We Mean by "Intelligence"? - 1.3 Narro…
Key sensory moments:
— Zesting (visual satisfaction + auditory grating sound) - Juice hitting hot pan (sizzle = cross-modal…
Key sequence parameters:
— **CACHE n** -- DB2 pre-allocates n values in memory for performance. This is critical for high-inser…
Key series for prediction market analysis:
— GDP and GDP growth (GDPC1, A191RL1Q225SBEA) - Unemployment rate (UNRATE) - Consumer Price Index / In…
Key services:
— `beneficiary-inquiry` — Full beneficiary demographics and enrollment - `benefit-calculation` — Curre…
Key signals of potential inauthenticity:
— Very recent account creation (especially during a news event) - Posting frequency far exceeding huma…
Key SR 11-7 concepts:
— **Model risk**: Potential adverse consequences from decisions based on incorrect or misused models -…
Key structural differences from Anthropic:
— OpenAI uses `client.chat.completions.create()` vs. Anthropic's `client.messages.create()` - OpenAI i…
Key sub-problems:
— How do sportsbooks' detection algorithms work, and what betting patterns trigger limiting? - What is…
Key success factors:
— Language localization (not just English-language platforms) - Mobile-first design (many target popul…
Key syntax rules:
— The condition (`quarterly_revenue >= quarterly_target`) is followed by a colon `:` - The indented bl…
Key systems:
— **EHR System A** (Epic): Used by 28 clinics, covering approximately 250,000 patients - **EHR System …
Key Tables:
— `INVENTORY` — 500,000 SKUs, updated on every order - `ORDERS` — 100 million rows, append-only during…
Key Takeaways
— The 10–15 most important points, organized by theme 2. **Exercises** — 15–40 problems ranging from r…
Key Takeaways (key-takeaways.md)
— A condensed summary of the chapter's most important points. Use this for review, not as a substitute…
Key Takeaways from Chapter 10:
— Electronic synthesis is the implementation of **physics in circuits and code** — each synthesis para…
Key Takeaways from Chapter 9:
— The voice operates as a **source-filter system**: the glottis generates a harmonic-rich buzz; the vo…
Key Takeaways — Chapter 11
— Pitch is the brain's interpretation of frequency; the relationship is logarithmic, not linear. - Oct…
Key Takeaways — Chapter 12
— The Pythagorean comma (23.5 cents) is the mathematical irreconcilability between pure fifths and clo…
Key Takeaways — Chapter 13
— Rhythm is the organization of sonic events in time through patterns that create and manipulate tempo…
Key Takeaways:
— **SQL injection** remains the most impactful injection type, with techniques ranging from simple UNI…
Key Terminology:
— **Adversarial Example:** An input intentionally designed to cause a model to make a mistake - **Pert…
Key Terms
— **Courtship** — the social process of seeking a romantic or marital partner, including its norms, ri…
Key Terms (Chapter 5)
— **Bystander effect**: The phenomenon in which individuals are less likely to intervene in an emergen…
Key Terms:
— Address space - Dispatching priority - JES2/JES3 - System services (SVC) - Program Properties Table …
Key traffic sources:
— **Browse features:** YouTube's home page and subscription feed. This is algorithm-driven distributio…
Key visual moments:
— Perfect center cut (prediction confirmed — the halves are equal) - Seed removal (transformation — im…
Key Xpediter features:
— Source-level debugging with COBOL source display - Before/after data inspection - Automatic data for…
Key-value ordering varies
— never assume a specific order; always search by key name
KEYCARD
— Collects full key cardinality information. This tells the optimizer how many distinct values exist f…
KeyError
— column names are case-sensitive. Fix: `df["country"]`. 2. **ValueError** — use `&` instead of `and`,…
KEYS(length offset):
— `length` — Number of bytes in the primary key (1 to 255). - `offset` — Byte position of the key with…
keystone habits
— habits whose formation tends to trigger cascades of positive secondary changes, even without deliber…
keystone species
— a species whose influence on the ecosystem is disproportionate to its abundance. Remove the keystone…
keyword arguments
— specifying the parameter name at the call site:
Keyword Extraction
— Identifying the most important or frequent terms in a body of text. This surfaces recurring themes w…
Khan Academy - Statistics and Probability
— https://www.khanacademy.org/math/statistics-probability - Free, comprehensive statistics fundamental…
Khan Academy Statistics
— https://www.khanacademy.org/math/statistics-probability - Foundation for statistical concepts - Free…
Kicker A (FG%)
— 0-29 yards: 100%, 100%, 100%, 100% - 30-39 yards: 85%, 90%, 80%, 88% - 40-49 yards: 70%, 75%, 65%, 7…
Kicker B (FG%)
— 0-29 yards: 100%, 100%, 100%, 100% - 30-39 yards: 100%, 100%, 100%, 100% - 40-49 yards: 60%, 55%, 65…
Kicker evaluation:
— **Binary outcomes**: Make or miss - **Distance as primary difficulty**: Can model expected % - **Poi…
Kill Fee
— A contractual payment made to a creator when a brand cancels a commissioned project that has already…
Kim family cult of personality
— The multi-generational personality cult surrounding Kim Il-sung, Kim Jong-il, and Kim Jong-un, repre…
Kinetics Dataset
— https://deepmind.com/research/open-source/kinetics - Large-scale video action recognition dataset - …
King studs
— full-height, flanking the opening - **Trimmer (jack) studs** — shorter, directly supporting the head…
Kirzner's entrepreneurial alertness
— See: Entrepreneurial alertness. *First introduced: Chapter 30.*
Kirzner's framework better describes:
— Small and medium business formation (the vast majority of entrepreneurship) - Arbitrage and trading …
Kitchen
— Under the sink: open the cabinet and look at the drain connections, supply lines, and the cabinet fl…
Kitchen:
— Is the range hood vented to the exterior? - Any evidence of past leaks under the sink or dishwasher?
Kituwah Academy
— A Cherokee language immersion school founded in 2004 that educates children entirely in the Cherokee…
Kituwah Mound
— the ancient ceremonial site considered by many Cherokee to be the mother town, the place where Chero…
Kiva US
— kiva.org/us An online lending platform offering zero-interest microloans up to $15,000 for small bus…
Klangfiguren
— sound figures. Today they are known as **Chladni figures**.
Kleiber's law
— The scaling relationship between an animal's metabolic rate and its body mass, following a 3/4 power…
kloppy
— Multi-provider data loading - Standardized data format - Event and tracking data - Link: github.com/…
Knights of Labor
— one of the earliest American labor organizations — and found the cause that would consume the remain…
Know the limits
— string methods are often simpler and clearer for straightforward tasks
Know Your Customer (KYC):
— Verify the identity of all customers at account opening - Maintain customer identification programs …
Knowing what AI is good at
— pattern recognition in large datasets, consistency, speed, tireless attention. - **Knowing what AI i…
Knowledge
— does the person know how to change?
Knowledge asymmetry:
— What did the Taylor-era foreman know that the worker did not? - What does the algorithmic manager kn…
Knowledge base tools
— Search and read team documentation, ADRs, coding standards 2. **Codebase navigation tools** — Find r…
knowledge cutoff
— and it means the model can confidently tell you about events that "happened" after its training ende…
knowledge engineering
— a painstaking process where a specialist (the "knowledge engineer") would interview domain experts, …
Knowledge file limitations:
— Total storage per GPT: 20 files, 512 MB total - Retrieval is not guaranteed: the GPT retrieves relev…
Knowledge Sharing Practices:
— Regular internal seminars or "lunch and learn" sessions - Pair programming or analysis for skill tra…
Knowledge Sharing:
— Write blog posts about techniques you have learned - Create walkthroughs for CTF challenges and lab …
Knowledge transfer
— The process of applying insights or methods from one domain to another; the practical skill at the h…
Knowledge Transfer Plan:
— Which components depend on retiring developers? - Documentation plan - Pair programming schedule - A…
Known challenges:
— Medical device network segmentation is incomplete — some devices can reach the corporate network - L…
Known Characteristics:
— **Patience:** APT29 campaigns operate over months or years. Initial access may occur weeks before an…
Known data notes:
— Alaska reports results at the borough/census area level in some years; FIPS codes for Alaska may dif…
Known implementation context:
— The platform replaces a legacy in-house system that has been in operation for nine years - There are…
Kong Gateway Documentation
— https://docs.konghq.com Documentation for the Kong API gateway used in CNB's reference architecture.…
Konkatsu
— Japanese term for organized marriage-seeking activities, including agency services and events; a con…
Korean ARMY
— those fans in the same country as BTS — uses Weverse (HYBE's proprietary platform), Naver Fan Cafe (…
Korean Central News Agency (KCNA)
— The state news agency of the DPRK, which serves as the primary production organ for official North K…
KPI Dashboard (second section)
— Key metrics displayed prominently, ideally with sparklines or mini-charts - Traffic-light coloring: …
KPIs (Key Performance Indicators)
— The specific, measurable metrics a creator tracks to assess progress toward their goals. Different b…
KPMG, Deloitte, PwC, and EY
— the major financial audit firms — have all developed AI audit practices, recognizing that AI governa…
Kramers' degeneracy
— For half-integer spin systems with time-reversal symmetry, every energy level is at least two-fold d…
Kronig-Penney model
— a 1D periodic array of rectangular potential barriers. It is exactly solvable and captures all the e…
KSDS
— Key-Sequenced Data Set. A *VSAM* file organization where records are stored in order of a primary ke…
KSDS (Key-Sequenced Data Set)
— Records are stored and retrieved by a primary key field. This is the indexed file organization. Reco…
KubeCon
— Kubernetes community conference for deployment topics.
Kubernetes Deployment
— Containerize and deploy a real-time system to Kubernetes with auto-scaling.
Kubernetes Goat
— Vulnerable Kubernetes cluster - **contained.af** — Container escape challenges
Kubernetes Hardening:
— Implement Pod Security Standards (Restricted profile) - Use RBCD with least privilege---never grant …
Kubernetes RBAC is frequently misconfigured
— Overpermissioned service accounts, wildcard permissions, and default account usage are among the mos…
Kubernetes StatefulSet Documentation
— Kubernetes official documentation on StatefulSets, persistent volume claims, and ordered pod managem…
Kwangmyong
— North Korea's domestic intranet, which provides state-approved digital content with no connection to…
KYC Program:
— KYC-current rate: target > 99%; <95% is a material gap - High-risk customer review on schedule: 100%
L
L8 TCBs
— For programs defined as CONCURRENCY(THREADSAFE). These run on open TCBs that operate concurrently wi…
La Follette Civil Liberties Committee
— a U.S. Senate investigation into violations of workers' rights, chaired by Senator Robert La Follett…
Lab Environment:
— A network of vulnerable machines of varying difficulty - Multiple network segments simulating corpor…
Lab safety practices
— including documentation, snapshot management, and the cardinal rule of never attacking unauthorized …
Lab Setup Requirements:
— Windows Server 2016 (FILE01) — vulnerable to MS17-010 - Windows Server 2019 (DC01) — domain controll…
Lab Setup:
— Three VLANs: Clinical (10), Admin (20), Server (40) - Domain controller, file server, and at least t…
label
— the index values and column names:
Label Flipping
— Changing the labels on training examples to cause misclassification: - Flip "spam" labels to "not sp…
Label Propagation
— Alternative algorithm - Semi-supervised approach
LABEL RECORDS
— Historically significant but largely obsolete. Standard labels are the default on all modern systems…
LABEL RECORDS ARE STANDARD
— Indicates that standard header and trailer labels are present on the file. This is the norm for disk…
Labeled training data
— a set of texts that human expert coders have already classified (populist/not populist, or a continu…
labor education
— providing training, analysis, and strategic support for workers organizing unions in the industries …
Lack of defense in depth
— multiple control failures aligned to enable the breach. - **The cost of a $0 patch vs. a $1.4 billio…
Ladder operators
— Ch 4.4, Ch 12.3 Operators that raise or lower quantum numbers. For the harmonic oscillator: $\hat{a}…
LAG() and LEAD()
— access previous and next rows without a self-join:
Lagging Indicators:
— Sustained usage (not just initial trial but continued use over months) - Business outcome improvemen…
LAION-5B
— Description: 5.85 billion image-text pairs scraped from the web. Used to train open-source vision-la…
Lally, P., et al. (see Chapter 29 further reading)
— for the habit formation timeline claim referenced in the quiz.
Lamb shift
— Ch 18.3 A small shift (~1057 MHz) between the $2S_{1/2}$ and $2P_{1/2}$ levels of hydrogen, which ha…
Lambda Function
— An anonymous, single-expression function in Python: `lambda x: x * 2`. Commonly used as arguments to…
Laminated glass
— A PVB (polyvinyl butyral) interlayer between two glass panes dampens resonance and provides STC rati…
land agents
— the advance scouts of industrial capitalism in the mountains.
land grant
— a legal instrument by which the colonial government (and later the state government) transferred tit…
land lottery
— The Cherokee government at New Echota was prohibited from meeting
land ownership pattern
— in which vast acreages of Appalachian land, including the mineral rights beneath them, were owned by…
Land Records:
— County deed books — the primary source for land ownership patterns; many have been digitized through…
land speculation
— the purchase of large tracts of frontier land by wealthy eastern investors who never intended to set…
Land-into-trust
— The legal process by which tribally purchased land is placed into federal trust status, expanding th…
land-into-trust acquisitions
— purchases of land by the EBCI that are then placed into federal trust status, expanding the Boundary…
Landau levels
— equally spaced, just like the quantum harmonic oscillator, with spacing $\hbar\omega_c$.
Landing Page
— A standalone web page designed to convert visitors to a specific action — email sign-up, product pur…
Landing Pages:
— Mirror the legitimate service's login page - Use HTTPS (free certificates from Let's Encrypt) - Capt…
language
— the specific words Sam chose, the structure of the accusations, the framing of the problem, the pres…
Language and framework context
— information about the programming language, imported libraries, and code patterns already used in th…
LANGUAGE COBOL
— Tells DB2 the load module is COBOL. DB2 uses this to set up the Language Environment runtime correct…
Language Environment (LE)
— The common runtime environment for programs compiled by IBM's z/OS language compilers (COBOL, PL/I, …
Language Environment Programming Reference
— Documents the runtime support for inter-language communication, save area conventions, and condition…
language shame
— the internalized belief that your natural way of speaking is inferior, that the language of your fam…
language-agnostic
— it does not require pre-tokenization or language-specific rules. SentencePiece supports both BPE and…
Lantern laws
— Colonial and antebellum laws in New York City requiring enslaved Black people to carry lanterns when…
large avalanche
— an event whose scale reveals the criticality of the terrain in which it occurred.
Large Systems Performance Reference (LSPR)
— IBM's processor benchmark data, published for each hardware generation. This is the source for MSU/M…
last line first
— it tells you the error type and a human-readable description. Then look at the line number to find *…
Last Row View (Tracking Data Analytics)
— Access: Research samples - Type: Open tracking data - Defensive Use: Movement and spacing analysis
Last week's goals:
— Organic Chemistry: Explain three reaction mechanisms (SN1, SN2, E1) from memory — **PARTIALLY MET.**…
last-click attribution
— crediting the final touchpoint before conversion — is the default in most campaign analytics platfor…
Late 1890s
— Science fiction and fantasy correspondence communities form around early pulp magazines. Readers wri…
Late 1930s
— Debates about what we would now call "gatekeeping" emerge in early science fiction fandom, including…
Late 1950s
— Television creates the first television-specific fan communities. Early quiz show, soap opera, and v…
Late 1970s
— The zine economy reaches maturity: large fan conventions host "dealers' rooms" for zine distribution…
Late 1980s
— Comic book specialty stores proliferate, creating physical community spaces for comics fandom. The d…
Late Bloomers
— Traditional models penalize age - Improvement trajectory can indicate higher ceiling
Late Breakout Age
— Production after age 21 concerns 2. **Low Dominator** - Couldn't dominate college competition 3. **P…
Late Game Rushing
— Clock management value - Win probability impact - Efficiency changes with lead
late Rise to early Peak
— when the trend has proven itself (not a false start) but hasn't yet saturated. At this point, your v…
Late Start in Basketball
— Only 7 years of organized basketball - Seen as lacking fundamentals
Late-bloomer romantic development
— The formation of first significant romantic attachments at substantially older ages than the cultura…
Late-Season SOS:
— Combined record: 46-56 (.451) - Four home games vs two road - Three games against sub-.500 teams
Late-Season Timing:
— Week 10 = 1.0x-1.2x timing multiplier - Accumulated fatigue from 9 games - Health recovery for playo…
Latency
— How long it takes to serve a request 2. **Traffic** — How many requests your system is handling 3. *…
latent code
— that captures the essential factors of variation in the data. This simple idea, when extended with p…
latent factors
— hidden dimensions that explain the patterns in the ratings matrix.
Latent inhibition
— Reduced conditioning to a stimulus that has been repeatedly presented without consequence; disrupted…
lateral early reflections
— those arriving from the sides rather than above — are particularly important for the subjective sens…
Lateral movement:
— PsExec and SMB-based execution - WMI and WinRM remoting - RDP with harvested credentials - Pass-the-…
lateral reading
— accumulating evidence from multiple sources about a source itself.
Lateral surveillance
— Surveillance of peers by peers, often facilitated by digital platforms — neighbors watching neighbor…
Latinx House
— An events organization that produces programming around Sundance, SXSW, and other media festivals sp…
Latinx Therapy
— latinxtherapy.com - Bilingual provider directory
lattice QCD
— the numerical computation of properties of the strong nuclear force.
Launch week:
— Day 1 (Monday): Write the subject line and first paragraph of your launch email. - Day 3 (Wednesday)…
Laundering
— The process by which misinformation produced by a disreputable source acquires the appearance of cre…
Laurie Shaw's Pitch Control Tutorial
— github.com/Friends-of-Tracking-Data-Science/LaurieOnTracking A detailed Python implementation of Spe…
Law has inherent limits
— regulatory lag, technical complexity, jurisdictional boundaries, the inability to mandate values, an…
Law360 AI Digest
— legal news aggregation covering AI-related litigation and regulatory developments - **IAPP AI Privac…
Lawfulness, fairness, and transparency
— Data must be processed lawfully, fairly, and transparently. 2. **Purpose limitation** — Data must be…
Laws to map:
— HIPAA - FERPA - COPPA - ECPA - GLBA (Gramm-Leach-Bliley Act) - FCRA (Fair Credit Reporting Act) - VP…
Lawson, C., "DB2 for z/OS: The Complete Reference"
— Detailed reference covering DB2 architecture, SQL, and application programming. - **Yevich, R., "DB2…
Layer 0 — Free Public Content
— Format and platform: - Specific content types/series: - Value proposition (what does the audience ge…
Layer 1 — Free Email-Gated Content
— What is the lead magnet? - Why would someone give their email for this specifically? - What does rec…
Layer 1: Data Sources
— Event data providers (Opta/Stats Perform, StatsBomb, Wyscout) - Tracking data (Second Spectrum, Skil…
Layer 1: Data Tests (Foundation)
— Schema validation (expected columns, data types) - Completeness checks (null value rates within acce…
Layer 1: Edge / CDN
— Absorb volumetric attacks at the network edge. - Cache static assets and read-only API responses at …
Layer 1: Platforms
— the infrastructure. TikTok, YouTube, Instagram, Substack, Patreon, Spotify, Twitch, and dozens of ot…
Layer 1: Safety (Weeks 1-4)
— Add characterization tests to critical paths - Set up continuous integration if not already present …
Layer 1: Structural luck
— The industry you enter, the economic conditions at the time of entry, the geographic market, the cre…
Layer 1: Technical bias
— Errors in data, models, or metrics > - *Addressable by:* Data auditing, fairness constraints, perfor…
Layer 2 Monitoring:
— Switch port security logs - DAI (Dynamic ARP Inspection) violations - DHCP snooping alerts - STP top…
Layer 2 — Low-Ticket Product ($9–$49)
— Product description: - Why is this a natural next step from Layer 1? - What signals that someone is …
Layer 2: Application Load Balancer
— TLS termination (the TLS handshake itself can be used as a DDoS vector). - Connection rate limiting …
Layer 2: Creators
— the content suppliers. Individuals and teams who produce content, build audiences, and generate reve…
Layer 2: Data Infrastructure
— Cloud platform (AWS, GCP, Azure) - Data warehouse / data lake (Snowflake, BigQuery, Redshift, S3) - …
Layer 2: Feature Tests
— Feature computation correctness (unit tests for feature engineering code) - Feature value range vali…
Layer 2: Network luck
— Who can reach you with opportunities, and what information environments their contacts inhabit. Care…
Layer 2: Structure (Weeks 5-12)
— Break circular dependencies - Extract methods from oversized functions - Introduce dependency inject…
Layer 2: Unit Tests (During Modernization)
— Test individual programs or modules in isolation - Validate business logic calculations with boundar…
Layer 3 — Mid-Ticket Product ($97–$497)
— Product description: - What transformation does this promise? - What evidence would a buyer need to …
Layer 3-4 Monitoring:
— Intrusion Detection Systems (Snort, Suricata, Zeek) - NetFlow/IPFIX analysis - Firewall logs - DNS q…
Layer 3: Analytics Tools
— Statistical computing (Python, R) - Machine learning frameworks (scikit-learn, PyTorch, TensorFlow) …
Layer 3: Application
— Token bucket rate limiting (per user, per IP, per API key). - Request validation (reject malformed r…
Layer 3: Architecture (Weeks 13-24)
— Apply design patterns (repository, service layer, etc.) - Migrate to modern frameworks where needed …
Layer 3: Audiences
— the demand. People who consume content, form relationships with creators, and ultimately fund the ec…
Layer 3: Integration Tests
— Test program-to-program interactions (CALL chains, CICS LINK/XCTL) - Test program-to-database intera…
Layer 3: Model Tests
— Minimum performance thresholds (accuracy, precision, recall, AUC above baseline) - Performance on cr…
Layer 3: Readiness luck
— The prepared mind (Chapter 29) applied to career. Rare skills, a reputation that travels ahead of yo…
Layer 4 — High-Ticket Product ($1,000+)
— Product description: - Who specifically within your audience is this for? - Why would someone who's …
Layer 4: Delivery and Communication
— Dashboards (Tableau, Power BI, Streamlit, custom web apps) - Reporting tools (Jupyter notebooks, aut…
Layer 4: Infrastructure
— Auto-scaling to absorb legitimate traffic spikes (which may resemble DDoS). - Circuit breakers to pr…
Layer 4: Integration Tests
— End-to-end pipeline execution (data ingestion through prediction output) - API contract tests (reque…
Layer 4: Polish (Ongoing)
— Add type hints throughout - Improve naming and documentation - Optimize performance bottlenecks
Layer 4: Regression Tests
— Re-execute characterization tests against the modernized system - Compare outputs field-by-field, no…
Layer 5: Performance Tests
— Benchmark critical transactions (response time, throughput) - Run batch jobs with production-scale d…
Layer 6: Parallel Testing
— Run the legacy and modernized systems simultaneously with the same inputs - Compare outputs automati…
Layer 7 Monitoring:
— Application-layer IDS - Web Application Firewalls - SSL/TLS inspection (with appropriate privacy con…
Layer 7: User Acceptance Testing (UAT)
— Business users validate that the modernized system meets their requirements - Focus on end-to-end bu…
layered approach:
— **Layer 1 (what she says aloud):** "Poverty is correlated with ER overcrowding. But when we look dee…
layered tension
— the viewer is uncertain about multiple dimensions simultaneously, increasing engagement.
layout
— what charts and controls appear on the page. 2. Defines **callbacks** — functions that run when the …
lazy
— it matches as little as possible:
LDA (Latent Dirichlet Allocation)
— A generative probabilistic model that represents documents as mixtures of topics, where topics are d…
Lead Magnet
— A free piece of value — a checklist, template, short video series, guide — offered to potential subs…
Lead Paint Prevalence by Era:
— Built before 1940: approximately 87% have lead paint - Built 1940–1959: approximately 69% have lead …
Lead with outcomes, not activities
— the Board cares what happened, not what the compliance team did 2. **Three key messages, not ten** —…
Leading in the AI Era
— The AI-ready leader profile · Continuous learning · Building AI intuition · NK and Tom's journeys · …
Leading Indicators:
— Training completion and assessment scores - Manager communication quality (are managers talking abou…
Leading question
— A question that embeds an assumption or preferred answer; pressures the answerer toward a predetermi…
leading tone
— the seventh scale degree, one half-step below the tonic, with an almost physical pull toward resolut…
League Context:
— **High-tempo teams:** 68-72 plays per game - **League average:** 62-65 plays per game - **Low-tempo …
League-Level Analysis:
— Correlation matrix of all statistics vs. win percentage - Ranking of teams by consistency (CV of poi…
League-wide shot distribution (2010):
— Mid-range: ~35% of shots - Three-pointers: ~22% of shots - Restricted area: ~28% of shots - Other pa…
Leakage
— Nonverbal signals that reveal emotional states a person is attempting to suppress or conceal. The bo…
leakage prevention
— the qualities that distinguish a research prototype from a deployable system.
leapfrogging
— the idea that developing countries can skip stages of technological development that wealthy countri…
Learn by building
— The best way to understand real-time systems is to build them.
Learn from every bug
— Each debugging session is an opportunity to build intuition that makes you faster and more effective…
Learn from others:
— Read disclosed bug bounty reports on HackerOne Hacktivity - Follow top researchers on social media -…
Learn one new skill per year
— not superficially, but to a working level. This year might be Kubernetes; next year might be Terrafo…
learned
— during the initial phase when shocks were inescapable — that their actions had no effect on outcomes…
learned components
— models that were trained from data rather than explicitly programmed. This introduces fundamental di…
Learned helplessness
— Seligman's concept of the belief that outcomes are uncontrollable, learned from exposure to uncontro…
learned optimism
— that could shift explanatory style toward the more adaptive pattern. These interventions reduced dep…
Learning
— One specific thing you'd do differently: _______________ - One specific thing you'd repeat: ________…
learning agility
— the ability to quickly acquire new knowledge and skills as the landscape shifts. This is not an inna…
Learning and conditioning
— the legacy of behaviorism — also replicate well. The effects are robust, the paradigms are simple, a…
Learning and Instruction
— Focused on the intersection of learning science and educational practice. Publishes research on self…
Learning Autobiography
— a candid, reflective account of yourself as a learner.
Learning Check-In
— A brief self-assessment that asks you to reflect on your understanding so far. Unlike Check Your Und…
Learning comparison:
— What do the results tell you about whether the structural element was genuinely the driver of the or…
Learning conditions:
— Times of day when I learn best: _______________ - Environments that help me focus: _______________ -…
Learning How to Learn
— Coursera (Barbara Oakley, Terrence Sejnowski) The most enrolled online course in history, with over …
Learning Materials:
— Comprehensive course text covering penetration testing methodology - Video lectures for each module …
Learning Objectives
— What you will be able to do after completing the chapter (using Bloom's taxonomy: remember, understa…
Learning Objectives for Part I:
— Explain COBOL's historical significance and its ongoing role in enterprise computing - Identify and …
Learning Objectives for Part II:
— Construct conditional logic using IF/ELSE, nested IF, EVALUATE, and condition names - Use PERFORM in…
Learning Objectives for Part III:
— Implement complete sequential file read, write, update, and copy programs - Build indexed file (VSAM…
Learning Objectives for Part IV:
— Write and call subprograms using static and dynamic CALL with BY REFERENCE, BY CONTENT, and BY VALUE…
Learning Objectives for Part IX:
— Design, implement, test, and deploy a multi-program COBOL application with file processing, DB2 acce…
Learning Objectives for Part V:
— Write COBOL programs with embedded SQL for DB2 database operations (SELECT, INSERT, UPDATE, DELETE, …
Learning Objectives for Part VI:
— Write JCL to compile, link-edit, and execute COBOL programs with proper DD statements - Design batch…
Learning Objectives for Part VII:
— Implement precise financial calculations including interest, amortization, and present value using C…
Learning Objectives for Part VIII:
— Write object-oriented COBOL programs using classes, methods, interfaces, and inheritance - Integrate…
Learning Objectives:
— Prepare raw event data for xG modeling - Engineer meaningful features from shot locations and contex…
Learning Path Annotations:
— 🏃 **Fast Track:** If you're an experienced systems programmer moving into architecture, focus on Sec…
Learning paths:
— 🏃 **Fast Track:** If you already know the infinite square well from a modern physics course, skim Se…
Learning priorities:
— Stay current on advances in machine learning and statistical methodology - Follow academic research …
learning science
— has made extraordinary progress over the past several decades. We know more about memory, attention,…
learning styles
— the widely believed claim that students learn better when instruction is matched to their preferred …
learning styles hypothesis
— sometimes called the **meshing hypothesis** — claims that students have distinct learning preference…
Learning to attend to her own experience
— rather than immediately converting emotional experience into behavioral direction
Least privilege routing
— Only allow traffic between VLANs that is specifically needed - **Microsegmentation** — Within VLANs,…
Least vulnerable (lowest artifact severity):
— Heavily produced, dynamically compressed pop: Already has reduced dynamic range (meaning fewer loud-…
Leather britches
— dried green beans, one of the most practical and efficient preservation techniques in the mountain f…
LeBron Advantages:
— More total seasons at high level - Will likely pass Kareem's total - More consistent (never fell bel…
lecture format
— the same structure that puts students to sleep in classrooms around the world. It fails online for t…
LED Strip Lighting Color Temperature
— 2700K: Very warm, amber-toned. Cozy but can make food colors look slightly orange. Good for living s…
Ledger
— A book or system of accounts that records financial transactions. See *general ledger*.
Ledgerwood v. Jobe (2016)
— Arkansas Medicaid case where algorithmic care hour determinations were ruled to violate due process …
Lee Sharpe's NFL Data
— `https://github.com/leesharpe/nfldata` - Game-level data - Team statistics - Historical records
Lee-Ready algorithm
— if a trade occurs above the midpoint, it was likely buyer-initiated; below the midpoint, seller-init…
LeetCode
— Coding practice - **HackerRank** - SQL and Python challenges - **Cracking the Coding Interview** - T…
leetso
— "yellow dirt," the color of the uranium-bearing ore that poisoned the land. - **Health consequences.…
Left join
— the student list is your primary dataset. You want every student, with scores where available. (b) *…
left-skewed
— pulled down by a tail of low values. In practical terms, this tells us that *most* countries have fa…
leftmost-character-position
— Integer starting position (1-based) - **length** — Number of characters to reference (optional; defa…
Legacy Medical Devices
— **Imaging Systems:** Three GE PACS (Picture Archiving and Communication System) servers running Wind…
legacy system
— a working artifact whose internal logic is only partially understood by the people responsible for m…
Legacy ≠ Obsolete
— COBOL runs trillions of dollars in transactions daily; understanding it is a superpower. - **Readabi…
Legal analysis:
— Operating accounts in another person's name (known as "beard" or "runner" accounts) violates the ter…
Legal and Regulatory
— Federal Register and CFR (ecfr.gov) — US federal regulations - Congress.gov — US legislation - EUR-L…
Legal and regulatory tracking.
— Subscribe to legal technology newsletters from firms specializing in AI law - Monitor the U.S. Copyr…
Legal authority
— A specific section of federal law authorizing the data exchange - **Data sharing agreement (DSA)** —…
Legal confrontations:
— Know your jurisdiction's tenant rights, employment laws, and consumer protections before confronting…
Legal Considerations:
— Sports betting legality varies by jurisdiction - This chapter is educational, not gambling advice - …
Legal consultation
— when the issue involves potential legal violations (discrimination, harassment, wage theft, safety v…
legal defense
— not a right. You only "use" it in court, after you've already been sued. It's not a permission slip.…
Legal Entity Identifier (LEI)
— A globally standardized, machine-readable identifier for legal entities participating in financial t…
Legal obligation is the workhorse basis for AML
— but it only covers what the law actually requires, not what is convenient to retain.
Legal readiness:
— [ ] Business entity properly formed and in good standing - [ ] All major agreements reviewed by an a…
Legal standards
— required for criminal prosecution or civil liability — are the most demanding, requiring evidence ad…
Legal Templates for Creators
— Multiple organizations have published free contract templates for brand deals, freelance work, and c…
LEGAL TERMS
— [ ] **17. Governing law is specified.** The contract states which state or country's law applies and…
Legal theory — disparate impact:
— What protected characteristic is allegedly being discriminated against? - What facially neutral empl…
Legend
— A box identifying which line style or color corresponds to which data series.
Legend for the alphabetical listing:
— **85** — Reserved in COBOL-85 (ANSI X3.23-1985) - **02** — Added in COBOL 2002 (ISO/IEC 1989:2002) -…
Legibility
— The degree to which a system can be seen, understood, and measured by an outside observer (typically…
Legibility trap
— The systematic error of preferring legible (measurable, standardized) information over illegible (ta…
legible
— readable, countable, plannable. They needed to look at a ledger and know how many cubic meters of ti…
Legislative responses:
— The **Kids Online Safety Act (KOSA)**, introduced in the US Senate in 2022 and passed in 2024, requi…
Legitimate aim
— What security objective does the surveillance serve? Is the objective genuine and specific, or vague…
Legitimate defense:
— Occurs after the concern has been genuinely heard and acknowledged - Corrects factual inaccuracies w…
Legitimate electoral processes
— the mechanisms by which citizens select and remove representatives - **Independent legal accountabil…
Legitimate epistemic action
— Influence that works through the other person's rational capacities rather than around them.
Legitimate strategies:
— Revenue growth through commercial development and stadium expansion - Academy investment to develop …
Lemmatization
— Reducing a word to its base dictionary form using morphological analysis (e.g., "running" → "run," "…
LENGTH
— Returns the length of a string:
Length Guidelines:
— Executive Summary: 1-2 pages - Scope and Methodology: 2-3 pages - Findings Summary: 1-2 pages - Tech…
Lens 1 — Mechanics (Ch. 7):
— Was this truly viral (K > 1), popular (algorithm-driven), or trending (format adoption)? - What's th…
Lens 2 — Algorithm (Ch. 8):
— What platform signals likely drove distribution? - Was this interest graph (TikTok), watch-time (You…
Lens 3 — Psychology (Ch. 9):
— Why did people share this? Which STEPPS elements were active? - What identity did sharing signal? - …
Lens 4 — Network (Ch. 10):
— What clusters did this reach? - Can you identify bridge crossings? (Different communities commenting…
Lens 5 — Timing (Ch. 11):
— Did timing play a role? (Trend, cultural moment, or timing-independent?) - Where in the trend lifecy…
Lens 6 — Brain (Chs. 1-6):
— What psychological mechanisms made this compelling? - Attention design? Emotional activation? Curios…
Less effective:
— "Be concise." (How concise?) - "Keep it short." (How short?) - "Write a comprehensive response." (Ho…
Less reliable than OWS
— Box scores miss most defensive value - Good teams have more DWS to distribute - Individual attributi…
Less-robustly supported findings:
— Specific claims about the exact behavioral content of Moore's 1985 catalog (the sample was culturall…
Lessons learned:
— What worked well (both offense and defense)? - What surprised both teams? - What processes need impr…
let's play
— A genre of gaming video content in which a player records and comments on their gameplay, often with…
Let-go threshold
— muscle contraction may prevent releasing the wire | | 50–100 mA | Ventricular fibrillation possible;…
Level 1
— Low intensity: journaling, awareness, brief reflection - **Level 2** — Moderate: structured self-ass…
Level 1 (Low stakes, low relationship investment):
— Telling a barista that your order is wrong. - Asking for your steak to be cooked to the right temper…
Level 1 -- Surface Check
— Can I describe the similarity in precise, specific terms, or only in vague language? - Does the simi…
Level 1 — Console Automation Rules:
— Capture all abend messages for batch jobs in the HABK* job name prefix - Automatically restart eligi…
Level 1: Ad Hoc Testing
— Penetration tests are conducted only when triggered by an incident or compliance requirement - No re…
Level 1: Application Instance Failure
— What can fail: _______________ - Impact: _______________ - Recovery mechanism: _______________ - Des…
Level 1: Configuration and Infrastructure
— Standard penetration testing of the hosting infrastructure - API security assessment - Authenticatio…
Level 1: Contemplative practices
— the regular examination of your inner life, relationship patterns, values alignment, and behavioral …
Level 1: In-memory table
— Cache the 500 most common provider/procedure combinations in a WORKING-STORAGE table:
Level 1: Naive Practice
— This is what most people do. You repeat an activity at whatever level you've already reached, withou…
Level 1: Pure Reaction
— Filming yourself experiencing content for the first time with minimal commentary beyond emotional re…
Level 1: Ultimate/Evolutionary
— What adaptive problems does attraction solve? What selection pressures have shaped human attraction …
Level 2 (Evidence):
— "Stores that adopted the new checkout system saw 12% higher sales." - "The effect was strongest in h…
Level 2 -- Structural Check
— Can both phenomena be described by the same formal model (same variables, same relationships, same d…
Level 2: Commentary Reaction
— Reacting while pointing out details, making observations, sharing opinions. Value: guided noticing +…
Level 2: Model-Specific Testing
— Adversarial example generation and testing - Prompt injection testing (for LLMs) - Model extraction …
Level 2: Multi-row FETCH
— When a DB2 lookup was needed, fetch multiple fee schedule entries at once.
Level 2: Periodic Testing
— Annual penetration test conducted for compliance purposes - Standard scope (external network, basic …
Level 2: Proximate/Biological
— What are the physiological and neurological mechanisms by which attraction is implemented? What happ…
Level 2: Purposeful Practice
— This is a step up. You set specific goals ("Today I'm going to work on my weak-side layups"), you fo…
Level 2: Relational practices
— the regular investment in genuine connection, including the discomfort of authentic communication, c…
Level 2: Subsystem Instance Failure
— DB2 member failure: - Impact: _______________ - Recovery: _______________ - RTO: _______________ - C…
Level 3 (Details):
— "We analyzed three years of sales data across 200 stores." - "The analysis controlled for store size…
Level 3 -- Predictive Check
— Does knowledge of the pattern in Domain A generate testable predictions about Domain B? - Have those…
Level 3 — Stream-Level Monitoring:
— Define four SLA milestones for the batch window - Implement critical path calculation across all sev…
Level 3: Deliberate Practice
— This is the gold standard, and it's what Ericsson spent decades studying. Deliberate practice has fo…
Level 3: Developmental/Psychological
— How has the individual's history of experience shaped their attraction patterns? What are their atta…
Level 3: Environmental practices
— the regular audit and redesign of the environments in which you operate, recognizing that environmen…
Level 3: Expert Reaction
— Applying specialized knowledge that transforms reaction into education (musician explaining chord pr…
Level 3: LPAR Failure
— Number of production LPARs: _______________ - Can N-1 LPARs handle full workload? _______________ - …
Level 3: Pipeline and Supply Chain
— Training data pipeline security assessment - Model provenance verification - Dependency analysis (ML…
Level 3: Preload
— At program start, load the top 500 combinations from a pre-computed table.
Level 3: Structured Testing Program
— Regular testing cadence (annual pentest + quarterly vulnerability scans) - Scope includes internal n…
Level 4 -- Independence Check
— Was the pattern discovered independently in multiple domains? - Are the domains genuinely unrelated,…
Level 4 — Historical Trending:
— Design the DB2 tables to store nightly SMF summaries - Define the weekly trend reports - Establish t…
Level 4: Contextual/Sociocultural
— What are the social, cultural, historical, and structural conditions within which this particular at…
Level 4: Coupling Facility Failure
— Number of CFs: _______________ - Which structures are duplexed? _______________ - Which structures a…
Level 4: Critical Commentary
— Structured analysis beyond reaction into evaluative critique. Less emotional, more thoughtful. Value…
Level 4: Integrated Testing Program
— Continuous testing: pentests, red team exercises, bug bounty, automated DAST/SAST - Scope includes c…
Level 4: Operational Security
— Monitoring and alerting effectiveness - Incident response procedures for AI-specific incidents - Mod…
Level 5: Adaptive Security Testing
— Threat intelligence-led testing (TIBER, CBEST, custom threat scenarios) - Continuous automated testi…
Level 5: Essay Commentary
— Long-form, researched commentary using specific content as a jumping-off point for broader analysis.…
Level 5: Storage Subsystem Failure
— Number of storage subsystems: _______________ - Mirroring technology: _______________ - Recovery mec…
Level 6: Site Failure
— Failover site: _______________ - Failover technology: _______________ - RTO: _______________ - RPO: …
Level 7: Data Corruption
— FlashCopy schedule: _______________ - Image copy schedule: _______________ - Air-gapped backup sched…
Level Number
— A number (01–49, 66, 77, 88) that indicates the hierarchical position of a data item within a record…
level repulsion
— a fundamental phenomenon in quantum mechanics that we will study systematically in Chapter 18 (degen…
Levels of listening
— A model describing the depth of attentional focus in listening, from Level 1 (internal, self-focused…
Levels.fyi
— https://www.levels.fyi/ - Tech company compensation data
Lever 1: Collaboration
— Prerequisite: 8+ videos published, clear enough channel identity to describe - Start low-commitment:…
Lever 2: Community
— Respond to every comment for the first 60 days (while manageable) - Ask questions at video end that …
Lever 3: Packaging optimization
— Revisit 5 lowest-CTR videos with new thumbnail designs - Apply one principle from Ch. 35 you haven't…
Leverage
— Understand what the vendor needs from you (revenue, reference customer, case study) and what you nee…
Leverage point
— A place in a system where a small change can produce large effects; identified by Donella Meadows as…
LGBTQ+ Appalachians
— people building queer community in rural spaces, navigating both the beauty and the hostility of sma…
Liar's dividend
— The strategic benefit that flows to bad actors from the *existence* of deepfake technology: the abil…
lib/
— Native libraries (.so files) for different CPU architectures (armeabi-v7a, arm64-v8a, x86, x86_64). …
libertarian paternalism
— Thaler and Sunstein's framework for nudge design: guiding people toward welfare-improving choices wh…
Liberty Features for CICS
— Reference for Liberty features available in CICS: cicsts:link-1.0 (COBOL invocation), cicsts:securit…
Liberty poles
— symbolic structures that had been used during the Revolution to signal resistance to tyranny — were …
LIBINQ01
— Library inquiry: Accept a library ID, display all books and their copy status 2. **LIBCHK01** — Book…
Library / Package / Module
— Prewritten Python code you can use in your own programs (e.g., `pandas`, `matplotlib`) - **pandas** …
Library class:
— Attributes: `name`, `books` (list of Book objects), `patrons` (list or dict) - Methods: `add_book(bo…
LibriSpeech
— URL: https://www.openslr.org/12 - Description: 1,000 hours of read English speech from audiobooks. T…
License
— Can you legally use the data for your intended purpose? Academic use, commercial use, and redistribu…
Licensed merchandise
— Products bearing official franchise trademarks, produced by authorized licensees. Global market appr…
Licensing
— Granting another party permission to use a piece of intellectual property under defined conditions, …
licks
— short melodic phrases, rhythmic patterns, harmonic substitutions, and textural effects that they hav…
Lie algebra
— The algebraic structure formed by the generators of a Lie group, defined by their commutation relati…
Lie group
— A continuous group of symmetry transformations that can be parameterized smoothly (e.g., rotations, …
life cycle assessment (LCA)
— a method for evaluating the environmental effects of a product or system across its entire lifespan,…
Lifestyle and Interests:
— Interest segments: Music streaming, social media, fast food, budget travel - Political affiliation: …
light
— specifically short-wavelength (blue) light detected by specialized photoreceptors (intrinsically pho…
light shift
— moving from low key to high key (or vice versa) within a single video — is a powerful storytelling t…
LightGBM
— https://lightgbm.readthedocs.io - Fast gradient boosting - Microsoft research - Good for large datas…
lightstick
— An official, brand-specific illuminated device sold by K-pop entertainment companies for fan use at …
likelihood
— P(B) = P(positive test) = P(positive|disease) * P(disease) + P(positive|no disease) * P(no disease) …
Likelihood of execution and settlement
— The probability that the order will be filled in full, at an acceptable price, and that the resultin…
Likelihood ratio
— The ratio P(E|hypothesis true) / P(E|hypothesis false); measures how much evidence E increases or de…
Likely copyrightable:
— Code where a developer writes significant original portions and uses AI to fill in small segments - …
Likely ethical
— government data is public by design, the purpose is public benefit, and no personal harm results. St…
Likely load-bearing:
— Runs perpendicular to floor joists - Located near building center, running the long axis - Continues…
Likely non-bearing:
— Runs parallel to floor joists - Has no structural element above or below it - Appears to be a space-…
Likely not copyrightable:
— Code generated entirely by AI with a simple prompt like "write a web server" - Code accepted as-is f…
Likely voter (LV)
— A survey respondent classified as likely to cast a ballot in the upcoming election. Likely voter scr…
likely voter electorate
— filtered for registration, predicted turnout, and election-specific mobilization — looks considerabl…
likely voter screen
— a set of survey questions designed to distinguish respondents who will actually vote on Election Day…
Lilli
— an internal generative AI tool named after Lillian Dombrowski, the firm's first professional staff m…
LIME
— https://github.com/marcotcr/lime - Local interpretable explanations
limestone
— a sedimentary rock composed primarily of calcium carbonate, often formed from the accumulated shells…
limit key
— the highest value that the partition can contain. The `ENDING AT` clause specifies this upper bounda…
Limitations explicitly stated:
— "This model assumes recent growth rates continue. A macro shift — new competitor, supply disruption,…
Limitations of built-in importance:
— **Biased toward high-cardinality features.** Features with many unique values have more potential sp…
Limitations of congressional oversight:
— **Classification constraints.** Committee members receive classified briefings but often cannot disc…
Limitations of Event Data:
— Only records discrete actions, missing continuous play - Doesn't capture off-ball movement—where the…
Limitations of federated learning:
— **Communication overhead.** Sending model updates back and forth requires bandwidth. For large model…
Limitations of IRBs for data ethics research:
— IRBs were designed primarily for biomedical and behavioral research and may lack expertise in evalua…
Limitations of LIME:
— The explanation depends on how perturbations are generated — different perturbation strategies can p…
Limitations of no-code tools:
— Less flexible than custom code for complex data transformations - Dependent on the platform's availa…
Limitations of OSSTMM:
— Steeper learning curve than PTES or OWASP - The rav calculation, while valuable, can be complex to i…
Limitations of PCA:
— Captures only linear relationships; nonlinear structure requires t-SNE, UMAP, or autoencoders - Assu…
Limitations of PTES:
— The standard has not been significantly updated since its initial release - Technical guidelines can…
Limitations of rainbow tables:
— **Size** — Tables for complex passwords can be enormous (terabytes) - **Salt defeats them** — If eac…
Limitations of SHAP:
— Computationally expensive — exact Shapley values require evaluating all feature subsets, which grows…
Limitations of state criminal law:
— Prosecution requires identifying an often anonymous perpetrator - Cross-border production and distri…
Limitations of the analogy:
— The choir director is a conscious agent with aesthetic intentions; the accelerator's focusing magnet…
Limitations of the Box Score Era:
— No context for when or how statistics occurred - Defensive contributions largely invisible - Team ef…
Limitations of the OWASP Testing Guide:
— Focused exclusively on web applications (not network, wireless, or physical) - Can be overwhelming: …
Limitations of Tracking Data:
— Expensive and not universally available - Large data volumes require significant computational infra…
Limitations should be specific:
— Not "the data may have errors" but "the WHO vaccination data relies on country self-reporting, and c…
Limitations:
— Behavior differs between training and evaluation modes (source of subtle bugs) - Performance degrade…
Limited Drop
— A product released in finite quantity for a finite window of time. Scarcity creates urgency and excl…
Limited request/response transformation
— the JSON format is dictated by DB2, not by API design best practices. - **Basic authentication only*…
Limited risk
— systems with specific transparency obligations. AI systems that interact directly with humans (chatb…
Limiting cases:
— $T \to 0$ ($x \to \infty$): $p_0 \to 1$, $p_1 \to 0$. $S \to 0$. The system freezes into the ground …
LINAGE
— A clause in the FD (file description) that specifies the number of lines per page for a print file, …
Lindblad equation
— Ch 33.3 The most general Markovian master equation for the density matrix of an open quantum system:…
Lindy effect
— The observation that for non-perishable entities (ideas, technologies, books), the longer something …
Line Movement
— Steam moves and reverse line movement - Opening vs closing line analysis - Sharp money indicators
Line Movement Analysis:
— Spread moved 3 points toward Buffalo - Total dropped 6.5 points - Market clearly pricing weather
Line Shopping Impact:
— Even small improvements in odds (3-5 cents) compound dramatically over thousands of bets - The diffe…
Line-Breaking Pass
— A pass that travels through a line of opposition players, progressing the ball past defensive or mid…
linear dispersion
— just like massless relativistic particles! The low-energy electrons in graphene behave as if they we…
linear micro-arc
— chronological structure with setup, complication, and resolution.
Linear Models
— Simple: Box count adjustment only - Intermediate: Gap, formation, down/distance - Paper: "A Linear A…
linear payoffs
— the payout scales proportionally with the outcome value.
linear search
— it checks each element one by one. In this chapter, we'll implement that search ourselves, understan…
Linear/Logistic Regression:
— Interpretable coefficients - Fast training - Assumes linear relationships - Good baseline
Lineup Overlap Analysis:
— Curry minutes: 2,846 - Green minutes: 1,730 - Shared minutes: 1,520 (88% of Green's time)
linguistic competence
— a skill that requires mastery of two distinct language systems and the social awareness to know when…
linguistic determinism
— the hypothesis claims that language determines thought, that you literally cannot think things your …
linguistic discrimination
— prejudice based on how a person speaks rather than on what they say or what they can do. And it is, …
linguistic style matching
— the discovery that the *function words* we use (the ands, buts, pronouns, and prepositions) are bett…
Linguistic style matching (LSM)
— The tendency for conversational partners to unconsciously align their use of function words (pronoun…
LINK
— The calling program needs the DB2 result to continue processing. LINK returns control to the caller.
Link in Bio
— The single clickable URL in an Instagram or TikTok profile. Because these platforms restrict clickab…
linkage attack
— is the fundamental threat to anonymization. It demonstrates that whether data is identifiable depend…
Linkage Section
— The section of the COBOL Data Division that describes data items received from a calling program, CI…
LinkedIn
— https://www.linkedin.com/jobs/ - General job board with sports listings
LinkedIn Groups
— Sports Analytics Professionals, Football Analytics.
LinkedIn integration
— If the prospect has a LinkedIn company page, scrape their recent updates (though LinkedIn's ToS requ…
LinkedIn Learning
— linkedin.com/learning Offers video courses on difficult conversations, assertiveness, conflict manag…
LinkedIn Presence:
— Maintain an up-to-date LinkedIn profile with: - Current certifications with verification links - Ski…
LinkedIn:
— LinkedIn's own data suggests that InMail messages (a paid feature allowing messaging to non-connecti…
Linking social capital
— Social capital that connects individuals to those with different levels of power or institutional au…
LinPEAS Color Coding:
— **Red/Yellow (95% PE vector):** Almost certain privilege escalation path - **Red (PE vector):** High…
Linter
— A static analysis tool that checks code for errors, style issues, and potential bugs without executi…
Lippmann-Dewey debate
— The foundational twentieth-century argument about whether democratic failure requires expert managem…
Liquid surveillance
— Zygmunt Bauman and David Lyon's concept of surveillance in late modernity as mobile, flexible, and p…
Liquid water
— bulk water from rain, flooding, or plumbing leaks — is always the first priority. No amount of vapor…
liquidity
— they make it possible for informed traders to express their views. Informed traders correct the pric…
Liquidity Risk
— **Withdrawal liquidity**: In stressed markets, LPs may withdraw simultaneously, causing a liquidity …
List
— ordered and allows duplicates. 2. Country-to-code mapping: **Dictionary** --- fast lookup by name. 3…
List all data inputs to the AI system:
— **SECTION 2: AFFECTED POPULATION ANALYSIS**
list comprehension
— a concise way to build a list by filtering and transforming another sequence.
List comprehensions
— A compact way to create lists. This is one of Python's most powerful features:
List Experiment (Item Count Technique)
— Randomly assign respondents to control (N items) or treatment (N+1 items, including sensitive item) …
list method
— it only works on lists.
List Segmentation
— Dividing an email list into subgroups based on shared characteristics (interests, purchase history, …
List tables in logical order
— typically starting from the "main" entity (CUSTOMER) and joining outward through foreign keys. 3. **…
LISTCAT
— display catalog information:
LISTDEF validation
— After any JCL change to maintenance jobs, an automated check verifies that all production tablespace…
Listening
— not solving, not minimizing, not reassuring immediately: The primary goal of a first conversation is…
listening to practitioners
— the people working inside the system, with their hands in the soil, who can see what the dashboard c…
Listening under pressure
— The challenge and practice of maintaining genuine listening capacity when the threat response has be…
lists and tuples
— mutable and immutable sequences. The indexing and slicing you learned here work identically on lists…
Literal
— A constant value coded directly in a COBOL statement. Numeric literals contain digits and optionally…
Live Dashboard
— Create a React dashboard that receives updates via WebSocket and visualizes game state.
Live Monitor
— Current odds, active arbitrage opportunities, active value opportunities, pending bets. 2. **Arbitra…
Live streaming (Twitch, YouTube Live, TikTok Live)
— Revenue model: subscriptions, tips (bits, super chats), ad share - Creator economic model: real-time…
Live transaction testing (21:00 — 22:00):
— Restored online banking access (small user population — Saturday night) - 3,247 real customer transa…
Livestreaming
— Broadcasting video in real time to an audience who can watch and interact simultaneously. Platforms …
Living apart together (LAT)
— A relationship structure in which partners are romantically committed but maintain separate residenc…
LLC (Limited Liability Company)
— A US business structure that separates the owner's personal assets from business liabilities, provid…
LLM (Large Language Model)
— A neural network trained on vast amounts of text data that can generate, understand, and manipulate …
LLM capabilities are genuine and broad
— text generation, summarization, translation, code generation, analysis, and classification. But the …
LLM limitations are equally real
— hallucination (confident fabrication), knowledge cutoffs, reasoning failures, sycophancy, and prompt…
LLM-Based Generation
— Description: Using large language models to generate training data, synthetic conversations, and eva…
LLM01: Prompt Injection
— Manipulating LLM behavior through crafted inputs 2. **LLM02: Insecure Output Handling** — Failing to…
Load and Inspect
— Understand what data you have 2. **Clean and Validate** - Address quality issues 3. **Explore Distri…
Load Indicators:
— Player Load (proprietary composite) - Deceleration events - Change of direction frequency
Load Management
— Monitor total distance - Identify fatigue patterns - Optimize rest schedules
Load Metrics:
— Maximum consecutive games: 5 - Target games played: 55-65 - Minutes per game: 32-34 (reduced from ca…
load module
— the executable program.
Load with intent
— `df = pd.read_csv("file.csv", parse_dates=[...], dtype={...}, na_values=[...])` 2. **Check dimension…
Load-bearing walls carry structural loads
— the weight of the house above — down to the foundation. Non-load-bearing (partition) walls only divi…
Loaded Language
— Specialized vocabulary that packages complex questions into predetermined answers, limiting the conc…
Loading the Language
— Present. "Revolutionary suicide," "the cause," "fascists," "the enemy," and "the people" were terms …
Loads comment data from a CSV file
— the format matches exports from YouTube Studio's comment export, or can be adapted for other platfor…
LOAN
— Extended attributes for loan accounts.
Loan payment
— given principal, rate, and term, calculate payment (ANNUITY) 2. **Future value** -- given payment, r…
Loan Payment Calculation
— Given a principal amount, annual interest rate, and term in months, compute the monthly payment usin…
LOAN-FILE-CONTROL.cpy
— SELECT clause for the loan master file with a :PREFIX: tag for the file status field
LOAN-RECORD.cpy
— The loan account master record (80 bytes): - Loan Number (10), Borrower Name (30), Loan Type (2), Or…
LOAN-STATUS-CODES.cpy
— 88-level condition names for loan status
Loan:
— Which book, which patron - Date borrowed, due date - Whether it's been returned
LOAN_COLLATERAL
— Assets securing a loan.
LOAN_PAYMENT
— Individual payments against a loan (weak entity).
Lobola (bridewealth)
— A practice in many southern and eastern African traditions in which the groom's family provides paym…
Local average treatment effect (LATE)
— The estimated effect of actual contact among the voters who would have been contacted if assigned to…
local color movement
— described the mountain people they encountered as strange, quaint, isolated, and frozen in time. The…
local color writers
— journalists, travel writers, and fiction authors, mostly from the urban Northeast — began publishing…
Local Development Districts (LDDs)
— regional planning bodies that coordinate project development at the county and multi-county level. T…
local differential privacy
— the strongest variant — in which noise is added on the user's device before any data is transmitted …
local energy
— the result of applying the Hamiltonian to $\psi$ and dividing by $\psi$ at each point in configurati…
Local hidden variable theory
— Ch 24.3 A theory in which measurement outcomes are determined by pre-existing hidden variables, and …
Local Knowledge
— If you are from Appalachia and see something this book gets wrong about your community, your correct…
local merchant
— typically the operator of the country store that served the community. The merchant was the critical…
local merchant or storekeeper
— often the same person who extended credit for salt, iron, and cloth. The merchant accumulated ginsen…
Local newspaper archives
— Many Appalachian newspapers have digitized back issues through local libraries or state archives
Local optimum
— A solution that is better than all nearby alternatives but not the globally best solution; the trap …
Local partnership requirements
— genuine co-development and co-governance rather than vendor relationships with local resellers — cre…
local U(1) gauge invariance
— invariance under $\psi(x) \to e^{i\alpha(x)}\psi(x)$ with spacetime-dependent $\alpha(x)$.
Local utility rates and grid:
— As established in Section 23.7, the economics depend heavily on your gas-to-electricity price ratio.…
LOCAL-STORAGE SECTION
— A DATA DIVISION section (COBOL 2002) where items are allocated fresh for each invocation of the prog…
localStorage:
— Vulnerable to **XSS** (cross-site scripting) attacks — if an attacker injects JavaScript into the pa…
Location permissions:
— Review all apps with location access (Settings > Privacy > Location Services on iOS; Settings > Loca…
Lock
— A mechanism used by DB2 and CICS to control concurrent access to shared resources (rows, pages, tabl…
lock avoidance
— a technique where the system determines that a lock is unnecessary and skips it entirely. Lock avoid…
Lock entries
— recording which member holds which locks - **Contention detection** — hardware-assisted detection of…
Lock management
— without periodic commits, the program accumulates locks on every accessed row, which can exhaust the…
Lock table
— a hash table where lock conflicts are detected - **Lock names** — identifying the resource being loc…
Lock-in
— A state where a system becomes committed to a particular path, technology, or institutional arrangem…
locked room
— the neural network's 2 million parameters create technical opacity that even the data science team c…
Locus of control
— Rotter's dimension describing whether individuals attribute outcomes to their own actions (internal)…
LOF vs. Isolation Forest:
— LOF is density-based and excels at detecting **local anomalies**---points that are anomalous relativ…
Log everything
— you will need detailed trade-level data for post-trade analysis and model improvement.
Log levels
— messages are categorized by severity - **Timestamps** — every message is automatically timestamped -…
Log Loss
— A metric for evaluating probability predictions that heavily penalizes confident wrong predictions.
LOG NO
— Don't log individual row inserts. This makes LOAD dramatically faster but means you cannot RECOVER t…
Log scan parameters:
— KEYINTV=60 → maximum 60 seconds of log records to scan - Transaction volume: ~3,200 TPS with 3 recor…
LOG YES
— Log the load operation for recoverability. LOG NO is faster but puts the tablespace in COPY-pending …
LOG YES/NO
— Controls whether the RELOAD phase is logged. LOG YES means the REORG itself is recoverable — if it f…
Log-based capture
— no triggers, no additional writes to the source database - **Transactional consistency** — changes a…
Log-Loss (Binary Cross-Entropy)
— A loss function for probabilistic classification models, penalizing confident incorrect predictions …
log-mel spectrogram
— the most widely used input representation for audio neural networks:
Log-normal distribution
— A probability distribution whose logarithm is normally distributed; often found in size distribution…
log_seconds = log(seconds_remaining + 1)
— Captures diminishing importance as time decreases - +1 prevents log(0) error
LOGARCHMETH1
— Primary archive method. - `OFF` — No archiving (circular logging) - `LOGRETAIN` — Keep log files in …
LOGARCHMETH2
— Secondary archive method (for dual archiving). - Same options as LOGARCHMETH1 - Provides redundancy …
LOGFILSIZ
— Size of each log file in 4 KB pages. - Default: 250 (1 MB) - Production: 10,000-65,536 (40 MB to 256…
Logging
— Recording events, errors, and information during program execution. Python's `logging` module provid…
Logging Gaps to Test For:
— CloudTrail not enabled in all regions (attackers operate in unexpected regions) - Data events not lo…
Logging interceptor
— Capture request/response details for audit and debugging - **Validation interceptor** — Apply busine…
Logging:
— **LOGLOAD**: The number of log records written between checkpoints. More frequent checkpoints (small…
logic
— a set of justifications, institutional arrangements, and legal tools that can be picked up by any su…
Logic-based inoculation is preferable when:
— The misinformation landscape is varied and rapidly evolving. - A diverse audience will encounter mis…
Logical fallacy
— Formally invalid reasoning; arguments whose conclusions do not follow from their premises.
logical operators
— operators that act on the encoded qubit as if it were a bare qubit, but without leaving the code spa…
LOGIN_HISTORY
— Audit trail for digital access.
logistic regression
— a model specifically designed for classification. Despite its name (it has "regression" in it), logi…
Logistical Timing
— [ ] It has been long enough since the triggering event that initial heat has cooled (hours to days, …
Logistics:
— Timeline: start date, duration, report delivery date - Communication channels and frequency - Point …
Logos
— the argument itself: the evidence, the reasoning, the logical structure of the case. Logos is what m…
Logotherapy
— Viktor Frankl's existential therapeutic approach centered on the human drive to find meaning; the cl…
LOGPRIMARY
— Number of primary log files, pre-allocated when the database activates. - Default: 13 - Production: …
LOGSECOND
— Number of secondary log files, allocated on demand when primary logs are exhausted. - Default: 12 - …
Long enough before (3-5 seconds)
— The brain needs time to encode the starting state. Rushing past the "before" reduces the contrast wh…
Long Format
— A data shape with one row per observation and one column per variable; preferred by most analytical …
long hunters
— "long" not because of their rifles (though their rifles were long) but because of the duration of th…
Long Tail
— The large number of niche topics or search queries that each have low individual traffic but collect…
Long-Form Content
— Content that is longer than the platform norm — typically videos over ten minutes, articles over 1,5…
long-form storytelling
— videos from 10 to 60 minutes (and beyond) — and specifically about how the psychology from Chapters …
Long-Range Value:
— **Ramirez** has the best long-range percentage and proven range to 57 yards - **Sterling** has solid…
Long-term (2030+):
— Prediction markets as an established asset class with comprehensive regulation - Integration with tr…
Long-term (6-12 months):
— Restructure DPO reporting: the DPO should report to the board, not the CEO, to ensure independence. …
Long-term (Ongoing):
— Address remaining style drift items incrementally using the Boy Scout Rule - Replace hallucinated pa…
Long-Term Consequences
— [ ] What short-term effects did this propaganda produce? - [ ] What long-term democratic or civic ha…
Long-term holdback groups
— a small percentage of users who permanently remain on the old model, allowing Google to measure the …
Long-term orientation
— Hofstede's cultural dimension contrasting societies that value future rewards, persistence, and adap…
Long-Term Recovery
— One failed conversation does not define a relationship. - Repair attempts — even imperfect ones — ch…
Long-Term Strategy:
— Implement a tiered administration model to limit the blast radius of service exploitation - Deploy a…
Long-term vs. Short-term Orientation
— the extent to which cultures value future-oriented virtues (persistence, thrift, ordering by status)…
Longer shots
— holding on her face for 4-6 seconds while explaining, rather than cutting every 0.7 seconds 2. **Vis…
Longer term:
— Learn more about crawlspace moisture management — the NW corner situation needed resolution before i…
Longitudinal consistency (if applicable):
— [ ] Are tracking questions identically worded to prior waves? - [ ] Are response scales reproduced i…
Longitudinal study
— A research design in which the same participants are observed over an extended period of time, enabl…
Longitudinal survey
— A survey design in which the same respondents are interviewed at multiple points in time. *Panel sur…
Longitudinal wave
— A wave in which the displacement of the medium is parallel to the direction of wave propagation, pro…
LONGLOBDATA
— Includes LOB and LONG data in the reorganization. Without this, only the base table rows are reorgan…
Look at the caret
— it points to where Python first noticed the problem. > 3. **Check for missing quotes, parentheses, o…
Look back
— trace the arc of what you've learned across all eight parts of this textbook 2. **Look around** — se…
look-ahead bias
— using information that would not have been available at the time of each prediction. Common sources …
Lookahead bias
— Using future information in past decisions. 2. **Overfitting** --- Fitting noise instead of signal. …
Lookalike audience
— An advertising targeting approach in which a platform's AI identifies users who resemble a "seed" au…
LOOKING AHEAD
— Chapter 14 takes you from architecture to implementation. You'll define CSD resources, configure SIT…
Looking Ahead:
— **Ch 35 (Quantum Error Correction):** Uses the operator formalism in the context of qubits — a very …
Looking back:
— Chapter 19 gave us the tools to describe individual variables (means, standard deviations) - Chapter…
Looking forward:
— Chapter 25 introduces formal modeling — using one variable to *predict* another - Chapters 26-28 bui…
Loop constructs
— DB2 SQL PL supports LOOP, WHILE, REPEAT, and FOR:
loop variable
— it automatically takes on each value in the sequence, one at a time. On the first pass (or **iterati…
loops
— the programming construct that lets you say "do this thing repeatedly" without writing the same code…
Loose coupling
— A system design in which components interact through well-defined interfaces with limited mutual dep…
Lore
— In community context, the accumulated inside jokes, references, recurring characters, catchphrases, …
Lorentz invariance
— the theory must be consistent with special relativity. 2. **Locality/Causality** — measurements at s…
Losing trades (3):
— Losses on the three incorrect trades: - M-024: True prob was 0.08, but market resolved YES. Bought N…
loss
— a measure of how wrong the network is. The loss is the altitude on the landscape, and the goal is to…
loss function
— a measure of prediction error. For binary classification (win/loss prediction), the standard loss is…
Loss of boundaries
— content creation invades every moment; filming meals, documenting everything, never being "off"; cre…
LOSS_EVENT
— The real-world event that caused the loss. | Attribute | Type | Notes | |-----------|------|-------|…
LOSS_TYPE
— Categorization of losses - **COVERAGE_TYPE** — Definitions of coverage categories - **PAYMENT_TYPE**…
lost
— they are never assigned. When DB2 restarts, it continues generating values from the start of the nex…
Lost Cause narrative
— The post-Civil War rewriting of Southern history that reframed the war as a conflict over states' ri…
loudness
— measured in dBFS (decibels relative to full scale), which is the digital equivalent of the dB SPL di…
Louisville and Nashville (L&N)
— complete the following:
Louisville and Nashville Railroad (L&N)
— were massive corporate enterprises, financed by Eastern and European capital, that saw the Appalachi…
Louisville Courier-Journal
— Kentucky's most powerful newspaper, edited by the formidable **Henry Watterson** — shaped the story …
Louvain Algorithm
— Original paper: Blondel et al. - Most common method - Fast and scalable
Love Bombing
— The practice of overwhelming new recruits with affection, validation, and community before the full …
Love Maps
— the detailed knowledge each partner has of the other's internal world — is one of the most practical…
loveisrespect.org/dating-violence-by-the-numbers/
— Statistics, policy information, and research summary.
Low (monitor and address over time):
— Patent implications of AI-generated inventions - Long-term copyright ownership strategy - Contributi…
Low barrier, high ceiling
— Minimum participation accessible to anyone with a phone. Maximum participation limitless for skilled…
Low decoherence
— photons interact weakly with the environment. A photon can travel through kilometers of optical fibe…
Low EPA, High CPOE:
— Accurate on short, low-value throws - Poor decision-making (accurate but wrong decisions) - Bad luck…
Low HFA (-0.3 to -0.5):
— LA Chargers (traveling fans) - Washington (attendance) - Shared stadiums
Low moral hazard risk:
— Weather outcomes (virtually impossible to influence) - Large-scale economic indicators (GDP, unemplo…
Low or Negative ROI (avoid AI or use minimally):
— Writing new COBOL business logic (AI doesn't know your business rules) - Performance optimization (A…
Low Q environments (dead acoustics):
— Typical homes and offices have soft furnishings (carpets, curtains, upholstered furniture, bookshelv…
Low reliability domains:
— Statistics and numerical data - Recent events (past 1-2 years relative to training cutoff) - Niche t…
Low reliability situations:
— Any feature involving a library updated within the past year - Domain-specific logic that requires u…
Low Risk (normal play):
— ACWR 0.8-1.3 - Subjective fatigue < 5/10 - HRV > 85% of baseline - Adequate rest between games
Low tackles can indicate:
— Excellent positioning deterring challenges (positive) - Playing for dominant possession team (contex…
Low-Block Systems:
— Sweeper actions less critical - Focus on shot-stopping - Strong aerial ability
low-expansion "window and door" foam
— not standard expanding foam — in rough opening gaps. Standard foam can bow vinyl frames. - Full-fram…
Low-latency replication
— changes are captured and applied in near-real-time - **Bidirectional replication** — two databases c…
low-level signal properties
— spectral content, temporal regularity, the presence or absence of certain acoustic elements. They ar…
Low-Major Conferences
— Heavy discounting creates opportunities - Look for players with extreme physical tools
Low-noise amplifiers
— tunneling is inherently fast and low-noise. - **Multi-junction solar cells** — tunnel junctions conn…
Low-quality signals:
— Single-word or emoji-only responses (often algorithmically triggered or pod activity) - Generic prai…
Low-signal indicators (often noise):
— "Impressive demo" without explanation of what's generalizable - Benchmarks from a tool's own marketi…
Low-stakes first action
— the best first action is one that takes less than 30 seconds and gets a response. Reaction roles (se…
LOW-VALUE
— A figurative constant representing the lowest value in the current collating sequence. In EBCDIC, LO…
LOW-VALUE / LOW-VALUES
— Represents the lowest character (X"00", null). Used as end-of-data markers and for initializing buff…
LOW2KEY
— the second-highest and second-lowest values in the column (stored in the catalog after RUNSTATS).
Lowe, "JCL: Job Control Language"
— Essential companion for understanding how JCL DD statements connect to COBOL SELECT statements and h…
Lowe, "Modern Mainframe Development"
— Chapter on code reuse patterns in COBOL, including how copybooks interact with modern CI/CD pipeline…
Lower legal risk:
— Using AI for internal analysis and ideation not involving regulated data - AI-assisted drafting and …
Lower Pace Eras (1990s-2000s):
— Fewer possessions reduced Win Shares opportunities - Jordan's 214 WS in 15 seasons was in slower era
Lower performing:
— Neutral expression — communicates nothing; gives the viewer no emotional expectation - Forced/exagge…
Lower scoring volume
— Shared touches with other lottery picks (Giles, Kennard) - Usage-adjusted scoring was competitive
Lower slaveholding rates
— most mountain farmers owned no enslaved people and had weaker economic ties to the slave system. (2)…
Lower the threshold
— flag more countries, accept more false alarms.
Loyalty oath
— A formal declaration of allegiance demanded of government employees, military personnel, and others …
LPAR
— Logical Partition. A division of a physical mainframe into multiple independent logical systems, eac…
LRECL
— Logical Record Length. The length in bytes of a single logical record in a dataset, specified in JCL…
LTAS (Long-Term Average Spectrum)
— The average power spectrum of an audio signal calculated over a time interval long enough to capture…
LTV:CAC < 1:1
— You are paying more to acquire customers than they are worth. This is existential. - **LTV:CAC 1:1 t…
LTV:CAC ratio
— The fundamental health metric for customer acquisition. Below 1:1 is existential. 3:1 to 5:1 is heal…
Lucasfilm 1981 memo
— Prohibited explicit fan fiction; drove slash underground; established property-absolutism template -…
luck attractor
— the specific qualities that make you the natural person to be recommended, introduced, or included w…
luck correlation
— the degree to which your luck outcomes in one domain move together with your luck outcomes in anothe…
Luck egalitarianism
— A political-philosophical position holding that inequalities arising from unchosen luck are unjust a…
luck gap
— a systematic difference in the flow of opportunity luck across demographic groups that operates inde…
Luck school
— Wiseman's four-week behavioral intervention for unlucky participants, producing 40% average improvem…
Luck surface area
— See: Opportunity surface. *First introduced: Chapter 25.*
Luck-skill continuum
— Michael Mauboussin's framework for positioning activities on a spectrum from pure luck (roulette) to…
Lucky person:
— Arrives slightly early to events to maximize meeting time - Positions themselves near food or drink …
Lucky:
— Being in San Francisco during a tech community that understood and eventually funded this type of bu…
LUFS (Loudness Units Full Scale)
— A standardized measure of integrated loudness conforming to the EBU R128 and ITU-R BS.1770 specifica…
Lukewarm water / inconsistent temperature:
— Scale buildup on the heat exchanger is the most common cause of reduced performance over time. Flush…
Lumber companies
— many of them headquartered far from the mountains — bought enormous tracts of forest land, often acq…
Lust (triangular theory)
— In Robert Sternberg's triangular theory of love, passion or physical attraction; one of the three co…
LUW
— Use `db2exfmt` or the EXPLAIN tables: ```sql EXPLAIN PLAN FOR SELECT * FROM meridian.transaction_his…
LUW row overhead:
— Row header: 8-10 bytes. - NULL indicator bitmap: 1 byte per 8 nullable columns. - VARCHAR length pre…
LUW:
— LOB data can be stored *inline* (in the base table row) if it is small enough, or in a separate larg…
Lyapunov time
— the time after which prediction becomes impossible — provides a physically meaningful definition of …
lycopsids
— organisms related to the tiny club mosses that grow on modern forest floors, but scaled up to monstr…
Lynch, Kentucky
— built by the **U.S. Coal and Coke Company**, a subsidiary of the **United States Steel Corporation**…
M
Ma (間)
— Japanese concept of meaningful empty space in time, conversation, and visual art; expressive absence…
MaC Venture Capital
— macventurecapital.com Founded by Marlon Nichols, Michael Palank, and Charles King, MaC VC has a stro…
Machiavellianism
— A personality trait in the Dark Triad characterized by strategic manipulation, cynical worldview, an…
Machine area: Adjustable LED work lights
— A pair of adjustable-arm LED shop lights mounted to the ceiling near the table saw and band saw. The…
Machine learning
— the approach that would come to dominate — needed examples. Lots and lots of examples.
Machine learning (Chapters 7--10):
— Classical algorithms (regression, trees, SVMs, clustering) - Feature engineering - Model evaluation …
Machine learning applications:
— Expected yards based on blocking - Pressure probability models - Win rate estimation
Machine Learning Approaches
— Random Forest for expected yards - XGBoost implementations - Neural network approaches - Paper: "Mac…
Machine Learning Engineer (Priya)
— Needs: scikit-learn, xgboost, tensorflow for predictive models - "My models need to be reproducible …
Machine Learning Engineer:
— Focuses on deploying models into production systems - Primary tools: Python, Docker, Kubernetes, ML …
Machine Learning for NFL Prediction
— building on these rating foundations with gradient boosting, neural networks, and feature engineerin…
Machine learning frameworks:
— **scikit-learn**: The standard library for classical ML algorithms --- decision trees, SVMs, k-means…
Machine Learning Mastery
— Practical tutorials - Python examples - https://machinelearningmastery.com
Machine Learning Models
— Modern AV products (CrowdStrike Falcon, SentinelOne, Carbon Black) use ML models trained on millions…
Machine-Executable Regulation
— The concept of expressing regulatory requirements in formal, computer-executable languages rather th…
macOS:
— Open Terminal and type `git --version`. If Git isn't installed, macOS will prompt you to install the…
macro
— a reusable template function.
Made the pipeline robust
— added comprehensive error handling, logging to a file, and a failure notification function 2. **Move…
Magic state distillation:
— Each logical $T$ gate requires $\sim 15$–$20$ ancilla qubits and multiple rounds of distillation - M…
magical thinking
— the belief that you can have something for nothing, that costs can be eliminated rather than merely …
magnetic domains
— where all the atomic spins point the same way. Within each domain, the symmetry is broken: there is …
magnetic resonance imaging (MRI)
— different Larmor frequencies allow selective excitation of different nuclear species.
magnetization
— the degree to which atomic magnetic moments are aligned. In the ferromagnetic phase (below the Curie…
Mahalanobis distance
— A multivariate extension that accounts for correlations between features. It measures how far a poin…
Main Chapter (index.md)
— Read this first. It runs approximately 9,500–10,500 words and constitutes the core learning material…
Main Menu
— Display transaction options: Balance Inquiry, Withdrawal, Deposit, Another Transaction, and Exit/Rem…
Mainframe
— A large, high-performance computer system designed for high-volume transaction processing, bulk data…
Mainframe DEV (developer.ibm.com/mainframe)
— IBM's developer portal for mainframe technology. Includes tutorials, code samples, and sandbox envir…
mainframe itself
— the platform that processes 95% of ATM transactions, runs the core systems of every Fortune 100 bank…
Mainframe Modernization: Patterns and Practices
— IBM Redbooks. Comprehensive guide to modernization strategies for COBOL systems.
Mainframe Security: Protecting Your Environment
— IBM Redbook SG24-6803 Covers z/OS security architecture, RACF configuration, and compliance from a p…
Maintain an event catalog
— registry of all event types, schemas, producers, and consumers
Maintain as-is
— Keep the COBOL code, invest in maintenance and documentation - **Re-platform** — Move the same COBOL…
Maintain YouTube
— but optimize for email list growth, not views. Every video ends with a direct call to join the "Firs…
Maintaining human strategic understanding
— even when AI systems are executing operational decisions — is both a professional best practice and …
Maintenance
— Check the pressure gauge monthly (needle should be in the green zone) - Have rechargeable extinguish…
Maintenance and Replacement
— **Test monthly:** The test button on your detector tests the alarm circuit and horn — not the sensin…
Maintenance calendar summary:
— **Late spring:** Clean gutters, flush downspouts, check and reposition splash blocks, check downspou…
Maintenance Time:
— Tariq's time spent answering questions dropped from 8-10 hours/week to 2-3 hours/week - He redirecte…
Maintenance:
— Test monthly - Replace batteries annually (or use 10-year sealed units) - Replace entire unit every …
Major key
— sounds bright, happy, resolved, confident. Use for positive content, comedy, celebrations, and uplif…
Major Optical Tracking Providers:
— **TRACAB (ChyronHego):** One of the longest-established tracking systems, installed in stadiums acro…
Major Renovations (Room Addition, Gut Renovation)
— Application preparation: 1–4 weeks (with designer or architect) - Plan review: 10–25 business days (…
make someone click
— Not to inform, describe, or look professional — to earn the click - The five design principles: 1. *…
Make your work visible
— don't just do great work; ensure it's seen by people with promotion influence - **Identify and culti…
make_subplots
— A plotly function that creates a figure with multiple chart panels arranged in a grid. Returns a Fig…
makers
— they "make" the market by placing orders that others can trade against.
Makes current errors invisible
— if the system "always self-corrects," why suspect current errors? 2. **Understates the cost of delay…
Makeup Air Triggers by Jurisdiction
— IMC baseline: makeup air required when exhaust exceeds 400 CFM - California Title 24: stricter provi…
Making Bug Bounty Sustainable:
— Specialize: become deeply expert in one vulnerability class or technology - Build efficiency: develo…
making decisions under uncertainty
— it's the most practical course you'll take regardless of your major 2. **Descriptive statistics** su…
Making the choice:
— If you need maximum ecosystem breadth and third-party integrations: **ChatGPT** - If you do a lot of…
maknae
— The youngest member of a K-pop group, a recognized social role with associated fan community narrati…
Male gaze
— A term introduced by film theorist Laura Mulvey (1975) to describe the way women are positioned in m…
malinformation
— true information disclosed with the intent or effect of causing harm — was introduced in the informa…
Maltego Editions:
— **Maltego CE (Community Edition)**: Free, limited transforms and results - **Maltego Classic/XL**: C…
Man vs. Zone Splits
— Scheme-specific evaluation - Player fit analysis - Coverage type classification
Man-in-the-Middle
— Intercepting and potentially modifying communications between two parties. - **Protocol Implementati…
Man-Marking
— A defensive system where each defender is assigned to track a specific opponent. At set pieces, cont…
Manage
— Provides a common vocabulary and structured approach to AI risk - Designed to be adaptable across se…
Managed Service
— A service in which a provider handles ongoing operations on behalf of a client, versus a one-time pr…
management
— developing a sustainable relationship to the difference.
Management Class
— defines the lifecycle of a dataset. It controls how long a dataset is retained, when it is eligible …
Managing online hate:
— Don't engage (feeding the engagement algorithm rewards it) - Block aggressively (you owe strangers n…
mania
— the obsessive, possessive, anxious version of love that is more terror than desire. The constant mon…
manifold
— a central distribution point where multiple tubing loops connect to the supply and return piping. Ea…
Manifold Markets
— Community-driven, anyone can create markets - **Metaculus** — Forecasting platform with continuous d…
Manifold Markets API:
— `/bets` endpoint returns individual bet records with timestamps - Each bet record includes `probBefo…
Manipulation
— Influence that bypasses or subverts another person's rational deliberation, typically relying on psy…
Manual Analysis:
— Coaches and analysts watch video to understand tactics, player behaviors, and game situations - Tagg…
Manual J
— the industry-standard procedure developed by the Air Conditioning Contractors of America (ACCA). Man…
Manual Verification:
— Validate automated findings to eliminate false positives. A vulnerability scanner reporting MS17-010…
Manually add Python to PATH:
— Open System Properties → Advanced → Environment Variables - Find the "Path" variable in User variabl…
Manufactured doubt
— The strategic production of apparent scientific uncertainty where scientific consensus exists, throu…
Manufactured uncertainty
— The deliberate creation of doubt about scientific consensus by interested parties, used historically…
Manufacturer Sources:
— Official firmware update files from the vendor's website - Update servers identified through network…
Manufacturing
— detecting equipment failures before they occur (predictive maintenance). **Healthcare** — identifyin…
manufacturing consent
— design techniques that manipulate users into granting permissions they would not grant if the choice…
Many-worlds interpretation
— Ch 28.4 Hugh Everett's interpretation (1957) in which wave function collapse never occurs. Instead, …
Map
— In *BMS*, the definition of a screen layout including field positions, attributes (protected, unprot…
Map power dynamics
— who benefits most? Who bears the most risk? Who has decision-making authority? 3. **Elicit values** …
Map your current opportunity surface
— list all recurring contexts, estimate time and weak-tie density in each 2. **Identify your HackerNew…
Map-territory relation
— Alfred Korzybski's insight that all representations (models, maps, theories, metrics) necessarily si…
MAPATTS
— it sends everything.
MAPPINGTABLE
— Required for SHRLEVEL CHANGE. Must be created in the same database. If you forget this, the REORG fa…
MAR (Missing at Random)
— the missingness is related to equipment availability, not to the actual temperature or humidity valu…
Marcellus Shale
— a geological formation stretching from New York through Pennsylvania, West Virginia, Ohio, and Virgi…
March (late — after freeze risk):
— Exterior perimeter walk with photographs - Open hose bibs, check for winter freeze damage - Schedule…
March Machine Learning Mania
— NCAA Tournament - Game prediction - Probability calibration - Public leaderboard
Marcus Chen (26)
— Marketing Analyst, 1 year at Greenfield. Marcus graduated from a business analytics program where he…
Marcus Rivera (State University)
— Traditional Stats: 68.5% completion, 3,245 yards, 28 TD, 8 INT - Passer Rating: 152.8
Marcus Thompson
— 42-year-old high school English teacher transitioning to a career in data science. Represents patter…
Marcus Webb
— Head of Operations. He has a theory that the drop is all about shipping, but Priya suspects there is…
Marcus's power relative to Diane:
— Expert: growing; he has taken significant interest in a specialized area of contract law and has rea…
Marcus's underlying interests and needs:
— **Need for acceptance without prolonged tension:** Marcus's conflict avoidance is not laziness — it …
Marcus's video:
— Views in week 1: 47,200 (previous average: 8,400) - New subscribers in week 1: 4,100 - Comment secti…
margin
— the distance between the decision boundary and the nearest data points from each class. This geometr…
Margin Capping:
— Cap at 14-24 points - Prevents garbage time distortion - Blowouts beyond cap add little information
Margin of error (MoE)
— The range above and below a poll estimate within which the true population value is estimated to fal…
MARGINAL
— BUF ML: Combined std ~2.6%. edge_lower at (0.4203 - 1.96*0.026)/0.4000 - 1 = 0.3694/0.4000 - 1 = -7.…
Marginal Calculation:
— Replacement level: ~0.92 points/possession - Marginal rate: 1.17 - 0.92 = 0.25 points/possession abo…
Marginal offense calculation
— Marginal = Above replacement level (~0.92 pts/poss) - Higher efficiency = more marginal points - Con…
marginalization
— the process of summing (or integrating) over variables we do not observe. In AI, marginalization app…
Marginalization (acculturation)
— Berry's acculturation strategy in which neither cultural heritage nor new cultural context is mainta…
Maria Chen
— Senior COBOL Developer (28 years at GlobalBank) Maria started at GlobalBank as a junior programmer i…
Maria Garza for Senate:
— Total raised (cycle): $24.7 million - Cash on hand: $3.1 million - Total spent: $21.6 million - Burn…
Mark Andrejevic
— "Participatory surveillance" and "digital enclosure" framework (*iSpy: Surveillance and Power in the…
Markelle Fultz:
— Diagnosed with thoracic outlet syndrome affecting shooting motion - Career (through 2023-24): ~8 Win…
Markers of a wasted crisis:
— Investigations produce reports that are shelved - Temporary reforms are quietly rolled back - Instit…
Markers of cosmetic correction:
— Reforms focus on procedures rather than assumptions - The same people remain in charge, implementing…
Markers of genuine correction:
— New training curricula, not just new procedures - New hiring criteria reflecting new values - Change…
market
— publicly available data | The **NCA** (regulator) — confidential | | Purpose | Price discovery; mark…
Market A (CLOB):
— Average spread: $0.03 - Trades: 150 - Total volume: 5,000 contracts - Average depth at best: 100 con…
Market Adaptation:
— Every edge has a lifecycle: discovery, exploitation, correction, adaptation - Detect edge decay thro…
Market as Data Source:
— Implied team ratings - Injury/news impact - Information flow timing
Market Assumptions:
— Win value: $3.5 million - Points per win: 30
Market B (AMM):
— Average spread: $0.05 - Trades: 80 - Total volume: 3,000 contracts - Average depth at best: Unlimite…
Market conditions:
— Bid: $0.52, Ask: $0.55, Midpoint: $0.535 - Order book depth: 50 contracts at $0.55, 50 contracts at …
Market discipline
— the idea that sophisticated investors would avoid overly risky bets — was undermined by the complexi…
Market Dynamics
— Competition for talent increasing - Salaries rising (especially senior roles) - Remote work becoming…
Market Efficiency
— Efficient Market Hypothesis applications - Semi-strong form efficiency in betting - Information inco…
Market factors:
— Selling club's league and reputation - Current market conditions (inflation, pandemic effects) - Tra…
Market Features:
— `market_price`: The prediction market price (implied probability) at the time of our analysis. - `ma…
Market Lifecycle Events:
— `MarketCreated` --- a new market is opened for trading - `MarketSuspended` --- trading is temporaril…
Market manipulation
— engaging in market manipulation.
Market Mechanics and Order Types
— how orders are actually matched, what different order types mean, and how market microstructure affe…
Market Patterns:
— Key numbers (3, 7) create structural features in the NFL margin distribution that affect teaser stra…
Market quality metrics
— spread, depth, order imbalance, VWAP -- provide quantitative tools for assessing how well a market f…
Market-derived features:
— Opening line - Line movement (closing minus opening spread) - Consensus percentage of bets on each s…
Marketing automation
— email sequences triggered by specific behaviors (abandoned cart, time since last purchase, browsing …
Marketplace platforms (Gumroad, Shopify, Etsy)
— Revenue model: transaction fees (Gumroad takes 10%; Shopify charges subscription + small transaction…
Markov chain
— a probabilistic system where the probability of the next state (chord) depends only on the current s…
martensite
— a very hard, very brittle crystal structure that can hold an extraordinarily sharp edge. The thickly…
Martin County, Kentucky
— one of the poorest counties in one of the poorest regions in America — to announce his administratio…
Mary Draper Ingles
— and no honest account can avoid confronting what the captivity narrative genre does to women's stori…
masking
— the conscious or semi-conscious performance of neurotypical social behavior by autistic and other ne…
Masking (acoustic)
— The phenomenon in which one sound (the masker) reduces the audibility of another sound (the target) …
Maslow's hierarchy
— multi-layered model of human needs; basic structure is useful even if the strict hierarchy is not em…
Mass Assignment:
— Test POST and PUT endpoints for mass assignment by adding unexpected fields. Can you set `is_admin: …
Massey Energy
— at the time the fourth-largest coal company in the United States and the most powerful company in th…
Massey/Thaler draft value research
— Fundamental economics 2. **Combine predictive analysis** - What testing matters 3. **Production corr…
massless mode
— the note that can slide to the tonic without energetic cost. It "costs nothing" to resolve a leading…
massless particle
— the fluctuation that communicates between equivalent ground states. It is the mode that carries info…
Master catalog
— one per z/OS system. Contains entries for system datasets (SYS1.*, etc.) and **aliases** that point …
Master data management
— particularly the customer golden record — is the enabler of enterprise-wide compliance monitoring.
master files
— the central repositories of business data such as customer records, account balances, product catalo…
master narratives
— the culturally shared stories that define what a life is supposed to look like.
Master this chapter's fundamentals
— Counting vs. rate statistics - Efficiency calculations - Era adjustments
master-transaction update pattern
— arguably the most important pattern in all of COBOL batch processing. Getting it right means account…
Mastodons
— shaggy, elephant-like creatures standing nine to ten feet at the shoulder — browsed the spruce fores…
Match Day: Execution and Monitoring
— Provide real-time tactical monitoring (Section 22.4.3) - Prepare half-time data package - Support in…
Match Level:
— Sum all key passes by player - Top creators: 0.3-0.6 xA per match
Match State:
— Score: 0-0 (1-0 aggregate to Metropolis) - xG: Olympus 0.62 -- Metropolis 0.51 - Possession: Olympus…
Match Statement
— Python's structural pattern matching syntax (3.10+). Similar to switch/case in other languages but w…
Match the tokenizer to the model
— never mix tokenizers from different pre-trained models. 3. **Domain-specific pre-training** (further…
Match!
— Trade: 30 contracts at $0.53 (Carol's resting price). Carol is partially filled. - Carol's remaining…
Match-to-date conversion
— The rate at which digital matches (mutual expressions of interest) result in in-person meetings; con…
Match-update
— Read sorted transactions and sorted master, produce updated master.
MATCHCOLS
— Are you getting the matching columns you designed for? 2. **ACCESSTYPE** — Is DB2 using your index o…
MATCHCOLS on TRANSACTIONS
— If the predicate on TRANS_DATE were an equality instead of a range, MATCHCOLS could be 2. But the bu…
Matchday revenue
— ticket sales, hospitality, and stadium-related income 2. **Broadcasting revenue** --- domestic and i…
matched-guise study
— a technique in which the same speaker records the same text in two or more accents, and listeners ev…
Matched-pair analysis (comparative file review)
— A method for detecting disparate treatment by comparing outcomes for applicants with matched financi…
matching hypothesis
— that people tend to pair with others of similar levels of physical attractiveness — is well-supporte…
Matching Parameters to Tune:
— **Exact match**: Name must be identical (very low false positive, higher false negative) - **Fuzzy m…
Matchup Data:
— Primary matchup PPP: 0.82 (league avg: 0.95) - Iso defense PPP: 0.75 - Post defense PPP: 0.88
Matchup features:
— `win_pct_diff`: home_win_pct - away_win_pct - `net_rating_diff`: (home offensive rating - home defen…
Matchup-specific features:
— Difference in key statistics (offensive rating A minus defensive rating B) - Historical head-to-head…
Mate copying
— The tendency to find a person more attractive after learning that others find them attractive; funct…
Mate value self-perception
— One's assessment of one's own desirability as a romantic partner; correlates with approach strategie…
Material culture
— the objects, foods, tools, and crafts that people create and use in daily life — is history you can …
Material information
— Information that a reasonable audience member would want to know before making the decision the comm…
Materialized Query Tables (MQTs)
— summary tables that DB2 can maintain automatically and use transparently when the optimizer recogniz…
Matewan Massacre
— or the Battle of Matewan, depending on whose side you were on — was front-page news across the count…
Math conventions:
— LaTeX throughout. Inline math with `$...$`, display math with `$$...$$`. - Wave mechanics notation (…
Mathematical explanation:
— Two-point efficiency naturally declines with volume (more difficult shots) - Three-point efficiency …
Mathematical foundations (Chapters 2--6):
— Linear algebra (vectors, matrices, decompositions) - Calculus (gradients, optimization) - Probabilit…
Mathematical Modelling of Football
— Uppsala University - Free course on soccer analytics - Includes expected metrics coverage - Availabl…
Mathematical reasoning
— financial calculations, unit economics, statistical analysis - **Multi-step logic** — policy evaluat…
MathSport International
— Focus: Mathematical approaches to sports including soccer defense - Key Content: Statistical modelin…
matplotlib
— Basic plotting - Customization
Matplotlib and Seaborn Documentation
— matplotlib.org/stable/tutorials/index.html — Official matplotlib tutorials, from basic to advanced -…
Matplotlib Documentation
— Official tutorials and gallery - Essential reference for customization - https://matplotlib.org/stab…
matplotlib figure templates
— For production reporting, define a reusable `figure_template()` function that applies your organizat…
matplotlib styles
— matplotlib includes a set of built-in style sheets (`plt.style.use("ggplot")`, `plt.style.use("seabo…
Matplotlib/Seaborn
— Standard Python plotting 2. **Plotly** - Interactive visualizations 3. **ggplot2** - R visualization…
Matplotlib/Seaborn (Python)
— Standard Python visualization - Covered extensively in Part 3 - Sports-specific styling available
matrilineal
— descent, identity, property, and clan membership all passed through the mother's line. A child belon…
Matrix Definition:
— Taker choices: Left, Center, Right - Goalkeeper choices: Dive Left, Stay, Dive Right - Outcomes: Goa…
matrix factorization
— a close relative of PCA — to compress the massive user-song interaction matrix into a lower-dimensio…
matrix mechanics
— was mathematically rigorous and gave correct predictions, but it was extraordinarily abstract. The a…
Matthew Effect
— The sociological principle, named by Robert Merton from the Gospel of Matthew, that those who alread…
Maturity Date Schedule
— Given an origination date and a term in months, generate a schedule of monthly maturity dates, adjus…
Maturity principle
— The empirical pattern by which Conscientiousness and Agreeableness increase and Neuroticism decrease…
MAXACTIVE
— Maximum concurrent tasks in this class. When reached, new tasks in this class queue. - **PURGETHRESH…
maximally mixed state
— complete ignorance about subsystem $A$, even though the composite system is in a perfectly well-defi…
Maximize the top:
— Clear share trigger (social currency, utility, emotion, identity, conversation) - Strong identity en…
Maximizer vs. satisficer
— A distinction in decision-making style introduced by Herbert Simon and extended by Barry Schwartz: m…
Maximum drawdown:
— $10.00 (during scandal weeks with NO position losses) - **Sharpe ratio:** 1.42 (annualized, estimate…
maximum quality improvement per dollar
— directional, flattering light with natural-looking shadows that mimics basic professional lighting. …
May 12, 2017, 07:44 UTC
— First infections detected. WannaCry begins spreading rapidly, primarily through organizations with l…
May 13-14, 2017
— Modified variants without the kill switch appear but spread less effectively. The initial wave's dam…
May Stone
— traveled to Hindman, a small town in the hills of Knott County in eastern Kentucky. They came to hol…
Maya
— A composite 17-year-old navigating TikTok and Instagram, tracking the individual psychology of platf…
Maya Chen
— 19-year-old college sophomore, zero budget, sustainable fashion on TikTok/YouTube. The idealized "an…
Maya Chen and the Three Weeks She Stopped
— The sustainable fashion community knew Maya Chen as the girl who could make a thrifted outfit look l…
Maya Reyes
— Independent Business Consultant, $175/hr, ~12 active clients
Maya's goals (for the student playing her):
— Push payment to 50% on signing, 50% on delivery - Reduce usage rights to 12 months, brand's owned ch…
Maya's lasting impact:
— 72% of her 85,000 new followers stayed because they discovered a science creator they genuinely enjo…
Maya's observations:
— All 12 rows have complete data — no missing values. - Hourly rates range from $125 to $175. She has …
Maybelle Carter
— came from Maces Spring, Virginia, a tiny community in the Clinch Mountain region of southwestern Vir…
McAfee, "COBOL: From Micro to Mainframe"
— Strong coverage of DECLARATIVES and USE statements with practical examples.
McCarthyism
— The political campaign associated with Senator Joseph McCarthy (1950-1954) characterized by unverifi…
McDowell County, West Virginia
— which would become one of the most productive coal counties in America — outside corporations had ac…
McKay Johns (YouTube)
— Practical Python tutorials for soccer analytics, including per-90 calculations, radar charts, and me…
McKay Johns Analytics Blog
— Detailed xG implementation posts - Comparison of modeling approaches - https://github.com/mckayjohns
McKay Johns Analytics Tutorials
— Practical soccer analytics guides - StatsBomb data tutorials - Visualization techniques - Link: yout…
McKay Johns, "Voronoi Diagrams in Football"
— YouTube. A visual introduction to Voronoi diagrams in soccer with Python code examples.
McNamara's fallacy
— named for the defense secretary whose technocratic approach exemplified it. The fallacy has two step…
MCP (Model Context Protocol)
— An open protocol developed by Anthropic that standardizes how AI models connect to external tools, d…
MDCT (Modified Discrete Cosine Transform)
— A lapped transform used in audio coding (MP3, AAC, OGG) that divides an audio signal into overlappin…
Me and White Supremacy
— Layla F. Saad (2020) A reflective workbook examining unconscious racial bias. Useful as preparation …
MEAMs
— music-evoked autobiographical memories; distinctive for their vividness, emotional intensity, and se…
mean
— technically the *arithmetic mean* — is the one you already know. Add up all the values, divide by ho…
Mean and standard deviation:
— Logistic Regression: mean = 0.2236, std = 0.0029 - XGBoost: mean = 0.2186, std = 0.0023 - Neural Net…
Mean reversion
— The tendency of a variable to return toward its long-term average over time; commonly observed in fi…
Mean world syndrome
— Cultivation theory's term for the pattern in which heavy television viewers overestimate the prevale…
Mean-Variance:
— Annual mean: $250 \times 0.0098 = 2.45$ - Annual std: $\sqrt{250} \times 0.0520 = 0.822$ - $P(\text{…
Meaning and purpose
— having a sense that your life and work connect to something larger than immediate self-interest — is…
meaning-based coping
— finding or creating meaning in the stressful experience, which restores motivation and supports cont…
Meaning-Making
— The cognitive process by which we interpret events and assign them significance. Shapes our experien…
Meaning-making capacity
— the ability to construct a coherent, somewhat positive narrative about what was learned or gained fr…
meaningful
— they must carry information, show relationships, or represent concepts. A picture of a brain on a sl…
Meaningful human review
— Human oversight of an AI decision that is genuine: the human reviewer has sufficient information, ex…
Meaningful information about the logic involved
— The GDPR standard for what data controllers must provide when automated decision-making is permitted…
Measure
— Calculate the energy consumption and carbon emissions of training and inference using tools like Car…
Measure first
— profile before optimizing. The bottleneck is rarely where you think it is. - **I/O dominates** — in …
Measured decibel levels:
— Normal NFL stadium: 80-100 dB - Seattle during key plays: 130+ dB - World record (2013): 137.6 dB
Measured productivity changes:
— **Boilerplate generation:** Approximately 60% faster. REST endpoint scaffolding, model definitions, …
Measurement
— [ ] How were the key variables measured? (validated scales? behavioral coding? self-report?) - [ ] A…
Measurement accountability
— the principle that the populations that bear the costs of measurement error should have meaningful i…
Measurement problem
— Ch 28.1 The unsolved foundational problem: the Schrodinger equation is linear and deterministic, yet…
Measures at each level:
— *Proximate:* All participants complete a brief fMRI session in which they view profiles of potential…
Measures of center
— mean, median, and mode — each answer the question "What's the typical value?" in different ways. The…
Measures of Central Tendency
— **Mean**: Average of values ($\bar{x} = \frac{\sum x_i}{n}$) - **Median**: Middle value when sorted …
Measures of Spread
— **Range**: Maximum minus minimum - **Variance**: Average squared deviation from mean - **Standard De…
Measuring AI ROI
— ROI frameworks for AI · Cost taxonomy · Direct vs. indirect value · Time-to-value · When to kill AI …
Measuring failure modes
— not just average quality, but the distribution of quality and the severity of the worst outputs
Measuring Gravity:
— Average distance of nearest defender - Frequency of help defense drawn - Impact on teammates' shot q…
Mechanical release
— the piano damper descends and touches the strings, immediately reducing vibration. If the sustain pe…
Mechanical systems
— water heater, furnace, electrical panel. All in one efficient walk through the utility spaces.
Mechanism design
— The engineering of rules, incentives, and institutions to produce desired outcomes from self-interes…
MedClaim Insurance Processing
— A health insurance claims processing system that demonstrates file handling, VSAM, report generation…
Media Buying
— The process of purchasing advertising placements on platforms or publications to promote content or …
Media capture
— The acquisition of editorial control over independent media by political or economic actors seeking …
Media Company
— A business whose primary product is content. Creators who operate with editorial strategy, publishin…
media cultivation
— associated with George Gerbner's cultivation theory — extends this principle to long-term media expo…
Media Kit
— A document a creator shares with potential brand partners that presents audience demographics, engag…
Media Kit Tools and Resources
— Canva (canva.com): Free templates specifically for creator media kits. Search "influencer media kit"…
Media literacy
— The capacity to critically read, evaluate, and produce texts across multiple formats and media; unde…
Media market
— A geographic area defined by which television stations' signals reach it, used by the Nielsen compan…
Media plurality
— The presence of a diverse ecosystem of news sources, editorial perspectives, and distribution channe…
Media priming
— The process by which exposure to media content activates associated cognitive schemas that then infl…
MediaBiasFact Check
— mediabiasfactcheck.com A crowd-assisted database of news source political orientation and factual re…
median
— the middle value when you sort all the data — gives you a more robust sense of what's "typical." Com…
Median:
— Middle value when sorted - Robust to outliers
MediaPipe
— https://mediapipe.dev/ - Real-time ML solutions for pose, hands, face
Medical BCIs
— enabling paralyzed patients to control prosthetic limbs or type text through thought alone (e.g., Br…
Medical confrontations:
— Know your patient rights: informed consent, records access (HIPAA), right to a second opinion, right…
Medical Devices:
— Networked infusion pumps (multiple vendors) - Patient monitoring systems - MRI and CT scanners with …
medical ethics
— and specifically in the aftermath of atrocity.
Medication-Assisted Treatment (MAT)
— the use of medications like **buprenorphine** (Suboxone), **methadone**, or **naltrexone** (Vivitrol…
Medici Effect
— Frans Johansson's term for the explosion of innovation that occurs at the intersection of different …
Mediterranean-pattern components:
— 5+ servings of vegetables and fruit daily ___/7 days - Fish 2+ times per week ___/7 days - Legumes (…
Medium
— Publishing platform for analysis - **Substack** - Newsletter platform - **GitHub** - Code portfolio …
Medium (address in implementation):
— Inconsistent tool usage across offices - No training or awareness program - Intellectual property ow…
Medium is the message
— McLuhan's claim (1964) that the formal properties of a communication channel shape its cognitive and…
Medium performing:
— Concern/Worry — appropriate for serious topics; communicates stakes - Intensity/Focus — appropriate …
Medium reliability situations:
— Integration code for well-documented third-party services - Error handling patterns (correct structu…
medium richness
— developed by Richard Daft and Robert Lengel in 1984 — describes the capacity of a communication medi…
Medium-term (2027-2030):
— Potential federal legislation in the US - Greater international regulatory harmonization - Maturatio…
Medium-term (90 days):
— Develop a specific data retention schedule with defined timeframes for each data category and proces…
Medium-term (Weeks 7-12):
— DEBT-032: Create base repository class and migrate existing repositories - DEBT-033: Create shared A…
MedSecure Health Systems
— our running example — is a mid-sized healthcare organization with a typical mix of modern and legacy…
Mei's profile at the start of the case study:
— Platform: TikTok (primary), Instagram (secondary) - Niche: Streetwear and sneaker culture - Follower…
Mel scale
— A perceptual frequency scale that maps physical frequency (Hz) to perceived pitch (mels), reflecting…
Melatonin
— A hormone produced by the pineal gland that regulates sleep onset and circadian rhythms; suppressed …
Melon
— A major South Korean digital music streaming platform, with its charts (Melon Chart) being significa…
Melungeon
— Mixed-heritage communities in central Appalachia whose ancestry likely includes Indigenous, European…
Melungeons
— a term applied to mixed-heritage communities in the mountains of eastern Tennessee, southwestern Vir…
member recovery
— replaying the failed member's log to roll back in-flight transactions 4. Client connections to the f…
members
— to read and write the same set of databases concurrently. Every member has full read/write access to…
Membership
— A recurring payment in exchange for ongoing access to exclusive content, community, or benefits. Mem…
Memoization
— Caching the results of function calls to avoid redundant computation. In Python, commonly implemente…
Memories from early childhood
— Research suggests very few genuine memories before age 3; memories between 3–6 are often unreliable.…
Memories that have been repeatedly told
— Every time you narrate a memory to someone else, you are potentially adding narrative elaboration. W…
Memories that have changed over time
— think of an event you remember differently now than you did ten years ago. What changed? Did you gai…
Memory & Cognition
— Publishes research on human memory, learning, and cognitive processes. More accessible than some alt…
Memory (EDM Pool and Buffer Pools):
— **EDMPOOL**: The Environmental Descriptor Manager pool size in kilobytes. This caches database descr…
Memory and Silence
— What do your interviewees choose to talk about, and what do they avoid? The silences in an oral hist…
memory consolidation
— the biological process of stabilizing new memories. Now you can understand the mechanism. During slo…
Memory evasion:
— Explain sleep obfuscation techniques - Describe memory encryption during beacon sleep - Discuss heap…
Memory is constructive
— not a recording but a reconstruction, shaped by attention, emotion, expectation, and post-event expe…
Memory Issues:
— Use `chunksize` parameter in pd.read_csv() - Filter data early in pipeline - Use appropriate dtypes
Mental agility
— the ability to think about problems in new ways, see connections across domains, and hold multiple p…
mental contrasting
— simultaneously imagining the desired outcome and the obstacles in the way — produces significantly b…
Mental model
— A cognitive representation of how something works, used to reason about it and make predictions. Str…
mental set
— the initial, wrong framing of the problem that has been preventing the solution. The solution was av…
Mentalizing
— The capacity to understand behavior (one's own and others') in terms of underlying mental states (th…
mentally highlighted
— the mind is primed to recognize it when it occurs. And when the situation is recognized, the associa…
Mentoring:
— Mentor junior professionals in your organization - Participate in mentoring programs (SANS Mentor, W…
MEP quality:
— Plumbing supply lines in copper or cross-linked polyethylene (PEX) with proper support intervals, no…
MEP systems
— an abbreviation used by architects, engineers, and contractors that stands for **Mechanical, Electri…
Merchandise
— Physical products bearing a creator's brand — apparel, accessories, prints, home goods — sold to fan…
Merchandise (print-on-demand):
— Typical creator margin: $8–$15 per item after costs - Conversion rate: 0.1–1.0% of active audience -…
Mere exposure effect
— The tendency to develop more positive attitudes toward stimuli through repeated exposure without any…
Mere ownership effect
— The increase in perceived value of an object (or relationship) that results from investment and owne…
Merge
— Read two sorted files, produce one sorted output.
Merge Conflict
— A situation in **Git** where changes in different branches affect the same lines of code and cannot …
MERGE INTO
— the target table that will be modified. 2. **USING** -- the source dataset. This can be a table, a v…
Merge passes calculation:
— Merge order = 6 (number of SORTWK files that can be merged simultaneously) - After pass 1: 40 runs m…
Merge scan join is not inherently bad
— it's optimal when both tables are large and no useful index exists. But when you can restructure the…
MERGE statement
— A COBOL statement that combines two or more sorted files into a single sorted output file.
merge-compare pattern
— the same pattern used in sequential file matching throughout the COBOL world. Both sources are sorte…
Meridian Main
— their existing primary channel 2. **Meridian Analyst** — deep-dive tactical content for serious comp…
Meritocracy
— The belief or system in which rewards (wealth, status, opportunity) are distributed based on individ…
Mermaid
— mermaid.js.org A text-based diagramming language supported by GitHub, Notion, GitLab, and other plat…
Mersenne's Laws
— the relationships between a vibrating string's length, tension, and mass per unit length and its fun…
Mesha Maren
— the list of contemporary Appalachian writers grows longer every year, and the range of voices and pe…
Message
— [ ] The chart answers a specific question. - [ ] The title states what the chart shows (and ideally,…
Message:
— [ ] I have identified my key insight (not just findings) - [ ] I lead with the conclusion, not the m…
MESSAGES
— File for export messages and row counts.
Meta AI
— https://ai.facebook.com/ - Video understanding research
Meta-analyses
— studies that combine the results of multiple individual studies to estimate the true size of an effe…
Meta-analysis
— A statistical method for combining results across multiple independent studies to produce more relia…
meta-conversation
— a conversation *about* the pattern itself, held outside of the pattern's activation.
META-INF/
— Signature information used to verify the APK's integrity and authenticity.
Meta-pattern
— A pattern about patterns; a higher-order regularity governing how cross-domain patterns relate to ea…
Meta-Prompting
— A **prompting** technique where you ask the AI to generate or improve prompts, rather than directly …
Meta-Question:
— [ ] If this message is wrong or deliberately misleading, what would I expect to see differently? Am …
metacharacters
— characters with special meaning that let you describe *classes* of strings rather than one specific …
metacognition
— the ability to reason about the boundaries of their own knowledge.
Metacognition and Learning
— The only journal dedicated specifically to metacognition research. Published since 2006. Covers meta…
Metacognitive delegation
— outsourcing the monitoring and regulation of your own learning to an AI — feels efficient. But it br…
Metacognitive experiences
— the feelings, intuitions, and sensations that arise during cognitive activity. That flash of "Wait, …
Metacognitive knowledge
— what you know about cognition in general and about your own cognition in particular. This includes: …
metacognitive monitoring
— he accurately assessed what he knew (glycolysis basics) and what he didn't (electron transport chain…
Metacognitive strengths:
— What I'm good at monitoring: _______________ - Where I tend to be well-calibrated: _______________
metacognitive toolkit
— a set of practices for examining one's own information processing as it happens. The question is not…
Metacognitive vulnerabilities:
— Where I'm prone to illusions of competence: _______________ - Where I tend to be poorly calibrated (…
metacomprehension
— your ability to judge how well you understand what you have read.
Metaculus
— https://www.metaculus.com/ - While not a trading market, Metaculus provides well-calibrated probabil…
Metaculus API
— [metaculus.com/api](https://www.metaculus.com/api/). API documentation for Metaculus, a forecasting …
Metaculus API:
— Question detail includes community prediction history - Prediction values at various time points - L…
metadata
— data about data. The content of your text message is data. The metadata is everything else: who you …
Metadata management
— including data catalogs and data lineage — is the infrastructure that makes governance operationally…
metaphor awareness
— the ability to see the frame as a frame and to recognize its constraints.
Metasploit 2.x (2004)
— Gained significant traction. The modular architecture attracted contributors who began adding new ex…
Metasploit 3.0 (2007)
— A complete rewrite in Ruby. Moore chose Ruby for its metaprogramming capabilities, object-oriented d…
Metasploitable 2
— Intentionally vulnerable Ubuntu Linux VM - **Metasploitable 3** — Windows and Ubuntu VMs with modern…
metastability
— a state that is locally stable (the system will stay there if undisturbed) but globally unstable (a …
Metcalfe's Law
— The value of a network is proportional to the square of the number of connected users (n²). Applied …
method chaining
— stringing multiple operations together in a single expression, where each operation feeds its result…
METHOD P
— Positional method, mapping file columns by position (1st column to 1st listed column, etc.). METHOD …
Method Resolution Order (MRO)
— a specific algorithm (called C3 linearization) that determines the order in which Python searches fo…
METHOD-ID
— A COBOL 2002 paragraph in the IDENTIFICATION DIVISION that defines a method within an object-oriente…
Methodologies:
— PTES provides an end-to-end engagement lifecycle with seven defined phases - OSSTMM offers quantitat…
Methodology and causal claims:
— What method was used, and is it appropriate for the claim being made? A correlation study cannot est…
Methodology transparency (weight: 25% of grade):
— Met: Pollster discloses specific method (not just "telephone" but "live caller using RDD with cell p…
methods
— functions attached to the string that transform or inspect it. Here are the ones you'll use most oft…
Methods for generating synthetic data:
— **Statistical modeling.** Fit probability distributions to the real data and sample from those distr…
Methods:
— Surveys with proper scoring rule incentives - Delphi-style iterative forecasting with feedback - Exp…
Metis
— Practical, local, experience-based knowledge that cannot be easily codified or communicated in forma…
Metrica Sports
— Type: Tracking data platform - Set Piece Features: Movement pattern analysis
Metrica Sports Sample Data
— Access: GitHub - Type: Tracking data samples - Defensive Use: Positioning and shape analysis
Metrics
— Numerical measurements over time (request rate, error rate, latency, CPU usage) 2. **Logs** — Timest…
Metrics from workshop screening:
— Average enjoyment rating: 8.2/10 - "Would you share this?" — 78% yes - Emotional word association: "…
Metrics to Calculate:
— Free kick attempts - Goals scored - xG from free kicks - Goals above expected
Metrics to use:
— EPA per target (rank high, volume rank low = undervalued) - Catch rate over expected - QB-adjusted E…
Metrics tools
— Calculate cyclomatic complexity, code duplication, test coverage (simulated) 2. **Trend tools** — Tr…
Metrics:
— Total number of active markets - Number of distinct categories/topics - Rate of new market creation …
MFCC (Mel-Frequency Cepstral Coefficient)
— A compact representation of the spectral envelope of a sound obtained by computing the cepstrum of a…
Mia Chen
— First-year college student, straight-A in high school, now struggling in college biology and calculu…
miasma theory
— held that disease spread through "bad air" from decaying organic matter. Snow was skeptical and prop…
Michael Caley's Work
— xG and xA methodology development - Influential early analysis - Historical xG model documentation
Michael Lopez's Statistical Research
— NFL competition committee work - Special teams research - Rule change analysis
Micro Focus (OpenText) Enterprise Analyzer:
— Provides visual impact analysis diagrams - Supports "what-if" analysis — change a field and see the …
Micro Focus (OpenText) Visual COBOL
— https://www.microfocus.com/products/visual-cobol/ — Modern COBOL development environment supporting …
Micro Focus COBOL Coding Standards Guide
— Available from OpenText (formerly Micro Focus). Provides coding standards for Micro Focus environmen…
Micro Focus Enterprise Analyzer
— Analyzes COBOL source and copybook dependencies, producing impact analysis reports for copybook chan…
Micro Focus Enterprise Server: Web Service Support
— Deploying COBOL programs as SOAP and REST services.
Micro Focus Visual COBOL Documentation
— The most complete OO COBOL implementation. Micro Focus's documentation includes tutorials and exampl…
micro-hospital
— a facility with a small number of inpatient beds (typically 8-15), an emergency room, and basic diag…
Micro-Influencer
— A creator with a relatively small but highly engaged audience, typically defined as 10,000–100,000 f…
Microaggression
— Subtle, often unconscious communications that express prejudice toward members of marginalized group…
Microaggressions
— Sue: everyday, often subtle communications conveying negative messages about marginalized group memb…
Microexpression
— A brief, involuntary facial expression lasting between 1/25 and 1/5 of a second that reveals an emot…
Microexpressions
— very brief (1/25 to 1/5 of a second) facial expressions that supposedly leak genuine emotion before …
microframework
— not because it is limited, but because it starts small and lets you add only what you need. A minima…
Microservice
— A small, independently deployable service that performs a single business function. In COBOL moderni…
Microservices
— An architectural style where applications are composed of small, independently deployable services t…
Microsoft Azure
— **Virtual Machines**: Full VM control - **Azure Container Apps**: Managed container hosting - **Azur…
Microsoft Copilot in Excel
— microsoft.com/en-us/microsoft-365/copilot Available with Microsoft 365 Copilot license. Integrated i…
Microtargeting
— The use of individual-level data to identify specific voters who are likely to respond favorably to …
microtiming
— small, systematic deviations from perfectly metronomic beat placement. When a drummer places the sna…
Mid-level (3-7 years experience):
— Financial services: $95,000 - $130,000 - Government: $75,000 - $100,000 - Insurance: $85,000 - $115,…
mid-video valley
— the 40-60% point where casual viewers decide to leave.
Midday (9:00 a.m. - 3:00 p.m.)
— Learning management system (LMS) records login time, pages viewed, time on each page, quiz attempts …
Middle — Re-establish understanding:
— Reflect back what you hear (without defending or correcting) - Acknowledge without collapsing ("I ca…
Middle:
— What do you need to hear from them? - What do you need to say about your own experience? - What apol…
Middleware
— Software that sits between the raw request and your application logic, processing requests and respo…
Midterm review.
— **Lecture 2:** **MIDTERM EXAMINATION** (Chapters 1--18 concepts through Chapter 13 code; Chapters 14…
Migration
— The process of moving a COBOL application from one platform, compiler, or runtime to another (e.g., …
Migration costs (one-time):
— Micro Focus conversion and testing: $2.4M - Data migration from DB2 to PostgreSQL: $800K - Batch sch…
Milieu Control
— Present at maximum intensity. Physical isolation (Guyana jungle), social isolation (all relationship…
MIME types you will use most:
— `MIMEMultipart("alternative")` — for HTML + plain text (same content, different formats) - `MIMEMult…
Mind reading
— Assuming knowledge of another person's thoughts or feelings without sufficient evidence.
Mindfulness
— When something is painful, I can hold the pain in balanced awareness — neither ignoring it nor being…
Mindguards
— group members who protect the group from disturbing information
Mindset shifts:
— Detach identity from metrics. Your worth is not your view count. - Remember why you started. Was it …
Mindshift: Break Through Obstacles to Learning
— Coursera (Barbara Oakley) The sequel to Learning How to Learn, focused on career change, lifelong le…
mine superintendent's house
— the largest and finest dwelling in the camp, typically a two-story frame house with a porch, a yard,…
miners' families
— the wives, mothers, daughters, and children of the striking miners. The women of Camp Solidarity ran…
minimal clinically important difference (MCID)
— the threshold below which a change is not practically meaningful. Readers of research should apply t…
Minimal Group Paradigm
— Tajfel's experimental demonstration that trivial, arbitrary categorization is sufficient to produce …
Minimal risk
— AI systems that pose no significant risks and face no specific requirements beyond existing law.
Minimisation
— transferring only data strictly necessary for the purpose — reduced the attack surface.
Minimization, data
— See *data minimization*.
Minimize context switching
— set up tools so switching is fast and natural. 2. **Use each tool for its strengths** -- do not forc…
Minimize direct dependencies
— Audit all 47 dependencies. Remove unused packages, replace large packages used for small features wi…
Minimize lock duration
— acquire late, commit early, don't hold locks during non-DB2 work. - **Use the minimum necessary isol…
Minimize the bottom:
— Low sharing friction (easy to forward, works without context) - Minimal context required (self-conta…
Minimize the number of I/O operations
— SQL calls, VSAM reads, IMS DL/I calls 2. **Avoid table scans** — ensure WHERE clauses use indexed co…
Minimum
— the smallest value 2. **Q1** — the 25th percentile 3. **Median** — the 50th percentile 4. **Q3** — t…
Minimum effective dose for psychological benefits:
— Aerobic: 150 minutes/week moderate intensity OR 75 minutes/week vigorous - Strength: 2 sessions/week…
Minimum groups required:
— Teller - Supervisor - Payment processor - Loan officer - CICS operator - CICS administrator - Audito…
Minimum recommended versions:
— pandas 1.5.0+ - NumPy 1.23.0+
Minimum Requirements
— Any modern computer (Windows, Mac, Linux) - 8 GB RAM - 10 GB free disk space - Internet connection f…
Minimum sample sizes:
— Single game: Game Score appropriate - Weekly/monthly: 200+ minutes for trends - Season analysis: 500…
Minimum standards:
— Northern states: SEER2 13.4 (equivalent to old SEER ~14) - Southern states (DOE's Southwest/Southeas…
Minimum thresholds:
— Per-36 stats: 500+ minutes - Per-100 possession stats: 500+ possessions - Pace calculations: Full se…
Minimum viable performance:
— ROC AUC > 0.80 on held-out test set (versus random baseline of 0.50) - Recall > 0.70 for the top 20%…
Minimum viable posting schedule:
— YouTube: 2 videos per week - TikTok/Reels: 3–5 per week
Minimum Viable Product (MVP)
— The simplest version of a product that delivers enough value to attract early customers and begin ge…
Minimum viable test:
— How could you test whether this vertical has audience demand before committing fully? - What three p…
Minimum viable topology for 99.99% availability:
— 2 LPARs (minimum for hardware failure survival) - 2+ TORs (one per LPAR minimum, more if channel sep…
minimum-uncertainty state
— it saturates the lower bound. No wave function can have a smaller uncertainty product.
MinMaxScaler
— A preprocessing technique that scales features to a fixed range, typically [0, 1]. Essential for fai…
Minor third
— an interval spanning 3 semitones; the characteristic difference between major and minor scales/chord…
Minority influence
— The ability of a numerical minority to shift majority opinion through behavioral style (consistency,…
minors' trust fund
— and released when the individual turned eighteen, resulting in a lump-sum payment that could exceed …
minstrel show
— a form of theatrical entertainment in which white performers in blackface makeup caricatured African…
Minutes 0–10: Plan
— Select one idea from your Evergreen Core list - Write down (not memorize — write down) your hook lin…
Minutes 10–25: Film
— Test your framing and audio by recording 5 seconds and playing it back with headphones - Film at lea…
Minutes 25–50: Edit
— Import to CapCut - Trim dead space at the beginning and end of each clip - Cut between takes to use …
Minutes 50–60: Review and export
— Watch the full video once with headphones - Ask: does the hook do its job? Is the content clear? Doe…
Mira's proposal included:
— A five-member board with two external members (a bioethicist and a patient advocate) - Review author…
Miranda Fricker's epistemic injustice framework
— testimonial injustice (credibility deficits based on identity) and hermeneutical injustice (conceptu…
Mirror content works through:
— **Validation:** "I'm not the only one who experiences this" reduces isolation - **Identity signaling…
Mirror neuron activation
— The viewer physically feels physical comedy through mirror neuron firing (Ch. 2), creating stronger …
Mirror neurons
— neural systems that activate both when we perform an action and when we observe another performing t…
Mirth coercion
— The social pressure to perform laughter in response to humor produced by higher-status or attractive…
Misattribution of arousal
— The tendency to attribute physiological arousal from one source to another; demonstrated in Dutton a…
Misconceptions to surface:
— "Mainframes are just old servers." Clarify the architectural differences (I/O channels, SYSPLEXes, s…
Misinformation
— False or inaccurate information shared without deliberate intent to deceive.
Misinformation (shared without intent to deceive):
— Well-meaning individuals sharing preliminary studies that were later retracted or contradicted - Par…
Misinformation exploitation:
— Relative risk inflation (50% relative risk reduction from a tiny base = tiny absolute effect) - Cher…
Misleading title
— "soared" is editorializing; the increase from Q3 to Q4 is about 12%. (3) **No context** — is this gr…
Misleading Visualization Patterns to Avoid
— Truncated y-axes on bar charts (makes small differences look large) - Cherry-picked time windows (sh…
Misled by sarcasm
— "Oh, great, another delay. Wonderful." will score as positive.
Mismatch hypothesis
— the argument that evolved psychological mechanisms produce maladaptive behavior when the current env…
Missing base case
— leads to `RecursionError` 2. **Base case that's never reached** -- recursive step doesn't make the p…
missing data
— the systematic absence of data about marginalized populations, which renders those populations invis…
Missing Data Patterns:
— Combine data is missing for approximately 30% of draft picks (players who opt out or are not invited…
Missing entries that should be added:
— `__pycache__/` — compiled bytecode directories - `*.py[cod]` — compiled Python files (`.pyc`, `.pyo`…
Missing essential elements:
— No axis labels (`plt.xlabel()`, `plt.ylabel()`) - No title (`plt.title()`) - No indication of what e…
Missing indexes
— tables with high read counts but only a primary key index. 2. **Redundant indexes** — indexes whose …
Missing or incorrect LEIs
— Particularly for natural person identification (concatenated code format errors) and for legal entit…
Missing values
— cells that should contain data but don't. The vaccination count is blank. The patient's age is recor…
Mississippian period
— named for the Mississippi River Valley, where its most spectacular expressions emerged, but extendin…
MIT 8.370x/8.371x (Quantum Information Science)
— edX. Peter Shor and Isaac Chuang. - **Qiskit Textbook** — open-source, interactive textbook for quan…
MIT OCW 8.422: Atomic and Optical Physics II
— Wolfgang Ketterle's graduate course. Lecture notes and problem sets covering quantum optics at a rig…
MIT OpenCourseWare 8.04
— Allan Adams' lectures on quantum mechanics. Outstanding video lectures covering the material in this…
MIT OpenCourseWare 8.04/8.05
— Lecture notes and problem sets on the QHO at both undergraduate and graduate levels. Freely availabl…
MIT OpenCourseWare, 8.04/8.05 Quantum Mechanics
— Lecture notes and problem sets covering this material from a world-class physics department. Free at…
MIT OpenCourseWare: Entrepreneurship
— ocw.mit.edu MIT's free online course materials include entrepreneurship curricula from actual MIT co…
MIT Sloan Conference Recordings
— Research presentations - Industry insights
MIT Sloan Sports Analytics
— Annual conference papers - Player evaluation research
MIT Sloan Sports Analytics Conference
— Premier sports analytics conference - Research paper competitions - https://www.sloansportsconferenc…
MIT Sloan Sports Analytics Conference (YouTube)
— Recorded presentations from the leading sports analytics conference. Search for soccer/football talk…
MIT Sloan Sports Analytics Conference Proceedings
— Annual collection of cutting-edge sports analytics papers. Archive available at sloansportsconferenc…
MIT Sports Analytics
— Sloan Conference host - Research publications
Mitigation measures:
— Real-time integrity monitoring of micro-betting patterns by operators and independent integrity bodi…
Mitigation Options
— **Flushing:** Run the cold water tap for 30 seconds to 2 minutes (longer for lead service lines) bef…
Mitigation reduces radon 80–99%.
— **EPA radon zone map** shows county-level risk, but testing is required regardless of zone. - **Post…
Mitigation strategies:
— Implement retry logic with exponential backoff (see the Python section below) - Use request queuing …
Mitigation System Costs:
— Professional installation (typical single-family): $800–$2,500 - System components (DIY): $200–$500 …
Mitigation:
— Retrain models regularly on recent data. - Use sliding window training instead of expanding window. …
Mitigations:
— Request that brands pay via ACH bank transfer or wire instead of PayPal whenever possible - If using…
mixed economy
— part subsistence, part barter, part cash, part global trade. A family in a western North Carolina ho…
mixed mesophytic forest
— a community dominated by an extraordinary variety of hardwood species. The term "mesophytic" means "…
mixed methods
— combining quantitative measurement with qualitative understanding, numbers with narratives, dashboar…
Mixed state
— Ch 23.2 A statistical mixture of quantum states, described by a density matrix with $\text{Tr}(\hat{…
Mixed Voice
— Not a separate register mode, but a coordination between chest and head mechanism - Vocalis (chest) …
mixins
— small, focused classes that add a single capability (like `Flyable` and `Swimmable` above). Keep the…
ML Excels When:
— High-dimensional data with unknown interactions - Non-linear relationships exist - Large datasets av…
ML Platform team
— a dedicated engineering team whose mission was to build and maintain shared ML infrastructure that a…
ML Struggles When:
— Limited data (~270 games/season) - High noise (σ ≈ 13.5 points) - Concept drift (team changes) - Ove…
MLC vs. WLC Pricing
— Monthly License Charge (MLC) software pricing is based on the rolling four-hour average of the highe…
MLflow
— https://mlflow.org - Experiment tracking - Model management - Deployment tools
MLflow documentation
— `mlflow.org/docs/latest` — The official documentation for experiment tracking and model management. …
MMDetection
— https://github.com/open-mmlab/mmdetection - Comprehensive detection toolbox
MMLU (Massive Multitask Language Understanding)
— URL: https://github.com/hendrycks/test - Description: 57 multiple-choice tasks spanning STEM, humani…
MMPose
— https://github.com/open-mmlab/mmpose - Pose estimation toolbox
MNAR
— the very conditions you want to measure are the ones most likely to be missing.
Mobile and mode considerations:
— [ ] Has the instrument been tested on mobile devices? - [ ] Have grid questions been replaced with s…
Mobile Application
— **MedSecure Patient App:** Available on iOS and Android. Communicates with `api.medsecure.example.co…
Mobile Applications:
— iOS and Android apps for merchants (inventory management, order notifications, sales analytics). - M…
Mobile banking API
— Real-time account inquiry, transfers, and payment from mobile apps 2. **Partner API** — Third-party …
Mobile banking app
— connects via CTG, serves 50,000 end users 2. **Online banking portal** — connects via CICS web servi…
MobSF (Mobile Security Framework)
— An all-in-one mobile security testing framework that performs automated static and dynamic analysis …
Mock
— A simulated object that mimics the behavior of a real object in controlled ways. Used in testing to …
MOD
— Modulus (remainder after division):
modal ambiguity
— music that's neither clearly happy nor clearly sad, creating a neutral-positive mood. This is typica…
Modal music
— Music organized around a mode (a scale with a characteristic interval pattern and melodic orientatio…
mode
— what you intend to do with the file:
Mode (acoustic)
— A pattern of vibration of an acoustic system (room, instrument body, air column) at a specific reson…
Mode (musical)
— One of the seven diatonic rotations (Ionian, Dorian, Phrygian, Lydian, Mixolydian, Aeolian, Locrian)…
Mode 1
— the whole-tone scale (C–D–E–F#–G#–A#) — is the most extreme because it has only **two** distinct tra…
Mode effect
— The difference in survey results produced by different methods of data collection (telephone vs. onl…
mode of vibration
— a different standing wave pattern with a different number of nodes and antinodes.
Mode:
— Most frequent value - Useful for categorical data
Model
— A simplified representation of reality that captures some features while ignoring others; all models…
Model A: "Nobody has the disease"
— Predicts "healthy" for all 10,000 people - Gets 9,990 right (the truly healthy ones) and 10 wrong (t…
Model A: Ridge/Lasso Regression (Chapter 9)
— Target: home_margin (continuous) for spread prediction - Regularization selected via cross-validatio…
Model accuracy
— A measure of how well a predictive model's outputs match actual outcomes. In political analytics, mo…
Model adjustment:
— Starter value: +6.5 points above replacement - Backup value: -1.5 points vs replacement - Differenti…
Model B
— recall of 80% vs. 50%. It catches 80% of customers who will churn. 2. **Model A** — precision of 60%…
Model B: An actual screening test
— Correctly identifies 8 of the 10 sick people (misses 2) - Correctly identifies 9,800 of the 9,990 he…
Model B: XGBoost Gradient Boosting (Chapter 27)
— Target: home_margin (regression) and home_win (classification) - Hyperparameter tuning via Optuna (C…
Model C: Neural Network (Chapter 29)
— Architecture: feed-forward with 2--3 hidden layers, dropout regularization - Target: home_margin (re…
Model comparison with cross-validation
— not choosing a model based on a single run
Model Considerations
— [ ] Exclude shooter identity for pure difficulty model - [ ] Include shooter for prediction model - …
Model D (bonus): Ensemble/Stacking
— Combine predictions from Models A, B, and C using a meta-learner - Stacking follows Chapter 27, Sect…
Model Development
— [ ] Development documentation complete before model goes into production - [ ] Training/test/validat…
model drift
— a degradation in model performance over time.
Model Evaluation and Selection
— Confusion matrix · Precision, recall, F1 · ROC/AUC · Cost-sensitive evaluation · Cross-validation · …
Model Evaluation:
— **Accuracy:** Proportion of correct predictions - **Precision:** $\frac{TP}{TP + FP}$ - **Recall (Se…
Model extensions
— O-RAPM and D-RAPM: separate offensive and defensive models - Multi-year RAPM: pool seasons for large…
Model Governance:
— Population Stability Index (PSI): >0.25 requires recalibration assessment - Validation: all models v…
Model Health Panel:
— Current Brier score (7-day rolling) - Calibration plot (predicted vs. actual probability) - Feature …
Model inputs:
— Shot distance - Defender distance - Shot type (catch-and-shoot, pull-up, etc.) - Shot clock - Touch …
Model Inventory
— [ ] All models formally registered with unique ID, owner, purpose, materiality tier - [ ] Inventory …
Model Limitations Revealed:
— Couldn't capture fatigue, pressure, or "clutch gene" - Momentum effects possibly underweighted - Ind…
model of community-wide resistance
— in which the strike was not just a workplace action but a community action, involving men and women,…
Model Performance Metrics:
— Prediction accuracy (when ground truth is available) - Prediction confidence distributions - Predict…
Model registry records
— a catalog of all production models with metadata including purpose, owner, risk tier, data sources, …
Model response elements:
— Metadata is data about communications: who called whom, when, for how long, from where — rather than…
Model risk management
— governed in the US by SR 11-7 — applies to all models including the ML-based compliance systems at t…
Model specifications:
— Elo + efficiency differentials + situational factors - Trained on 3 seasons, tested on 2
Model Training
— [ ] Choose algorithm (logistic regression recommended for interpretability) - [ ] Use time-series cr…
Model training leakage
— training the prediction model on all 5 seasons of data, then "backtesting" on games from those same …
model transferability
— adapting a modeling framework developed for one sport to another sport with similar structure.
Model Use
— [ ] Override policy documented: when overrides are permitted, who approves, and how they are recorde…
Model Validation
— Prospective testing before deployment - Regular recalibration as data accumulates - External validat…
Model Validation (Independence)
— [ ] Validator(s) independent of development team - [ ] Validation scope covers conceptual soundness,…
Modeling:
— Prophet models at the category-region level (approximately 200 primary forecast series) - Holt-Winte…
Models are tools, not oracles
— turnout models improve resource allocation but require continuous validation, appropriate uncertaint…
Models Captured Momentum Shifts:
— Q3 swing from 78% GSW to 50% accurately reflected changing dynamics - Models responded appropriately…
Moderate Correlation:
— Possession and points (r ≈ 0.4): Possession helps, but is far from decisive - Passing accuracy and p…
Moderate legal risk:
— Using AI for commercial content generation where copyright ownership matters - Generating AI-assiste…
Moderate moral hazard risk:
— Corporate earnings or executive decisions (insider trading concerns more than causation) - Regulator…
Moderate Positive Correlations:
— Assists and turnovers (r ≈ 0.55): Ball-handling role creates both - Win shares and salary (r ≈ 0.45)…
Moderate reliability domains:
— Industry-specific knowledge in major industries - Applied technical topics with rich documentation -…
Moderate Risk (monitor closely):
— ACWR 1.3-1.5 - Subjective fatigue 5-7/10 - HRV 70-85% of baseline - 3 games in 4 nights
Moderate ROI (use AI with caution):
— Code comprehension for moderately complex programs (2-3x gain, accuracy varies) - Naming improvement…
moderate schema violation
— content that activates a familiar schema but then deviates from it in one specific, interesting way.…
Moderate-reliability code tasks (Raj's Zone 2):
— Algorithm implementations for common problems - Database query optimization - API integration code f…
Moderately vulnerable:
— Electronic music: Often has sharp synthesized transients. But synthesized sounds may be already band…
Moderation is an act of community care
— not censorship, but active maintenance of the space your community belongs to 2. **The distinction b…
Modern applications woven throughout
— quantum computing, quantum information, quantum sensing, AMO physics, and condensed matter connectio…
Modern Positionless:
— LeBron, Giannis blur categories - Can accumulate both OWS and DWS
Modern Soccer Coach Podcast
— Focus: Tactical and technical coaching - Set Piece Content: Training session design
Modernization
— Updating legacy COBOL systems to meet current business and technical requirements. Modernization str…
Modernization (Part VII):
— [ ] 3-year modernization roadmap - [ ] CI/CD pipeline design - [ ] API strategy - [ ] Skills and tra…
Modernization Demand
— Every major mainframe shop is engaged in some form of modernization. These initiatives require archi…
Modernization Specialist
— Helping organizations migrate from or modernize their COBOL systems. This role requires understandin…
Modernizing Enterprise COBOL Applications
— IBM Redbooks. Covers z/OS Connect, API enablement, and modernization patterns.
Modernizing IBM Mainframe Applications
— IBM Redbooks. Practical guidance on API enablement, containerization (zCX), and hybrid cloud integra…
Modifiable:
— Training load and progression - Sleep and recovery - Strength and conditioning - Movement quality - …
MODIFIED BY
— Specifies format modifiers. COLDEL sets the column delimiter (comma by default for DEL format). Date…
Modified Progressive Project Schedule:
— Week 3: Community selection memo (1 page) - Week 6: Audience analysis submission (Milestone 1) - Wee…
MODIFIES SQL DATA
— The procedure can execute INSERT, UPDATE, DELETE. Options are NO SQL, CONTAINS SQL, READS SQL DATA, …
modular architecture
— multiple traps connected by photonic links or ion shuttling.
modular block structure
— breaking a long-form video into distinct blocks of 3-7 minutes, each functioning as a mini-video wit…
modular network structures
— loosely coupled clusters that each have internal coordination capacity but maintain limited inter-cl…
Modularity
— The degree to which a system's components can be separated and recombined; modular systems are more …
Modulation
— In music theory, the process of transitioning from one key to another within a composition, typicall…
module
— a `.py` file that you import.
Module 2: Understanding AI Bias (60 minutes)
— Sources of bias: training data, feedback loops, proxy variables, label bias (20 min) - Fairness metr…
Modules
— The heart of Metasploit. Everything you use day-to-day is a module:
modules and packages
— splitting a growing program like TaskFlow into separate files that can be imported and reused. Then …
Monacan Indian Nation
— based along the James River in the foothills of the Blue Ridge — has maintained a continuous presenc…
Monday (2–3 hours):
— Script or outline pillar content - Film pillar content
Monday 11:00 UTC
— A major political event occurs (surprise election result). Multiple prediction markets that are corr…
Monetization
— The process of converting an audience or content catalog into revenue. Monetization strategies range…
Monetization Threshold
— The minimum performance criteria a creator must meet to qualify for a platform's monetization progra…
Money laundering stages
— placement, layering, integration — provide the conceptual framework for understanding what monitorin…
Monitor and plan (within one year):
— Schedule septic inspection - Get written quote for iron filter installation (if water quality test c…
Monitor audit log volume
— EXECUTE-level auditing generates enormous volumes. Size your audit infrastructure accordingly.
Monitor continuously
— hit ratios, synchronous reads, sort overflows, package cache hits. Capture baselines. Compare across…
Monitor:
— The possible efflorescence at NW sill plate — photograph monthly. - Whether termite tube is rebuilt …
Monitoring enabled
— on LUW, the `MON_GET_*` table functions require the appropriate monitor switches to be active. Verif…
Monitoring infrastructure:
— Real-time model performance tracking (sensitivity, specificity, alert rates). - Data drift detection…
Monitoring integration:
— OMEGAMON alerts for any transaction exceeding 3x budget - Accounting data captured and archived dail…
Monitoring Performance (by domain):
— False positive rate: target < 20%; >30% requires recalibration - Overdue alerts (>5 days): zero tole…
Monitoring query:
— Write a query that operations staff can run to monitor batch progress across all partitions in real …
monitoring questions:
— "Explain it back to me. Don't look at anything." - "What if the number changed? Can you solve this d…
Monitoring:
— [ ] SMF Type 30 performance baseline for all critical-path jobs - [ ] Performance dashboard reviewed…
Monolith
— An architectural style where an entire application is built as a single, unified codebase and deploy…
Monophony
— Musical texture consisting of a single melodic line without accompaniment or harmonic support. Grego…
monopsony
— a market with a single buyer (in this case, a single seller in a captive market). The company store …
monorepo
— a single, massive repository containing code for hundreds of services. This creates a unique depende…
Monorepo structure
— frontend and backend in the same repository:
Montage
— Eisenstein's theory of film editing in which meaning is produced not by individual shots but by the …
Monte Carlo integration
— estimating integrals by random sampling. The key insight is to rewrite the energy expectation value …
Monte Carlo procedure:
— Drew 50,000 random election-day margins from a normal distribution centered on the integrated estima…
Monte Carlo results (50,000 simulations):
— Garza win probability: 79.4% - Whitfield win probability: 20.6% - Median simulated margin: Garza +4.…
Monte Carlo simulation
— estimating probabilities by running random experiments many times. It's one of the most powerful tec…
Month 1 (Days 1–30):
— Which revenue model do you launch first? Why? - What are the exact setup steps? - What's the realist…
Month 1 after scale-back:
— Views: 12,800 | Completion: 58% | Comments: 68/video
Month 1 metrics:
— Posted 38 videos in 30 days - Gained 1,200 followers - Average views: 2,800 - Best video: 14,000 vie…
Month 1 Targets:
— Dormant connections contacted: 5 - Genuine responses received: (track, do not control) - Community r…
Month 1-2: Breath Support
— What is the physical relationship between subglottal pressure and vocal fold vibration? Why does "br…
Month 1-2: Infrastructure.
— z/OS Connect EE deployed on both production LPARs - API Connect deployed in the FBA's secure cloud e…
Month 1: _______________
— Primary learning goal: - Resource: - Time commitment: ___ hours/week - Deliverable by end of month:
Month 1: First GPT
— [ ] Identify your highest-value GPT use case - [ ] Write and test a system prompt - [ ] Build and de…
Month 1: Skill Building + Portfolio Expansion
— Start an intensive SQL course (e.g., chapters 1-10 of *Practical SQL*). Complete one chapter per day…
Month 2 (Days 31–60):
— What do you add or optimize? - What systems need to be in place? - Revenue expectation?
Month 2 Targets:
— New community entered: 1 - Events outside usual domain: 2 - Cross-domain connections made: 2 - New p…
Month 2: _______________
— Primary learning goal: - Resource: - Time commitment: ___ hours/week - Deliverable by end of month:
Month 2: Active Application + Interview Prep
— Complete SQL course. Take a practice SQL assessment to benchmark skills. - Build a third portfolio p…
Month 2: Refinement
— [ ] Update your Custom Instructions based on month 1 usage patterns - [ ] Refine your GPT based on r…
Month 2–3 (November–December): Business Input.
— Meet with business unit leaders to gather growth projections (account growth, transaction volume, ne…
Month 3 (Days 61–90):
— What's the final configuration of the revenue stack? - How do you evaluate success/failure? - Revenu…
Month 3 after scale-back:
— Views: 19,400 | Completion: 64% | Comments: 112/video | Followers/week: 380
Month 3 metrics:
— Followers: 78,000 (+144%) - Average views: 28,000 (+87%) - Completion rate: 68% (slightly below nich…
Month 3-4: API development.
— Five internal services built on z/OS Connect (the services listed in Tier 1) - Three agency-specific…
Month 3: _______________
— Primary learning goal: - Resource: - Time commitment: ___ hours/week - Deliverable by end of month:
Month 3: Intensify + Refine
— Based on interview feedback, address any consistent skill gaps. - Write a blog post about one of you…
Month 3: Team and Scale
— [ ] Document your three highest-value prompt patterns for sharing - [ ] Review your data privacy set…
Month 4 (January): Review and Approval.
— Present the capacity plan to IT leadership and finance - Obtain budget approval for planned capacity…
Month 4: _______________
— Primary learning goal: - Resource: - Time commitment: ___ hours/week - Deliverable by end of month:
Month 4: Final Push
— Continue applications and interviews. By now you should have had several phone screens and hopefully…
Month 5-6: Testing and certification.
— Integration testing with each agency using sandbox data - Security assessment by the FBA's Informati…
Month 5: _______________
— Primary learning goal: - Resource: - Time commitment: ___ hours/week - Deliverable by end of month:
Month 6: Review and Recalibrate
— Self-assessment: What did I learn? What gaps remain? - Portfolio update: What new projects can I add…
Monthly
— Test all smoke and CO detectors using the test button - Visually inspect the pressure gauge on each …
Monthly (1--2 hours):
— Read one in-depth article or blog post about a technique you have not used. - Try a Kaggle competiti…
Monthly (10–15 minutes):
— Who are the two or three most connected people in my existing network? Am I maintaining those relati…
Monthly (2-4 hours):
— Attend one virtual or in-person event: a webinar, meetup, or conference talk. The MLOps Community, A…
Monthly (approximately 90 minutes):
— A 30-minute exploration session: she tries one new AI capability on a real current project - A 60-mi…
Monthly Goals:
— Month 1: [specific goal + specific resource] - Month 2: [specific goal + specific resource] - Month …
Monthly Practices
— [ ] Analyze time savings by task category - [ ] Calculate your AI batting average by task category -…
Monthly tracking:
— Email list growth rate (net) - Revenue by source breakdown - Email open rate and CTR - MRR and MRR c…
Monthly:
— Domain review (which domain, what specific question): - Practice audit (what is working, what has di…
Months 1-3 (Foundations — Parts 1-2 of this book):
— Primary: TryHackMe "Complete Beginner" and "Jr Penetration Tester" paths - Secondary: PortSwigger We…
Months 4-6 (Core Skills — Parts 3-4):
— Primary: HackTheBox Easy machines, local Active Directory lab - Secondary: PortSwigger Web Security …
Months 7-9 (Advanced — Parts 5-6):
— Primary: HackTheBox Medium machines and Dante Pro Lab - Secondary: HTB Academy modules for specific …
Monty Hall problem
— A famous probability puzzle: given three doors, one hiding a prize, you choose one. The host (who kn…
Mood logs and journal entries
— mental health data. Not covered by HIPAA (MindWell is not a covered entity). No sector-specific fede…
moral contagion
— the tendency for morally loaded emotional language to spread disproportionately rapidly in social ne…
moral elevation
— the warm, expansive emotion discovered by Jonathan Haidt when witnessing acts of moral beauty. Eleva…
Moral evaluation
— Who is responsible? Frames assign virtue and vice. The same event framed as a "terrorist attack" and…
Moral hazard
— A situation in which one party takes risks because another party bears the consequences; a failure m…
Moral luck
— The philosophical problem, raised by Thomas Nagel and Bernard Williams, of how we can hold people mo…
Moral Machine experiment
— an online platform that presented users with variations of the trolley problem applied to autonomous…
moral panic
— A period of widespread social alarm about a perceived threat, typically characterized by media ampli…
moral pluralism
— the view that multiple ethical frameworks each capture genuine moral truths, and that practical ethi…
Moral rights
— non-economic rights protecting creators' personal connection to their work (right of integrity, righ…
Moral sensitivity
— The capacity to notice the ethical dimensions of a situation; often the first capacity that must be …
Moralistic judgments
— statements that imply wrongness or badness in the other person ("You're irresponsible," "That was st…
More examples:
— "I don't want this to turn into a list of everything you've done wrong. I do want to understand what…
More stable
— API schemas change infrequently; HTML changes constantly - **Explicitly permitted** — no ToS concern…
Morewedge, C. K., & Todorov, A. (Eds.). (2018).
— See Foundational Academic Papers section.
Morning (6:00 a.m. - 9:00 a.m.)
— Sleep tracker records sleep stages, duration, heart rate, blood oxygen levels - Phone alarm logs wak…
Mortality salience
— the psychological state of heightened awareness of one's own death; a trigger for meaning-seeking an…
Mosaic theory
— The principle that individually innocuous pieces of information, when assembled together, can consti…
Moseley, "The COBOL Programmer's Reference"
— Extensive coverage of copybook management patterns including versioning strategies and library organ…
Most common failure points:
— Door bottom sweep: wears out from friction, especially on textured flooring - Threshold seal: vinyl …
Most damaging long-term: Over-moderation
— though this is debatable.
Most likely threat actors:
— Opportunistic attackers scanning for common web application vulnerabilities - Financial criminals ta…
Most traders are overconfident
— their estimates are more extreme than their accuracy warrants, and their confidence ratings do not p…
Most valuable knowledge trapped in one field
— Chapters referenced: (none yet)
Most vulnerable (highest artifact severity):
— Classical and orchestral music: Rich high-frequency acoustic content, wide dynamic range, sharp tran…
Mother Jones
— the legendary labor organizer who roused miners across the coalfields (Chapter 17) — was the most fa…
Mother Jones (Mary Harris Jones)
— Legendary labor organizer active in the Appalachian coalfields in the late nineteenth and early twen…
Motivated reasoning
— The tendency to evaluate arguments and evidence in ways that support a desired conclusion; distinct …
Motivational threat
— The recognition that one's belief is vulnerable to attack; the engine of the inoculation effect, whi…
Motor intention
— what movements the user intends to make (the primary use case) - **Cognitive state** — attention lev…
mountain garden
— the intensive, carefully managed plot that produced the vegetables, herbs, and small fruits that com…
Mountain Goat Software Blog
— Practical agile advice from Mike Cohn.
mountain Republican tradition
— rooted in Civil War Unionism, anti-slavery sentiment, and the areas that had broken from the Confede…
Mountain slavery
— The institution of slavery as it operated in Appalachia, characterized by smaller slaveholdings, div…
Mountain Valley Pipeline (MVP)
— a 303-mile pipeline proposed to carry natural gas from northwestern West Virginia through the mounta…
MOVE
— The COBOL statement that transfers data from a source to one or more destinations. MOVE handles data…
MOVE statement
— A COBOL statement that copies data from a source to one or more destinations, applying type conversi…
Move to advanced metrics (Chapters 7-11)
— EPA and success rate - Advanced passing metrics - Defensive analytics
Movement Patterns
— Cuts and off-ball screens - Pick-and-roll coverage - Transition speed
Movements II and VII: The "Abyss" movements
— The second movement, "Vocalise, for the Angel who Announces the End of Time," and the seventh, "Clus…
mplsoccer
— https://github.com/andrewRowlinson/mplsoccer - Soccer pitch visualization library - Many concepts tr…
mplsoccer (Python)
— GitHub: andrewRowlinson/mplsoccer - Use: Pitch visualization for defensive action maps
mplsoccer Documentation
— Python visualization library - Pitch plots and heatmaps - xT grid visualization - Link: mplsoccer.re…
MPP vs. BMP Regions:
— MPP: Online, short-running, processes messages from the queue. - BMP: Batch, long-running, accesses …
MQ adapter
— writes the event to an MQ queue (most common for z/OS integration) - **HTTP adapter** — posts the ev…
MQ Dependencies:
— Queue names: ________________ (should be NONE for balance inquiry)
MQ Triggers
— react to messages arriving on queues (Section 20.2) 2. **CICS Event Processing** — capture business …
MQCONN
— Establishes a connection to the queue manager named in `WS-QM-NAME`. Returns a connection handle (`W…
MQGET/MQPUT
— IBM MQ API calls for receiving and sending messages on message queues. COBOL programs use these call…
MRP (Multilevel Regression and Poststratification)
— A statistical method for estimating opinion in small geographic areas using data from national surve…
MRR (if applicable):
— Current MRR = Monthly subscription price × Number of active subscribers - MRR churn: How many subscr…
MRR (Monthly Recurring Revenue)
— The predictable, repeating revenue a creator earns each month from subscriptions, memberships, or re…
msfconsole
— The primary command-line interface. Feature-rich, with tab completion, command history, and scriptin…
MSHA
— the **Mine Safety and Health Administration** — as the federal agency responsible for enforcing mine…
MSJOIN
— Merge scan join. Both inputs must be sorted on the join column. Look for SORT operators below MSJOIN…
MTK (Migration Toolkit)
— IBM's command-line migration toolkit for moving data and objects from various source databases to DB…
Much faster
— UMAP scales better to large datasets - **Better preservation of global structure** — distances betwe…
Mulesoft: "API-led Connectivity" whitepaper.
— Framework for organizing APIs into system, process, and experience layers. While vendor-specific in …
Multi-Account and Multi-Sport Allocation:
— Bankroll allocation across sportsbooks should consider juice efficiency, limits, restriction risk, a…
Multi-Agent System
— An architecture where multiple AI **agents**, each with specialized roles (architect, coder, tester,…
Multi-Channel Network (MCN)
— A company that manages relationships between creators and YouTube (and other platforms), offering se…
Multi-channel notification
— email, SMS, and mobile app push notifications to members 3. **Provider portal updates** — real-time …
multi-class detection
— distinguishing among several possible signals. How does the signal detection framework extend to cas…
Multi-Game System
— Handle multiple concurrent games with proper isolation and resource management.
multi-index
— an index with two levels (region and year). You can access specific values with:
multi-level control break report
— the kind of report that Report Writer was specifically designed to handle. The data is sorted by reg…
Multi-Merchant Isolation:
— A critical business logic concern: can a customer on one merchant's store access or affect another m…
Multi-mode operations require contingency planning
— no single mode is reliable enough to absorb all operational problems. 2. **Demographic imbalances cr…
multicollinearity
— your predictors are correlated with each other.
MultiIndex DataFrames
— When you group by multiple columns or create pivot tables with multiple value columns, pandas create…
multilevel feedback queues
— the algorithm actually used by most modern operating systems. A process that uses its entire quantum…
Multilevel Regression and Poststratification
— universally abbreviated as MRP, and sometimes called "Mister P" — is a more sophisticated approach t…
Multilevel Regression and Poststratification (MRP)
— A statistical technique that combines individual-level survey data with population-level demographic…
Multiliteracy
— Finnish educational concept: literacy across multiple modalities (written, visual, audio, digital), …
multimedia learning
— how people learn from words and pictures combined.
multimodal AI
— systems that can process and generate across multiple modalities simultaneously. A multimodal system…
multiple attractors
— multiple stable states that different starting conditions lead to. Between attractors are **basins o…
Multiple choice
— tests recall and conceptual understanding - **True/False** — tests common misconceptions - **Short a…
Multiple content lines
— more than one show, series, product, or channel - **Staff** — people whose primary professional iden…
multiple dimensions simultaneously
— something a traditional clustering index cannot do (which is limited to one key). MDC organizes data…
Multiple discovery
— The phenomenon whereby the same invention or discovery is made independently by two or more people a…
multiple inheritance
— a class can inherit from more than one parent:
Multiple Metrics
— Comprehensive profiles beat single numbers
Multiple repair attempts have not landed
— the spiral is continuing despite efforts to interrupt it. This is particularly significant: when rep…
Multiple-perspective consumption
— intentionally exposing oneself to high-quality sources representing different political and cultural…
multiplet
— a set of degenerate states that transform into each other. The dimension of the multiplet is the dim…
Multiplex network
— A network with multiple types of connections between the same nodes; more realistic than simple netw…
Multiplication rule (AND):
— If A and B are independent (occurrence of one doesn't affect the other): P(A and B) = P(A) × P(B) - …
multiplier
— a positive feedback loop in which government spending increases incomes, which increases consumption…
Multiply marginalized
— Occupying multiple non-dominant identity positions simultaneously; the experience of fans for whom m…
Multitasking
— genuinely doing two cognitively demanding things at the same time — is something the human brain ess…
Munger's dictum
— "Show me the incentive and I'll show you the outcome" -- is usually quoted to mean that incentives a…
Municipal surveillance
— the cameras on traffic light standards that may be monitored by police from a control room.
muonic hydrogen
— has energy levels and Bohr radius scaled by the reduced mass:
Music animation machine (Stephen Malinowski)
— Visual representations of Bach fugues and other polyphonic works that make the voice-leading and sym…
Music too loud
— her background lo-fi track was competing with her voice for attention - **Inconsistent volume** — he…
Musical consequences:
— Very rapid passages (e.g., fast scales at the piano) played at high dynamic levels may have softer i…
Musical implications:
— Symphony halls need reverberation times of 1.8–2.2 seconds for orchestral warmth. - Opera houses nee…
Musical phenomena at or near this limit:
— **Rapid ornaments and trills:** A fast trill at 16 notes per second has inter-note intervals of ~62 …
Musical scale
— An ordered set of pitches spanning an octave, providing the pitch material for melody and harmony. S…
Musical works:
— Bach, *The Art of Fugue* (BWV 1080): Referenced in Chs. 14, 18, 20, 39 - Bach, *The Well-Tempered Cl…
MusicCaps
— Description: 5,521 music clips with text descriptions, created by Google for music understanding and…
Must begin in Area A (columns 8-11):
— Division headers (`IDENTIFICATION DIVISION.`) - Section headers (`WORKING-STORAGE SECTION.`) - Parag…
Must begin in Area B (columns 12-72):
— Statements and sentences (`DISPLAY "HELLO"`, `MOVE X TO Y`) - Clauses and entries within a statement…
musturbatory beliefs
— using the term with deliberate provocation. The "must" was the mechanism: converting preference into…
mutable
— you can change them after creation.
mutation
— random changes to DNA during replication. Mutations are perturbations, in the exact sense of simulat…
mutation testing (mutmut)
— Search for "mutmut Python mutation testing" (Tier 2) Mutation testing works by introducing small cha…
mutual aid
— reciprocal assistance among people who knew that they might need the same help tomorrow.
mutual discovery
— topics where neither person has a fully formed answer, where they are thinking alongside each other …
Mutual toleration
— The norm, identified by Levitsky and Ziblatt, of treating political opponents as legitimate rivals r…
MV
— Music video; the primary visual format of K-pop comebacks and a central text for fan community analy…
MVP (Minimum Viable Product)
— The simplest version of a product that delivers core value and can be used to gather feedback. Vibe …
MVS JCL Reference
— IBM Publication SA23-1385 While JCL is covered in your prerequisite knowledge, the reference manual'…
My 90-day review date:
— ## Level 4: Synthesis and Design
My audit schedule:
— Q1 audit date: _______________ - Q2 audit date: _______________ - Q3 audit date: _______________ - Q…
My conflict mode going in (TKI):
— [ ] Competing - [ ] Collaborating - [ ] Compromising - [ ] Avoiding - [ ] Accommodating
My current situation:
— What is the conflict/negotiation about? - What outcome do I want?
Mycorrhizal fungi
— the "wood wide web" -- form networks connecting the roots of different trees. These fungal networks …
mypy documentation
— `mypy.readthedocs.io` — The official documentation for Python's standard type checker. The "Getting …
Mystical Manipulation
— Present throughout the Peoples Temple's history. Jones's staged healings, his claimed mind-reading (…
N
N-gram
— A contiguous sequence of n items from a text; bigrams are 2-word sequences, trigrams are 3-word sequ…
Nadia, Sam & Jordan
— Three composite undergraduate characters: Nadia Hadid (bisexual Lebanese-American woman), Sam Nakamu…
naive Bayes classifier
— to distinguish spam from legitimate email. The idea was simple but powerful.
naive optimism
— the belief that technology will solve its own problems, that market forces will produce ethical outc…
naive practice
— doing the same things the same way, year after year, without improvement.
Name
— The resource or dataset - **Source** — Where to find it (described by platform and path rather than …
Name and description
— What the prompt does and when to use it 2. **The prompt template** — With variable placeholders for …
Name it explicitly when:
— The pattern is persistent and has occurred across multiple conversations - The stakes of not naming …
name mangling
— Python internally renames it to `_BankAccount__balance`. You *can* still access it via `account._Ban…
name tags
— when `age` is reassigned, the old value isn't "changed"; the name `age` is pointed to a new integer …
Named Aggregation
— A pandas 0.25+ syntax where you specify both the output column name and the aggregation function in …
Named aggregations
— the syntax `output_col=("source_col", "function")` — are the cleanest way to use `.agg()`. They prod…
Named Entity Recognition (NER)
— Identifying and classifying specific entities mentioned in text: company names, people's names, loca…
Named recognition
— shoutouts in content, in community announcements, in newsletter editions. Public acknowledgment is a…
NameError
— `pritn` is not a recognized name. It's a typo for `print`. Should be: `print("This should work")`
Naming discipline required
— The `xx99` exit paragraph convention must be strictly followed to prevent accidental inclusion of un…
NaN
— "Not a Number." The sentinel value pandas uses to represent missing data.
Narrative capture
— The cognitive trap of becoming so attached to a story or explanation that one ignores or distorts ev…
Narrative compression
— Transformation content is a compressed micro-arc: beginning (before), implied middle (effort), endin…
narrative continuity
— each appearance builds on previous ones, creating a cumulative story that rewards loyal viewers.
Narrative fallacy
— The tendency to construct post-hoc stories that create an illusion of understanding and inevitabilit…
Narrative fidelity
— Walter Fisher's (1987) concept: the degree to which a story's elements ring true against the audienc…
Narrative identification
— The process by which audience members align their emotional perspective with a character in narrativ…
Narrative identity
— McAdams's framework understanding personal identity as an internalized and evolving life story; incl…
Narrative laundering
— also called the "fringe to mainstream pipeline" — is the process by which narratives that originate …
Narrative Quality
— Does the county history read as a unified, coherent narrative? Is the writing clear, specific, and e…
narrative survivorship
— the construction of compelling causal stories from survivorship-biased evidence. Narrative survivors…
narrative tension
— a question, a contrast, a before-and-after implication, or a moment of emotion that makes the viewer…
Narrative transportation
— Green and Brock's (2000) model: the experience of being absorbed in a story such that counter-arguin…
narrow-bandwidth formant
— A single selected harmonic of the drone becomes perceptually audible as a distinct melodic pitch - T…
Nash equilibrium
— a state from which neither player can improve their position by changing their strategy alone. It is…
Nashville Sound
— developed by producers like **Chet Atkins** and **Owen Bradley** in the late 1950s and early 1960s —…
NAT (Network Address Translation):
— The VM can access the Internet through the host's connection - Other VMs and the host cannot directl…
NAT Network:
— Like NAT, but VMs on the same NAT network can communicate with each other - VMs can access the Inter…
National Association of Social Workers (NASW)
— naswdc.org - Social work practice standards, ethics code, continuing education
National Athletic Trainers' Association (NATA)
— https://www.nata.org/ - Professional resources for athletic training
National Black Business Month Grant Resources
— nationalblackbusinessmonth.com A curated directory of grants available specifically to Black-owned b…
National Defense Education Act
— was as much a public persuasion effort as a policy response. (→ Ch. 20)
National Development Council
— nationaldevelopmentcouncil.org Provides capital and technical assistance to small businesses in low-…
National Disability Institute
— nationaldisabilityinstitute.org Provides financial tools and resources specifically for people with …
National Domestic Violence Hotline
— Call: **1-800-799-7233 (SAFE)** - Text: START to 88788 - thehotline.org
National Weather Service (NWS)
— Free, official forecasts - API available - Historical data accessible - https://www.weather.gov/
Nationalization of Elections
— Down-ballot races (Senate, House, state) increasingly track presidential vote share rather than loca…
Native advertising
— paid content designed to resemble the editorial content of the publication in which it appears — has…
Native analytics tools (free):
— YouTube Studio (comprehensive — covers reach, engagement, audience, revenue) - TikTok Analytics (ava…
Native JSON handling
— No WSBIND files, no assistants. Java code handles JSON serialization/deserialization with standard l…
Native SQL Procedure
— A stored procedure written entirely in SQL Procedural Language (SQL PL), compiled and executed by DB…
Native SQL procedures
— written entirely in SQL PL, compiled by DB2 into a package. No COBOL involved. 2. **External stored …
Natural breaks
— visual or tonal shifts that signal "that section is done; here's a new one" - **Summary micro-moment…
natural experiments
— events that change a country's wealth for reasons unrelated to health — to estimate the causal effec…
Natural fractals
— mountains, coastlines, heartbeats — share the 1/f statistical structure of music, suggesting that th…
natural frequencies
— actual counts of people or events.
Natural gas competition
— the shale gas revolution (hydraulic fracturing/fracking) dramatically increased natural gas supply a…
natural gas infrastructure
— specifically, the massive pipelines proposed to carry fracked gas from the Marcellus and Utica shale…
Natural Language + Vision
— Generating play descriptions from video
Natural Questions (NQ)
— URL: https://ai.google.com/research/NaturalQuestions - Description: Real questions from Google Searc…
naturalistic fallacy
— inferring that what is "natural" (i.e., adaptive) is therefore normal or desirable. Second, its samp…
Naturally occurring uncertainty
— the authentic ambiguity of early connection, where neither person yet knows if the other is interest…
Navajo Nation
— the largest Native American reservation in the United States, spanning parts of Arizona, New Mexico,…
navigational
— you tell IMS exactly how to move through the hierarchy, one segment at a time.
NBA Analytics (Open Source)
— Various GitHub repositories with NBA prediction examples - Search: "NBA prediction model Python"
NBA API (nba.com/stats)
— Accessed via the `nba_api` Python package. Player tracking data, shot charts, lineup combinations, h…
NBA API (nba_api)
— https://github.com/swar/nba_api - Python library for NBA statistics access
NBA examples:
— Charlotte Bobcats -> Charlotte Hornets (2014) - New Jersey Nets -> Brooklyn Nets (2012) - Seattle Su…
NBA Players Stats
— Various datasets on Kaggle - Search: "NBA statistics kaggle"
NBA Stats API
— https://www.nba.com/stats/ - Official NBA statistics
NBA Stats Official
— https://www.nba.com/stats/ - Official NBA statistics including advanced tracking data
NBA Tracking Data
— Available through NBA Stats API (limited) - Second Spectrum provides comprehensive data to teams
NBA.com/stats Advanced
— Player tracking metrics - Shot location data
NBA.com/stats:
— Player tracking statistics section - Matchup data - Hustle statistics - Catch-and-shoot data
nba_api Python Package
— https://github.com/swar/nba_api - Python access to NBA.com data
NBADraft.net
— https://www.nbadraft.net/ - Mock draft history - Prospect profiles and measurements
NCA Financial Intelligence (UK)
— The NCA's financial intelligence team provides engagement and feedback mechanisms for major filing i…
NCAA Statistics
— https://stats.ncaa.org/ - Official NCAA statistical database - Division I, II, and III data - Histor…
Near-term (DIY possible):
— Replace vapor barrier across entire crawlspace floor — this was a DIY project he was confident about…
Near-term (within 12 months, $200–$1,000):
— IGU replacements for fogged windows - Rough opening air sealing (any locations found in Exercise 5-5…
Near-term (within six months):
— Inspect well pump and pressure tank function - Inspect/replace water heater anode rod - Have license…
Near-Term History:
— SQL activity for the last N minutes - Thread history for analysis after a problem resolves
Near-Zero or Negative Correlations:
— Three-point percentage and three-point attempts (r ≈ 0.05): Volume independent of efficiency - Offen…
nearest-neighbor interactions on a 2D grid
— a natural fit for superconducting qubit and trapped-ion architectures.
Need to belong
— Baumeister & Leary's proposed fundamental human motivation to form and maintain positive, lasting in…
Need ~500+ bets for statistical significance
— ## Line Movement Interpretation
Needs
— The deeper human requirements — for safety, belonging, esteem, autonomy, meaning — that underlie int…
Negative autocorrelation (mean reversion):
— Prices tend to reverse direction. - Possible causes: overreaction followed by correction, bid-ask bo…
Negative correlations:
— Home spread and away spread (opposite sides) - Over and under (definitionally) - Individual player t…
Negative feedback loop
— A feedback mechanism that counteracts change, pushing a system back toward equilibrium or a set poin…
Negative partisanship
— The phenomenon in which partisan loyalty is driven primarily by dislike of the opposing party rather…
negative sentiment override
— is the tendency, in deteriorating relationships, to interpret ambiguous behavior negatively. A partn…
negative space
— empty area that the viewer's brain interprets contextually. Negative space in front of a person sugg…
Negative turnover luck
— Fumble recoveries going against them 2. **Close game losses** - Losing one-score games at abnormal r…
Negatives:
— "Not interested in learning new technologies" is a disqualifying statement for most employers. Even …
Negativity bias
— The finding that negative events and information carry disproportionate psychological weight relativ…
negotiate
— typically by writing its dirty pages to the GBP and downgrading its P-lock.
neonatal abstinence syndrome (NAS)
— a condition in which newborns, exposed to opioids in utero, go through withdrawal after birth.
nested categories
— categories that contain subcategories — and a **recursive search** that finds tasks at any depth.
nested conditions
— splitting outcome tokens from one condition into sub-positions contingent on another condition. When…
nested loops
— curiosity gaps of different sizes nested inside each other:
nested OCCURS clauses
— an `OCCURS` within an `OCCURS`.
Nested Program
— A COBOL program defined within the scope of another COBOL program (contained program). Nested progra…
Nested structures
— especially lists of dicts — represent tables of business data and are the foundation of nearly all r…
Net P&L:
— $6.90 - **Return on capital:** -0.07% - **Number of trades:** 4 - **Win rate:** 4/4 = 100% - **Maxim…
Net profit: $12,036.70 - $11,000.00 = $1,036.70
— ROI: $1,036.70 / (240 x $100) = **4.3%**
Net Promoter Score (NPS)
— A measure of audience loyalty based on a single question: "How likely are you to recommend [creator/…
Net Rating (On/Off):
— Net Rating On = ORtg On - DRtg On - Net Rating Off = ORtg Off - DRtg Off
Net result: -\$500 + \$0 =
— \$500** (full loss of original stake; free bet returns nothing).
Net value = $136,000 - $7,200 - $24,000 = $104,800
— At 0.50: TP value = 260 x $400 = $104,000; FP cost = 200 x $15 = $3,000; FN cost = 140 x $400 = $56,…
Network
— Who can reach you with opportunities? Healthy = strong ties plus diverse weak ties, sponsor presence…
Network analysis
— the quantitative mapping and analysis of connections between entities — has been applied extensively…
Network Attacks:
— Internal network scanning via JavaScript - Port scanning behind the firewall - DNS rebinding attacks…
Network audit questions:
— How diverse are your community clusters? (Same field / adjacent fields / very different fields) - Wh…
Network Capture:
— Intercepting firmware update traffic (often unencrypted HTTP) - MITM on the update process to captur…
Network Characteristics:
— Highly distributed (entropy: 0.87) - Multiple playmakers (Curry, Green, Durant) - High assist rate (…
Network Density
— The ratio of actual passing connections to the maximum possible connections, indicating how intercon…
Network Density: 0.327
— Moderate connectivity suggesting selective but reliable passing routes - **13 active connections** a…
Network Density: 0.418
— Higher than France, indicating more varied passing routes - **16 active connections** - More diverse…
Network detection evasion:
— Domain fronting and CDN abuse - Malleable C2 profiles mimicking legitimate services - DNS-over-HTTPS…
Network diversity
— The extent to which a person's network spans different industries, backgrounds, geographies, and soc…
Network effect
— A phenomenon in which a product or service becomes more valuable as more people use it. Network effe…
Network effects
— The phenomenon whereby the value of a product or service increases as the number of users grows; a p…
Network flow data (NetFlow/IPFIX):
— Metadata about network connections (source/destination IP, ports, bytes, duration) - Much smaller th…
Network Infrastructure:
— Corporate network: 10.10.0.0/16 (approximately 3,000 endpoints) - Medical device network: 10.20.0.0/…
Network policies are rarely implemented
— The default Kubernetes networking model allows all pod-to-pod communication. Without explicit networ…
Network Scanning:
— Conduct port scans of external-facing IP ranges (TCP SYN scan of top 1000 ports initially; expand as…
Network Topology Discovered:
— 347 active hosts across 12 subnets - 4 domain controllers (Windows Server 2019) - 23 application ser…
Network:
— Dual FICON channels between all LPARs in each site - Dual ISC (Intersystem Communication) links betw…
Networking
— How computers communicate with each other. You used APIs and HTTP requests in Chapter 21. Networking…
networkx
— Network analysis - Recruiting relationships - Coaching trees
NetworkX Official
— Python library for networks - Comprehensive tutorials - https://networkx.org/
NetzDG
— Germany's Network Enforcement Act (2017) requiring large social media platforms to remove "clearly i…
neural coupling
— the listener's brain activity mirrors the storyteller's. Princeton neuroscientist Uri Hasson demonst…
Neural Network Alternative:
— Can capture complex spatial patterns - Requires more data - Better for sequence modeling
Neural Network:
— Hidden layer sizes, number of layers - Learning rate, weight decay - Dropout rate, batch size - Acti…
Neural Networks
— Can model arbitrarily complex relationships - Require large datasets and careful tuning - May overfi…
Neural Networks Demystified
— The neuron analogy · Layers and weights · Activation functions · Training (gradient descent intuitio…
Neural Networks:
— Captures complex patterns - Requires large data - "Black box" without interpretation tools - Computa…
Neural Radiance Fields
— Mildenhall, B., et al. (2020). "NeRF: Representing Scenes as Neural Radiance Fields for View Synthes…
NeurIPS (Neural Information Processing Systems)
— Major ML venue with vision papers
Neurogenesis
— the birth of new neurons — occurs throughout your life, primarily in the **hippocampus**. Yes, the s…
Neuroimaging (fMRI)
— Functional magnetic resonance imaging; a brain scanning technique that measures blood oxygenation as…
Neuromuscular Recovery:
— Countermovement jump (CMJ) height and related metrics (flight time, rate of force development). - Is…
Neurons and synapses
— the electrochemical communication between nerve cells that underlies all thought, feeling, and actio…
Neuroplasticity
— The brain's capacity to change in structure and function in response to experience; the biological b…
Neuroticism
— One of the Big Five traits, characterized by emotional instability, negative affect, and anxiety; on…
Never cap or plug the discharge port
— Test annually: lift lever briefly, water should discharge, flow should stop cleanly when released - …
Never commit:
— `.env` files (API keys, secrets) - Data files (`.csv`, `.parquet`, `.db`) — too large and potentiall…
Never has to generate all his own original ideas
— the internet produces absurd "life hacks" continuously; his content is theoretically infinite in sup…
Never mount the Docker socket:
— Use dedicated monitoring tools that do not require socket access - If socket access is absolutely ne…
Never put SYNCPOINT in a tight loop
— commit frequency is an architecture decision - **DISP=SHR unless you genuinely need exclusive access…
Never rely on color alone
— add shape, pattern, or labels 2. **Use diverging schemes** for data with meaningful midpoint (EPA at…
Never run AORs or FORs with SEC=NO
— internal regions are where privilege escalation succeeds - **XDFTRAN=YES without a restrictive defau…
Never stare during emotional moments
— when the other person is expressing vulnerability or distress, sustained staring feels evaluative an…
Never use the test set for any decision
— not feature selection, not model selection, not hyperparameter tuning.
NEW
— The initial status. The data set does not exist yet; create it. 2. **CATLG** -- The normal dispositi…
New additions beyond traditional literacy:
— **Synthetic media recognition**: Knowing specific artifacts to look for in AI-generated images (unus…
New approach (one session):
— Time spent: 30 minutes watching 8-10 minutes of footage with pauses and practice - Processing: activ…
New Content or Deepening (10–15 minutes)
— Introduce the next strategy or deepen the current one. - Explain *why* it works, not just *what* to …
New Deal
— the most sweeping program of federal intervention in American life that the country had ever seen. A…
New Employee/Contractor
— "Hi, I'm the new contractor starting in the IT department. I don't have my badge yet — can you let m…
New enforcement:
— **California Privacy Protection Agency (CPPA):** The CPRA created a dedicated enforcement agency — t…
New evidence:
— Among users who watched a recommendation, 40% browsed for 30+ minutes: $P(\text{browsed} \mid \text{…
New loads:
— EV charger (Level 2, 40A): +40A - Heat pump (18A at 240V): +18A - Bathroom circuit (20A at 120V, sin…
New rights:
— **Right to Correct:** Consumers could request the correction of inaccurate personal information — a …
New Test Cases:
— Client-side testing (DOM-based XSS, HTML5 security) - Business logic testing (critical addition --- …
NewMe Accelerator
— newmeacelerator.com One of the longest-running accelerators for minority tech and digital media foun…
News desert
— A geographic area without active local journalism coverage, identified as a risk factor for misinfor…
News literacy
— The ability to evaluate journalism according to journalistic standards of verification, sourcing, an…
News Verification
— Reuters, AP, AFP — wire services with strong editorial standards - Newsguard (newsguardtech.com) — n…
Newsletters and Digests:
— *Import AI* by Jack Clark — Weekly newsletter covering AI research, policy, and industry - *The Algo…
Next 15 minutes: Compare and identify gaps.
— Open the textbook and compare her brain dump to the actual material. What did she miss? What did she…
Next 20 minutes: Application practice.
— Make up scenarios: "What would happen if this enzyme were blocked? What would happen if this molecul…
Next Gen Stats (NGS)
— Tracking-based metrics - Separation data - Pass rush win rate
NEXT SENTENCE
— An obsolete COBOL statement that transfers control to the first statement after the next period. Rep…
NFL 1st and Future
— Player safety - Prediction challenges - Industry prizes
NFL Betting Markets Are:
— Highly efficient (near 50/50 ATS) - Information-incorporating - Difficult to beat consistently
NFL Big Data Bowl
— Annual tracking data competition - Winner notebooks and submissions - https://www.kaggle.com/competi…
NFL Big Data Bowl Solutions
— Search GitHub for "nfl big data bowl" + year - Real tracking data analysis code - Various approaches…
NFL Big Data Bowl Starter Notebooks
— Official competition notebooks - Data loading and visualization examples
NFL Big Data Bowl Winner Presentations
— Competition winning approaches - Implementation details
NFL Combine Data
— Historical measurables - Position benchmarks - Comparison data
NFL examples:
— Washington: Redskins (through 2019) -> Football Team (2020-2021) -> Commanders (2022+) - Oakland Rai…
NFL London Game:
— Jaguars (designated home) vs Falcons - Both teams traveling from US - Game at 9:30 AM ET (2:30 PM lo…
NFL Mexico City:
— Chiefs (designated home) vs Chargers - Chiefs: 1-hour flight, Chargers: 3-hour flight - Altitude: 7,…
NFL Next Gen Stats
— Win probability features - Real-time tracking
NFL Next Gen Stats Engineering Blog
— Behind-the-scenes of NFL's real-time tracking infrastructure. - **ESPN Analytics** - Technical posts…
NFL Play-by-Play (nflfastR)
— Complete NFL play data - EPA and WPA calculated - https://github.com/nflverse/nflverse-data
NFL Team Analytics Departments
— Job postings and requirements - Industry standards
NFL weather correlation studies
— Quantitative foundations 2. **Altitude and athletic performance** - Denver-specific research 3. **Fo…
nfl-data-py
— https://github.com/cooperdff/nfl_data_py - Python interface to nflfastR data - Includes tracking dat…
nfl-data-py Python Library
— `https://github.com/nflverse/nfl_data_py` - Python interface for EPA data - Easy data access
nfl_data_py
— Python NFL data access 8. **cfbd** - College football data API 9. **sportsipy** - Sports reference s…
nfl_data_py (Python)
— Python NFL data access - Pre-calculated WP
nfl_data_py / cfb_data_py
— Python equivalents - Pandas integration - Visualization support
nflfastR
— NFL WP calculations - Pre-built models
nflfastR / cfbfastR
— R packages for football data - EPA and WPA calculations - Play-by-play parsing
nflfastR Data Repository
— Play-by-play data - Regular updates - Documentation
nflfastR Documentation
— NFL play-by-play data processing - Data cleaning best practices - https://www.nflfastr.com/ - Python…
nflfastR Package Documentation
— `https://www.nflfastr.com/` - Professional-grade EPA models - Open-source reference implementation
nflfastR Tutorial
— NFL analytics in R - **cfbfastR Tutorial** - College football data in R - **Sports Analytics Course …
nflscrapR
— Historical NFL play-by-play for R/Python. - **nflfastR** - Modern NFL data with EPA and win probabil…
nflverse
— NFL play-by-play data - Network-ready data - https://nflverse.com/
nflverse (github.com/nflverse)
— Community-maintained R and Python packages for NFL data. Includes play-by-play data from nflfastR, r…
nflverse (R)
— Comprehensive PBP data - WP calculations included - https://nflverse.com/
NFRC whole-unit U-factor
— not the center-of-glass R-value, which overstates performance. - SHGC should be matched to your clim…
Niche
— A specific, well-defined topic area or audience segment that a creator focuses on. Niching down typi…
niche construction
— organisms modifying their environment in ways that favor themselves and disadvantage competitors. Be…
Niche CPM benchmarks for brand deals:
— Finance/business: $50–$100+ per thousand views - Tech/gaming: $25–$50 - Health/wellness: $30–$60 - B…
niche luck
— finding and cultivating a highly engaged, specific audience — is more accessible and sustainable tha…
Niche misalignment
— creating in the Grind quadrant (Ch. 32): high demand, low passion; metrics look good but soul cost i…
Niche paralysis
— researching forever without posting. Cure: the 10-Video Experiment. 2. **Choosing the Grind** — pick…
Nightly Batch Extract
— CNB's regulatory reporting data replicated to S3 at 01:00 for the cloud reporting batch at 02:30. (2…
NISQ
— Noisy Intermediate-Scale Quantum — in 2018 to describe the current generation of quantum hardware. A…
NIST AI Risk Management Framework (AI RMF)
— Published in January 2023, the NIST AI RMF is the most practically oriented organizational governanc…
NIST Atomic Spectra Database
— [physics.nist.gov/asd](https://physics.nist.gov/asd) The authoritative source for atomic energy leve…
NIST SP 800-53 Rev5: Security and Privacy Controls
— The comprehensive catalog of security controls. Map CICS security features to NIST controls for a fr…
nitro
— Discord's paid subscription service, which enables custom emotes, better upload limits, and other fe…
NLJOIN
— Nested loop join. The left child is the outer (driving) input, and the right child is the inner (loo…
NLP for Business
— Text as data · Tokenization and embeddings · Sentiment analysis · Named entity recognition · Topic m…
NLTK Documentation
— https://www.nltk.org/ - Tutorials and API reference - Corpus resources
NO
— function on key defeats elimination | | Host variable | `WHERE trans_date >= ?` | Depends — may use …
No additional I/O on the source database
— the capture reads log files that DB2 has already written - **No schema changes required** — no trigg…
No autocorrelation:
— Consistent with an efficient market. - Price changes are unpredictable from past changes. - Trading …
No automatic documentation
— the team maintains a separate Markdown file that is often out of date 3. **Synchronous only** -- und…
No changes to existing COBOL programs
— the same business logic must serve 3270, ATM, and mobile
No comment
— standard campaign policy; protects the campaign but says nothing - **Denial** — the campaign has not…
No derived columns
— each column in the view must correspond directly to a column in the base table.
no error is raised
— the program continues silently with bad data. This is one of the most dangerous behaviors in COBOL a…
NO EXTERNAL ACTION
— The function has no side effects outside DB2 (no file I/O, no IMS calls, no MQ puts). Declaring this…
No formal performance methodology
— performance problems were addressed reactively, often by adding hardware. - **No capacity planning p…
No hashing
— Passwords were not passed through any hash function - **No encryption** — Passwords were not encrypt…
No hot water / unit won't activate:
— First check: confirm the gas supply is on and other gas appliances work. A failed gas shutoff or gas…
No IDCAMS
— Files are created automatically when opened for OUTPUT. No separate definition step is needed. 2. **…
No INCLUDE needed
— PK lookups are point queries, infrequent
No JOBLIB
— each step uses STEPLIB, risking inconsistency. - **Generic step names** (STEP1, STEP2) provide no op…
No knowledge maintenance
— without spaced repetition, the forgetting curve will erase much of what Jordan learns between course…
No language barrier
— Physical comedy is universal, helping content go viral internationally. It doesn't rely on spoken wo…
No local installation required
— works from any web browser - **Real z/OS** — not an emulation; you are on actual IBM hardware - **En…
no longer equally spaced
— the spacing increases with $n$.
No menu or choices
— the user can't pick which conversion to run. (Chapter 4: conditionals) - **No looping** — the progra…
No need to share:
— Inline autocomplete suggestions. - Simple formatting or syntax corrections. - Routine generation of …
no ON clause
— every row pairs with every other row.
No other adapters
— target VMs should never have Internet access
No Parallel Sysplex
— the production and DR sites were connected by asynchronous DB2 log replication (HADR) - **Single MQ …
No probabilistic interpretation
— attention weights would not form a distribution over positions. 4. **Gradient flow** would be altere…
No rate limiting
— 1,000 rapid requests will likely trigger a 429 (Too Many Requests) response, and after that, `respon…
No SBOM generation or management
— Organizations cannot identify which dependencies they use 2. **Unpinned dependencies** -- Using vers…
No single metric captures defensive quality
— Use multi-dimensional profiles
No single variable is decisive
— variables interact 2. **Alternative availability is the hidden key** — determines depth, not just sp…
No source is perfect
— All data sources have errors or inconsistencies 2. **Score data is most reliable** - Universal agree…
No spin
— the Klein-Gordon field $\phi$ is a scalar. It describes spin-0 particles (like pions), not spin-1/2 …
NO SQL
— the date validation is pure computation with no database access. These attributes let the optimizer …
No standardization
— Every exploit had a different interface and different options - **Payload coupling** — Most exploits…
No test isolation
— if the second assertion fails, the third and fourth never run. With separate test functions, all tes…
No validation of provider type before adjudication
— a missing defensive check 3. **No post-processing verification** — the batch job did not verify that…
No, 95% is not impressive
— it matches the baseline exactly. The model might simply be predicting "will not cancel" for everyone…
no-clip
— Moving through walls and other surfaces using unintended game mechanics; a type of glitch.
No-Code / Low-Code AI
— The democratization of AI · AutoML platforms · Drag-and-drop ML · When no-code works (and when it do…
no-operation
— it does nothing. It provides a paragraph that contains no executable code. It is typically used as t…
nocebo effect
— the dark twin of placebo — occurs when negative expectations produce genuine negative physiological …
node
— Two users were **connected by an edge** if they had exchanged at least one message during the observ…
Node (acoustic)
— A point, line, or surface in a standing wave pattern where the amplitude of oscillation is always ze…
Noether's theorem
— Emmy Noether's proof that every continuous symmetry of a physical system corresponds to a conservati…
Noether's theorem (quantum)
— The equivalence of three statements: (i) $\hat{U}$ is a symmetry, (ii) $[\hat{H}, \hat{G}] = 0$, (ii…
Noise
— Random variation or unwanted signal that obscures meaningful information; distinguishing signal from…
Noise (pink, white, brown)
— Random signals characterized by their power spectral density. White noise has equal power per unit f…
NOLO Press Legal Guides
— nolo.com NOLO publishes accessible, accurate legal guides specifically for non-lawyers. Their books …
non-attitudes
— fabricated on the spot with no stable underlying content - **Ideological constraint** (the logical c…
Non-Compete
— A contractual agreement restricting a creator from working with competitors of a brand partner for a…
Non-consensual intimate image sharing (NCII)
— the distribution of intimate images without the subject's consent — is a severe, multi-domain harm a…
non-consensual intimate imagery (NCII)
— sexually explicit images or videos that realistically depict real people who did not consent to the …
Non-ergodicity
— See *ergodicity*. The property of a system in which time averages do not equal ensemble averages, me…
Non-functional requirements:
— Every method logs its activity at the DEBUG level - Every error produces a user-readable message (no…
non-integer dimensions
— they are "more than" a line but "less than" a plane, or "more than" a plane but "less than" a solid.…
Non-Modifiable:
— Age (risk increases significantly after 30) - Previous injury history (strongest predictor) - Positi…
Non-negotiable requirements:
— Every job must be wrapped in error handling (decorator pattern from the chapter) - Every job must lo…
Non-negotiables:
— Consistent wake time 7 days/week (most important) - Screen-free bedroom (phone charges elsewhere) - …
Non-probability sample
— A sample in which the probability of selection for each member of the population is unknown. Online …
non-repeatable reads
— if you read a row, do some processing, and read it again, the value might have changed because someo…
Non-response bias
— Bias arising when people who do not respond to a survey differ systematically from those who do, in …
non-retrogradable rhythms
— rhythmic patterns that read the same forward and backward. In plain language: rhythmic palindromes.
Non-user
— Hasn't engaged with AI tools 2. **Explorer** — Has tried AI tools occasionally, inconsistently 3. **…
Non-Verbal Resistance Signals:
— Decreased eye contact or avoidance - Postural closing (arms folding, turning slightly away, leaning …
Noncommercial operation
— Eliminates commercial motivation from Factor 1 analysis 2. **Transformative framing** — ToS and plat…
NONE
— No access permitted. The user cannot read, write, or even determine that the dataset exists.
None of these behaviors are your fault
— they arise from the viewer's internal experience, not from anything you did wrong. But they're signa…
Nonlinearity
— A relationship in which the output is not proportional to the input; small inputs may produce large …
nonparametric methods
— distribution-free alternatives to the $t$-test and ANOVA that make fewer assumptions about the data.…
Nonprofit governance AND scale
— AO3's nonprofit model enables community-aligned governance but limits scale. Commercial platforms' a…
nonresponse bias
— whether those who respond are systematically different from those who don't in ways that affect surv…
nonresponse biased
— it misrepresents the population not because the sampling frame was wrong, but because the fraction o…
Nonverbal communication
— All communicative signals transmitted through channels other than the literal content of words, incl…
Norfair
— github.com/tryolabs/norfair A lightweight, customisable multi-object tracking library in Python. Des…
Normal (Gaussian) Distribution
— $X \sim \mathcal{N}(\mu, \sigma^2)$
Normal accident
— Charles Perrow's concept that certain kinds of accidents are inevitable in tightly coupled, complex …
Normal disposition (second subparameter)
— what to do if the step completes successfully:
normal distribution
— the bell curve. You've seen it mentioned a hundred times. Now you'll understand *why* it's everywher…
normal ordering
— redefining the Hamiltonian to subtract the vacuum contribution:
Normal volume
— for context setting, exposition, background 2. **Elevated volume** — for moments of surprise, outrag…
Normalization
— Scaling data to a standard range. Per-90 normalization divides raw counts by minutes played and mult…
Normalization and Denormalization
— structuring data for integrity and performance. - **Physical Database Design** -- tablespaces, parti…
Normalization as validation
— using 1NF through BCNF as a check on your ER model, not as a design method.
normalization of deviance
— the process by which an institution gradually accepts increasingly risky conditions as normal becaus…
normalizing gaze
— the way that surveillance produces not merely compliance but the internalization of norms. The exami…
Normative social influence
— Conformity motivated by the desire for social approval and fear of rejection; distinct from informat…
Norms of public callout
— the expectation that community members should publicly call out rule violations rather than using pr…
Norris Lake
— that stretched seventy-three miles up the Clinch River Valley. It was designed to control flooding, …
Northern missionary societies
— particularly the **American Missionary Association (AMA)**, the American Freedmen's Union Commission…
Northwind Database
— A classic sample database representing a small trading company. Available in SQLite format at multip…
NoSQL
— A category of databases that do not use the traditional relational table model. Includes document st…
NoSQL Databases (MongoDB, DynamoDB):
— Best for semi-structured or schema-flexible data (event data with varying qualifier structures, trac…
NOT a pickup guide
— the "seduction" framing is explicitly deconstructed from page 1 - Warm, curious, intellectually hone…
NOT AT END
— Executes when a record is successfully read.
Not available:
— Any individual municipality-level polling outside major cities - Reliable voter registration party a…
Not checking `robots.txt`
— makes your scraper disrespectful and potentially legally exposed.
Not claiming expertise you do not have
— being skilled at vibe coding is different from being skilled at manual software engineering, and bot…
not closed
— DB2 returns the open cursor as a result set.
Not correct
— it's missing a base case. Without one, it will recurse forever (and raise `RecursionError`). Even if…
Not data science
— This is **data engineering**. Building pipelines is essential infrastructure, but it is not itself a…
NOT DETERMINISTIC
— This procedure may return different results for the same input (because account data changes). If a …
not errors
— IMS still retrieved a valid segment. But they are informational signals that help you detect boundar…
Not handling `None` from `find()`
— the most common crash. Use defensive coding with `if element` checks.
Not Included:
— Throw quality - Pocket presence - Pre-snap reads - Leadership
not integer multiples of the fundamental
— they are **inharmonic**. The ratios between the bell's partials depend on the exact shape, thickness…
Not needed with modern constructs
— Inline PERFORM with EXIT PERFORM (COBOL 2002+) achieves the same result without GO TO:
NOT ON EXCEPTION
— A COBOL phrase used with statements like CALL, STRING, UNSTRING, and ACCEPT to specify processing wh…
Not permanent
— it's a focused starting point that can evolve - **The niche spectrum:** Ultra-specific → Specific → …
Not publishing (benefits):
— No property value decline - No anxiety or stigma - No job losses
Not publishing (harms):
— Continued environmental exposure for ~2,500 residents, including ~600 children - No remediation fund…
not random
— he always opens a goat door. This means his action carries no information about Door 1 (your origina…
not recoverable
— you want to preserve the audit trail even if the transaction fails. For transactional queues (where …
not symmetric
— It is not a true distance metric (violates symmetry and triangle inequality)
Not well-supported:
— That microexpression reading is reliable enough to identify liars with meaningful accuracy in real-w…
Notable player projection papers:
— Various years include papers on player valuation, aging curves, and projection methodology - Researc…
Notable programs and payouts:
— Google's Vulnerability Reward Program has paid over $50 million since inception - Microsoft's Bug Bo…
notation
— a lossy encoding system developed over centuries in which composers translated sound into symbols on…
Note
— Supplementary information, clarifications, or context that does not fit neatly into the main exposit…
note count
— The accumulated total of reblogs, likes, and comments on a Tumblr post; high note counts indicate vi…
Note on exercise categories:
— **(A) exercises** test comprehension of core concepts. - **(B) exercises** require application and a…
notebook server
— the engine that runs Jupyter in the background. **Don't close this window.** If you close it, Jupyte…
NotebookLM
— notebooklm.google.com Document-grounded AI assistant. Best for analysis within a defined document se…
Notes for Solution Guidance
— Gini of 0.47 on hold-out: passes (above 0.30). A drop of 0.06 from dev to test is within typical deg…
Notes on participation assessment:
— Participation quality matters far more than quantity. A student who speaks once per session but alwa…
nothing
— no Python, no statistics, no SQL. It is written for:
Notice an emotion you are routing
— look for any emotional energy you are converting into a more acceptable form (anger into intellectua…
Notice one flow moment
— a moment of absorbed engagement — and identify what conditions enabled it. Ask how you could design …
Notice one moment of confabulation
— a moment when you generate an explanation for your own behavior that might not be the actual reason.…
Notice one moment of motivated reasoning
— a moment when your reasoning about a topic felt suspiciously efficient in the direction of your pre-…
Notice one moment of post-stress clarity
— a moment where, after a stressful interaction, you see more clearly what you could have done differe…
Notice one moment of top-down filling
— a moment when you construct meaning from an ambiguous signal (a text not replied to, a tone of voice…
Notice peak-end effects
— at the end of a meeting, conversation, or experience this week, notice whether the ending is shaping…
notifiable disease
— one of the approximately 120 diseases and conditions designated for mandatory reporting by the Counc…
Notification delivery rate
— successful notifications per minute. Compared against event emission rate to detect delivery failure…
Notification management
— deliberate control of push notification settings to reduce interruption
Notifications:
— OCC: 30 days advance notice (regulatory requirement for Tier-1 bank DR test) - ATM network (STAR/Pul…
Novelty Features:
— `news_surprise`: How novel the latest article is (from Section 24.7). - `information_velocity`: Rate…
novelty gradient
— the sweet spot between "I've seen this before" (boring → no attention) and "I have no idea what's ha…
November:
— Final gutter check - Party wall moisture check (their townhouse-specific item) - Water heater drain …
NP-hard
— a class of problems for which no known algorithm can find the exact solution in polynomial time (lik…
NREM sleep
— non-rapid eye movement sleep; three stages from light (Stage 1) to deep slow-wave sleep (Stage 3); d…
nuclear isomers
— excited nuclear states with lifetimes ranging from nanoseconds to years.
NUDAT 3.0 (Brookhaven National Laboratory)
— [nndc.bnl.gov/nudat3](https://www.nndc.bnl.gov/nudat3/) Nuclear data for all known isotopes, includi…
nudge
— A choice-architecture intervention that makes a desirable option easier to reach without restricting…
NULL
— (1) In DB2/SQL, a value indicating the absence of data, distinct from zero or blank. Detected in COB…
null distribution
— the distribution of the test statistic under $H_0$. If the observed difference is in the tails of th…
null results
— Adoption of **open data and open materials** practices
NUM_FREQVALUES
— Number of most/least frequent values to collect. Equivalent to z/OS FREQVAL COUNT.
NUM_QUANTILES
— Number of quantile divisions for the histogram. More quantiles provide finer granularity but increas…
Number operator
— Ch 4.4 The operator $\hat{N} = \hat{a}^\dagger\hat{a}$, whose eigenvalues are the non-negative integ…
number state
— it has exactly $n$ photons. The ladder operators become **creation** ($\hat{a}^\dagger$ creates a ph…
number_format
— An openpyxl cell property that controls how a numeric value is displayed. Uses Excel's custom format…
NUMBERED
— This keyword makes it an RRDS (as opposed to INDEXED for KSDS or NONINDEXED for ESDS) - **RECORDS(99…
Numeric edited
— A data category for numeric items formatted for display, using PICTURE editing symbols such as Z (ze…
numerical data
— variables where the values are numbers on a meaningful scale (ages, incomes, test scores, watch time…
Numerical Features:
— [ ] Check for outliers and decide on a strategy (removal, capping, robust scaling). - [ ] Apply appr…
Numerical methods:
— Finite difference method: convert TISE to matrix eigenvalue problem. - Shooting method: integrate OD…
NUMPROC(NOPFD)
— The compiler generates code to "fix" the sign on every numeric operation, converting any valid sign …
numpy
— Numerical computing - Array operations
NumPy Documentation
— Numerical operations - Array manipulation - https://numpy.org/doc/
NumPy Essentials:
— Vectorized operations for speed - Statistical functions - Array-based calculations
NumPy Fundamentals:
— Vectorized operations dramatically outperform Python loops - Statistical functions enable quick expl…
NUMTCB
— the number of task control blocks (essentially threads) available for concurrent stored procedure ex…
Nunna daul Tsuny
— "The Trail Where They Cried."
nurse-midwives
— nurses with advanced education in midwifery — would live in the communities they served, travel to p…
Nussbaum's seven features of objectification
— instrumentality, denial of autonomy, inertness, fungibility, violability, ownership, denial of subje…
NYC Yellow Taxi Trip Data
— Available from the NYC Taxi & Limousine Commission. Large-scale time-series data with pickup/dropoff…
Nyhan et al. (2019)
— including Brendan Nyhan himself, one of the original backfire effect researchers — published a study…
Nylon Calculus
— https://fansided.com/nba/nylon-calculus/ - Basketball analytics writing
Nylon Calculus (Various authors)
— https://fansided.com/nba/nylon-calculus/ - Collection of analytical writing including projection-rel…
Nyquist frequency
— Half the sampling rate of a digital audio system, representing the highest frequency that can be acc…
Nyquist-Shannon sampling theorem
— The fundamental theorem of digital audio, stating that a bandlimited signal can be perfectly reconst…
O
O(1)
— by name | **Instant** | **Named fields** | **Comprehension** |
O(n)
— every existing element must shift right by one position. - c) **O(1)** average — hash table lookup. …
O(n²)
— the most dominant term dictates the overall growth.
OAuth
— An open standard for authorization that allows users to grant third-party applications limited acces…
OAuth and API Authentication
— Implementing OAuth 2.0 flows (authorization code, client credentials), managing tokens, and handling…
OAuth Testing Checklist:
— Map all redirect URIs registered for the application - Test path manipulation, subdomain variations,…
Obedience
— Compliance with a direct instruction from an authority figure; Milgram's research documented 65% ful…
Obfuscation
— described by Finn Brunton and Helen Nissenbaum in their 2015 book — refers to the deliberate product…
Object Module
— The output of the COBOL compiler: a machine-language translation of the source program that has not …
OBJECT-COMPUTER
— A CONFIGURATION SECTION paragraph that specifies the computer on which the compiled program will run…
object-oriented interface
— the `Figure` and `Axes` approach — rather than the simpler but less flexible `pyplot` shortcut. The …
Objectification theory
— A feminist psychological theory developed by Barbara Fredrickson and Tomi-Ann Roberts (1997) proposi…
Objections (Dewey's Position):
— **O1** (against S1): Political competence is not the same as technical expertise. Citizens do not ne…
Objections:
— **O1** (against S1 and S2): Emotion is not inherently non-rational. Emotional appeals that accuratel…
objective
— many observers can independently learn the same thing about a system without disturbing it.
Objective stressors:
— Work demands consistently exceeding capacity ___ - Financial pressure or insecurity ___ - Caregiving…
observability
— the ability to understand the internal state of a system from its external outputs (metrics, logs, t…
Observable
— Ch 6.1 A physical quantity that can be measured, represented in quantum mechanics by a Hermitian ope…
Observation selection effect
— A bias that arises from the conditions necessary for observation itself; we can only observe situati…
observational data
— people weren't randomly assigned to be vaccinated or not. Maybe vaccinated people tend to be younger…
observational epidemiology
— studying what people report eating and correlating it with health outcomes. This methodology has fun…
observational unit
— one person who responded to the survey (remember that term from Chapter 2?). Each column is a **vari…
Observations from PCA:
— Two components capture only about 22% of total variance, meaning the 2D PCA plot is a very lossy rep…
Observations from the perplexity study:
— **Perplexity 5**: Very tight, fragmented clusters. Some digits split into sub-clusters (e.g., differ…
Observations from the UMAP parameter study:
— **n_neighbors=5**: Very local focus. Clusters are tight and separated by large gaps. Sub-structure w…
Observations:
— **Spread**: $0.01 (tight for a prediction market) - **Midpoint**: $0.555 - **Depth at best**: 750 co…
Observe
— Notice that something is too slow for its purpose. > 2. **Measure** — Profile the application to ide…
Observed data
— Data generated by user behavior but collected without active user input, such as website visit logs,…
Observer Pattern
— A **design pattern** where an object (subject) maintains a list of dependents (observers) that are a…
Obstructive sleep apnea (OSA)
— repeated airway obstruction during sleep, producing fragmented sleep and oxygen desaturation; dramat…
OBTAIN
— request a lock on a resource - **ALTER** — change the state of a held lock (e.g., from S to X) - **R…
Occasionally used:
— A regulatory horizon-scanning service (used by the CCO and one senior associate; 3 other named licen…
OCCURS
— A COBOL clause that defines a table (array) by specifying the number of times a data item is repeate…
OCCURS clause
— A DATA DIVISION clause that defines a table (array) by specifying the number of times a data item is…
OCCURS DEPENDING ON
— The variable-length table construct. The number of occurrences of ORD-LINE-ITEMS depends on the valu…
OCEAN model
— Five-factor personality model (Openness, Conscientiousness, Extraversion, Agreeableness, Neuroticism…
OCESQL (Open COBOL ESQL)
— An embedded SQL preprocessor for GnuCOBOL that supports PostgreSQL and MySQL. Allows embedded SQL pr…
Oconaluftee Citizen Indians
— Group of Cherokee who had obtained North Carolina citizenship and argued that removal treaties did n…
Oconostota
— were selling territory that was used as hunting ground, not settled homeland, and they were doing so…
Octave
— The musical interval corresponding to a frequency ratio of exactly 2:1. A pitch one octave above ano…
October:
— HVAC heating service (professional) - Replace air filter - Chimney sweep (annual — they have a gas f…
ODA Dataset
— a realistic synthetic dataset of political data - Include complete, runnable code with step-by-step …
odd harmonics
— 1, 3, 5, 7, 9... The even harmonics (2, 4, 6, 8...) are not resonance modes of the cylindrical close…
Odds formats
— American, decimal, fractional, Hong Kong, and Malay. Each format encodes the same information in a d…
Odds Portal
— https://www.oddsportal.com/ - Historical odds comparison
odds ratio
— the factor by which the odds are multiplied for a one-unit increase in $x_j$. If $\beta_j = 0.5$, th…
Odds-Portal (oddsportal.com)
— Historical opening and closing odds from dozens of bookmakers. Covers all major sports globally. Fre…
OddsJam (oddsjam.com)
— Real-time odds comparison across US sportsbooks. Positive EV finder and arbitrage scanner. Subscript…
Odessa Steps sequence
— The central sequence of Eisenstein's *Battleship Potemkin* (1925), depicting a massacre that did not…
OECD AI Policy Observatory
— Look up the AI policy landscape for specific countries where your system operates - **EU AI Act text…
OF DEL
— Delimited format. Alternatives: IXF (recommended for DB2-to-DB2 transfers, preserves metadata), ASC …
OFAC's Compliance and Enforcement Resources
— ofac.treas.gov — The authoritative source for all US sanctions compliance practitioners, including u…
OFAC's five-component compliance framework
— management commitment, risk assessment, internal controls, testing/auditing, training — provides the…
Off Court:
— Minutes: 1,560 - Team Points: 2,800 - Opponent Points: 2,960 - Estimated Possessions: 2,800
Off-Ball Movement
— Box scores cannot capture whether Westbrook set screens or moved without the ball - His high usage m…
Offensive Concepts
— Offensive positions and their roles - Basic formations (shotgun, under center, etc.) - Difference be…
Offensive contribution:
— Non-penalty expected goals (npxG) per 90 - Expected assists (xA) per 90
Offensive Coordinator (OC):
— Checks analytics twice daily: morning prep and post-practice - Primary questions: "What worked yeste…
Offensive Efficiency Features:
— `home_off_epa`: Home team's offensive Expected Points Added per play (season-to-date rolling average…
Offensive Evaluation:
— Off-ball movement quality (cuts, relocations) - Catch-and-shoot percentages by contest level - Gravi…
Offensive Identity:
— Elite three-point shooting (highest volume and percentage) - Motion offense generating open looks - …
Offensive Line Analytics
— evaluating the hardest position group to measure with individual statistics.
Offensive Line Example:
— One lineman out: ~0.5 point impact - Two linemen out: ~1.5 point impact (not 1.0) - Three linemen ou…
Offensive Line Impact:
— Protection schemes designed for Rodgers' preferences - Wilson has different mobility profile - Adjus…
Offensive Metrics:
— Effective Field Goal Percentage (eFG%) - Turnover Rate - Offensive Rebounding Rate - Free Throw Rate
Offensive Personnel:
— Returning starting quarterback (senior) - New starting running back (sophomore transfer) - Experienc…
Offensive Rating
— points produced per 100 possessions:
Offensive Rating (On/Off):
— Points scored per 100 possessions with player on court - Points scored per 100 possessions with play…
Offensive Security Web Expert (OSWE / WEB-300)
— **Vendor:** Offensive Security - **Cost:** ~$1,749+ - **Format:** 48-hour practical exam - **Prerequ…
Offensive Specialist Example:
— ORtg On: 115.0, ORtg Off: 105.0 (Offensive Diff: +10.0) - DRtg On: 112.0, DRtg Off: 108.0 (Defensive…
Offer A (Corporate Social Media Manager):
— 90% probability: Stable position, $55,000/year, modest learning, low excitement - 10% probability: E…
Offer B (Startup Content Lead):
— 45% probability: Startup thrives, $45,000/year growing to $65,000 + equity - 35% probability: Startu…
Office of Management and Budget (OMB)
— Aggregate spending by program, demographic category, and geographic region. Fixed-width ASCII format…
Office of Strategic Influence
— briefly established at the Pentagon in 2002 before being dissolved amid controversy — illustrated th…
Office of War Information (OWI)
— The U.S. government's WWII propaganda coordination agency, which included a Bureau of Motion Picture…
Official and Reference Servers:
— File system access with configurable permissions - GitHub and GitLab integration - Database connecto…
Official vs. parallel economies
— Rights-holders benefit from fan economic engagement while also potentially threatening it through co…
Offline Cracking:
— Phase 1: Common passwords (top 1000) - Phase 2: RockYou with rules - Phase 3: Custom MedSecure wordl…
Oh Shit, Git!?!
— Katie Sylor-Miller (https://ohshitgit.com) A profanity-laden, genuinely useful reference for the mom…
OLAP grouping extensions
— ROLLUP, CUBE, and GROUPING SETS — produce multi-level summaries in a single query.
Old approach (one session):
— Time spent: 45 minutes watching a full masterclass - Processing: passive — watching, enjoying, noddi…
Old Regular Baptists
— a tradition particularly strong in eastern Kentucky and southwestern Virginia — maintained these rit…
OLD TABLE and FINAL TABLE:
— `FINAL TABLE` returns the row *after* modification. - `OLD TABLE` returns the row *before* modificat…
Ombudsperson conversations
— most universities and many hospitals and corporations have an ombudsperson whose job is to receive a…
Omnidirectional
— reaches the brain even when the viewer isn't looking 2. **Faster emotional processing** — sound hits…
On an exterior wall
— In some mild-climate regions, the meter is mounted on the outside of the house, near the foundation.
On AWS:
— Regulatory reporting batch (the 47-program suite that started this journey) - Dev/test environments …
On beating baselines:
— Elo is harder to beat than it looks - 1-2% improvement is meaningful - Consistent improvement matter…
On Consensus Manufacturing
— [ ] Is the claim being made that "everyone" agrees, or that "real" members of the community hold thi…
On Content:
— [ ] What specific claims are made? Are they factually accurate? - [ ] What is the emotional register…
On Context:
— [ ] What military operation is this information product part of? - [ ] Is there physical coercion ac…
On Court:
— Minutes: 2,400 - Team Points: 4,800 - Opponent Points: 4,560 - Estimated Possessions: 4,400
On creativity and insight:
— Research by Immordino-Yang, Christodoulou, and Singh (2012) documented that the default mode network…
On Domestic Effects:
— [ ] Are there domestic audiences who will receive this message even if it is designed for foreign au…
On Enemy Construction
— [ ] Is there a clearly defined enemy in this messaging? - [ ] Is the enemy described as both powerfu…
ON EXCEPTION
— A COBOL phrase used with statements like CALL, STRING, and UNSTRING to specify processing when an ex…
On feature engineering:
— Domain knowledge beats feature count - Differential features capture prediction target directly - Si…
On Information Control
— [ ] How many sources of information are available on this topic, and how independent are they from o…
On Repetition and Saturation
— [ ] Is the same core message arriving through multiple channels simultaneously? - [ ] If it is arriv…
On Simplification
— [ ] Has a complex problem been reduced to a single cause with a single responsible agent? - [ ] What…
ON SIZE ERROR
— A COBOL phrase used with arithmetic statements (ADD, SUBTRACT, MULTIPLY, DIVIDE, COMPUTE) to specify…
On social relationships:
— Turkle's *Alone Together* research (2011) documented through extensive interviewing that constant di…
On Source:
— [ ] Is the source of the information clearly identified? - [ ] What is the source's institutional in…
On Target Audience:
— [ ] Who is the primary intended target audience for this message? - [ ] Is this a foreign audience (…
On the Channel:
— [ ] What cognitive conditions does this channel create? Print (deliberate, individual, re-readable)?…
On the Frame:
— [ ] What story does this message ask you to fit it into? What existing narratives does it invoke? - …
On the Message:
— [ ] What claim is being made, explicit or implicit? - [ ] What evidence is offered? Is it verifiable…
On the Source:
— [ ] Who owns this outlet? What are the owner's financial and political interests? - [ ] Who funds th…
On validation:
— Temporal CV is non-negotiable - Watch for train-test gaps - Monitor production performance continuou…
On z/OS (Parallel Sysplex):
— All CICS OLTP (account inquiry, fund transfer, ATM authorization, wire transfer) - Core batch proces…
On z/OS:
— Queue manager: `SFPQM01` (SecureFirst Production Queue Manager 01) - Outbound notification queue: `S…
On-the-spot guidance
— The genre of North Korean state media coverage in which Kim Jong-un is depicted personally visiting …
On/Off Defensive Metrics (2021-22):
— Defensive Rating On: 108.2 - Defensive Rating Off: 113.4 - Differential: -5.2 (team is 5.2 points/10…
On3
— NIL valuations - https://www.on3.com/ - Transfer portal tracking
One "yes" = they stay. Three "no"s = they scroll.
— ## 25 Verbal Hooks at a Glance
one branch ever runs
— Python stops at the first `True` condition. - **Order matters.** More specific conditions go before …
One clear action
— one sentence: "Film yourself doing [X]" 2. **Obvious result** — viewer can SEE the challenge was com…
One foreseeable unintended consequence
— Applying the historical pattern analysis from the Action Checklist, identify one genuine way your pr…
One idea per paragraph
— **Translate every number** into something meaningful - **Cut mercilessly** — every sentence must ear…
One record per model
— **Model Name**: _______________________________________________
One Sec
— Adds friction to opening social media apps; exploits the attention-redirection window.
One-off training
— knowledge decays, incentives unchanged - **Exhortation** — "be humble" is correct and useless - **Pu…
one-room schools
— single-room buildings, typically of log or frame construction, serving all grades together under a s…
One-Semester Introduction (14 weeks):
— Weeks 1-2: Chapters 1-2 (Foundations) - Weeks 3-4: Chapters 3-4 (Statistics and Python) - Weeks 5-6:…
one-time editorial license
— they can use it once, in this article, credited to you. You charge $200–$500. The photo is still you…
One-to-one mapping
— Each OAuth client ID maps to a specific RACF user ID. Most granular but most administrative overhead…
One-year metrics:
— Prompt library: 30 entries, all reviewed and updated in the past 90 days - Monthly measurement analy…
Ongoing Monitoring
— [ ] Enhanced transaction monitoring parameters applied (tighter thresholds) - [ ] Next review date s…
Ongoing monitoring:
— Continuous monitoring of vendor security posture - Regular reassessment (annually at minimum) - Thre…
Ongoing obligations:
— Regular reporting of financial and operational metrics - Payment of licensing fees and taxes - Maint…
Ongoing Reference:
— Bookmark pandas performance tips - Keep nflfastR glossary accessible
Ongoing relationship patterns:
— Significant reduction in your social network from what it was before the relationship - Changes in y…
ONLINE
— all CICS and DB2 DDF service classes - **BATCH** — all batch service classes - **INFRASTR** — infras…
Online Banking Portal
— Real-time account inquiry and transaction history (API) 2. **Mobile Banking App** — Push notificatio…
Online Courses
— Khan Academy Statistics and Probability - Coursera: Statistics with Python Specialization - edX: Int…
Online Courses:
— Khan Academy Statistics and Probability - Coursera: Statistics with R Specialization - edX: Introduc…
Online disinhibition effect
— The tendency for people to disclose more intimate information earlier in online relationships than i…
Online Hate:
— At scale, hostile comments and coordinated harassment are near-universal creator experiences, not pe…
Online Learning:
— Friends of Tracking (YouTube) --- free video tutorials on tracking data analysis - DataCamp and Cour…
Online panel
— A pool of pre-recruited volunteers who have agreed to complete surveys in exchange for points, cash,…
Online Processing
— Interactive transaction processing in which a user (or automated system) sends a request and receive…
Online Processing (Part III):
— [ ] CICSplex topology diagram - [ ] Transaction routing rules - [ ] CICS Web Services endpoint catal…
Online resources:
— Stanford Encyclopedia of Philosophy (plato.stanford.edu) — Free, academically rigorous entries on al…
Online transactions
— real-time banking transactions through CICS (target: < 0.3 second response time) 2. **Batch critical…
ONLINE_PROFILE
— Digital banking credentials and preferences (1:1 with CUSTOMER, optional).
Only then
— sometimes decades later, sometimes never — is a rigorous RCT conducted
Onset
— The beginning of a note or sound event, characterized by a rapid rise in amplitude (the attack trans…
OODA loop
— Observe, Orient, Decide, Act -- developed by Air Force Colonel John Boyd, provides the procedural fr…
OOP for Student records:
— Pros: Each student naturally bundles name, grades, and major. Methods like `calculate_gpa()` belong …
OPEN
— A COBOL statement that makes a file available for processing. Modes include INPUT (read), OUTPUT (wr…
Open (floodlight) attention
— broad, diffuse, receptive. When you are resting or moving through a familiar environment without par…
Open Area
— primarily in two ways:
Open Assistant (OASST)
— Description: 160,000+ human-annotated conversations for training assistant-style models. Includes ra…
Open body language
— A cluster of physical signals that communicate receptivity and non-threat: uncrossed limbs, body fac…
Open bowl with overhanging roofs
— Sound reflects back to field 2. **Metal seating sections** - Create resonance 3. **Proximity to fiel…
OPEN EXTEND
— Append-only access. Adds records after the highest existing key. Rarely used with indexed files sinc…
Open Football Data:
— A community-maintained repository of open soccer data on GitHub - Includes fixtures, results, and le…
open harmony
— raw, parallel intervals of fourths and fifths that sound archaic and slightly dissonant to ears accu…
OPEN I-O
— Full read/write access. Required for master file maintenance (adding, updating, deleting records).
OPEN INPUT
— Read-only access. Use for reports and inquiries.
Open Loop
— A narrative element that creates expectation of completion but is not immediately completed — leavin…
Open Mainframe Project
— https://www.openmainframeproject.org The Linux Foundation's Open Mainframe Project publishes open-so…
Open Mainframe Project — COBOL Programming Course
— Modules on subprogram communication include exercises you can run on IBM Z Xplore or GnuCOBOL.
Open Mainframe Project: COBOL Check
— An open-source unit testing framework for COBOL that encourages structured, testable program design.…
Open monitoring
— A mindfulness practice involving non-directed, receptive awareness of whatever arises in consciousne…
OPEN OUTPUT
— Write-only access. Creates a new file or replaces all existing data. Used for initial loading.
Open Path Collective
— openpathcollective.org Provides access to affordable therapy (sessions between $30–$80) from license…
open quantum systems
— quantum systems that interact with their environment. In reality, no quantum system is perfectly iso…
Open question
— A question that invites elaboration and cannot be answered with yes/no; designed to explore perspect…
Open questions
— quantum gravity, dark matter, neutrino masses, the hierarchy problem — drive current research beyond…
Open questions:
— How efficient are specific sub-markets (player props, live betting, micro-betting)? Most efficiency …
Open Rate
— The percentage of email recipients who opened a given email. A primary metric of email subject line …
Open Science Framework (OSF)
— osf.io - Preregistered studies and open data; useful for checking replication status of research
Open Source Football
— `https://www.opensourcefootball.com/` - Community-driven analysis - Code sharing
OPEN statement
— A COBOL statement that makes a file available for processing. Modes include INPUT (read only), OUTPU…
Open vs. Closed Tubes Determine Harmonic Content
— Open-open tubes (flutes): support all harmonics (1, 2, 3, 4, 5...); overblow at the octave - Closed-…
Open with engaging, non-threatening questions
— right/wrong track, local issues before sensitive national issues 2. **Group related questions** — do…
Open-ended
— Assess quality of connection between the commitment chosen and the chapter sections, and specificity…
Open-ended question
— A survey question that allows respondents to answer in their own words rather than selecting from pr…
Open-Source C2:
— **Sliver:** Written in Go, supports multiple implant types (session, beacon), multiple C2 protocols …
Open-source governance tools
— Developers who create free, open-source tools for data governance — consent management platforms, al…
Open-source intelligence (OSINT):
— MITRE ATT&CK (free, comprehensive) - NIST National Vulnerability Database (CVE details) - CISA advis…
Open-Source Tool Development:
— Contribute to existing tools (Metasploit modules, Nmap scripts, Nuclei templates) - Build and releas…
Open-weight models
— including Meta's Llama series, Mistral's models, Alibaba's Qwen, and Google's Gemma --- make the mod…
OpenAI / ChatGPT
— ChatGPT: https://chat.openai.com - API Documentation: https://platform.openai.com/docs - API Referen…
OpenAI API
— Description: Access to GPT-4 and related models. Commonly used for generating synthetic training dat…
OpenAPI Specification
— Standard for API documentation at swagger.io/specification.
OpenAPI Specification 3.0
— The standard for REST API documentation. z/OS Connect EE generates OpenAPI specs from COBOL copybook…
OpenAPI Specification 3.0.3
— The version most widely supported by tools and recommended for new mainframe API projects. - **JSON …
OpenAPI Specification 3.1
— The latest version, which aligns JSON Schema support with JSON Schema 2020-12. If your organization …
OpenCV
— https://opencv.org/ - Essential for video I/O, basic vision operations - Python and C++ interfaces
Opening
— how you noticed and why you're saying something: "I've been noticing [specific observations], and I …
Opening (5 minutes)
— How was your week? (Build rapport — this is a human relationship, not a data collection exercise.) -…
Opening (Sunday night prior):
— Spread: Bills -6.5 - Total: 44.5
Opening hook
— a real-world scenario that frames the chapter's stakes - **Learning objectives** — what readers will…
Opening lines (Sunday night):
— Spread: Home -3 - Moneyline: Home -155, Away +135 - Total: 47.5
Opening Quote
— A relevant voice from a creator, researcher, or thinker 2. **Chapter Overview** — What you'll learn,…
Opening quote and overview
— What you'll learn and why it matters 2. **Main content** (5–7 sections) — With retrieval practice pr…
Opening scene
— A scene involving one or more of our four recurring characters, grounding the abstract concept in li…
Opening — 10 min
— Ask how many students have used an ATM, booked a flight, or filed insurance this week. Reveal that m…
Opening — 15 min
— Present the capstone project options and requirements. Explain grading criteria: technical depth (40…
Opening — Honor what happened:
— State your intention honestly - Invite the other person's experience before sharing your own - Name …
Opening:
— What will you say to honor what happened? - What will you say about your intention for the conversat…
OpenML
— URL: https://www.openml.org - Description: A platform for sharing machine learning datasets, tasks, …
Openness to experience
— One of the Big Five traits, characterized by intellectual curiosity, aesthetic sensitivity, and will…
OpenPose
— https://github.com/CMU-Perceptual-Computing-Lab/openpose - Multi-person pose estimation
OpenPose Documentation
— https://github.com/CMU-Perceptual-Computing-Lab/openpose - Comprehensive implementation details and …
openpyxl
— openpyxl documentation: https://openpyxl.readthedocs.io/ The official tutorial is essential reading.…
OpenText (Micro Focus) Enterprise Analyzer
— Cross-reference reports, flow analysis, impact analysis, and complexity metrics for COBOL.
OpenWeather API
— Free tier available - Forecast and historical - Easy integration - https://openweathermap.org/api
Operant conditioning
— Skinner's learning framework in which behavior is shaped by its consequences (reinforcement and puni…
Operate across all major betting market types
— pregame, live, props, and futures --- with a unified analytical framework that adapts the same core …
Operate and Govern Phase
— Establish oversight with the **AI Governance Charter** (Template 9). - Prepare for problems with the…
Operating Cost Section:
— Estimate the equipment cost to produce competitive-quality content on this platform (list each item …
Operating Systems
— How computers manage their resources: memory, processors, files, and processes. You've been using an…
Operational
— [ ] Runbook documents startup, shutdown, and emergency procedures - [ ] Contact information for plat…
Operational debrief (Red + Blue teams):
— Walk through the engagement chronologically - Red team reveals what they did and why - Blue team sha…
operational layer
— kept internal — includes: - Claims under active investigation (publishing these before verification …
Operational metrics:
— System uptime and availability - Processing speed per transaction (for time-sensitive processes) - I…
operational policies
— specific rules governing concrete situations. What data sources may not be used to train models? Wha…
Operational readiness:
— [ ] Written SOPs for all recurring tasks - [ ] Business can operate for 30 days without founder invo…
Operational requirements:
— Runs without modification month-to-month (the period is a command-line argument) - Handles the case …
Operations
— Docker deployment - Monitoring and alerting - Automated testing - Documentation
Operations (Part VI continued):
— [ ] Monitoring architecture (Tier 1/2/3) - [ ] Alert threshold matrix - [ ] Production runbooks (at …
Operations team
— batch schedule impact analysis - **Capacity planning** — resource availability assessment - **Ahmad …
Operator
— Ch 6.1 A mathematical object that acts on quantum states to produce new states: $\hat{A}|\psi\rangle…
Operator obligations:
— Staff training on identifying problem gambling behaviors - Customer interaction requirements when ha…
opinion cascades
— the sudden, apparently spontaneous shifts in public opinion on issues from gay marriage to marijuana…
Opinions are distributions, not fixed points
— any individual's "true" position is a probability cloud, not a location 2. **Context is data** — que…
Opioid use disorder:
— *Methadone* — long-acting opioid agonist; reduces craving, blocks euphoria from additional opioid us…
Opponent adjustment system
— Calculate adjustment factors - Re-rank defenses - Compare to unadjusted
Opportunities:
— Lower leagues have less data coverage (less competition for undervalued players) - Young players in …
Opportunity cost
— The value of the best alternative foregone when a choice is made. In luck science, opportunity cost …
Opportunity Finance Network CDFI Directory
— ofn.org The authoritative directory for finding CDFIs in your specific geographic area. Search by st…
Opportunity recognition
— The perceptual capacity to identify conditions in which value can be created — to see a possibility …
Opportunity sensitivity
— the ability to notice unexpected information in one's environment — turns out to be highly variable …
Opportunity Surface
— How many contexts do you inhabit? Healthy = active presence in multiple distinct communities, contri…
Opportunity surface analysis:
— Which context has produced the most career serendipity so far? - Which context are you under-investi…
Oppositional decoding
— Stuart Hall's term for the practice of reading a text against its preferred meaning; in fan contexts…
OPS/MVS Best Practices
— Broadcom's recommended practices for rule design, performance tuning, and governance. Particularly u…
Opt-In
— The act of a user actively choosing to receive communications — email, SMS, push notifications — fro…
Opt-in / Opt-out
— The two paradigms for acquiring data subject consent: opt-in requires affirmative consent before dat…
Opt-Out
— The act of a subscriber choosing to stop receiving communications. Regulations including CAN-SPAM an…
Opta
— Pitch dimensions: 100 x 100 (percentage-based) - Origin: bottom-left for the team's own half in the …
Opta (Stats Perform)
— https://www.statsperform.com/ - Comprehensive event data coverage - Multiple xG model versions
Opta Analytics Blog
— Provider methodology insights - Event data explanations - Industry applications - Link: optasports.c…
Opta Pro Forum Presentations
— Focus: Industry research on defensive metrics - Key Presentations: Annual analytics forum content
Opta Set Piece Analysis
— Type: Commercial data - Features: Detailed set piece event data
Opta/Stats Perform
— Comprehensive event data - Expected metrics included - Used by major leagues - Link: optasports.com
OptaPro Analytics Forum
— Focus: Industry-leading soccer analytics research - Key Presentations: Defensive metrics innovations
OptaPro Analytics Forum (now Stats Perform)
— Annual conference bringing together football analytics practitioners, researchers, and industry lead…
OptaPro Forum
— Industry-focused presentations - Practitioner insights - Applied research - Historical presentations…
OptaPro Forum.
— Analytics conference - Industry presentations - Methodology papers
optical cavity
— typically two mirrors facing each other — that provides:
Optical Tracking:
— Multiple cameras positioned around the stadium (typically 12-20+) - Computer vision algorithms ident…
Optimal attribution
— An attribution style that accurately acknowledges external factors while consistently identifying sp…
optimal detection
— the threshold setting that minimizes total expected cost given known costs of each error type and kn…
Optimal filming approach:
— Close-up framing focused on the active organization zone (not wide shot of entire desk) - Slow, deli…
Optimal parameters:
— n_estimators: 200 - max_depth: 4 - learning_rate: 0.1 - min_samples_leaf: 10 - subsample: 0.9
optimal region
— the region of musical interest — lies between these extremes. And the tool for navigating this regio…
Optimal Solution:
— Sign James Miller: $22M, 3.8 VORP - Sign Andre Smith: $16M, 2.8 VORP - Sign Chris Lee: $8M, 2.0 VORP…
Optimal stopping
— A mathematical framework for determining the best moment to stop searching and commit to a choice. T…
optimal stopping problem
— the mathematical question of when to stop searching and commit to the best option you've found so fa…
Optimization
— The process of finding the best solution according to a defined objective function; powerful but dan…
optimization pressure
— the relentless, systematic force exerted by an incentive structure that rewards metric improvement r…
Optimization tips:
— Use Adam with $\beta_1 = 0.0$ and $\beta_2 = 0.9$ for WGAN-GP (note: $\beta_1 = 0$, not the default …
OPTIMIZE(0)
— No optimization (default). The compiler generates straightforward code that is easy to debug but not…
Optimized for social media language
— it understands that "this video absolutely SLAPS" is positive, even though those words out of contex…
Optimizes every SQL statement
— choosing access paths, index usage, join methods 4. Stores the resulting access plan in the DB2 cata…
optimizing for what worked
— which meant leaning harder into the "perfect discipline" persona:
Option 1: Follow the stricter jurisdiction
— Comply with the most stringent applicable requirement across all activities, regardless of jurisdict…
Option 2: Jurisdiction-specific compliance
— Implement separate compliance models for UK and EU activities. Maximum flexibility. Significant oper…
Option 3: Activity-based segmentation
— Implement the stricter standard only for activities that are in scope in the stricter jurisdiction. …
Option A (from contender):
— Receive: Young player (BPM -0.5, 22 years old) + 1st round pick - Send: Thompson
Option A: 32 casual TikToks over two days
— Expected views per TikTok: ~2,000 (realistic, not wishful) - Total expected views: ~64,000 - Expecte…
Option A: Approve the pilot as proposed
— Deploy CityScope Predict for one year with quarterly reviews as Chief Rodriguez recommends.
Option A: B2B Software Subscriptions
— Replace frequency with "feature adoption score" (number of distinct product features used per month)…
Option A: Full database PITR
— Restore the entire database to 14:47:00 (before the DELETE). This recovers the deleted rows but also…
Option A: Full rollback
— Revert the code and manually clear the `inventory_reservations` table. Risk: might release inventory…
Option A: JSON name override in DFHLS2JS
— DFHLS2JS supports a name mapping file:
Option A: Kanban Board
— Drag-and-drop task board with columns (To Do, In Progress, Review, Done). Tasks can be dragged betwe…
Option A: Quick shot (2-pointer)
— Time to execute: 8 seconds - Success probability: 48% - If successful: Overtime with 50% win probabi…
Option A: Situational Deep Dive
— Focus on a specific game situation (e.g., fourth-and-1 inside opponent's 5-yard line) - Collect deta…
Option A: Standard LMSR
— Pros: Bounded loss (budget predictable), well-understood theory, natural multi-outcome support - Con…
Option A: Travis Kelce
— Pros: Elite positional scarcity, guaranteed production - Cons: Age 34, single-player dependency - VO…
Option B
— letting GlobalBank's consumer perform the lookup. The reasoning:
Option B (from rebuilder):
— Receive: Expiring bad contract + 2 second-round picks - Send: Thompson
Option B: 1 long-form YouTube video over two days
— Expected views in first month: ~800 (YouTube is slower to grow) - Expected new subscribers: ~40 - Lo…
Option B: Activity Feed
— A timeline showing all actions taken in the application (task created, task completed, comment added…
Option B: Approve with conditions
— Deploy the pilot only after specific prerequisites are met (independent validation, community oversi…
Option B: APScheduler with a Windows service
— Pros: More robust, survives reboots via Windows service management - Cons: More setup complexity, Ma…
Option B: CPMM
— Pros: Simple to implement, familiar from DeFi, intuitive "pool" metaphor - Cons: Unbounded loss, res…
Option B: Hotfix forward
— Fix the race condition in the new code and deploy the fix. Risk: takes time; error rate continues me…
Option B: Ja'Marr Chase
— Pros: Highest VORP available, young, high ceiling - Cons: WR depth reduces scarcity concern - VORP: …
Option B: Migrate to DB2 for LUW on cloud Linux
— Advantages: Lower infrastructure cost; larger talent pool; modern DevOps tooling; cloud scalability.…
Option B: Professional Services / Consulting
— Replace raw transaction counts with "project count" and "average project duration" - Add a "referral…
Option B: Run clock and shoot three
— Time to execute: 25 seconds - Success probability: 35% - If successful: Win - If unsuccessful: Offen…
Option B: Tablespace-level PITR
— Restore only the TRANSACTION table's tablespace to 14:47:00. This preserves recent changes in other …
Option B: Team Case Study
— Select one team known for fourth-down aggression (Eagles, Ravens, Lions) - Track their fourth-down d…
Option B: Wrapper copybook
— Create a new copybook with names designed for JSON mapping, and write a thin wrapper COBOL program t…
Option C (keep Thompson):
— Maintain current production - Lose for nothing in free agency
Option C: Bijan Robinson
— Pros: Elite workload, pass-catching upside in PPR - Cons: Second-year player, some efficiency concer…
Option C: Export/import from a restored copy
— Restore the database to a separate instance, extract the deleted rows, and re-insert them into produ…
Option C: Hybrid approach
— Advantages: Critical OLTP stays on proven z/OS; new development uses modern cloud tooling; analytics…
Option C: LS-LMSR
— Pros: Adaptive liquidity, better long-term price behavior - Cons: More complex to implement, no boun…
Option C: Partial rollback
— Revert the code, keep the database changes, write a script to carefully reconcile the reservations. …
Option C: Reject the proposal
— Do not deploy CityScope Predict. Invest resources in alternatives (community policing, diversion pro…
Option C: Run clock and shoot two
— Time to execute: 25 seconds - Success probability: 52% - If successful: Overtime with 50% win probab…
Option C: Team Workspaces
— Multi-tenant support where users can create and join workspaces. Each workspace has its own tasks, m…
Option C: Two-Point Conversion Analysis
— Apply the same expected value framework to two-point decisions - Estimate the optimal two-point atte…
Option C: Windows Task Scheduler (OS-level)
— Pros: Built into Windows, no additional Python process required, survives reboots, IT already knows …
Option D: Defer
— Table the vote for six months. Commission an independent study. Hold additional community forums in …
Optional appendices
— photographs, reproductions of primary source documents, data tables, family histories, or other supp…
Optional for the curious:
— Multimeter ($25–$60) — Chapter 12, 13 exercises - Thermal imaging app or camera — Chapter 4 exercise…
Optional paragraphs (for documentation):
— `AUTHOR`: The programmer's name - `INSTALLATION`: The computing environment - `DATE-WRITTEN`: When t…
Optionally share:
— Routine code generation using established prompts from the library. - Debugging sessions where AI he…
Options:
— **Map your surveillance:** Document and map the surveillance infrastructure of a specific area (your…
or
— Be inside an aggregate function.
Oracle Risk
— **Data feed manipulation**: Oracles providing resolution data can be manipulated. - **Oracle downtim…
Oral history projects
— including the Appalachian Oral History Project at Alice Lloyd College, the Foxfire archives, and num…
oral tradition
— was not a primitive substitute for literacy. It was a sophisticated system for preserving and transm…
orbifold
— a geometric space where the "distance" between positions represents the total melodic motion require…
orchards
— particularly of peach trees, which were adopted from Spanish contact in the sixteenth century and qu…
Orchestration
— a central coordinator program drives the saga, calling each step in sequence. This is the natural mo…
Orchestration Threats (Kubernetes-specific):
— API server misconfiguration - RBAC over-permissioning - Secrets stored in plaintext - Network policy…
ORD-INTAKE
— Reads a header-detail-trailer order file, validates each order, writes valid orders to an output fil…
Order and flow:
— [ ] Does question order prime later responses in unintended ways? - [ ] Are related questions groupe…
order book
— a data structure that collects and organizes all outstanding buy and sell orders, matching them acco…
Order Book Markets (Polymarket, Kalshi):
— Impact is discrete: your order "walks" through price levels - Impact depends on the specific shape o…
ORDER BY
— The query requests sorted output, and no index provides the data in that order - **GROUP BY** — Aggr…
Order Events:
— `OrderPlaced` --- a new order enters the system - `OrderMatched` --- two orders are matched (partial…
Order flow
— the sequence of orders arriving at the exchange -- contains information beyond what the order book s…
Order Manipulation:
— Test whether you can modify an order after payment (change shipping address, add items, change quant…
Order parameter
— A quantity that characterizes the state of a system near a phase transition, changing from zero to n…
ordinal
— the categories have a natural order (free < basic < premium) that reflects increasing levels of serv…
ordinaries
— frontier taverns spaced along the route at intervals of roughly a day's travel. These were not comfo…
Organic Growth
— Audience growth that occurs without paid advertising, driven by word of mouth, platform algorithmic …
Organic Reach
— The number of people who see a piece of content without any paid promotion. Organic reach has declin…
organic reach rate
— the percentage of your followers who actually see any given piece of content.
Organization
— The structural arrangement of records in a file. COBOL supports SEQUENTIAL, INDEXED, and RELATIVE or…
ORGANIZATION IS RELATIVE
— Declares this as a relative file (as opposed to SEQUENTIAL or INDEXED). - **RELATIVE KEY IS data-nam…
ORGANIZATION IS SEQUENTIAL
— Specifies sequential file organization. This is the default, so it is often omitted:
Organization Level (required):
— Approved AI tools and data security requirements. - Minimum code review standards for AI-generated c…
Organization:
— Name screenshots with a consistent scheme: `F001-01-injection-point.png`, `F001-02-data-extraction.p…
Organizational Approach:
— Small but influential analytics team (5-8 people at peak) - Direct reporting to ownership, bypassing…
Organizational awareness (6 points):
— Three retirements create urgency for knowledge capture — specific strategies (pair programming, docu…
Organizational behavior or management
— extends Chapters 28, 33, and 34 - **Ethics or moral philosophy** — deepens Chapter 5 and the ethical…
Organizational challenges:
— Appointment of a Data Protection Officer (required because VitraMed processes health data at scale) …
Organizational Characteristics:
— Revenue model: media clients (30%), political clients (25%), corporate (25%), academic partnerships …
Organizational Context
— [ ] Who produced this material? What organization, under whose direction? - [ ] Was the organization…
Organizational Controls:
— Implement multi-channel verification for sensitive actions (voice request + email confirmation + in-…
Organizational ethics programs
— the subject of Chapter 26 - **Professional norms** — ethical standards within data science, engineer…
Organizational Factors
— Team's competitive situation - Ownership commitment - Budget and resources - Location and travel
Organizational Maturity
— Analytics departments growing in size - Integration with coaching improving - Executive buy-in incre…
Organizational practices:
— Conduct Privacy Impact Assessments (PIAs) for AI projects that process personal data. - Implement da…
Organizational structure:
— What resources were required to sustain the campaign? What was the scale of the operation in terms o…
Organizations and Initiatives:
— **WiCyS (Women in CyberSecurity):** Conference and community for women in cybersecurity - **Diana In…
Organizations to Follow:
— Stanford HAI (Human-Centered AI) — hai.stanford.edu - AI Now Institute — ainowinstitute.org - Partne…
orgasm gap
— The documented difference in orgasm rates between men and women during sexual encounters, which is l…
Orient toward the other person's actual experience
— not what you want them to feel, but what they actually feel. 2. **Treat uncertainty as a reason to a…
Orientation and light quality:
— **South-facing windows** (in the Northern Hemisphere) receive the most direct sun and provide consis…
Orienting Response
— An automatic, involuntary attentional response to novel or unexpected stimuli — movement, sound, vis…
Origin and attribution:
— Can the origin of the campaign be traced to a specific actor or network of actors? What is the evide…
Original error
— the field holds a wrong position 2. **Crisis** — a visible, costly failure forces confrontation 3. *…
Original opening (first 3 seconds):
— *Visual:* Medium shot of Nico sitting on his bed, looking at camera, normal expression. - *Audio:* "…
Original specification:
— Title: "Will AI take over?" - Close date: December 31, 2030 - Resolution: "Resolves YES if AI takes …
ORM (Object-Relational Mapping)
— A technique that maps database tables to programming language objects, allowing database operations …
Ornate plaster surfaces
— columns, caryatids, coffered ceiling — provide excellent broadband diffusion, smoothing the frequenc…
Orphan works
— copyrighted works whose rights-holders cannot be located. Cannot be licensed; use exposes users to i…
OS-level scheduling
— Windows Task Scheduler or Linux/macOS cron. These run Python scripts as external processes. Best for…
Oscillator
— A system that produces a periodic waveform by cycling repeatedly through a sequence of states. Mecha…
OSINT Gathering:
— Enumerate subdomains using certificate transparency logs (crt.sh), DNS brute-forcing, and search eng…
Other indicators that quantum mechanics is needed:
— Discrete energy spectra (atomic/molecular transitions) - Quantized angular momentum - Interference o…
Other jurisdictions:
— Laws vary widely. Research the laws of both your country and the target's country - Some countries h…
Other Languages:
— YouTube Creator Academy offers content in over 40 languages - Teachable and Thinkific both provide c…
Other Party's State
— [ ] The other party does not appear to be under visible time pressure - [ ] The other party is not v…
Other persistent myths
— "I'm not a math person," multitasking while studying, "learning should be easy" — each persist becau…
Other Premium Providers:
— **Sports Info Solutions**: Detailed charting data - **Telemetry Sports**: Tracking data - **Pro Foot…
Other ways to help
— Vote in official award polls (links in pinned message) - Request BTS songs on streaming radio progra…
Othman and Sandholm (2010)
— Studied the game-theoretic equilibria of decision markets and showed that truthful reporting is a Ba…
OTW founded (2007)
— First fan institution built specifically to assert legal legitimacy of fan creativity as transformat…
OUT
— Passed from procedure to caller. The initial value is undefined. Use for return values, status codes…
Out & Equal Workplace Advocates
— outandequal.org While primarily focused on workplace equity, Out & Equal has programming relevant to…
Out-group homogeneity effect
— The tendency to perceive members of out-groups as more similar to each other than members of one's i…
Out-of-scope assets typically include:
— Third-party services and hosted content - Employee personal accounts - Physical locations - Non-prod…
Outcome Attachment
— The state of needing a specific result from a conversation so acutely that the need distorts communi…
Outcome bias
— The tendency to evaluate the quality of a decision based on its outcome rather than on the quality o…
Outcome Detachment
— Not outcome indifference, but the psychological state of being able to want an outcome, pursue it sk…
Outcome Detachment Practices
— preparatory exercises for loosening the grip of outcome attachment before you arrive. Naming the fea…
Outcome KPIs:
— Adoption rate of analytics recommendations - Success rate of analytically-supported signings - Accur…
Outcome metrics:
— Reduction in compliance incidents related to AI misuse (measured by the compliance team) - Time-to-a…
Outcome Values:
— Touchback: 25-yard line - Average return: ~23-yard line - Out of bounds penalty: 35-yard line - Kick…
Outcome variables:
— **Conversation count:** Number of distinct conversations with previously unacquainted people - **Con…
Outcome:
— Sold to Chelsea in August 2023 for a reported GBP 115 million - Return on investment: approximately …
Outcomes:
— Democratic Party nominee - Republican Party nominee - Independent/Third-party candidate - No electio…
Outdoor (20 teams):
— All others, including cold-weather markets
outdoor recreation economy
— the economic activity generated by hiking, mountain biking, rock climbing, kayaking, fishing, and ot…
outdoor reset control
— adjusting the water supply temperature based on outdoor air temperature. On a mild day, the boiler s…
Outdoor: Motion-activated LED flood light
— Replaced the incandescent fixture over the garage door with a dual-head motion-activated LED flood (…
outer product
— an operator, not a number. It takes a ket $|\psi\rangle$ and produces:
Outfit challenges
— e.g., "styling one white t-shirt five different ways" 2. **Thrift haul reviews** — e.g., "everything…
outlier
— it lies outside the realm of regular expectations. 2. It carries an **extreme impact**. 3. After the…
Outliers and implausible values
— data points that are technically present but seem wrong. A patient listed as 250 years old. A temper…
outlying parcels
— are located in nearby counties.
Output format the prompt should request:
— [Describe desired output structure]
Output KPIs:
— Number of pre-match reports delivered on time - Number of player profiles generated for recruitment …
Output standards
— write for a CEO audience unless specified otherwise, use formal but accessible language, always dist…
Output:
— Daily forecasts at SKU-store level, with 80% prediction intervals - Weekly forecast summary dashboar…
outrage social currency
— sharing his videos signaled moral superiority and critical intelligence. The sharer's message was: "…
Outside the window (too much):
— Using the audience as a therapist for unprocessed emotional crises - Sharing details that could harm…
outside view
— a concept developed by Daniel Kahneman and Amos Tversky -- is the practice of evaluating a project, …
Outside Zone:
— Lateral movement before hitting hole - Cutback opportunities - Generally higher YPC - Requires visio…
outsider gaze
— the particular way that people from outside a community see, interpret, and represent the people wit…
Over-lit scenes
— flat, shadowless lighting that looks like a corporate video - **Aggressive color grading** — obvious…
Over-relying on YPC
— Doesn't account for blocking or situation 2. **Ignoring sample size** - Need 100+ carries for stable…
Over-the-Rhine
— a neighborhood whose name tells a story about layers of migration. In the nineteenth century, German…
Overall accuracy:
— Group A: (180 + 160) / 500 = 68% - Group B: (70 + 232) / 400 = 75.5%
Overall credibility rating:
— ☐ **High** (17–20 criteria met, 0–1 red flags): Poll meets professional standards; results can be us…
Overall ethics assessment:
— ☐ **Approved:** All criteria met; no concerns identified. Project may proceed. - ☐ **Conditional app…
Overall Offensive Performance:
— Total yards: 6,432 (2nd in NFL) - EPA/play: +0.095 (5th) - Yards per play: 6.1 (4th) - First downs: …
Overall Report:
— [ ] No unfiltered scanner output - [ ] All findings validated (no false positives) - [ ] Consistent …
Overall, the market is better
— Don't bet every game 2. **High-conviction disagreements have value** - Focus on 3+ point differences…
overburden
— is removed by enormous machines. The largest of these are **draglines** — massive cranes that swing …
overconfident
— they assign high probabilities to their predictions more often than is warranted. **Temperature scal…
overdispersion
— the variance exceeds the mean. This can occur because:
overfitting
— the single most common and most expensive mistake in machine learning. And it's a problem that is no…
overfitting to metrics
— identifying a player who excels on the specific metrics used in the shortlisting model but who lacks…
Overflow
— A condition where an arithmetic result exceeds the capacity of the receiving data item. Detected by …
Overmountain settlements
— communities west of the Blue Ridge in what is now northeastern Tennessee and southwestern Virginia. …
overpay by 15-25%
— First-week signings worst value - Age 27-29 sweet spot for value - **Avoid**: 30+ RB, 32+ WR, injure…
Overperformance
— When a team's actual results (goals, points) exceed what their underlying metrics (xG, xPts) would p…
Overrated by BPM:
— High-usage scorers with marginal efficiency - Players with inflated assist rates (system dependent) …
Overreaction to star names
— Backup quality underestimated - Scheme adjustment capability ignored
Override frequency increasing
— a signal that human decision-makers were compensating for model limitations rather than flagging the…
Oversample
— The practice of including a larger proportion of a minority group in a survey than exists in the gen…
overshot
— not because the reformers were wrong, but because the structural forces of overcorrection (trauma, p…
Oversight Board
— The independent body created by Meta to review and overturn individual content moderation decisions;…
Oversight Dashboard
— provided real-time visibility, explanation of decisions, override controls, and performance reportin…
Oversized copybooks
— A 500-line do-everything copybook is harder to maintain than five focused 100-line copybooks.
Overstated ethnic homogeneity
— the Celtic thesis treats Appalachia as overwhelmingly Scotch-Irish when in fact the region was settl…
Overtone
— A frequency component of a complex tone above the fundamental frequency. The first overtone is the s…
overtreatment
— intervening when the best course of action is to do nothing. Overtreatment is not the same as malpra…
Overview
— Summary dashboard with recent performance 2. **Reach** — How people are finding your content 3. **En…
Overweighting single-game EPA
— High variance game-to-game - Use rolling averages or season totals
Overwork system
— A practice at some industrial operations where enslaved workers could earn small payments for produc…
Overwriting historical data
— use append mode when building time-series datasets. You cannot recreate historical prices after the …
OWASP Chapters
— Local chapters in most major cities; free meetings focused on application security. Find your chapte…
OWASP Top 10
— owasp.org/Top10 The Open Web Application Security Project's list of the ten most critical web applic…
OWASP Top Ten
— Essential web security risks at owasp.org.
Owned brands
— consumer products (like Chamberlain Coffee), digital products (courses, tools), or subscription serv…
Owned Media
— Channels that a creator controls directly and is not subject to platform policy changes — email list…
Ownership and Funding
— Who owns this outlet? Is that ownership transparent and documented? - Who funds this outlet? Is fund…
OxyContin
— a time-release formulation of the opioid **oxycodone**, marketed as a revolutionary advance in pain …
oxytocin
— sometimes described in popular science as the "love hormone" or "bonding hormone," though the actual…
P
p < 0.05
— which means there is less than a 5% probability that the observed difference is random. In other wor…
P(A|B) ≠ P(B|A)
— and why confusing the two is called the **prosecutor's fallacy**. You've seen how this confusion can…
p-hacking
— running multiple statistical analyses on the same data, selectively reporting the ones that produce …
p-value
— The probability of obtaining a result at least as extreme as the observed result, assuming the null …
P6. Logistics (Chapter 17)
— Setting: Where will this conversation happen? Why is this the right choice? - Timing: When? What mak…
PaaS (Platform-as-a-Service)
— A cloud service category that provides managed infrastructure for deploying applications. Render and…
Pace and Play Calling
— examining how teams choose between pass and run, how pace affects efficiency, and whether teams make…
Pace and Style Features:
— `home_plays_per_game`: Home team's average offensive plays per game, a proxy for pace. - `away_plays…
Pace and Transition:
— Possessions per minute - Transition frequency - Fast break points per possession
Pace compression
— removes pauses, "um"s, false starts, and dead moments; a 5-minute raw recording becomes 60 seconds o…
Pace Manipulation
— Thunder's pace (99.6) was above league average - This created additional counting stat opportunities
Pacing
— the rhythm of your communication. Some creators are dense and information-heavy; every sentence carr…
pacing problem
— is not an accident. It reflects structural features of how technology develops and how governance op…
Package
— In DB2, a bound collection of optimized SQL statements from a single *DBRM*. Packages provide better…
Package collection ID
— **Stored procedure name**
Packaged offer
— Productization is not just knowing something; it is wrapping that knowledge in a structure that make…
Packaging
— Learn how to package your Python projects so others can install them with `pip install your-tool`. T…
Packaging (thumbnail and title):
— Describe the thumbnail: What's in it? What's the emotional cue? What design principle is most visibl…
Packaging experiments:
— Thumbnail: Try two different thumbnail concepts on consecutive videos (your normal style vs. one des…
PACKED-DECIMAL
— A synonym for *COMP-3*. Each byte holds two decimal digits, except the rightmost byte, which holds o…
Page 1: Executive Summary
— Q3 total company forecast: $X.XM to $X.XM (95% confidence range) - Q4 total company forecast: $X.XM …
Page 1: Where We Are
— County choropleth: Garza support score (shaded) with bubble size = registered voters - Sorted horizo…
Page 2: Where to Focus
— Heatmap: turnout propensity × support score (2×2 grid showing which cell is the best GOTV target: hi…
Page 3 --- Physical Report (1 minute to consume):
— Player fatigue indices with traffic-light color coding - Distance and sprint comparisons to expected…
Page and Clemen (2013)
— Analyzed conditions under which conditional market prices converge to causal effects and showed that…
page cleaners
— background threads that write dirty pages to disk. The number of page cleaners is controlled by the …
page-based I/O
— each node corresponds to a disk page, minimizing the number of physical reads.
PagerDuty Incident Response Guide
— Free guide to incident management.
Pagination
— The practice of dividing large datasets across multiple numbered pages in a web interface.
Paid Promotion
— Content where creators pay a platform to extend the reach of their posts beyond their organic audien…
Pair Programming
— A practice where two developers work together at one workstation. In vibe coding, the AI serves as a…
Paired t-test
— the same countries are measured before and after. 2. Differences: [6, 3, 7, 2, 8, 1, 7, 2, 7, 6]. Me…
Pairing type distribution
— As of the most recent published annual statistics, works tagged with "M/M" (male/male pairing) repre…
pairplot
— A grid of scatter plots showing the pairwise relationship between every combination of numeric varia…
Paleo-Indian period
— the earliest phase of human habitation in the Americas, spanning roughly 13,000 to 10,000 years befo…
Pamphlet
— The short, cheap, portable print format that became the primary medium of Reformation propaganda aft…
pandas
— Data manipulation - Recruiting board management - Class analysis
pandas Documentation
— Official pandas documentation - Data cleaning functions - https://pandas.pydata.org/docs/ - Essentia…
pandas Essentials:
— DataFrames efficiently store and manipulate tabular soccer data - Boolean indexing and query() filte…
pandas Excel I/O
— pandas I/O documentation: https://pandas.pydata.org/docs/user_guide/io.html The "Excel files" and "C…
pandas Fundamentals:
— DataFrames and Series for structured data - Selection with `.loc`, `.iloc`, and boolean indexing - G…
Panel (membrane) absorbers
— a thin panel (wood, drywall) mounted with an air gap behind it absorbs low-frequency energy as the p…
Panel 1: Radar Profile Comparison
— Shows 8 core metrics in spider chart format - Overlays 2-3 prospects simultaneously - Uses consisten…
Panel 2: Percentile Context Chart
— Horizontal bars showing percentile ranking for each metric - Color-coded zones (Elite/Above Average/…
Panel 3: Historical Comparison
— Identifies 5 most similar NFL players based on college profile - Shows how those players performed i…
Panel 4: Situational Splits
— Heatmap showing performance by down/distance - Comparison of red zone efficiency - Third-down conver…
Panel attrition
— The dropout of respondents between waves of a *longitudinal panel survey*. Attrition is typically no…
Panel conditioning
— The effect of prior survey participation on respondents' subsequent attitudes and behavior. Responde…
Panel Replacement: What to Expect
— Work takes one full day - Power to the entire house is off for most of the day - A permit is require…
panel study
— a survey that interviews the same respondents multiple times before and after events of interest. Th…
Pangaea
— the vast landmass that combined nearly all of Earth's continents into one — was assembling. The Afri…
Panopticism
— Michel Foucault's theoretical analysis, derived from Jeremy Bentham's panopticon design, of a modern…
panopticon
— Jeremy Bentham's 18th-century prison design in which a central watchtower allows a single guard to o…
Paper trading with live data
— As discussed in Section 19.10, building a paper trading engine against live market data is the most …
Paradigm
— A set of shared assumptions, methods, and values that define a scientific community's approach to pr…
paradigm capture
— the inability of scientists deeply embedded in a prevailing theoretical framework to recognize evide…
Paradigm shift
— A fundamental change in the basic concepts and experimental practices of a scientific discipline; ex…
Paradox of choice
— Barry Schwartz's (2004) argument that an abundance of options produces decision paralysis, lower sat…
Paragraph
— A named block of code in the COBOL Procedure Division, terminated by the next paragraph or section n…
Paragraph extraction
— Move nested logic into separate, well-named paragraphs. Advantage: Each paragraph has a single respo…
Paragraph Library Copybooks
— Encapsulate standard procedure code (error logging, date formatting). Document all prerequisites in …
Paralanguage
— The vocal qualities that accompany words: tone, pace, volume, pitch, prosody, and vocal quality. Par…
Parallel design outperforms guest appearance
— each creator appears in their strongest form in their own format 3. **Genuine content interest drive…
parallel partitioning
— splitting the 5 million accounts into multiple partitions and processing them simultaneously:
Parallel vote tabulation
— A method of election verification that samples a random selection of polling stations and tallies re…
PARALLELISM 4
— Number of parallel backup agents. Increase this on systems with multiple I/O paths.
parameter
— a variable that represents the input the function expects. When you call the function, you'll pass i…
Parameter Modes (IN/OUT/INOUT)
— Directionality modifiers on stored procedure parameters. IN passes data to the procedure, OUT return…
Parameter order mismatch
— the CALL USING lists parameters in a different order than the PROCEDURE DIVISION USING; diagnose by …
Parameter size mismatches cause storage overlays
— one of the hardest bugs to diagnose. The called program may write beyond the bounds of the actual pa…
PARAMETER STYLE GENERAL
— DB2 passes parameters directly as host variables. This is the standard for COBOL. The alternative, P…
PARAMETER STYLE SQL
— The parameter passing convention required for UDFs. Includes null indicators, SQLSTATE, function nam…
Parameterized Copybooks
— Use replacement tokens (`:PREFIX:`, `:TAG:`) for copybooks that will be COPYed multiple times with d…
parameters
— adjustable values that determine how the model transforms inputs into predictions. During training, …
Parameters:
— `game_id` (string): Specific game ID - `team` (string): Filter by team - `season` (integer): Filter …
Paraphrasing
— The practice of restating another person's words in your own language to confirm understanding; alwa…
Parasocial bond-building plan (first 10 videos):
— **Self-disclosure:** Progressively share: fitness background (Video 1-2), personal motivation/why I …
parasocial identity investment
— the extension of self-concept into parasocial relationships and community positions. At moderate lev…
parasocial interaction
— the one-sided relationship where viewers feel they genuinely know, like, and trust a person on scree…
Parasocial pressure
— the experience of having a large number of people who feel a meaningful relationship with you while …
Parasocial Relationship
— A one-sided emotional connection that an audience member develops with a creator. The viewer feels i…
parasocial relationships
— first theorized by sociologists Horton and Wohl in 1956 — describes the one-sided relationships that…
Parasocial relationships and emotion
— The emotional dynamics of one-sided relationships with media figures. We'll explore this in depth in…
parasocial resonance
— a connection between the listener's observation of a celebrity relationship narrative and their own …
Parental investment theory
— Robert Trivers's (1972) evolutionary theory proposing that the sex that invests more in offspring (t…
Pareto index
— determines how extreme the concentration is. A lower exponent means more extreme inequality; a highe…
parity
— either even ($\psi(-x) = \psi(x)$) or odd ($\psi(-x) = -\psi(x)$).
Parliamentary system
— A system of government in which the executive emerges from the legislature and is accountable to it;…
Parse
— Syntax validation, object resolution 2. **Semantic check** — Authorization, data type compatibility …
Part (a): Annual expected value of risk reduction
— Annual expected cost before technology: 9% × £2,000,000 = £180,000 - Technology reduces enforcement …
Part 1 — Task Analysis:
— What is the task? - Who is the intended audience for the output? - What does "excellent" look like f…
Part 1: Baseline
— What is the federal estate tax? Describe the actual policy: what it taxes, at what rates, with what …
Part 1: Current Media Literacy Education
— What media literacy education currently exists in your community? (Check K-12 curriculum documents, …
Part 1: Executive Session (30-60 minutes)
— Audience: CIO, CISO, CTO, VP of Engineering, legal counsel, risk manager - Content: Executive summar…
Part 1: Validity Assessment
— What validity evidence is required (type, source, independence)? - What is the minimum acceptable st…
Part 2 (Network Fundamentals and Reconnaissance):
— Multiple target VMs simulating different network segments - pfSense router for network segmentation
Part 2: Adverse Impact Assessment
— What adverse impact data must the vendor provide? - What is your organization's threshold for accept…
Part 2: Technical Deep-Dive (60-120 minutes)
— Audience: Security team, development leads, system administrators, network engineers - Content: Deta…
Part 2: Techniques | Chapter 8 of 40
— > *"The broad masses of a nation are not made up of diplomats or professors of public jurisprudence …
Part 3 (Web Application Hacking):
— DVWA with multiple security levels - OWASP Juice Shop (simulating ShopStack-like functionality) - Cu…
Part 3: Accommodation and Accessibility
— What accommodation alternatives must be available? - How must accommodation be communicated to candi…
Part 3: Ethical analysis
— At what point, if any, does a genuine commercial-advocacy alignment (a company that sincerely holds …
Part 3: Platform and Channel Mapping
— What platforms and channels does your target community primarily use for information? - What are the…
Part 4 (System and Network Attacks):
— Windows Active Directory lab (Domain Controller + member servers + workstations) - Simulated MedSecu…
Part 4: Contract and Liability
— What contractual representations must the vendor make? - What remedies does your contract provide if…
Part 4: Historical Cases | Chapter 19 of 40
— These exercises are designed to be completed individually or in seminar groups after reading the cha…
Part 5 (Wireless and Advanced Topics):
— Wireless testing setup (requires a compatible wireless adapter) - IoT device simulation
Part 6 (Advanced and Professional Topics):
— Multi-domain Active Directory forest - Cloud environment integration (AWS free tier)
Part 7: Staying Current and Looking Forward.
— ## The Chapters Ahead
Part a) Scheduled reviews per year:
— High Risk (5% of 15,000 = 750): semi-annual review = 750 × 2 = **1,500 reviews/year** - Medium Risk …
Part A: Frame Identification
— Collect five to ten actual examples of language used about this topic from different sources (news a…
Part A: Mapping the Surface
— What is the ostensible topic of this conflict? (What are you usually fighting about on the surface?)…
Part and Weekly Structure:
— Part 1 (Foundations): Weeks 1–5, Chapters 1–5 - Part 2 (Historical Cases): Weeks 6–10, Chapters 6–10…
Part B Guidance:
— Question 16 should reference the normalization of surveillance and the difficulty of contesting back…
Part B Rubric:
— Full credit: accurate description with specific textual reference and identification of what each co…
Part B: Frame History
— Research the origin of the most successful framing terms in your debate. When did this language firs…
Part B: Surveillance Threshold Assessment
— Cancel ratio (0.875 = 87.5%): exceeds the 0.85 threshold. - Size asymmetry ratio (5.15): exceeds the…
Part C Rubric (15 points):
— Position clarity and defense (4 pts): Does the student take and sustain a clear position? - Use of c…
Part c) Compliant kill switch design:
— **Activation authority:** Single authorized individual (Head of Compliance, Head of Risk, or designa…
Part C: Frame Effect
— Propose an alternative framing for the same policy debate that makes different values salient. Does …
Part C: The Payoff Audit
— What might this conflict be giving you? (List possibilities honestly, even uncomfortable ones.) - Wh…
Part D: Your Contribution
— At what point in the loop do you first become aware you're in the pattern? - What is your automatic …
Part E: The Dream Level
— What do you most deeply need, at the core, in this relationship or situation? - What do you imagine …
Part F: Sustainability
— What is this conflict costing you? - What would be different if this conflict were managed well — no…
Part I
— You download the data and take your first look. What's in here? What are the columns? What questions…
Part I (Ch 1-7): Wave Mechanics
— Builds intuition and computational skill in position-space quantum mechanics. Students learn to solv…
Part I (Chapters 1–5): Foundations
— Why do we believe what we believe? What makes a source trustworthy? How do cognitive biases and soci…
Part I is fully linear
— beginners need to build skills in a specific order. - **Later parts have more flexibility** — once y…
Part I: Foundations
— Feedback loops, emergence, power laws, phase transitions, signal and noise - **Part II: How Things F…
Part I: Foundations Revisited
— COBOL landscape, environment setup, program structure, data description, numeric precision - **Part …
Part I: The Land Before (Ch. 1-4)
— Geological formation, ten thousand years of Indigenous life, the Cherokee civilization, and the cata…
Part I: Welcome to Data Science (Chapters 1--6)
— Establishes Python fundamentals and the mindset of data analysis using pure Python, creating product…
Part I: What Is AI?
— Foundations, history, how machines learn - **Part II: How AI Works** — Data, LLMs, computer vision -…
Part II (Chapters 6–10): The Information Ecosystem
— How did we get here? From the penny press to the attention economy, this part traces the structural …
Part II: The Persistence Engine
— how wrong ideas STAY. Chapter 9: The Sunk Cost of Consensus.
Part III (Chapters 11–18): Types and Mechanisms
— What kinds of misinformation exist, and how does each work? This part is a field guide to the specif…
Part III: The Correction
— How wrong ideas finally die. Chapter 17: Planck's Principle.
Part IV (Chapters 19–24): Detection and Analysis
— How do we identify misinformation? Professional fact-checking, source evaluation, data literacy, and…
Part IV: Field Autopsies
— applying everything from Parts I–III to eight specific disciplines for deep diagnostic examination.
Part IV: Labor (Chapters 17–20)
— running in parallel with Production — examines the economic dimensions of fan activity: the concept …
Part IV: Learning in Specific Contexts
— where you'll apply everything you've learned to specific learning situations. First up:
Part V (Chapters 25–29): Critical Thinking Skills
— The cognitive toolkit for resistance: logic, scientific thinking, probabilistic reasoning, lateral r…
Part VI (Chapters 30–33): Political Dimensions
— Democracy, polarization, state-sponsored disinformation, election interference, and global policy re…
Part VII (Chapters 34–38): Countermeasures
— Platform content moderation, inoculation theory, education-based interventions, regulatory approache…
Part VIII (Chapters 39–41): Advanced Topics
— Generative AI, global perspectives, and the ethics of truth. Graduate-level extensions of the core m…
Partial
— Any sinusoidal frequency component of a complex tone, whether or not it is harmonically related to t…
partial dependency
— a non-key attribute depends on only part of the composite primary key.
partial fill
— the incoming order was only partially matched.
Partial trace
— Ch 23.4 The operation that produces the reduced density matrix of a subsystem by tracing over the de…
Partial wave analysis
— Ch 22.4 A method for analyzing scattering by expanding the scattering amplitude in terms of angular …
participate in it
— creating their own version, adding their own twist, and spreading it through action rather than pass…
participation pressure
— the social cost of NOT participating can feel higher than the physical or emotional cost of particip…
participation threshold
— the balance between accessibility and impressiveness.
Participation Threshold Analysis:
— Easy enough? Yes — everyone has access to old photos - Achievement feel? Moderate — vulnerability cr…
Participatory culture
— Media environments with low barriers to creative expression, strong social support for sharing conte…
Participatory governance
— An approach to AI deployment in which affected communities participate in decisions about whether an…
participatory music
— music made by everyone present, for no one outside the room.
Participatory surveillance
— Mark Andrejevic's term for surveillance systems in which users actively participate in generating th…
Partisan nonresponse
— A specific form of *differential response* in which partisans of one party are less likely to respon…
Partisan nonresponse bias
— The differential tendency of members of one party to decline survey participation, independent of de…
partisan realignment
— a genuine restructuring of which social groups belong to which party. The most significant ongoing r…
Partisan sorting
— the alignment of ideology with party identity — has produced parties that are more ideologically coh…
Partisan Sorting (Not the Same as Polarization)
— Sorting: the process by which liberals have become Democrats and conservatives have become Republica…
partition
— a set of disjoint index sets that cover all outcomes.
partition sale
— a forced sale of the entire property, with the proceeds divided among the heirs.
Partnering with existing groups
— developer meetups, startup communities, makerspaces, coding bootcamps — to add vibe coding content t…
Partnership on AI
— *Focus:* Multi-stakeholder collaboration on AI's impact on society - *Members:* Technology companies…
Partnership on AI (PAI)
— Founded in 2016 by Amazon, Facebook, Google, IBM, Microsoft, and Apple (joined shortly after), PAI h…
PARTY
— Any person or organization that participates in the insurance ecosystem. | Attribute | Type | Notes …
Party committees
— the Democratic National Committee (DNC), Republican National Committee (RNC), and their House (DCCC/…
Party identification
— A long-standing psychological attachment to a political party that shapes how individuals perceive a…
Party Identification (Michigan Model)
— A psychological attachment to a political party — distinct from registration, voting behavior, and i…
PASS
— `3 * 4 == 12` is True - `test_multiply_by_zero`: **PASS** — `5 * 0 == 0` is True - `test_multiply_st…
Pass Attempts:
— Do spikes count? - What about aborted plays?
Pass rush and coverage interact
— neither exists independently 4. **Turnovers are largely random** - don't overweight them 5. **Indivi…
Pass rush win rate model
— Use tracking data if available - Feature engineering - Predict future success
pass@k
— A **benchmark** metric that measures the probability of generating at least one correct solution wit…
Passes Per Defensive Action (PPDA)
— A pressing intensity metric computed as opponent passes allowed divided by a team's defensive action…
Passing
— Passes made and received - Potential assists - Assist points created
Passing has higher variance than rushing
— Both the upside and downside are greater 2. **Turnovers are devastating** - An interception costs 4+…
Passing Stats (1st Half):
— Colts: 4/12, 31 yards, 2 INTs - Bills: 3/7, 28 yards
Passion
— the drive for physical union, romantic excitement, and arousal. Passion tends to be most intense ear…
Passion Audit
— list what you genuinely care about (behavior-based, not aspiration-based) 2. **Audience Check** — se…
Passion Projects aren't dead ends
— passionate creators in small niches often build intensely loyal communities that can expand
Passionate love
— Intense, emotionally aroused, often obsessive romantic love characterized by strong desire for union…
Passive acoustic monitoring
— The use of sensors and recording equipment to detect and analyze sounds in an environment — typicall…
passive harm
— harm that results not from what you did, but from what you declined to do when you were positioned a…
Passive Interception (Sniffing):
— Capture unencrypted credentials (HTTP Basic Auth, FTP, Telnet, SMTP) - Read unencrypted email conten…
passive resonance
— acoustic energy being transferred to strings that are not directly excited.
Passive social media use
— scrolling and viewing others' content; more consistently associated with negative wellbeing outcomes
Password policy effectiveness
— If MedSecure's password policy produces passwords similar to the RockYou distribution (mostly 8 char…
Password Spraying:
— Spray top 5 common passwords against all domain accounts
Past SOS (actual results):
— Uses opponent records from completed games - Subject to randomness in results - Can be compared to e…
patch corruption
— corrupting a small number of patches can disproportionately affect performance, whereas CNNs degrade…
patch updates
— developer-released modifications to game balance, maps, and mechanics --- that can fundamentally alt…
PATH
— In VSAM, a catalog entry that connects an *alternate index* to its *base cluster*, allowing programs…
Path dependence
— The phenomenon whereby earlier events and decisions constrain later possibilities, so that history m…
Path integral
— Ch 31.1 Feynman's formulation of quantum mechanics: the probability amplitude for a particle to trav…
Pathos
— the emotional state of the audience. Aristotle recognized that an audience's emotional condition sha…
Paths to contribution
— new members should quickly see how they can contribute, not just consume. The #content-creator-corne…
Patient Portal Attacks:
— Exploit identified web vulnerabilities (SQLi, XSS, IDOR, authentication bypass, etc.). - Demonstrate…
Patreon
— A membership platform that allows creators to receive recurring payments from their audience in exch…
Patreon/membership tiers:
— Lower ($2-5): Credits, supporter Discord, early access - Mid ($8-15): Behind-the-scenes, Q&A session…
Patrick Ferguson
— British major commanding Loyalist militia in the Carolina piedmont; killed at the Battle of Kings Mo…
Patron:
— Name, library card number - List of current loans - Contact email
Pattern
— Repetition or near-repetition of temporal structures (distinguishes musical rhythm from random noise…
Pattern detection
— the visual cortex identifies a pattern in progress (symmetry being created, process approaching comp…
Pattern interrupt
— blurred screen and "I changed my mind every time" defies the typical reaction opening 2. **Curiosity…
Pattern Library
— a personal reference that catalogs each pattern you encounter, maps its appearances across domains, …
Pattern mapping questions:
— How many times has a version of this happened? - What do all the instances have in common? - Is the …
Pattern name
— What is this pattern called? 2. **One-sentence description** -- What does this pattern do? 3. **Doma…
pattern recognition
— the rapid, often unconscious identification of meaningful configurations in complex information. Exp…
Pattern: Distributed vs. Centralized Architecture
— **One-sentence definition:** The structural tension between concentrating decision-making authority …
Pattern: Explore/Exploit Tradeoff
— **One-sentence definition:** The fundamental tension between gathering new information (exploration)…
PatternFill
— An openpyxl style object that controls background color of a cell. Created with `PatternFill(fill_ty…
Patterns to look for:
— Correlation between emotional state and bet sizing deviations. - Degradation of process compliance d…
Patterson's 6 Interceptions:
— 1 in red zone - 3 on third down - 2 on first down
Pauli exclusion principle
— Ch 15.3 No two identical fermions can occupy the same quantum state. This follows from the requireme…
Pauli matrices
— Ch 13.2 The three $2\times 2$ matrices $\sigma_x = \begin{pmatrix}0&1\\1&0\end{pmatrix}$, $\sigma_y …
Paved streets and sidewalks
— a luxury that most mountain communities, including the county seat of Harlan, would not enjoy for ye…
Pay special attention to:
— Outlets serving high-draw devices (space heaters, microwaves, window ACs) - Outlets with multiple th…
Pay-Per-Click (PPC)
— An advertising model where advertisers pay only when a user clicks their ad. Google Search and many …
payer mix
— the ratio of well-insured to poorly insured or uninsured patients — means that rural hospitals consi…
Payload development considerations:
— Avoid known malware signatures and behaviors - Use direct system calls instead of API calls that are…
PAYMENT
— [ ] **5. Total fee is explicitly stated.** The exact dollar amount is written in the agreement, not …
Payment calculation
— "If payments are late, we make national news." 2. **Eligibility determination** — "If eligibility is…
Payment features (financial signals):
— `payment_failures_last_year` — billing issues are a leading indicator - `days_since_last_payment_fai…
Payment processing
— the ability to process customer payments (debits, BACS, Faster Payments, international wires). Disru…
Payment Processing Logic:
— Analyze the Stripe integration. Does ShopStack validate the payment amount on the server side after …
Payment Processing:
— Stripe Connect integration for payment processing and merchant payouts. - PCI DSS compliance achieve…
Payoff (final 5–10 seconds):
— What is the payoff? (Reveal, CTA, emotional peak, cliffhanger) - Does it deliver on what the hook pr…
Payscale
— https://www.payscale.com/ - Salary benchmarking
PBP Stats
— https://www.pbpstats.com/ - Detailed play-by-play derived statistics
PCA:
— Linear dimensionality reduction - Preserves global structure - Components may be hard to interpret
PCBs and PSBs:
— The PSB defines a program's authorized view of IMS databases. - Each PCB represents one database vie…
PCI DSS Evolution:
— Version 1.0 (2004): Basic security requirements - Version 2.0 (2010): Enhanced scoping guidance, mor…
PCI DSS:
— Requirement 11.4 mandates internal and external penetration testing annually - PCI pentests must cov…
PDS
— Partitioned Data Set. A z/OS dataset organized as a directory of members, similar to a folder contai…
PDSE
— Partitioned Data Set Extended. An enhanced version of *PDS* that supports dynamic directory expansio…
PDSLIB
— Points to the PDS containing the COBOL copybook - **REQMEM / RESPMEM** — The 01-level names for requ…
Peak Content
— A piece of content that represents the highest quality, creative ambition, or production value a cre…
peak flow rate
— how fast the water comes during the most intense part of the storm. HVAC and plumbing engineers use …
peak-end rule
— the brain's tendency to judge an experience not by its average quality, but by its most intense mome…
PEER
— meaning the standby has replayed all received log records and is in sync with the primary within the…
peer instruction
— a structured teaching method developed by Harvard physicist Eric Mazur that applies the protege effe…
Peer norming
— The process by which individuals adjust their beliefs and behaviors to match perceived social norms …
Peer recovery coaches
— sometimes called recovery support specialists — were people who had experienced addiction themselves…
Peer review gatekeeping
— Asymmetric scrutiny of paradigm-challenging work 2. **Conference culture** — In-group citation and v…
Peer review status:
— Has the research been peer-reviewed, or is it a preprint (posted to a repository before review)? Pre…
peer set
— is one of the most consequential decisions in player evaluation. Common peer sets include:
Penalty Area (Box)
— The 18-yard rectangular area in front of each goal. Shots from inside the box are significantly more…
PENDING_TRANSACTION
— Transactions not yet posted (holds, pending ACH).
Penetration Testing
— Georgia Weidman. Practical introduction to penetration testing with Kali Linux and Metasploit. Excel…
Penetration testing is appropriate when:
— You need to assess the security of a specific application, network, or system - Compliance requireme…
Penny Press
— The low-cost American newspapers of the 1830s (beginning with Benjamin Day's New York Sun in 1833) t…
Pentagon Entertainment Liaison Office
— The Department of Defense office responsible for coordinating with film and television productions, …
Pentatonic scale
— A five-note scale per octave. The major pentatonic (e.g., C-D-E-G-A) and minor pentatonic are the mo…
People agility
— the ability to learn from and with others, to seek feedback, and to adapt your communication to diff…
People analytics
— The application of data analysis to human resources functions, including hiring, performance managem…
People KPIs:
— Team retention rate - Skill development and certification completion - Internal stakeholder satisfac…
Peoples Temple / Jonestown (1978)
— The gradient from genuine social justice work to totalistic coercion; intelligent, idealistic people…
PEP (Python Enhancement Proposal)
— The process for proposing changes to Python. PEP 8 defines the standard style guide; PEP 484 introdu…
PEP 8
— the style guide published by the Python core team.
PEP-specific verification
— PEP status confirmation (commercial database check) - Role description and period of tenure document…
Peptic Ulcers
— Marshall & Warren vs. the gastroenterology establishment (30 years) 2. **Dietary Fat Hypothesis** — …
Peptic Ulcers (Marshall & H. pylori)
— The 30-year wrong consensus. Authority cascade + sunk cost + outsider punishment in one story. (Medi…
Peptic ulcers / Marshall & Warren
— Deep treatment Ch.2, referenced in Ch.9, Ch.14, Ch.17, Ch.18. Most frequent anchor. 2. **Dietary fat…
Per Bak
— self-organized criticality (1987) - **Edward Lorenz** — butterfly effect, chaos in weather (1960s) -…
Per capita distribution
— The payment of a share of tribal gaming revenue directly to enrolled tribal members.
Per round-trip trade:
— Spread cost: 3 cents × 50 contracts = $1.50 - Entry fee: $0.01 × 50 = $0.50 - Exit fee: $0.01 × 50 =…
Per-100-Possession Rates:
— Points: 32.8 - Rebounds: 8.1 - Assists: 8.4
Per-90 Metrics
— Statistics normalized to a 90-minute match equivalent by dividing by minutes played and multiplying …
Per-Bet Entry (complete for each bet placed):
— Standard bet log fields (sport, market, odds, stake, model probability) - Time spent on analysis (mi…
Per-technique reporting:
— Technique ID and name - Procedure used (specific tool, command, method) - Timestamp and target syste…
Per-transaction performance budgets:
— Account inquiry: < 0.5 seconds elapsed, < 50ms CPU - Balance transfer: < 1.0 seconds elapsed, < 100m…
Perceived benefits of speaking up:
— The problem gets addressed - The organization improves - The person who spoke up may be recognized f…
Perceived costs of speaking up:
— Being seen as incompetent ("I don't understand the reasoning behind the decision") - Being seen as d…
perceived loneliness
— the subjective experience of insufficient connection — was more predictive of health outcomes than t…
Perceived similarity
— The subjective sense that a potential partner shares one's values and traits; stronger predictor of …
Perceived vastness
— the stimulus feels larger than the self 2. **Need for accommodation** — existing mental frameworks c…
Perceiving emotions
— accurately reading emotional information in faces, voices, images 2. **Using emotions** — harnessing…
Percentage of missing values
— Under 2-5%: consider dropping. Over 20%: consider dropping the column entirely. Between: assess furt…
Percentage-of-bankroll at 2%:
— The expected growth factor per bet is:
Percentiles and quartiles
— **Basic data visualization:** histograms, scatter plots, box plots
Perception
— Does the human visual system process this chart effectively? 2. **Accessibility** — Can everyone in …
Perception and psychophysics
— which study basic sensory processing — have high replication rates. The reason: the phenomena are di…
Perception is construction
— the brain builds an experience of reality from sensory data, using expectation, memory, attention, a…
Perception is multi-sensory
— the brain integrates information from multiple modalities, and the combined product is not simply th…
Perceptual audio coding
— the family of algorithms that includes MPEG Layer 3 (MP3), AAC, and Ogg Vorbis — exploited psychoaco…
Perceptual non-uniformity
— equal data differences produce unequal perceived color differences, so some data variations appear l…
Perceptual principles
— how the human visual system processes charts, and how to design for it. 2. **Accessibility** — how t…
Perceptual Recovery:
— Subjective wellness questionnaires (fatigue, muscle soreness, mood, sleep quality, stress). - Typica…
perceptual screen
— a lens through which voters process all incoming political information. When Rosa encounters a news …
perceptually fuse
— to lose their independence and sound like a single voice. When the soprano and alto move in parallel…
percolation threshold
— below which fire almost never crosses the grid and above which it almost always does. For a simple s…
perfect classifier
— it achieves 100% true positive rate with 0% false positive rate. AUC = 1.0. This rarely happens in p…
PERFORM
— A COBOL statement that transfers control to a paragraph or section (out-of-line) or executes inline …
PERFORM range scoping
— Instead of `PERFORM 2100-VALIDATE THRU 2300-UPDATE`, you can `PERFORM 2000-PROCESSING`. The section …
PERFORM statement
— A COBOL statement that transfers control to a paragraph, section, or inline code block, with optiona…
Performance
— Dashboard load time: < 3 seconds - Real-time updates: < 5 seconds latency - Query response: < 30 sec…
Performance Analysis:
— Advanced metrics beyond basic statistics - Focus on repeatable, skill-based performance - Identifica…
Performance Analysts:
— Prepare opposition analysis and reports - Support coaches with tactical insights - Create video comp…
Performance characteristics:
— Excellent sequential prefetch utilization (32-page or 64-page reads) - Predictable elapsed time prop…
Performance comparison:
— Your video vs. your typical performance: outperformance, typical, underperformance? - What metric mo…
Performance criteria:
— Relevance score >= 70% (measured over 30-day rolling window, N >= 10,000 recommendations) - Latency:…
Performance Data:
— High school statistics - Camp and combine performances - Game film evaluations - All-star game appea…
Performance depends on:
— MATCHCOLS (more matching = narrower search = fewer leaf pages scanned) - CLUSTERRATIO/CLUSTERED (det…
Performance Dimensions:
— EPA (Expected Points Added) - WPA (Win Probability Added) - Success rate (binary outcome) - Yards ga…
Performance Evaluation:
— The sample size problem is severe: confirming a 3% edge requires 4,000+ bets - CLV provides a faster…
Performance factors:
— Goal contributions (goals, assists, expected goals) - Defensive metrics (tackles, interceptions, pre…
Performance fundamentals
— CPU time, elapsed time, I/O counts, and memory usage as the four pillars of mainframe performance me…
Performance impact:
— The split itself requires multiple I/O operations (read original CI, write both CIs, update index). …
Performance model
— Given the following assumptions (500 API calls/second peak, 200ms average backend response time, 10%…
Performance monitoring
— Is the model's accuracy degrading? Are precision and recall shifting? 2. **Data drift monitoring** —…
Performance regression test
— mandatory for all packages that show access path changes. Run the affected program in the test envir…
Performance Section:
— Elapsed time - Wait time (I/O wait, ENQ wait, page wait) - Number of EXCPs (I/O operations) by DD na…
Performance:
— 2015-16: +25.4 net rating in 281 minutes - 2016-17: +16.9 net rating with Durant replacing Barnes - …
Performative surveillance
— Surveillance that is not primarily about gathering information but about communicating power, demons…
performed peace
— the surface appearance of harmony maintained by the systematic suppression of anything that might di…
Perimeter security:
— Fencing, gates, and barriers - Exterior lighting - Security cameras (coverage gaps, dummy cameras) -…
Period A ($17 price):
— Landing page visits: 4,240 (from TikTok bio link + email sequences) - Units sold: 178 - Conversion r…
Period B ($27 price):
— Landing page visits: 4,810 (her audience had grown, hence more traffic) - Units sold: 149 - Conversi…
Periodic jitter
— jitter that oscillates at a fixed frequency — introduces sidebands around each spectral component in…
Periodicity
— The property of a signal that exactly repeats itself after a fixed interval (the period T = 1/f). St…
Peripheral route processing
— Processing of a persuasive message through attention to cues (speaker attractiveness, emotional tone…
Peripheral route processing (ELM)
— The persuasion pathway involving heuristic cues (source attractiveness, social proof, authority sign…
permanent accounts
— their balances carry forward from one year to the next. Cash does not reset to zero on January 1; ac…
Permanently available alternative (PAA)
— The continuing presence of a dating app and its options even while a user is actively pursuing a par…
Permissionless blockchains
— Bitcoin, Ethereum, and most public cryptocurrencies — are open networks. Anyone can participate as a…
Permits are typically not required for:
— Like-for-like fixture replacements (replacing a faucet, a toilet, an outlet cover) - Painting, floor…
Permits are typically required for:
— Any structural work (adding, removing, or modifying walls — especially load-bearing walls) - Electri…
perpetual problems
— recurring differences that do not get resolved, because they reflect genuine differences in personal…
Perplexity
— perplexity.ai Real-time web search with citations. Best for current events and time-sensitive resear…
Perry Cline
— a McCoy relative by marriage — held legal title to approximately 5,000 acres of timberland on the We…
Persist across records (never INITIALIZE):
— Counters (they accumulate) - Running total accumulators (they accumulate) - Constants (they never ch…
Persistence Mechanisms (Documentation Only):
— Identify persistence mechanisms that a real attacker might establish: scheduled tasks, startup scrip…
Persistent disk
— Storage that survives container restarts and redeployments. Required for applications that write dat…
Persistent disk + pipeline update
— configure a Render Persistent Disk at `/app/data`, update the automated data pipeline to write to a …
persistent identification
— the ability to know who you are, wherever you are, without your knowledge or consent.
Persona (Creator)
— The consistent, legible version of a creator's identity as expressed through their content. Not a ma…
Personal Brand
— The sum of how a creator presents themselves — their values, aesthetic, voice, expertise, and reputa…
Personal contact mobilizes
— the Green-Gerber research tradition has firmly established that high-quality personal outreach incre…
Personal loans
— up to $50,000, terms of 12-60 months 2. **Auto loans** -- up to $100,000, terms of 12-60 months 3. *…
personal myth
— an internalized, evolving story about who we are that integrates our past, our present, and an antic…
Personal projects
— Build things you care about using concepts from the course 2. **Open source** — Start small (documen…
Personal strength
— "I discovered how strong I actually am" 2. **New possibilities** — previously unavailable paths or i…
Personal unsecured loans
— $1,000 to $25,000, terms of 12 to 60 months 2. **Auto loans (new vehicles)** -- $5,000 to $75,000, t…
Personal Website / Blog:
— A professional website with your portfolio, writings, and contact information establishes you as a s…
Personality
— The relatively stable individual differences in thoughts, feelings, and behavior that characterize a…
personality paradox
— is that personality is best understood as **if-then behavioral signatures**: patterns of responding …
Personalization
— Taking excessive causal responsibility for outcomes that involve many factors outside one's control.
Personalization at scale
— true individual-level message generation calibrated to each voter's specific profile — is qualitativ…
Personalized audio experiences
— music or soundscapes tailored to specific contexts, events, or customer segments.
Personnel changes:
— Added a power-running package - Elevated a blocking tight end - Used heavier personnel groupings in …
Persuadability score
— An individual-level model estimate of how responsive a voter is to campaign communication. High pers…
Persuasion rate
— In campaign field experiments, the estimated percentage of contacted voters who changed their vote i…
Persuasion Strategy:
— Primary contact mode: ☐ Direct mail ☐ Digital ads ☐ Phone ☐ Door ☐ Other: ___ - Number of touches pl…
Persuasion universe
— The group of genuinely undecided voters a campaign targets with persuasion contact.
perturbation
— swap two elements, adjust a parameter, flip a bit. Calculate how this change affects the quality of …
Perturbation theory
— Ch 17.1 A method for approximating the eigenstates and eigenvalues of a Hamiltonian $\hat{H} = \hat{…
Perturbation theory results:
— First-order energies: $E_1^{(1)} = 0$, $E_2^{(1)} = 0$. - Second-order energies: $E_1^{(2)} = |V|^2/…
Perverse incentive
— An incentive structure that produces behavior opposite to what was intended; the mechanism underlyin…
Pest activity
— termites, carpenter ants, and rodents prefer moist wood
PETs are shifting from theory to practice
— differential privacy, federated learning, and synthetic data are available tools for enabling data u…
PFF (Pro Football Focus)
— Advanced football metrics articles - Tracking data insights
PFF Forecast
— Weekly analytics discussion - Methodology explanations - Industry interviews
PFF Grades:
— 90+: All-Pro - 80-89: Pro Bowl - 70-79: Starter - 60-69: Average - 50-59: Below average - <50: Backu…
PFF Research
— Grading methodology - Projection systems - Data-driven analysis
PFLAG Creator Resources
— pflag.org PFLAG provides resources for LGBTQ+ individuals building businesses, including connections…
Phase
— The position within an oscillation cycle at a given moment, expressed as an angle in degrees or radi…
Phase 0: Prepare (Weeks 1-4)
— Wrap the existing BALINQ CICS transaction as a REST web service using z/OS Connect (you built this i…
Phase 1 (Months 1-3): Leadership
— Hire VP of Basketball Analytics - Hire Director of Data Engineering
Phase 1 (Months 1-6): Foundation
— Establish AWS landing zone - Set up Micro Focus Enterprise Server on EC2 - Migrate 3 development env…
Phase 1 (Months 1-6): Stabilize and Enable
— What immediate actions address the batch window crisis and the security audit findings? - How do you…
Phase 1 (Months 1–3): Foundation
— What legal structure will you establish (or are you already in)? - Will you form an LLC? Which state…
Phase 1 (Weeks 1-2): Foundation documents
— Engagement scope and objectives document - Client background — 800-word summary of the firm's histor…
Phase 1 (Weeks 1-3): Infrastructure preparation
— Install and configure coupling facilities on both CPCs - Define CFRM policies with all required stru…
Phase 1 — Foundation (Week 1-2):
— Formatting (ruff format) - Basic linting (ruff check with default rules) - Existing tests must pass
Phase 1: Analysis
— Ask the AI to analyze the repository map and identify all files that need to change. 2. **Phase 2: P…
Phase 1: Assessment (2-4 weeks)
— Identify 5-10 candidate questions where forecasting accuracy matters - Assess cultural readiness and…
Phase 1: Awareness (Month 1-2)
— Demonstrate the DevOps toolchain to the entire team - Show real examples from other mainframe shops …
Phase 1: Build foundations (3-6 months).
— Complete this textbook, including the Python exercises and the capstone. - Take Andrew Ng's Machine …
Phase 1: Build the Modern Service (Weeks 5-10)
— Implement the balance-inquiry microservice in the target language/platform - Use BigDecimal (or equi…
Phase 1: Concrete Experience
— You do something. You participate in an activity, attempt a task, engage with a situation. This is t…
Phase 1: Critique
— Identify what is wrong, missing, or suboptimal in the current output. Be specific. "This is not righ…
Phase 1: Declaration (0-5 minutes)
— Confirm site failure (not just a network issue that makes the primary appear down) - Declare disaste…
Phase 1: Detection (0-15 minutes)
— Security monitoring tool generates alert - On-call security analyst validates the alert (true positi…
Phase 1: Establishing distrust (minutes 0-5)
— Attack the credibility of mainstream medicine and government health agencies - Invoke financial conf…
Phase 1: Exploratory Analysis (Discovery)
— Search freely through historical data for patterns. - Use the BH correction to control false discove…
Phase 1: External Reconnaissance (No Credentials)
— Cloud footprint discovery - S3/Blob/GCS bucket enumeration - Public-facing service identification - …
Phase 1: Foundation (Months 1-6)
— Established the Executive Data Governance Council with CFO sponsorship - Hired a Data Governance Pro…
Phase 1: Foundation (Weeks 1-4)
— Requirements gathering and stakeholder interviews - Architecture design and technology selection - D…
Phase 1: Inventory and Mapping
— Enumerate all software dependencies (direct and transitive) - Map CI/CD pipeline configurations and …
Phase 1: Know Your Situation
— [ ] Written statement of what happened and what you need (one paragraph; see Chapter 16's diagnostic…
Phase 1: Quick Wins (Months 1-6)
— Deploy 2-3 high-feasibility use cases with clear, measurable ROI - Establish foundational data infra…
Phase 1: Reconnaissance
— Identify container orchestration platform and version - Enumerate exposed ports and services - Disco…
Phase 1: Source Control Migration (Month 1-2)
— Migrated 1,247 COBOL programs from Endevor to Git - Maintained bi-directional sync with Endevor duri…
Phase 1: Standards (immediate)
— Published a formal COBOL coding standard document (modeled on GlobalBank's, with MedClaim-specific a…
Phase 2 (Months 13-24): Modified Option E — Hybrid
— Maker fee: $0.00 (remove rebate as liquidity is self-sustaining) - Taker fee: $0.01 - Resolution fee…
Phase 2 (Months 4-6): Core Team
— Hire Director of Player Evaluation - Hire Director of Basketball Strategy - Hire 2 Data Engineers/De…
Phase 2 (Months 4–12): Operations
— How will you handle quarterly estimated taxes? What safe harbor amount do you need to pay based on l…
Phase 2 (Months 7-12): Expose and Extend
— How do you deliver the web portal within the 18-month mandate without rewriting the backend? - What …
Phase 2 (Months 7-18): Batch Migration
— Migrate all 6,400 batch jobs to AWS - Convert VSAM files to Amazon Aurora PostgreSQL - Implement AWS…
Phase 2 — Strengthening (Week 3-4):
— Type checking (mypy with gradual strictness) - Security scanning (bandit) - Test coverage minimum (s…
Phase 2: Apply in your current role (3-6 months).
— Identify an AI opportunity in your current job and volunteer to lead or co-lead it. - Partner with y…
Phase 2: Automated Build (Month 3)
— Implemented IBM DBB for dependency-aware builds - Automated compile, link-edit, and CICS NEWCOPY - B…
Phase 2: Campaign Design (Week 3)
— Select target employees based on profiles - Design pretexts based on OSINT findings - Build email te…
Phase 2: Confirmation
— Test provisional hypotheses on held-out data (different seasons, different leagues, or prospective t…
Phase 2: Containment (15-60 minutes)
— Severity 1 (active data exfiltration): RACF ALTUSER REVOKE the compromised userid immediately - Seve…
Phase 2: Core Development (Weeks 5-12)
— Data ingestion pipeline implementation - EPA and core metrics calculation - Basic API development - …
Phase 2: Design (4-8 weeks)
— Select a market mechanism (continuous double auction, LMSR, etc.) - Design the incentive structure -…
Phase 2: Dynamic Analysis (Day 2-3)
— Install the application on test devices - Configure proxy interception - Bypass certificate pinning …
Phase 2: Education (Month 2-4)
— Git training for all developers (hands-on, with COBOL examples) - Jenkins/pipeline training for buil…
Phase 2: Foundation (Months 7-12)
— Deploy 3-4 additional use cases including first medium-complexity applications - Implement ML platfo…
Phase 2: GDPS Failover (5-20 minutes)
— GDPS controlling system at DR site takes control - Metro Mirror pairs are broken; DR volumes become …
Phase 2: Image Analysis
— Scan all accessible images for CVEs - Inspect image layers for embedded secrets - Review Dockerfiles…
Phase 2: Know Their Situation
— [ ] Name and title of the specific person who has authority to give you what you need - [ ] Understa…
Phase 2: Modify
— Request targeted changes. Frame your modifications clearly, distinguishing between things to add, re…
Phase 2: Operationalization (Months 7-18)
— Appointed 12 Domain Data Stewards across business units - Implemented a commercial data catalog (Ala…
Phase 2: Refactoring (ongoing)
— Identified the 30 most-modified programs for priority refactoring - Each refactoring included: consi…
Phase 2: Reflective Observation
— You step back and think about what happened. What did you notice? What went well? What went wrong? W…
Phase 2: Shadow Mode (Weeks 11-14)
— Deploy the modern service alongside the legacy - Configure the facade to shadow all balance-inquiry …
Phase 2: The Gallop itself (minutes 5-25)
— Rapid-fire presentation of 30-50 specific claims about vaccine ingredients, adverse events, studies,…
Phase 2: Vulnerability Assessment
— Scan all dependencies for known vulnerabilities (CVEs) - Check for end-of-life or unmaintained depen…
Phase 3 (Month 25+): Optimized Hybrid
— Maker fee: $0.00 - Taker fee: $0.008 - Resolution fee: $0.005 - Volume discounts for top traders - R…
Phase 3 (Months 13-24): Optimize and Sustain
— How do you introduce CI/CD and automated testing for a team that has never used either? - What is yo…
Phase 3 (Months 19-30): Online Migration
— Migrate all CICS transactions to Micro Focus Enterprise Server on EC2 - Convert BMS maps to web-base…
Phase 3 (Months 7-12): Build Out
— Hire Senior Analysts (2) - Hire Analysts (2) - Hire Cap Analyst
Phase 3 (Weeks 7-9): Add second member
— Install CF1B on CPC-2 - Start CF1B — it joins the existing data sharing group - Gradually shift 50% …
Phase 3 (Year 2–3): Optimization
— At what income level will you evaluate the S-Corp election? - What attorney relationships do you wan…
Phase 3 (Year 4-5): Optimization and Steady State
— Complete remaining refactoring - Hybrid architecture operational (Chapter 37) - Next-generation work…
Phase 3 — Maturity (Month 2+):
— Strict type checking - Complexity thresholds - Coverage minimum at 80% - Documentation coverage chec…
Phase 3: Abstract Conceptualization
— You develop theories, principles, or mental models based on your reflection. "I think this happened …
Phase 3: Advanced Features (Weeks 13-20)
— Win probability model development - Fourth-down decision engine - Opponent analysis automation - Rep…
Phase 3: API Testing (Day 3-4)
— Document all discovered API endpoints - Test authentication mechanisms (token generation, expiration…
Phase 3: Automated Testing (Month 4-5)
— Added COBOL-Check unit tests for 47 critical programs - Implemented integration test suite using Gal…
Phase 3: Canary Deployment (Weeks 15-20)
— Ring 0: Internal users, 2 weeks - Ring 1: 5% of external users (lowest balances), 1 week - Ring 2: 2…
Phase 3: Configuration Audit
— Run kube-bench for CIS compliance - Enumerate RBAC policies for overpermissioning - Check network po…
Phase 3: Configuration Review
— Review CI/CD pipeline security configurations - Evaluate secret management practices - Check code si…
Phase 3: Economic Validation
— Even statistically significant angles may not be profitable after accounting for vig, line movement,…
Phase 3: Execution (Weeks 4-5)
— Launch phishing emails in waves (not all at once) - Conduct vishing calls at appropriate times - Exe…
Phase 3: Exploitation and Escalation
— IAM privilege escalation - Storage access testing - Service-specific exploitation - Cross-service at…
Phase 3: Improve
— After the AI applies your modifications, look for opportunities to elevate quality beyond mere corre…
Phase 3: Investigation (1-24 hours)
— Collect SMF type 80 records for the affected period - Collect CICS journal records for affected tran…
Phase 3: Maturation (Months 19-36)
— Expanded quality monitoring to cover 200+ data elements - Implemented data lineage tracking for regu…
Phase 3: Pilot (8-16 weeks)
— Launch with 50-200 participants - Run 10-20 markets simultaneously to ensure engagement - Monitor tr…
Phase 3: Pilot (Month 3-6)
— Select one low-risk application for the full DevOps treatment - The pilot team includes champions pl…
Phase 3: Position for the transition (3-6 months).
— Update your resume and LinkedIn to emphasize AI project experience, not just certifications. - Netwo…
Phase 3: Prepare the Conversation
— [ ] One-sentence statement of what you need (specific, actionable, limited to one ask) - [ ] Brief n…
Phase 3: Resolution
— **If no dispute**: The assertion is accepted as true. The proposer receives their bond back plus a s…
Phase 3: Scale (Months 13-18)
— Deploy strategic bet use cases that leverage Phase 1-2 infrastructure - Implement advanced capabilit…
Phase 3: The alternative (minutes 25-30)
— Brief, positive presentation of an alternative worldview (natural immunity, holistic health) - Emoti…
Phase 3: Validation (20-40 minutes)
— Run validation transactions against each critical subsystem - Verify data currency (last transaction…
Phase 4 (Months 31-36): Decommission
— Turn off the mainframe - Terminate IBM contracts - Achieve full cloud operations
Phase 4: Active Experimentation
— You test your new theories by trying again, differently this time. You apply what you've learned in …
Phase 4: Advanced Testing (Day 4-5)
— Inter-process communication testing (intents, URL schemes) - Cryptographic implementation review - M…
Phase 4: Analysis and Reporting (Week 6)
— Compile success/failure rates for each vector - Analyze which pretexts were most effective and why -…
Phase 4: Call to action (final minutes)
— Encourage research ("do your own research") - Provide alternative information sources - Community so…
Phase 4: Deployment Pipeline (Month 6)
— GitHub Actions pipeline: build, test, deploy to test, deploy to staging - Production deployment gate…
Phase 4: Documentation Before and After
— [ ] Copies of all documents you are bringing (keep originals; bring copies to leave with them) - [ ]…
Phase 4: Eradication (1-48 hours)
— Remove the vulnerability that enabled the incident - Rotate any compromised credentials or keys - Ap…
Phase 4: Evaluation (2-4 weeks)
— Measure forecast accuracy against baselines - Survey participants on experience - Assess organizatio…
Phase 4: Expansion (Month 6-12)
— Pilot team members become mentors for the next wave of applications - Standardize the pipeline confi…
Phase 4: Exploitation
— Attempt API server anonymous access - Test kubelet API authentication - Enumerate and abuse service …
Phase 4: Full Migration (Weeks 21-24)
— 100% of traffic to modern service - Legacy CICS BALINQ on standby (still receiving shadow traffic fo…
Phase 4: Integration and Testing (Weeks 21-26)
— End-to-end testing - Performance optimization - Security audit - User acceptance testing
Phase 4: Monitored Deployment
— Begin betting the angle with small stakes. - Track results prospectively. - Compare ongoing results …
Phase 4: Optimize (Months 19-24)
— Optimize existing models for performance and cost - Deploy most complex use cases (clinical decision…
Phase 4: Post-Exploitation
— Data access assessment - Persistence mechanism testing - Lateral movement mapping - Compliance impac…
Phase 4: Stabilization (40 minutes - 4 hours)
— Resume batch processing (assess which jobs need restart from checkpoint) - Verify regulatory reporti…
Phase 4: Threat Modeling
— Model adversary capabilities and motivations - Identify highest-impact attack paths through the supp…
Phase 5: Decommission (Week 24 + 90 days)
— After 90 days of standby with no issues, decommission the CICS BALINQ program - Archive source code …
Phase 5: Deployment and Training (Weeks 27-30)
— Production deployment - Staff training sessions - Documentation finalization - Feedback collection a…
Phase 5: Normalization (Month 12+)
— DevOps is how we work, not a special initiative - All new development uses the Git/Jenkins/automated…
Phase 5: Post-Exploitation
— Pivot to cloud provider APIs using pod credentials - Access secrets stores (etcd, external vaults) -…
Phase 5: Recovery (1-72 hours)
— Restore normal operations - Re-enable any revoked access (with corrected permissions) - Increase mon…
Phase 5: Reporting and Remediation
— Prioritize findings by risk (impact times likelihood) - Provide specific, actionable remediation gui…
Phase 5: Scaling
— Expand participant pool - Integrate market signals into decision processes - Build internal expertis…
Phase 5: Support
— [ ] Decision about whether to bring a witness or advocate (appropriate in some medical and legal con…
Phase 6: Lessons Learned (within 2 weeks)
— Post-incident review with all stakeholders - Update security controls, monitoring rules, or procedur…
Phase 6: Reporting
— Map findings to CIS Kubernetes Benchmark controls - Prioritize by exploitability and impact - Provid…
Phase transition
— An abrupt, qualitative change in a system's behavior at a critical threshold, analogous to water tur…
phase transitions
— and you will discover that power laws play a starring role there too. Systems at the critical point …
phases
— information about the timing offset of each sine wave within the cycle. Two sine waves at the same f…
PhET Simulations
— phet.colorado.edu. Interactive simulations of quantum wave functions, probability densities, and the…
Philosophy shift:
— Accepted that field goals weren't failures - Reduced turnovers in red zone - Prioritized efficiency …
Phishing Campaign:
— Design and execute a phishing campaign targeting the pre-approved employee list (up to 50 targets). …
Phishing incident playbook:
— Detection criteria (how you know this is a phishing incident) - Initial triage steps - Scope assessm…
Phone
— Auditory only — tone, pace, volume, pause, inflection available - No visual information - Immediate …
phonons
— are normal modes that each behave as independent quantum harmonic oscillators. The Debye and Einstei…
Photocard system
— K-pop album packaging design that includes randomly distributed photocards, creating engineered scar…
Photoelectric effect
— Ch 1.3 The emission of electrons from a metal surface when illuminated by light above a threshold fr…
Photon
— Ch 1.3 A quantum of electromagnetic radiation, carrying energy $E = h\nu = \hbar\omega$ and momentum…
Photon antibunching
— $g^{(2)}(0) < 1$, impossible for any classical field. The definitive proof that the electromagnetic …
Photon as QHO excitation
— the beam splitter transformation is a linear transformation of oscillator operators, directly follow…
photon loss
— a photon absorbed by an optical element or failing to be detected is an irreversible error that cann…
Photon statistics as a diagnostic
— $g^{(2)}(0) = 1$ (Poissonian) confirms coherent state; deviations reveal the quantum nature of the l…
Phrases to Avoid
— "I'm sorry you felt that way." - "I'm sorry if you were offended." - "I'm sorry, but you have to und…
Phrygian mode
— a diatonic mode built on the third scale degree of a major scale; characterized by a minor second ab…
physical data independence
— separating the logical view of data from its physical storage, so any query could be expressed witho…
Physical environment:
— [ ] Sleep environment optimized (dark, cool, phone absent, consistent timing) — Chapter 30 - [ ] Dee…
Physical Locations
— Portland HQ: Main office with server room, 200 employees. - Satellite Clinic A (Salem): 80 employees…
Physical map
— a load module that controls screen formatting (colors, positioning, attributes) 2. **Symbolic map** …
Physical Measurables:
— Height, weight, body composition - Speed metrics (40-yard dash, shuttle times) - Explosiveness (vert…
Physical Measurements:
— Height: 6'9" (but still growing) - Wingspan: 7'3" - Weight: 196 lbs - Age: 18.5 years
physical modeling
— building mathematical models of the physical systems that acoustic instruments actually are, and sim…
Physical Presence
— [ ] Made appropriate eye contact (sustained, not staring) - [ ] Maintained open body posture (not cr…
Physical Profile:
— Height: 5'11", Weight: 195 lbs - Leg strength: Elite - Kickoff ability: Excellent (72% touchback rat…
Physical Red Flags:
— Below-average wingspan for position - Poor athletic testing numbers - Injury history, particularly t…
Physical SE Metrics:
— **Entry success rate**: Percentage of attempts that achieved physical access - **Time to entry**: Ho…
Physical self-care
— sleep (Chapter 30), exercise (Chapter 31), and the management of chronic stress (Chapter 12) — affec…
Physical signs:
— Chronic fatigue that sleep doesn't fix - Headaches or tension when thinking about creating - Disrupt…
Physical-adjusted projection:
— Finishing at rim: Expected significant improvement - Post scoring: Viable addition to game - Defensi…
Physical:
— Heart pounding or racing - Muscle tension in jaw, shoulders, chest - Hot face, flushed skin - Shallo…
Physics experiments/discoveries:
— LIGO gravitational wave detection (GW150914): Referenced in Chs. 1, 40 - CMB (COBE, WMAP, Planck): R…
physiographic provinces
— broad zones, running roughly northeast to southwest, each with distinct geological character, topogr…
Physiological Effects:
— Muscle stiffness increases - Hand dexterity decreases - Grip strength reduces - Fatigue patterns cha…
Physiological measures
— heart rate, skin conductance, pupil dilation, genital blood flow (in sexuality research), cortisol l…
Physiological self-soothing
— Call a time-out. Do something calming for at least 20 minutes. Return when regulated.
Pick 8 in a 12-team snake:
— Round 1: Pick 8 - Round 2: Pick 17 - Round 3: Pick 32 - Round 4: Pick 41 - Pattern: Picks cluster at…
Pick values (approximate):
— Pick 18: 900 points - Pick 35: 460 points - Pick 70: 200 points
Pick-and-Roll Ball Handler Defense
— Points per possession allowed - Ability to navigate screens - Switching success rate - Help requirem…
Pickling
— preserving vegetables (and sometimes fruits and eggs) in a vinegar brine — was another essential tec…
Pickup artist (PUA) industry
— A commercial ecosystem of coaches, books, online communities, and boot camps teaching scripted manip…
PICTURE clause
— The COBOL data definition clause that specifies the size, type, and format of an elementary data ite…
Piedmont
— a gently rolling plateau that stretches from the fall line (where rivers drop from hard rock to soft…
Pier and beam maintenance checklist:
— Inspect annually from below — the same protocol described in Section 2.3 for crawlspaces - Probe all…
pig iron
— was the primary product of the blast furnace. Pig iron was brittle and high in carbon; it needed fur…
Pill mills
— clinics that prescribed opioids to virtually anyone who walked through the door, often after perfunc…
Pillar 1: Privacy by Design (from Part 2)
— All new products undergo a Data Protection Impact Assessment before development begins, not after de…
Pillar 3: Community Engagement (from Parts 6-7)
— A Patient Data Advisory Council — modeled on Eli's Community Data Council — composed of patients, he…
Pillar 5: Organizational Culture (from Part 5)
— Ethics training for all employees, not as annual compliance but as ongoing professional development …
Pillar Content
— Long-form, comprehensive content that covers a topic exhaustively and serves as the authoritative hu…
Pilot program design:
— Budget: $500,000 per year - Target population: Residents of Sub-Saharan Africa with relevant experti…
Pilot-wave theory (Bohmian mechanics)
— Ch 28.3 David Bohm's deterministic interpretation (1952) in which particles have definite positions …
PIN Entry
— Accept a 4-digit PIN. Allow up to 3 attempts. Lock the card after 3 failures. Display masked card nu…
Pin your dependencies
— Unpinned versions lead to reproducibility failures 2. **Validate before running** - Catch environmen…
ping
— To directly notify someone in a Discord server through mention (@user); also used as a verb. Fan com…
Pinnacle API
— Pinnacle offers a free API for current odds on all markets. Requires a funded Pinnacle account. Wide…
Pinnacle Betting Resources
— Market efficiency analysis - Betting mathematics - Model evaluation
Pinnacle European Opportunities Fund
— a UCITS fund distributed across the EU and UK - **Pinnacle Global Alternative Fund** — an AIFMD-regu…
Pinnacle Health (Diane/Ahmad):
— Claims adjudication → Mainframe (12,000 TPS, CICS + DB2 + MQ, two-phase commit) - Dev/test → Cloud (…
Pinnacle Health Partners
— A health insurance consortium running a claims adjudication engine that processes 50 million claims …
Pinnacle Sports Blog
— https://www.pinnacle.com/en/betting-resources/ - Educational content on betting markets, line moveme…
PINNACLE.CALC_ALLOWED_AMT
— Takes procedure code, provider tier, and plan type. Returns the allowed amount. Reads from PROCEDURE…
PINNACLE.CALC_COINSURANCE
— Takes plan type, allowed amount, copay, and deductible applied. Returns the coinsurance amount (plan…
PINNACLE.CALC_COPAY
— Takes plan type and procedure category. Returns the copay amount. Reads from COPAY_SCHEDULE.
PINNACLE.CALC_DEDUCTIBLE
— Takes patient ID, plan year, and claim amount. Returns the deductible applied to this claim. Reads f…
Pip
— Python's package installer. Installs packages from the **Python Package Index (PyPI)**. Usage: `pip …
pipeline
— a sequence of transformations where data flows through each step. This mirrors how data scientists d…
Pipeline 1: Daily Morning Invoice Check
— Runs every weekday at 8:00 AM - Checks all open invoices for overdue status - Flags any invoice that…
Pipeline 2: Friday Weekly Business Health Report
— Runs every Friday at 5:00 PM - Pulls revenue data from Maya's invoices CSV - Calculates utilization …
Pipeline and Validation:
— [ ] Wrap all preprocessing in a scikit-learn Pipeline. - [ ] Verify no data leakage by checking that…
Pipeline Metrics:
— Build success rate (target: >95%) - Test pass rate (target: >99%) - Build time (track and optimize) …
Pipeline tools
— Trigger builds, check build status, view build logs, cancel running builds 2. **Deployment tools** —…
Pipeline-Level Metrics:
— Total pipeline execution time - End-to-end success rate - Number of feedback loop iterations - Cost …
Pisgah culture
— named for the Pisgah Phase defined by archaeologist Joffre Coe — represents the Mississippian adapta…
Pitch
— The perceptual attribute of a sound ordered on a musical scale from low to high, most closely correl…
Pitch Control
— A model that computes the probability that each team controls each point on the pitch at a given mom…
Pitfalls to avoid:
— Becoming an outrage machine that needs escalation to maintain engagement - Attracting a toxic audien…
Pittsburgh, Pennsylvania
— the largest city in the Appalachian region by the ARC's definition — was solidly Democratic. Alleghe…
Pittston Coal Company
— had been constructed by simply dumping coal waste across the head of the hollow, creating an earthen…
Pittston Coal Group
— one of the largest coal companies in the Appalachian coalfields, the same corporate entity whose sub…
pivot chord
— a chord that belongs to both the old and new key, temporarily restoring a kind of harmonic ambiguity…
Pivot Table
— A two-dimensional summary table where row and column labels come from the data and cell values are a…
Placebo effect
— The phenomenon in which a person experiences real measurable improvements after receiving an inert t…
Placement on ceilings and walls:
— **Ceiling mounting:** Preferred. Install at least 4 inches from any wall-ceiling junction (dead air …
Plaintext Storage
— The most catastrophic approach. Passwords stored as-is in a database or file. If the database is com…
Plan
— In DB2, a bound collection of one or more *packages* or *DBRMs* that authorizes a COBOL program to e…
Plan before collecting
— Design your structure and validation criteria first 2. **Cache aggressively** - Minimize API calls t…
Plan Reuse
— DB2 compiles the SQL once and caches the access plan in the package cache. Subsequent executions wit…
plan, generate, evaluate, iterate, test, reflect
— is the core loop of vibe coding. In the chapters ahead, you will apply this same workflow to increas…
Plan:
— "When my alarm goes off, I will pick up the journal that is on my nightstand (not my phone, which is…
PLAN_TABLE
— the classic access path table, one row per query block per table access - **DSN_STATEMNT_TABLE** — s…
Planck's constant
— Ch 1.2 The fundamental constant $h = 6.626 \times 10^{-34}$ J$\cdot$s setting the scale of quantum e…
plane wave
— a wave of definite wavelength $\lambda = 2\pi/k$, definite momentum $p = \hbar k$, and definite ener…
Planet DB2
— A blog aggregator collecting posts from DB2 professionals worldwide. Search for DDL-related posts to…
Planet Mainframe
— https://planetmainframe.com Industry news and technical articles about mainframe technology. Covers …
Planet Mainframe (planetmainframe.com)
— News and articles on mainframe technology, including regular coverage of automation tools and techni…
PlanetDB2
— Blog aggregator for DB2 content. Search for partitioning-related articles. http://www.planetdb2.com
planetmainframe.com
— Technical articles on DB2 performance, including practical guides to RUNSTATS scheduling, EXPLAIN in…
Planned equipment:
— CNC router (ShopBot Buddy, 2HP spindle): 240V, 15A; control computer: 120V, 10A - Air filtration uni…
planned site switch
— functionally identical to an emergency failover but without actual hardware destruction.
Planning (5–10 minutes)
— What will you try this week? Be specific: what strategy, what material, when, where, for how long. -…
Planning activities include:
— Defining the scope (which systems, networks, applications, and physical locations are in bounds) - E…
Planning and Reconnaissance
— Scope definition and information gathering - **Scanning and Enumeration** — Active probing to map th…
Planning fallacy
— What have you planned optimistically that is likely taking longer or costing more than you estimated…
Planning questions:
— When should you accumulate savings most aggressively? - If you planned one major product launch, whi…
Planning without buffering
— a calendar without pre-produced backup videos is one sick day away from breaking 2. **Inspiration-on…
plantation
— the colonization of Irish land with loyal Protestant settlers. The Crown's goal was to pacify Irelan…
plateau
— the phase where the initial excitement has faded, the basic skills have been acquired, and the inter…
Platform
— The technology infrastructure (YouTube, Instagram, Substack, Spotify, TikTok) on which creators publ…
Platform adaptations
— how the voice shifts slightly by platform (more casual in Stories, more structured in long-form) whi…
Platform and algorithmic context:
— How did platform architecture affect the campaign's spread? Which platform features were exploited? …
Platform architecture matters:
— Public, searchable platforms (HackerNews, Stack Overflow, Twitter/X) create persistent, geography-un…
Platform capitalism
— The economic model in which digital platforms function as markets or coordination infrastructure for…
Platform capitalism critique
— Platforms (Patreon, Etsy, YouTube) extract value from fan economic activity through fees and data co…
Platform cost:
— Annual software license: £210,000 in Year 1, with 3% annual escalation - Implementation (one-time): …
Platform Dependency
— The strategic and financial risk of building an audience exclusively on a single platform whose poli…
Platform framing indicators:
— Floor joists sit on top of the wall (on the top plate or on a ledger on the foundation wall) - Each …
Platform Lock-In
— The situation in which a creator's audience, content, and revenue are so deeply embedded in a single…
Platform responses:
— Meta introduced "teen accounts" on Instagram in 2024, with restrictions on content recommendations, …
Platform S-curve
— See: Technology adoption S-curve. *First introduced: Chapter 31.*
Platform sandbox/testnet environments
— Most prediction market platforms offer sandbox environments for testing API integration without risk…
Platform selection criteria:
— YouTube: long-form, educational, process, permanent library - TikTok: entertainment, trend-responsiv…
Platform surveillance
— The collection of user behavioral data by social media platforms, search engines, and other digital …
Platform Valuation
— The market capitalization or investment valuation of a social media platform, which in practice repr…
Platform voluntary commitments
— including the EU Code of Practice on Disinformation, third-party fact-checking programs, and labelin…
Platform vulnerability
— The structural condition of fan communities that build creative infrastructure on commercial platfor…
Platform's perspective:
— You work at a major social media platform and recognize that your metrics displays contribute to und…
Platform-agnostic
— They work on TikTok, YouTube, Instagram, or wherever you post - **Difficulty-rated** — From "film th…
Platform-specific primary metrics:
— TikTok: Completion rate (% of video watched) - YouTube: CTR × Average view duration = Algorithmic va…
Platforms (choose one):
— Hubstaff - Teramind - ActivTrak - Time Doctor - InterGuard - Crossover WorkSmart
Platforms used:
— Platform A (Polymarket-style, crypto-settled): Up to 40% of trading capital - Platform B (Kalshi-sty…
Platoon effects
— the handedness advantage of batters against opposite-handed pitchers --- are robust, persistent, and…
Platt Scaling
— Original paper on probability calibration - Post-hoc calibration method
Platt scaling:
— Advantage: Requires very few parameters (just a slope and intercept), making it robust with small ca…
Plausible but incorrect logic
— Code that looks correct at first glance but contains subtle bugs, especially in edge cases and bound…
Plausible story problem
— imposing coherent narrative patterns on diverse, complex cases 2. **Survivorship bias** — selecting …
Play A (Horns Pick-and-Roll):
— Average starting EPV: 1.00 - Average EPV at first pass: 1.06 - Average EPV at shot decision: 1.14 - …
Play B (Motion Offense):
— Average starting EPV: 1.00 - Average EPV at first pass: 1.03 - Average EPV at shot decision: 1.09 - …
Play Calling:
— Offensive coordinator must adjust - Fewer deep shots, more conservative - Estimated impact: +0.2 poi…
Play it over and over
— thirty times, fifty times, until it sounds right. 3. **Move to the next hard passage** and repeat. 4…
Play-by-play data from the NBA's stats API
— Structured. Each row is an event (foul, shot, turnover) with timestamps, player IDs, and score at th…
Play-by-Play Derived:
— Shot distribution by zone - Scoring by quarter - Performance in clutch situations
Play-Level Data
— One row per play - Maximum detail and flexibility - Large file sizes (millions of rows per season) -…
Player A (Consistent):
— Q1 = 16 points, Q3 = 24 points - IQR = 8 points
Player A (Hamstring):
— Monday: DNP - Wednesday: DNP - Thursday: Limited - Friday: Full - Saturday: Full - Status: Questiona…
Player A (Shot Blocker):
— BLK%: 5.5, STL%: 1.0, DRB%: 23 - Poor help defense, limited lateral movement
Player A's Plus-Minus Calculation:
— Q1 (first 6 min): +4 (14-10) - Q2 (first 4 min): +2 (10-8) - Q3 (first 8 min): +2 (16-14) - Q4 (full…
Player A:
— Average points per game: 22.5 - Games this season: 60 - Standard deviation: 8.3
Player Actions:
— Shooting (jump shot, layup, dunk, free throw) - Passing (chest pass, bounce pass, overhead pass) - D…
Player Alpha (Age 24, Ligue 1):
— Current level (league-adjusted): 2.72 composite - Expected trajectory: Near peak, slight improvement…
Player B (Ankle):
— Monday: Limited - Wednesday: Limited - Thursday: Limited - Friday: Limited - Saturday: Limited - Sta…
Player B (Help Defender):
— BLK%: 1.5, STL%: 2.0, DRB%: 18 - Excellent rotations, strong communication
Player B (Streaky):
— Q1 = 10 points, Q3 = 28 points - IQR = 18 points
Player B (substitute) performance:
— Minutes played: 32 - Sprints: 11 (highest on the team in this period) - Successful dribbles: 4/5 - K…
Player B:
— Average points per game: 21.8 - Games this season: 45 - Standard deviation: 4.1
Player Beta (Age 23, Bundesliga):
— Injury risk: LOW (no significant injuries) - Performance sustainability: MEDIUM (only 1.5 seasons of…
Player C (Concussion):
— Monday: DNP - Wednesday: DNP - Thursday: DNP - Friday: DNP - Saturday: DNP - Status: Out
Player Contract:
— Salary: $25 million/year - Expected BPM: +5.0 - Expected minutes: 2,500
Player Epsilon (Age 26, Premier League):
— Injury risk: MEDIUM (recurring ankle issues, 45 days missed) - Performance sustainability: LOW (cons…
Player Evaluation:
— QB: EPA per dropback - RB: EPA per carry + Success Rate - WR: EPA when targeted - Defense: EPA allow…
Player features:
— Historical shooting percentage by zone - Three-point specialist indicator - Rim finishing grade
Player Impact:
— Quarterback value dominates all other positional values. Elite QBs are worth 8-12 points over replac…
Player Information
— Name, position, jersey number - Height, weight, hometown - Class year, eligibility status - Recruiti…
Player Iota (Age 21, Bundesliga 2):
— Current level (league-adjusted): 1.85 composite - Expected trajectory: Steep improvement expected, b…
Player Personnel / Recruiting
— Primary need: Prospect evaluation and comparison - Time constraints: Recruiting cycles span months, …
player piano
— a mechanical piano that plays pre-punched paper rolls rather than having a human performer at the ke…
Player Profile:
— Position: RB - Age: 27 - Last 3 seasons: 280 pts, 300 pts, 260 pts - Peak age for RB: 25 - Decline r…
Player protection tools:
— Deposit limits (daily, weekly, monthly) - Loss limits and wager limits - Session time limits and rea…
Player Statistics
— Passing: completions, attempts, yards, TDs, INTs - Rushing: carries, yards, TDs, fumbles - Receiving…
Player Stats:
— Minutes: 2,850 (34.8 mpg) - Raw Plus-Minus: +412 (season total) - On/Off Differential: +9.8 - Net Ra…
Player tracking improvements:
— Individual blocker assignments via computer vision - Contact point detection - Automated pressure at…
Player Valuation:
— Statistical models estimate "true" player ability separate from market price - Models account for ag…
Player X (on Team A currently):
— Net Rating On: +5.5 - On/Off: +7.2 - Team Net Rating: +3.0
Player X (Volume Three-Point Shooter):
— 15 PPG on 12 FGA and 2 FTA - Makes 5 threes per game
Player X:
— BPM: +9.0 - Minutes: 1,800
Player Y (on Team B currently):
— Net Rating On: +4.0 - On/Off: +9.5 - Team Net Rating: -1.0
Player Y (Rim Attacker with FT Drawing):
— 15 PPG on 10 FGA and 6 FTA - Makes 0 threes per game
Player Y:
— BPM: +5.5 - Minutes: 3,100
Player-level features:
— Per-90 performance metrics (xG, xA, progressive actions, defensive actions) - Physical profile (heig…
Player-Play Linkage
— Which players were involved in each play - Allows attribution of plays to specific players - Essenti…
PlayerProfiler
— Advanced metrics - Prospect evaluation - https://www.playerprofiler.com/
Playing Style
— Unorthodox offensive game - Heavy reliance on skill over athleticism - Didn't fit traditional center…
Playing Style Characteristics:
— Explosive first step (among fastest in league) - Frequent hard stops and direction changes - High ve…
Playmaking:
— Assists per 75 possessions - Assist % - Turnover Rate
Playoff Defense
— Small ball lineups were exploited by teams with dominant bigs - Three-point shooting became less rel…
Playoff Race Scenario:
— Team Y (9-5) has remaining opponents with combined 30-18 record - Team Z (9-5) has remaining opponen…
Playoff Statistics:
— Games played: 24 of 24 (100%) - Minutes per game: 39.1 (increased from regular season) - Points per …
Pleistocene epoch
— the geological age dominated by repeated glaciations — was ending, but it had not ended yet. The gre…
Plotly
— Interactive visualizations - Dashboard creation - Hover data and animations
Plotly (Interactive)
— Interactive visualizations - Dashboard capabilities - Web deployment options
Plotly / Altair
— Interactive visualizations - Web-ready charts - Dashboard integration
Plotly Dash Documentation
— Python dashboard framework at dash.plotly.com.
Plotly documentation
— `plotly.com/python` — The official documentation for Plotly's Python library, with extensive example…
plotly express (`px`)
— High-level, one-function-call charts (recommended for most cases) 2. **plotly graph objects (`go`)**…
plotly graph objects (`go`)
— plotly's low-level interface offering fine-grained control over every chart element. Required for su…
Plotly Python Documentation
— Interactive visualization tutorials - Dash application examples - https://plotly.com/python/
Plotly Soccer Visualizations
— Interactive xT surfaces - Dashboard creation - Web-based display
pluralistic approach
— different governance mechanisms for different contexts, informed by the nature of the data, the powe…
Pluralistic ignorance
— A social phenomenon in which all group members privately doubt a group norm while publicly conformin…
Plywood subfloor
— built from cross-laminated wood veneers — has been the standard for decades. It's dimensionally stab…
PM2.5
— particles smaller than 2.5 microns in diameter. At this size, particles can penetrate deep into lung…
POCA 2002 (Proceeds of Crime Act 2002)
— Sections 327–335, 330–332. The UK statutory basis for money laundering offences and SAR reporting ob…
Pocahontas coalfield
— a region straddling the Virginia-West Virginia border in what is now McDowell County, West Virginia,…
Podcasts and audio resources:
— "Philosophize This!" (podcast) — Episodes on Kant, Mill, Rawls, and Aristotle provide accessible int…
Podcasts Worth Following:
— *Negotiate Anything* (Kwame Christian) — One of the most downloaded negotiation podcasts. Practical,…
Podcasts:
— *Hard Fork* (The New York Times) — Technology and society, frequently covers AI - *Eye on AI* — In-d…
POGIL (Process Oriented Guided Inquiry Learning)
— structured collaborative learning methodology - **Peer Instruction Network** — resources for impleme…
Point Classification:
— **Core point**: Has at least `min_samples` neighbors within $\varepsilon$ - **Border point**: Within…
point estimate
— a single number that represents our best guess.
Point Guards:
— Often have high offensive on/off due to playmaking influence - May show team-wide effects (assists c…
point-source resources
— they are concentrated in specific locations (coal seams, timber stands, salt deposits) rather than d…
Pointer
— A COBOL data item (USAGE POINTER) that holds a memory address. Used for dynamic memory management, i…
pointer basis
— in which the density matrix becomes diagonal. This is **environment-induced superselection** (or **e…
pointer states
— they are robust against environmental monitoring.
Poisson Distribution
— $X \sim \text{Poisson}(\lambda)$
Polanyi's paradox
— Michael Polanyi's observation that "we know more than we can tell" — much human knowledge is tacit a…
Polarity
— A sentiment score from -1.0 (most negative) to +1.0 (most positive).
Polarization
— The divergence of political attitudes, party coalitions, or governing behavior toward opposite extre…
Polarization's Effects on Polling
— Partisan differential nonresponse: the party whose voters are more enthusiastic overrepresents itsel…
Polars
— A newer DataFrame library with a Python API that is dramatically faster than pandas for many operati…
Polars user guide
— `pola.rs/user-guide` — For practitioners who want to understand how Polars differs from pandas and w…
Policy administration
— issuing, modifying, renewing, and canceling policies across dozens of product lines - **Claims proce…
Policy Analyst (Technology/Data Governance)
— Analyzes technology policy for government agencies, advocacy organizations, or international bodies …
Policy and Process Changes (Management):
— Implementing vulnerability management programs - Adding security to SDLC processes - Training and aw…
Policy standards
— the standard appropriate for government action in response to foreign interference — are contested. …
Polish
— [ ] Consistent typography - [ ] Aligned elements - [ ] No typos - [ ] Proper resolution for output m…
Political knowledge
— Respondents' demonstrated recall of factual information about politics (names of officials, position…
Political Markets:
— Average spreads: 2-5 cents on major races, 5-10 cents on minor races - Spreads widen before debates,…
Political microtargeting
— the use of behavioral data to target political messages to narrow, precisely defined voter segments …
Political poll:
— Population: All registered voters in Ohio. - Sample: The 1,200 polled voters. - Parameter: True prop…
Polling average
— A combined estimate of candidate support calculated by averaging across multiple polls, often with w…
Polling blackout
— Legally mandated periods before an election during which publication of new polls is prohibited; com…
Polling Evaluation:
— **American Association for Public Opinion Research (AAPOR):** aapor.org — professional standards for…
Polling Features:
— `polling_avg`: Weighted average of polls in the final 30 days before the election. - `polling_trend_…
polycentric
— systems with multiple, overlapping centers of authority, each operating at a different scale and wit…
polycentric governance
— multiple overlapping centers of decision-making, adapted to local conditions, with rules shaped by t…
polyglot persistence
— will be a recurring theme in this book. Meridian National Bank, our progressive project, uses exactl…
Polymarket
— Largest by volume, built on Polygon - **Augur** — Pioneering decentralized protocol on Ethereum - **…
Polymarket (buy YES) + Kalshi (buy NO):
— Cost: $p_{YES}^{Poly} \times 1.01 + p_{NO}^{Kalshi} + 0.03$ - If YES wins: Payout = $1.00. Net = $1.…
Polymarket (buy YES) + PredictIt (buy NO):
— Cost: $p_{YES}^{Poly} \times 1.01 + p_{NO}^{PI}$ - If YES wins: Payout from Poly = $1.00. Net = $1.0…
Polymarket API documentation
— [docs.polymarket.com](https://docs.polymarket.com/). The official API documentation for Polymarket, …
Polymarket CLOB API:
— `/prices-history` endpoint returns historical price data - Supports intervals: 1d, 1w, 1m, 3m, 1y, a…
Polymarket Documentation
— https://docs.polymarket.com/ - Official documentation for Polymarket's API and fee structure. Essent…
Polymarket Model:
— Order matching: Off-chain (centralized operator) - Token custody: On-chain (user wallets) - Settleme…
polymorphism
— different objects responding to the same method call in their own way (Chapter 15 explores this in d…
polyphony
— multiple independent melodic lines sounding simultaneously — unfolded in stages across the medieval …
polyrhythmic interference
— the same phenomenon that occurs when multiple waves of different periods interact. The large-scale "…
Polyvagal theory
— Porges's framework identifying three phylogenetically ordered autonomic responses: ventral vagal (so…
Pool 1: Catalog and System Objects
— Assign: DB2 catalog, directory, system table spaces - Size: Moderate (enough for 95%+ hit ratio on c…
Pool 2: Hot OLTP Data
— Assign: The 10-20 most frequently accessed transaction tables - Size: Large — this is where you spen…
Pool 3: OLTP Indexes
— Assign: Indexes on the hot OLTP tables - Size: Large enough to hold all non-leaf pages plus frequent…
Pool 4: Batch/Sequential Data
— Assign: Tables primarily accessed by batch jobs, reports, large scans - Size: Moderate (sequential p…
Pool 5: Temporary Work
— Assign: Temporary table spaces (sorts, intermediate results, declared GTTs) - Size: Based on concurr…
Pool 6: Reference/Lookup Data
— Assign: Small, frequently read reference tables (branch codes, currency codes) - Size: Small but suf…
population proportion
— the disease prevalence of 1%. But here's the thing: that 1% is itself an estimate. Maya's county mig…
Populism
— A political ideology or rhetorical style that posits a virtuous, unified "people" in opposition to a…
Populism needs media
— even anti-media populism. The paradox of Whitfield's "fake media" attacks is that he delivers them o…
Populism's thin-centered ideology
— dividing society into "the pure people" and "the corrupt elite" — creates structural anti-expert and…
Porous broadband absorbers
— thick wedges or panels of mineral wool, rigid fiberglass, or acoustic foam placed in corners (where …
Port Security
— Limit each access port to 2 MAC addresses with shutdown violation mode. 2. **DHCP Snooping** — Enabl…
Portfolio Career
— A professional model in which income and identity are assembled from multiple simultaneous roles and…
portfolio construction for prediction markets
— how to size positions, manage risk across multiple correlated markets, and build a diversified portf…
Portfolio management and trading
— active management of client portfolios; order generation and execution via prime brokerage. 2. **Cli…
Portfolio Theory:
— Markowitz mean-variance optimization adapts naturally to bet portfolios - Correlated bets reduce the…
Portfolio thinking (luck)
— An approach to life design inspired by investment portfolio theory, in which the individual delibera…
PORTNUMBER
— The TCP port. Use 8080 or higher for non-SSL, 8443 or 443 for SSL/TLS. At SecureFirst, the API gatew…
Portuguese-Language Creator Resources:
— Brazil has one of the most vibrant creator economies globally. Canva's educational resources are ful…
Pose Estimation
— Computer vision technique that detects and tracks the positions of body joints (skeleton) from video…
position
— accepting an unbalanced book when they believe one side is more likely than the other. Books with so…
Position A: A binding international AI treaty
— Similar to arms control agreements, a binding treaty would establish universal rules for AI developm…
Position A: Trader (NFL)
— Base salary: $95,000 - Annual bonus target: 15% of base - Career progression: Senior Trader in 3 yea…
Position adjustment
— Different positions have different statistical expectations - A center with 6 assists is exceptional…
Position B: Data Scientist (Pricing Models)
— Base salary: $130,000 - Annual bonus target: 10% of base - Career progression: Senior DS in 2--3 yea…
Position Calculation:
— Triangulation from multiple camera views to determine 3D positions - Kalman filtering for smooth tra…
Position Held
— > Resolution -> Settlement. After your order is matched, you hold a position that you can monitor an…
Position Scarcity
— Unique skill sets (e.g., passing big men) - Versatile defenders with length
Position Value Framework
— Understanding which positions matter most 2. **Player Valuation** - Quantifying individual value ove…
Position:
— Buy Bracket 5 (1.0--1.5%): Strong edge of 7.15 percentage points - Buy Bracket 6 (1.5--2.0%): Strong…
positional encodings
— additional information that tells the model where each token appears in the sequence. Without positi…
positional luck
— luck that flows to you based on where you sit in a network, not what you personally do. Positional l…
positionally
— the first item in the CALL USING corresponds to the first item in the PROCEDURE DIVISION USING, the …
Positioning
— The strategic decision about how a creator or product occupies a specific space in an audience's min…
Positioning Data:
— Average distance to assignment: 4.5 feet - Help defense rotations: 8 per game - Closeout speed: 14.2…
Positioning:
— `LINE n` -- places the field at row n (1 = top of screen) - `COLUMN n` (or `COL n`) -- places the fi…
Positions
— What each party says they want; the explicit demand or complaint in a conflict. Distinguished from i…
Positions and Roles
— Five positions (PG, SG, SF, PF, C) - General responsibilities of each position - Offensive and defen…
Positive affect reciprocity
— The cascade of mutual positive feeling that follows shared laughter; a mechanism through which humor…
Positive autocorrelation (momentum):
— Prices tend to continue moving in the same direction. - Possible causes: gradual information incorpo…
Positive correlations:
— Team moneyline and team spread (same team) - Team moneyline and over (winning team contributes to to…
Positive feedback loop
— A feedback mechanism that amplifies change, pushing a system further from its starting point; the en…
Positive predictive value (PPV)
— The probability that an AI system's positive prediction is correct, given the base rate of the condi…
Positive Residual (Seth Partnow)
— https://positiveresidual.com/ - Former Bucks analyst providing analytical perspective including play…
positive sentiment override
— The state in which a relationship's accumulated positive affect functions as an interpretive buffer,…
Positive signals:
— Developers voluntarily write tests before being asked - Review comments are predominantly constructi…
positive social currency
— sharing her videos made people look informed and health-conscious. The sharer's message was: "Hey, I…
Positives:
— 30+ years of deep domain expertise is genuinely valuable - Intimate knowledge of a production bankin…
Possession & Creativity:
— Progressive passes per 90 minutes - Expected assists (xA) per 90 - Through balls completed per 90 - …
Possession quality:
— Pass completion percentage - Pressure success rate (%)
Possession Sequence
— A continuous period of team control ending when the opponent gains the ball or play stops.
Possible explanations for the score gap:
— **Bias in peer evaluations:** Research consistently shows that identical behaviors are perceived as …
possible selves
— the images, hopes, and fears about who we might become.
possible selves exploration
— trying on different professional identities through small experiments before committing to a new dir…
POST
— submits data to the server. Used when a user submits a form. The submitted data travels in the reque…
Post Go-Live (Hypercare Period):
— [ ] Adoption metrics reviewed daily for first 30 days - [ ] Second training wave scheduled (2-4 week…
Post regularly (not constantly)
— enough to remain present in your connections' feeds. One thoughtful, specific post per week is more …
Post-Acquisition Growth (2009-Present):
— Module count grew from hundreds to thousands - Community contribution process formalized (GitHub pul…
post-acute withdrawal syndrome (PAWS)
— the longer-duration neurological and psychological symptoms that persist for months or years after a…
POST-COMPLETION
— [ ] Conduct completion walk-through; create punch list - [ ] Confirm all punch list items completed …
Post-correction results:
— Duct leakage to outside: 2.1 CFM25 per 100 sq ft
Post-debate metrics:
— **Spread**: $0.01 (back to pre-debate tightness) - **Midpoint**: $0.685 - **Depth at best**: 900 con…
Post-Decision Analysis:
— Expected VORP: 14.5 over 4 years - Contract cost: $84M - Break-even VORP: 15.3 (at $5.5M/VORP) - Ris…
Post-deployment monitoring configuration:
— Metrics to watch for 1 hour after deployment - Threshold values that trigger alerts - Automatic roll…
Post-deployment verification
— automated tests that confirm the new model is running correctly on all instances. - **Automated roll…
Post-exam data:
— Actual score: 91 - Calibration gap: -6 (underestimated by 6 points — mild underconfidence) - Error d…
Post-Exploitation
— Once you have gained access, you perform additional activities: privilege escalation, lateral moveme…
Post-game:
— Margin multiplier: 2.8 (large margin but expected favorite) - Rating change: +22 Elo - New rating: 1…
Post-hoc rationalization
— Explains any outcome after the fact without predicting outcomes in advance (Freud, market commentary…
Post-Incident (Day 14):
— Lessons learned meeting with all stakeholders - Incident report completed with full timeline and IOC…
Post-Injury Performance (2013-present):
— Win Shares per 48: .082 (60% decline) - PER: 15.2 (35% decline) - All-Star selections: 0
Post-International Recovery:
— Full week to recover from Germany travel - No jet lag concerns for next game - Players could rest ex…
Post-intimacy silence
— The period of quiet that follows genuine physical or emotional intimacy; disproportionately importan…
Post-launch (first 30 days):
— What is the first thing a new member receives after joining? - How will you prompt new members to ma…
Post-level analytics:
— Unique opens: How many distinct subscribers opened each post - Open rate: Percentage of subscribers …
Post-Market Monitoring (Article 72)
— [ ] Establish a post-market monitoring system proportionate to the nature and risk of the AI system …
post-market surveillance
— the systematic monitoring of how AI systems perform after they are deployed in real clinical setting…
Post-Processing Validation (after each major job):
— Output record count within expected range of input - Output control totals reconcile with input (cla…
Post-rejection growth
— The phenomenon, documented in longitudinal research, in which rejection experiences are reported ret…
Post-remote biometric identification
— searching surveillance footage after the fact, rather than in real time — is classified as a high-ri…
Post-scan activities:
— Review scan logs for errors or authentication failures - Verify that all in-scope hosts were success…
Post-session reflection (5 minutes):
— What did I learn? The E1-SN1 parallel. Anti-periplanar geometry for E2. Bulky bases favor eliminatio…
Post-Shot xG (PSxG)
— An extension of xG that incorporates where within the goal frame the shot is directed.
Post-stratification weighting
— A statistical adjustment applied to survey data to make the sample match known population characteri…
Post-traumatic growth
— The phenomenon, documented by Richard Tedeschi and Lawrence Calhoun, in which individuals experience…
post-truth
— The contested claim that factual claims have lost their social and political function in contemporar…
posterior
— our updated belief about hypothesis $H$ after observing data $D$ - $P(D \mid H)$ is the **likelihood…
posterior collapse
— a pathology where the encoder ignores the input and the posterior collapses to the prior.
posterior probability
— a revised estimate of spam likelihood given the observed features.
PostgreSQL Official Documentation
— Comprehensive and well-written. Available at postgresql.org/docs.
Poststratification
— The step in MRP where regression-based predictions for each demographic cell are combined with censu…
Potential Inefficiencies:
— Multiple depth injuries - Game-time decision uncertainty - Return from injury performance
Potential leapfrogging opportunities:
— **Skip the notice-and-consent paradigm.** Western data governance is built on individual notice and …
Potential Opportunities:
— Wind effects (underweighted) - Last-minute forecast changes - Heat/humidity (early season)
Potentially Mispriced:
— Wind (often underweighted) - Heat/humidity (early season) - Last-minute weather changes
potlikker
— the nutrient-rich broth left after boiling greens — is rooted in African foodways that wasted nothin…
power
— not just their stated positions - Notes where stakeholder interests align and where they conflict - …
Power (relational)
— The degree to which one partner can influence the other's behavior and outcomes in a relationship; u…
Power and accountability
— Who holds power, who is harmed, who answers? 2. **Innovation vs. harm prevention** — The speed-vs-ca…
Power differential
— A systematic asymmetry between two parties in the resources, status, or structural positions that af…
Power distance
— Hofstede's cultural dimension describing the extent to which less powerful members of institutions a…
Power law
— A mathematical relationship where one quantity varies as a power of another (y = kx^a); produces sca…
Power law curves across domains
— species extinction rates, startup failure rates, language death, song popularity decay, city size di…
Power law distribution
— A probability distribution in which a small number of items account for a disproportionately large s…
power points
— the positions where the eye naturally gravitates. Placing your subject on a power point creates a co…
power usage effectiveness (PUE)
— the ratio of total facility energy to the energy used for actual computing. A PUE of 1.0 would mean …
Power variables:
— Does the program give the media company greater power to suppress unauthorized fan activity by estab…
Power/Gap:
— Pulling linemen create leads - Downhill running - Favors power over speed
Power:
— 7,500-watt generator, gasoline-powered, stored in a weatherproof shed with a 50-gallon fuel reserve …
PPAY1 — Primary Production Online:
— 4 GCPs, 2 zIIPs (dedicated) - Runs: CICS TOR/AOR regions for wire and RTP, DB2 member PPDB1, MQ queu…
PPAY2 — Primary Production Batch/Online:
— 4 GCPs, 2 zIIPs (shared with PPAY1 via LPAR weight adjustment) - Runs: CICS AOR regions for ACH onli…
PPAY3 — DR/Read Active:
— 3 GCPs, 1 zIIP - Runs: DB2 member PPDB3 (data sharing group member, handles read queries), reporting…
PPAY4 — DR Warm Standby:
— 3 GCPs, 1 zIIP - Maintains GDPS-managed standby for PPAY2 - Batch DR capability — can assume full ba…
PPDA
— Passes Per Defensive Action - measures pressing intensity
PPDA (Passes Per Defensive Action)
— A pressing intensity metric measuring how many passes the opposing team completes before the pressin…
PPG alone is insufficient
— consistency measures add important context 2. **Multiple metrics capture different aspects** of cons…
PPR vs Standard matters
— Receiver values differ significantly 2. **Floor matters for consistency** - Not just ceiling chasers…
Praat: Doing Phonetics by Computer
— https://www.fon.hum.uva.nl/praat/ The standard tool used by linguists and speech scientists worldwid…
Practical Applications:
— **Match preparation:** Analysts can compute the opponent's typical defensive shape to identify areas…
Practical Approaches:
— Use domain knowledge to evaluate mechanisms - Control for confounders in regression - Use natural ex…
Practical considerations
— liquidity, slippage, contract specification pitfalls, and platform risk — separate paper profits fro…
Practical considerations:
— Setting max tokens too low truncates responses mid-sentence — a common source of frustration. - Sett…
Practical guidance:
— **Prefer AI tools with known, licensed training data.** Adobe Firefly, for example, is trained on Ad…
Practical guidelines:
— If $f^* \leq 0$, do not bet (no edge). - Half Kelly ($f^*/2$) achieves approximately 75% of the grow…
Practical implications:
— A city of 10 million is not just five cities of 2 million added together. It is disproportionately m…
Practical Malware Analysis
— Michael Sikorski, Andrew Honig. Comprehensive guide to malware reverse engineering. Complements Chap…
Practical Network Penetration Tester (PNPT)
— **Vendor:** TCM Security - **Cost:** ~$399 (exam only; training courses ~$30 each or subscription) -…
Practical Notes:
— For most knowledge workers with no existing toolchain: start with Claude or ChatGPT; both offer stro…
Practical probability estimation
— using historical frequencies, power ratings, and calibration analysis to develop and validate your o…
Practical readability
— For validation paragraphs with many sequential checks, the guard clause pattern is demonstrably more…
Practical responses:
— Use stationary transformations as features: returns instead of prices, changes instead of levels. - …
Practical risk management for AI-generated code:
— Use tools with established IP indemnification commitments where material IP exposure exists (GitHub …
Practical risks:
— If discovered, both parties could face account closure, forfeiture of funds (including unrealized pr…
Practical rules of thumb:
— 1 eV $\approx$ 11,600 K (thermal energy at "1 eV temperature") - 1 eV $\approx$ 8066 cm$^{-1}$ (spec…
Practical tips for model building:
— Always hold out data for validation. Backtested performance on the same data used for training is me…
Practical tips:
— Do not rely on stale order book data. If your data is more than a few seconds old, the book may have…
Practical Tools:
— We built a complete Python system for collecting, storing, analyzing, and alerting on odds across mu…
Practical Value
— the most democratic of the STEPPS elements. The secondary trigger was **Social Currency**: sharing t…
Practical wisdom (phronesis)
— the capacity for sound judgment in complex situations — requires, at minimum, that ethical questions…
practice
— how to estimate probabilities from data, test whether your edge is real, build confidence intervals,…
Practice Design
— Identify movement pattern inefficiencies - Optimize defensive rotations - Track player exertion for …
Practice one recovery technique
— extended exhalation breathing, brief physical movement, or social connection — and notice whether it…
Practice Participation:
— Full: Full participation in practice - Limited: Partial participation - DNP: Did not practice
Practice Pattern Signals:
— Full all week → 95%+ plays - DNP → Limited → Usually game-time - DNP all week → Usually out
Practice the alternative construction
— for one ambiguous social signal this week, write down your automatic interpretation, then write thre…
Practice with crowd noise
— Road teams practice with speakers 2. **Silent counts** - Home offense uses visual signals 3. **Defen…
Practice:
— LeetCode (easy problems) - HackerRank Python track - Project Euler
Pre-1973-74:
— Win Shares estimated with less precision - Some statistics unavailable - Wilt's numbers involve assu…
Pre-2000s Limitations:
— Play-by-play data sparse or nonexistent - Many statistics not tracked - Different rules affect compa…
Pre-admission
— Device is assessed before being granted access (OS patches, antivirus status, compliance) 2. **Post-…
Pre-Campaign (Weeks -4 to -1):
— Infrastructure provisioning, domain registration, and aging. - Tooling development, testing, and val…
Pre-commit Hook
— A **Git** hook that runs automatically before a commit is created. Used to enforce code quality by r…
Pre-commitment to examining failure rates
— before gathering any evidence, committing to looking at the base rate of similar bold campaign resul…
Pre-crime logic
— The extension of surveillance and law enforcement to target individuals not for what they have done …
Pre-emptive Empathy
— The technique of naming and acknowledging the other person's likely concerns before they raise them,…
Pre-engagement assessment:
— Security certifications (SOC 2 Type II, ISO 27001, FedRAMP) - Security questionnaire responses (SIG …
Pre-engagement:
— Obtain explicit written authorization for physical testing - Carry authorization documentation at al…
pre-event positioning
— market makers widen their quotes to protect against the uncertainty of the debate, and some early in…
Pre-exam data:
— Study hours: approximately 18 across 10 days (20 sessions averaging 50 minutes) - Strategy: distribu…
Pre-flight checks specific to compliance:
— RACF IRRDBU00 output from the prior day's unload is available - SMF data for the full reporting peri…
Pre-Game Odds Were Reasonable:
— 62% home favorites lost 38% of the time historically - Model appropriately uncertain despite Warrior…
Pre-game:
— 49ers: 1619 - Steelers: 1480 (after regression from 1470) - Expected: 49ers 72% favorite, -7.5 sprea…
Pre-Injury Performance (2010-12):
— Win Shares per 48: .206 - PER: 23.5 - MVP Award (2011)
Pre-Injury Status:
— Team record: 6-1 - Point differential: +78 - Playoff probability: 95% - Super Bowl odds: 12%
Pre-merge checklist:
— [ ] Check both key columns have the same dtype (`df['key'].dtype`) - [ ] Check for duplicate keys (`…
Pre-mortems
— structured exercises in which teams imagine that a project has failed and work backward to identify …
pre-norm
— leads to more stable training, especially for deeper models:
Pre-planned response protocols
— knowing in advance what you will do if targeted — reduce the damage done by harassment in its first …
PRE-PLANNING
— [ ] Create a complete wish list of all desired improvements - [ ] Sort list into Must-do / Nice-to-h…
Pre-Processing Validation (before each major job):
— Input file record count within tolerance band - Control totals match trailer record - Sample validat…
Pre-REBIND EXPLAIN comparison
— mandatory for all packages. Diane Chen writes a COBOL comparison program (similar to Pinnacle's exis…
Pre-recording energy
— before recording the script, Marcus would talk out loud about why the topic excited him (unscripted)…
pre-registration
— publicly recording the study design, hypotheses, sample size, and analysis plan before collecting an…
Pre-Roll Ad
— A video advertisement that plays before a creator's video content. One of the earliest forms of plat…
Pre-Season:
— Baseline biomechanical assessment - Movement screening (FMS, Y-balance) - Strength testing (especial…
Pre-Share Questions
— If you share this content and it is subsequently shown to be false, what is the cost to you and to t…
Pre-strategy metrics:
— Followers: 32,000 - Average views: 15,000 - Posting frequency: 5-6 videos/week (high — speed was the…
Pre-suasion
— Cialdini's concept of using attention management before the message to increase receptivity; directi…
Pre-Toronto Career:
— 2011-17: Played 330 of 492 possible regular season games (67%) - 2017-18: Played only 9 games - Conc…
pre-trade transparency waivers
— exemptions from the obligation to publish pre-trade data — under specific, narrowly defined conditio…
Pre-training
— The initial training phase of an **LLM** where it learns from massive amounts of text data to predic…
Pre-training data curation
— including deduplication, quality filtering, and domain balance --- is as important as model architec…
preaching area
— often a raised platform or fallen log — surrounded by a clearing where the congregation gathered. Ar…
prebunking
— inoculating people against misinformation before they encounter it — has shown more consistent posit…
Prebunking / inoculation
— explaining manipulation techniques *before* exposure - **Motivational interviewing** — non-confronta…
precarious manhood
— Bosson and Vandello's (2011) theory that masculinity, unlike femininity, is culturally constructed a…
Precautionary principle
— The principle that when an action raises potential threats of harm, precautionary measures should be…
precedent
— the principle that similar cases should be decided similarly, based on prior decisions. Precedent is…
precesses
— it wobbles around the direction of the field, like a spinning top wobbling around the vertical direc…
Precision
— detailed quantitative knowledge of acoustics, psychoacoustics, and instrument physics that changes h…
Precision satisfaction
— something is done with perfect accuracy (a flawless calligraphy stroke, a machine cutting identical …
Precision Without Accuracy
— the seduction of exact numbers that are exactly wrong.
Precompile
— DB2 precompiler processes EXEC SQL statements, generates a DBRM and modified COBOL source. 2. **Comp…
Precompiler
— A preprocessor that translates embedded statements (*EXEC SQL*, *EXEC CICS*, *EXEC DLI*) into standa…
Predictability
— Opponents could game-plan specifically for the Rockets' tendencies - Lack of mid-range threat made d…
Predicting New Connections
— Common neighbors - Jaccard coefficient - Adamic-Adar index
prediction
— using available information to estimate a future outcome.
prediction errors
— moments when reality deviates from expectation. Music, with its 1/f statistics, is a machine for gen…
Prediction Market Resource List
— Various academic and practitioner resources on prediction market design, efficiency, and trading str…
Prediction markets
— platforms where participants bet on election outcomes — aggregate the beliefs of market participants…
Prediction models are systematic
— Not guesses, but mathematical transformations of data 2. **Evaluation is essential** - Without prope…
PredictIt API
— Market data from PredictIt is accessible via their public API endpoints, though formal documentation…
Predictive coding
— the framework proposing that the brain generates predictions and processes prediction errors, with m…
predictive policing
— the use of algorithms to forecast where and when crimes will occur, and sometimes to predict who wil…
preference falsification
— the idea that in repressive societies, people conceal their true preferences, making the system appe…
Preferential attachment
— The mechanism ("rich get richer") by which nodes with more connections attract even more connections…
prefigurative politics
— the idea, articulated by movements from the Spanish anarchists to the civil rights movement to Occup…
Prefixes indicate scope:
— `WS-` for WORKING-STORAGE items - `LS-` for LINKAGE SECTION items - `FD-` or file-specific prefixes …
Prejudice
— an attitude (cognitive + affective) toward people based on group membership
Premack principle
— named after psychologist David Premack — states that a more-preferred activity can serve as a reinfo…
premature closure
— settling on a diagnosis too early because the initial narrative is compelling.
Premium Data Limitations:
— Expensive subscriptions ($$$) - May require institutional access - Terms often restrict redistributi…
Premium Data Strengths:
— Information not available publicly - Human-reviewed play charting - Granular player attribution - Tr…
Premium discount determination
— maps to healthcare/insurance domain; stakes are **high** because it directly affects the cost of ess…
preparation
— knowing your content before the conversation begins.
Preparation questions for each group:
— What empirical evidence supports your position? - What is the strongest version of the opposing argu…
Preparation:
— The affirmative team should gather evidence from the chapter's discussion of Appalachian TikTok, Ins…
Prepare and split data
— Mistake: not holding out a test set, or using the test set during development.
Prepare Your Environment:
— Set up your testing VM (Kali Linux or similar) with all required tools. - Configure a secure evidenc…
prepared coincidence
— a serendipitous event that only generates value because the observer's mind was prepared to receive …
Prepared mind
— The state of readiness, built through deep domain knowledge and sustained curiosity, that enables a …
PreparedStatement with parameter markers
— The `?` placeholders are bound with `setInt()`, `setString()`, etc. This prevents SQL injection and …
Preprints
— manuscripts posted to public servers like arXiv, bioRxiv, or medRxiv before peer review — played an …
PREREQUISITE CHECK
— This chapter requires solid understanding of CICS region topology and MRO (Chapter 13), DB2 locking …
Prerequisites Checklist:
— Writing a complete COBOL program with all four divisions - Using PICTURE clauses for basic data type…
Prerequisites:
— Hard: none - Soft: none
prescribed burns
— intentional, carefully controlled fires set under specific conditions to reduce the fuel load and re…
Presence
— The quality of genuine, attentive engagement with what is actually happening in the conversation, as…
Presentation
— Evidence dismissed based on credentials, not merit 2. **Escalating resistance** — Active opposition …
Presentation Layer
— RESTful API - Coaching dashboard - Recruiting dashboard - Executive reports
Presentation Tips:
— Bring the tester who performed the work --- they can answer detailed technical questions - Prepare f…
Presentation:
— Offer a debrief call or presentation to walk through findings - Prepare a separate slide deck for bo…
Presenting Complaint
— The stated reason for a confrontation; the surface-level issue. Contrasts with the underlying issue …
presenting problem
— the trigger, the incident, the visible symptom — and the **real problem** — the pattern, the underly…
Preserves transaction boundaries
— changes are applied in commit-consistent groups - **Handles conflicts** — in bidirectional mode, con…
Pressing
— A defensive tactic where players actively close down opponents to force turnovers. Pressing intensit…
Pressing CB Requirements:
— Pressures > 15 per 90 - Tackles won > 2.0 per 90 - Recovery pace for high line
Pressing is measurable
— PPDA, high turnovers, and counter-pressing quantify pressing effectiveness
Pressure Adjustment:
— High sack rate → worse O-line - Adjust EPA for protection quality
Pressure Impact Analysis
— Calculate league-wide pressure effects - Identify pressure-resistant QBs - O-line attribution
Pressure rate vs. sack rate correlation
— Analyze relationship - Determine sample size needs - Project future sacks
Pressure Reducing Valve (PRV):
— Steps down high municipal pressure to safe levels - Required if incoming pressure exceeds 80 PSI - L…
Pressure tank air check:
— Locate the pressure tank (typically in the basement or utility room near the pressure switch). - Not…
Prestige Investment
— A prestigious individual or institution proposes the idea 2. **Deference Amplification** — Others ci…
pretesting
— testing yourself on material *before* you've studied it.
pretesting effect
— making a prediction before learning new material primes your brain to learn the correct answer more …
Pretesting:
— [ ] Has the instrument been reviewed internally? - [ ] Have cognitive interviews been conducted? - […
Preventing early caulk failure:
— Use 100% silicone in the shower — it's more flexible and more mold-resistant than latex blends - Nev…
Prevention (before tilt occurs):
— Pre-session emotional self-assessment (mood, stress, sleep) - Go/reduce/no-go decision based on comp…
Prevention fix
— add data quality validation to all migration programs.
Prevention Program:
— Bi-weekly neuromuscular training - Landing mechanics review monthly - Real-time deceleration monitor…
Prevention strategies:
— Define adequate free space with FREESPACE parameter - Reorganize periodically (REPRO out and back in…
Prevention:
— Implement automated patch management with rapid deployment for critical kernel vulnerabilities - Use…
Preventive structures:
— Pre-meeting written input (anonymous) before discussion - Rotating devil's advocate / concerns-advoc…
Previous conversations (false agreement pattern):
— Sam raised the issue when frustrated, Tyler acknowledged and expressed remorse - Outcome: "I'll do b…
Previous Week Carryover:
— Chiefs: Lost at Denver, potentially motivated - Dolphins: Won at NE, riding high but may be complace…
PRG pattern
— Post/Redirect/Get. After a successful form submission, redirect to a GET request to prevent duplicat…
Price
— The consideration paid or received for the financial instrument, excluding costs.
price discrimination
— the practice of charging different prices to different customers for the same product or service, ba…
Pricing Check
— My average views per video: _______________ - Niche CPM benchmark: $ _______________ - Calculated fa…
Primary Ball Handlers:
— Essential for offensive initiation - Should overlap minimally with secondary ball handlers - Critica…
Primary Data Center (East):
— IBM z16 Model A01, 12 CPs configured as 8 GCPs + 4 zIIPs - Two LPARs: PPAY1 (production) and PPAY2 (…
Primary database
— the active database serving all read/write traffic 2. **Standby database** — receives log records fr…
Primary Factors:
— Team offensive/defensive efficiency - Home court advantage (~3-4 points) - Recent performance trend
Primary Goal: Championship
— Result: Achieved - Assessment: Complete success
Primary Issue: Offensive Line Decline
— Pressure rate increased 28% → 36% - Time to throw decreased 2.65 → 2.38 seconds - Performance under …
primary key
— one or more attributes that uniquely identify each instance. The choice of primary key has far-reach…
Primary keys uniquely identify each row
— usually an auto-incrementing integer. No two rows can share a primary key, and it can never be null.
Primary orientation variables:
— **Gaze direction:** Eyes directed at other people (scanning, making contact) vs. eyes directed at a …
primary research question
— this is the central question your study is designed to answer.
Primary source
— An original document, dataset, study, or record, as distinguished from secondary interpretations or …
Primary source access
— reading legislative text rather than summaries of it, reviewing original data rather than visualizat…
Primary Source Excerpts
— letters, speeches, newspaper accounts, oral histories, and government documents with guided analysis…
Primary Sources:
— Play-by-play data from official NBA feed (via Stats LLC) - Player tracking data (Second Spectrum) - …
primary succession
— the process by which life colonizes a completely barren environment and builds, stage by stage, from…
Primary target: Player Alpha
— Best statistical fit for the departed player's role - Strong scout endorsement - Reasonable transfer…
Priming
— the influence of a prior encounter with a stimulus on subsequent responses to it, without conscious …
priming read
— an initial READ before the processing loop, with additional READs at the bottom of the loop: > > ```…
principal
— someone who wants something -- and an **agent** -- someone who is supposed to deliver it. The Soviet…
Principal / Architect (15+ years experience):
— Financial services: $170,000 - $220,000 - Government: $130,000 - $170,000 (GS-15 / SES equivalent) -…
Principle 4: Difficulty gradient.
— Basic: Simple sketch with three colored pencils (accessible to anyone who can hold a pencil) - Inter…
Principle analysis:
— **P1 (Build Allies): Failed.** Semmelweis alienated potential supporters with personal attacks - **P…
Principled GraphQL
— Best practices from Apollo (the leading GraphQL platform) for designing production GraphQL APIs. - h…
Principles:
— Data governance decisions are made by the communities most affected by those decisions - Data is tre…
PRINT
— display dataset contents:
Print-on-Demand (POD)
— A merchandise fulfillment model where products are printed and shipped only when an order is placed,…
Print-on-demand merchandise:
— **Printful** — Integrates with Etsy, Shopify, WooCommerce. High product quality; reliable shipping -…
Printed text
— menus, signs, instructions, mail, labels, expiration dates - **Product identification** — distinguis…
Prior (probability)
— In Bayesian reasoning, the initial estimate of the probability of a hypothesis before considering ne…
Prior belief (before streak):
— Thompson's true scoring rate: approximately 0.31 goals per 90 - Standard deviation of true ability: …
prior knowledge corridors
— the specific combination of domain knowledge, industry experience, and market understanding that eac…
prior probability
— an initial estimate of how likely any given email is to be spam. Based on historical data, roughly 4…
Prior programming experience
— We start from absolute zero in Chapter 2. - **Mathematics beyond arithmetic** — We use business math…
Prior Research and Reporting
— Identify at least two credible published analyses of this platform (academic papers, investigative j…
Prioritize findings
— which issues are most urgent? Most impactful? 2. **Develop actionable recommendations** — specific, …
Prioritize:
— Enterprise clients seeking training or strategy work - Mid-size company strategy engagements (strong…
prioritized scanning
— a systematic pattern of attention allocation where the most critical situations (aircraft on final a…
priority override
— it bypasses the normal cycle entirely. This is a common pattern: check for exceptional conditions fi…
Priority Tiers:
— **Tier 1 (Score 4.0--5.0):** Pursue immediately. Allocate resources and assign executive sponsor. - …
PRISM
— A program through which the NSA obtained data directly from the servers of nine major technology com…
Prisoner's dilemma
— A game theory scenario in which two rational agents may not cooperate even though cooperation would …
Privacy advantages:
— No real individuals are represented in the data, so re-identification risk is eliminated (in theory)…
Privacy by design
— An approach to systems engineering and policy development that builds privacy protections into the d…
Privacy by Design is a legal requirement
— Article 25 means data protection must be built into systems from the start, not bolted on afterward.
Privacy characteristics of centralized models:
— The government holds a database of who was near whom and when. - The data can potentially be repurpo…
Privacy characteristics of decentralized models:
— No central database of contact events exists. - The government or public health authority never lear…
Privacy constraints
— You need data that mimics real patient, customer, or financial records without exposing actual indiv…
Privacy Engineer
— Designs and implements privacy-preserving technologies: differential privacy, federated learning, co…
Privacy Implications:
— Confirming that a patient's medical record was used to train MedSecure's diagnostic model reveals th…
Privacy paradox
— The observed tendency for individuals to express strong privacy preferences in surveys while behavin…
Privacy Sandbox
— Google's set of proposed replacements for third-party cookies in the Chrome browser.
Privacy, Security, and AI
— Privacy in the age of AI · Differential privacy · Federated learning · Adversarial attacks · Model i…
Privacy-focused browsers and search engines
— Firefox with privacy extensions, Brave browser, DuckDuckGo search --- reduce tracking by blocking th…
Privacy-Preserving Analytics
— Federated learning for distributed analysis
Privacy-preserving techniques:
— **Data minimization.** Collect only the data you need for the specific AI application. Resist the "c…
private right of action
— the ability of individuals to sue. Most privacy statutes rely on enforcement by government agencies …
Privilege Escalation:
— From each foothold, attempt to escalate privileges to SYSTEM/root on the compromised host. - On Wind…
Priya
— our recurring student character — inhabits. When Priya sits down to write a paper and considers usin…
Priya Kapoor
— Application Architect Priya has fifteen years of experience spanning both mainframe and distributed …
Priya Okonkwo
— Data Analyst, Acme Corp - **Sandra Chen** — VP of Sales, Acme Corp - **Marcus Webb** — IT Manager, A…
Priya Sharma
— Data analyst at Acme Corp. Responsible for the quarterly operations report and increasingly the pers…
Priya Sharma (31)
— Digital Marketing Manager, 3 years at Greenfield. Priya manages the e-commerce and paid media channe…
Priya's design decisions:
— She chose a line chart because this is temporal data with a continuous trend. - She set the y-axis f…
Priya's minimal impact:
— 80% retention on a tiny base (1,200 × 80% = 960 followers retained) - Virtually no lasting change in…
Priya's situation:
— Monthly premium: $380 - Probability of needing a major medical service in one month: approximately 3…
Pro Football Focus
— Player-level grades - Tracking data - Premium analytics
Pro Football Focus (PFF)
— Detailed player grades - Play-by-play charting - Subscription required for full access
Pro Football Reference
— https://www.pro-football-reference.com/ - Advanced passing stats section - Historical data - Air yar…
Pro Football Reference CSV exports
— Historical statistics - Advanced passing stats - Manual download required
Pro Football Reference Historical Data
— Historical statistics going back decades - Understanding era context - Record progression over time
Pro Git
— Scott Chacon and Ben Straub The definitive Git reference, available free at https://git-scm.com/book…
Pro tip: Dual pacing
— use different cut rates for different segments within the same video. Fast for energy, slow for cont…
Pro:
— Intelligence agencies already try to predict conflicts. Markets might do it better. - Better predict…
Proactive interference
— The impairment of new memory learning by prior memories; explains why expertise in one domain can in…
Proactive not reactive; preventive not remedial
— Privacy protection designed in before events occur 2. **Privacy as the default setting** — Maximum p…
proactive provenance
— embedding information about a content's origin at the time of creation, rather than trying to detect…
Proactively engage counsel when:
— Developing organizational AI use policies for the first time - Negotiating client contracts with AI …
Probabilistic forecasting
— An approach to election prediction that expresses outcomes as probabilities rather than point predic…
Probability as long-run frequency
— the conceptual shift from certainty to probabilistic thinking. Many students think a probability of …
Probability basics:
— Probability is a number between 0 (impossible) and 1 (certain) - Three interpretations: classical (c…
probability calibration
— the art and science of ensuring your model's probabilities are trustworthy. We then address the chal…
Probability current
— Ch 2.6 The vector $\mathbf{j} = \frac{\hbar}{2mi}(\psi^*\nabla\psi - \psi\nabla\psi^*)$ satisfying t…
Probability density
— Ch 2.2 The quantity $|\psi(x,t)|^2$ whose integral over any region gives the probability of finding …
probability distribution
— a ranked list of every possible next token with a percentage chance attached to each. If the text so…
probability distributions
— and one distribution in particular, the **normal curve**, that will change how you think about data …
probability estimates
— educated guesses, with varying degrees of confidence, based on patterns in historical data.
Probability estimation:
— What is the feared outcome? - What probability do you actually assign to it? (0–100%): ___ - What wo…
probability flow ODE
— a deterministic ordinary differential equation that generates the same marginal distributions as the…
Probability Fundamentals
— Basic probability rules (complement, union, intersection) - Conditional probability and independence…
Probability is everywhere in sports
— not just in betting, but in team strategy, player evaluation, game planning, and fan behavior.
probability is not fixed; it changes with evidence
— is the conceptual shift that separates casual probability thinking from the kind of reasoning that a…
Probability sample
— A sample in which every member of the target population has a known, non-zero probability of being s…
probability sampling
— it is technically invalid for nonprobability samples (though many polls report it anyway)
Probability-based online panels
— exemplified by the AmeriSpeak panel at NORC/University of Chicago, Ipsos's KnowledgePanel, and simil…
Problem 1:
— a) Mean = (2+1+0+3+2+1+4+2+1+2)/10 = 18/10 = **1.8 goals** - b) Sorted: 0,1,1,1,2,2,2,2,3,4. Median …
Problem 2:
— **Go for it:** EP = 0.55(2.6) + 0.45(-0.7) = 1.43 - 0.315 = **1.115** - **Field goal:** EP = 0.48(3.…
Problem definition
— What is the issue? Framing determines what kind of problem we are dealing with. Is illegal immigrati…
Problem formulation
— Define the target variable and the decision the model will inform. 2. **Data collection** --- Aggreg…
Problem framing
— defining the observation window, label period, and business objective before touching code
Problem-Solving
— Frame ambiguous questions clearly - Identify relevant data and methods - Iterate based on feedback -…
Problem: "My arithmetic gives wrong results"
— Cause: Missing `S` (sign) in the PIC clause — negative intermediate results lose their sign. - Fix: …
Problem: `pip install` gives a permission error
— Make sure your virtual environment is activated (you should see `(.venv)` in your prompt) - Never us…
Problem: `python` command not found
— **Windows:** Reinstall Python with "Add to PATH" checked - **macOS/Linux:** Use `python3` instead of…
Problem: Classify emails as spam or not spam
— Target: Spam or not spam (category) - Features: Number of exclamation marks, presence of suspicious …
Problem: Claude Code says "API key not found"
— Check that `ANTHROPIC_API_KEY` is set: `echo $ANTHROPIC_API_KEY` - If it is empty, re-read the API k…
Problem: Copilot not showing suggestions
— Check the Copilot icon in the VS Code status bar - Sign out and sign back in to GitHub within VS Cod…
Problem: Git says "Please tell me who you are"
— Run the `git config` commands from Section 4.8 to set your name and email
Problem: Predict house prices
— Target: Sale price (dollars) - Features: Square footage, bedrooms, bathrooms, lot size, neighborhood…
Problems identified:
— Row-by-row cursor processing (the classic "slow-by-slow" anti-pattern) - Committing every 100 rows a…
Problems where quantum computers do NOT help:
— **NP-complete problems** (in general): There is no known quantum algorithm that solves NP-complete p…
Problems where quantum computers probably help:
— **Optimization** (QAOA, quantum annealing): Possible quadratic or modest speedups for combinatorial …
Problems with DWS:
— Steals and blocks are overweighted relative to their defensive value - Positioning and help defense …
Problems with proven quantum speedup:
— **Factoring and discrete logarithm** (Shor's algorithm): exponential speedup. Breaks RSA, Diffie-Hel…
PROC must include:
— Documentation header (purpose, parameters, change history) - JOBLIB concatenation (application load …
procedural account of manipulation
— The view that manipulation uses techniques designed to circumvent rather than engage rational evalua…
Procedural for the report generation:
— Pros: Calculating class averages and producing a report are one-time operations on a collection. A f…
Procedural language
— Language that addresses the structure or process of a conversation rather than its content; used in …
Procedural memory
— memory for skills and procedures: how to ride a bike, how to type, how to play a chord on the guitar…
PROCEDURE DIVISION
— The fourth of COBOL's four divisions, containing the executable logic of the program organized into …
Procedure Division checks:
— Does every paragraph have exactly one entry point and one exit point? - Are all file operations chec…
procedures
— the exact implementations that known threat groups have used. For example, APT29 (Cozy Bear) has bee…
process
— the ongoing interaction between the individual and their resources (internal and external) in respon…
Process C (circadian rhythm)
— the approximately 24-hour internal biological clock, driven by the SCN; regulates the timing of aler…
Process changes:
— A mandatory impact analysis step was added for all copybook changes - A "full recompile" procedure w…
Process glimpses (5-15 seconds)
— Builds anticipation (viewer knows change is coming) AND provides implied effort (the transformation …
Process health metrics:
— Average PR review time - Review comments per PR - Time to merge - Defect escape rate (bugs found in …
Process Injection (T1055):
— Use `malfind` to identify injected code regions - Compare `pslist` and `psscan` for hidden processes…
Process Integration
— Daily readiness reports for coaching staff - Pre-game injury risk assessments - Post-game load analy…
Process KPIs:
— Average turnaround time for analysis requests - Percentage of routine reporting that is automated - …
Process repairs:
— "Can we take a break and come back in 20 minutes?" - "I feel like we've lost the thread. Can we star…
Process review:
— Were all bets placed according to your documented process? - Were there any deviations? If so, what …
Process S (sleep pressure)
— the adenosine-based accumulation of sleep drive across waking hours; caffeine blocks adenosine recep…
Process visible from start
— the viewer must see what's happening immediately with no setup or explanation. The knife is touching…
Processing fluency
— the subjective ease with which cognitive operations are performed—functions as a metacognitive signa…
Processing per account:
— Calculate daily interest accrual (rate from INTEREST_RATES table) - Assess applicable fees (monthly …
Processor Accounting Section:
— CPU time (TCB and SRB, broken down by step) - zIIP and zAAP eligible time (and time actually execute…
Proclamation Line of 1763
— British royal decree establishing the Appalachian ridge as the western limit of colonial settlement,…
PROCOPT values:
— G = Get (read) - I = Insert - R = Replace - D = Delete - A = All (GIRD)
procrastination
— one of the most common and most studied forms of self-regulation failure, and the one that most reli…
PRODUCT
— Financial products offered by the bank.
Product affinity scoring
— using the recommendation engine approach from Chapter 10, she generates per-member product affinity …
Product Launch
— A structured campaign to introduce and sell a new product to an audience, typically combining email …
Product owner
— Someone is responsible for the API's success, not just its implementation - **Roadmap** — The API ha…
Product recommendations
— how the recommendation engine works, what data it uses, and how customers can adjust their preferenc…
Product requirements:
— Must address a specific problem your audience has - Must take 3–8 hours to build - Must include a ti…
Product-audience fit discipline
— only making things that your specific audience specifically needs — costs nothing and is violated co…
Product-Market Fit
— The degree to which a creator's product satisfies a genuine need in a well-defined market. Achieving…
product_images
— multiple images per product: - `id` (primary key) - `product_id` (foreign key to products) - `url` (…
Production
— The live environment serving real users. Must be stable, secure, and monitored.
Production Analysis
— Normalize college stats for comparison 2. **Physical Testing** - Combine metrics predict athleticism…
Production choices:
— Filmed on her phone in her bedroom (natural environment) - Available overhead light (not optimized) …
PRODUCTION RULE
— Never write a COBOL program that loops without issuing a CICS command. A PERFORM VARYING loop that p…
Production standard
— batch update + CICS reads | | 3 | No VSAM integrity | Only with external serialization — **avoid** |…
Production statistics (first 3 months):
— 36,000 loan applications processed through the saga - 34,800 completed successfully (96.7%) - 1,040 …
PRODUCTION WARNING
— In textbook architectures, the three-way TOR/AOR/FOR split is clean. In production, you'll encounter…
Productive borrowing
— Initial cross-domain transfer that illuminates 2. **Invisible analogy** — The import stops being tre…
Productive pause
— A time-out from a difficult conversation that is requested (not imposed), names the speaker's state,…
Productive Struggle
— A deliberately challenging problem that may take time and frustration to work through. Do not skip t…
Productization
— The process of converting a creator's services, knowledge, or recurring work into standardized produ…
products
— the core entity: - `id` (primary key, serial) - `name` (varchar 200, not null) - `description` (text…
Products:
— Player grades (0-100 scale) - Detailed play-level data - Position-specific metrics
Professional and Standards Organizations
— International Code Council (ICC): iccsafe.org - National Fire Protection Association (NFPA): nfpa.or…
Professional annual service:
— Combustion analysis: measures flue gas CO, CO₂, and temperature. Verifies complete, efficient combus…
Professional communication guidelines:
— Be patient. Triage teams handle hundreds of reports. Response times vary. - Be respectful. Even if y…
Professional fact-checking
— A journalistic practice characterized by the evaluation of specific verifiable claims against docume…
Professional only:
— Combustion analysis - Heat exchanger inspection - Refrigerant level check (requires EPA 608 certific…
Professional recommended:
— Main-line clearing (requires drain machine; sewage exposure) - Sewer camera inspection - Vent blocka…
Profile Elements:
— Total penalties taken - Conversion rate - Preferred placement zones - Technique patterns
Profile factors:
— Age and remaining career trajectory - Contract length (remaining years) - Nationality and work permi…
Profile of CICS workloads that can work on cloud:
— Transaction volume under 100 TPS (transactions per second) - Latency requirements above 50ms per tra…
Profile:
— 20 seasons - Career WS: 273.4 - Never had an exceptional WS/48 season (peak 0.292) - But maintained …
Profiling
— The practice of constructing an analytical model of an individual or category of individuals from da…
Profit and Loss (P&L):
— Total P&L (absolute dollars) - P&L per trade (average) - P&L by market category - P&L by edge source
profit curve
— one of the most underused and most powerful evaluation visualizations in applied ML.
Program Comprehension
— Academic research on how programmers understand unfamiliar code. Search ACM Digital Library and IEEE…
program visibility
— it determines which programs can call which other programs. A COMMON program can be called by its si…
Program-ID
— The paragraph in the IDENTIFICATION DIVISION that names the COBOL program. The program-id is used to…
Programmable Logic Controllers (PLCs)
— Industrial computers that control physical processes based on programmed logic. PLCs read sensor inp…
Programmatic advertising
— Automated buying and selling of digital advertising inventory through real-time auctions, with AI sy…
Programming and software engineering:
— Python (the lingua franca of AI) - Software design patterns and best practices - Version control (Gi…
Programming experience
— Python is taught from scratch in Chapter 3 - **Linear algebra or calculus** — Mathematical concepts …
Programming:
— Comfortable writing Python functions and classes - Experience with basic data structures (lists, dic…
Programs with Evidence:
— FIFA 11+ (soccer): 50% reduction in ACL injuries - Sportsmetrics: 60-70% reduction in female athlete…
progressive massive fibrosis (PMF)
— the disease is devastating. The lungs become so scarred and stiffened that breathing becomes progres…
Progressive Pass
— A pass that moves the ball at least 10 meters closer to the opponent's goal, measured along the x-ax…
PROGRESSIVE PROJECT
— The HA Banking Transaction Processing System. In Chapter 1, you designed the Sysplex infrastructure.…
Progressive Project Grand Total: 100 points
— ## 2. Case Study Analysis Rubric
Progressive project milestones
— Graded as a portfolio of incremental submissions. Early milestones should be graded generously to bu…
Prohibited AI Practices include:
— Real-time remote biometric identification in publicly accessible spaces by law enforcement (with nar…
Prohibited secondary uses:
— Decisions detrimental to individuals based on their health data - Advertising or marketing - Increas…
Project 1: Full-Stack SaaS Application
— A subscription-based web application with user authentication, a dashboard, REST API, and database. …
Project 2: Data Pipeline and Analytics Platform
— A system that ingests data from multiple sources, transforms it, stores it, and presents analytical …
Project 3: Multi-Agent Development Tool
— A system that orchestrates multiple AI agents to automate software development tasks. This project d…
Project Budget (must be in the right range)
— Below $8,000: Too small — the project economics do not work for her rate and the overhead of client …
PROJECT CHECKPOINT
— In Chapter 13, you designed your HA banking system's CICS region topology (TOR/AOR/FOR with MRO). In…
Project Initiation Phase
— Write an **AI Project Proposal** (Template 1) for each selected initiative. - Complete the **Data Re…
Project name and client
— **Status:** Active, On Hold, or Completed - **Contracted hours** — what she agreed to deliver - **Ho…
Project Phase 1 due
— Conceptual and logical data model for Meridian National Bank.
Project Phase 2 due
— Physical schema with sample data, indexes, views.
Project Phase 3 due
— Stored procedures, triggers, business logic layer.
Project Phase 4 due
— Performance tuning report and security hardening.
Project Type (must be in her wheelhouse)
— Process improvement, systems design, change management, training design, organizational assessment: …
Projected cloud costs (from vendor proposal):
— EC2 compute (reserved, 3-year): $38,000/year - Storage (io2 + S3): $24,000/year - Micro Focus licens…
Projected growth (3 years):
— Claims volume expected to grow 15% annually - New partner integrations may add 30% more HSA-eligible…
Projected growth:
— MedClaim expects to add 3 new partner insurers in the next 12 months, each contributing ~2,000 trans…
Projected GRP levels:
— Suburban Metro: 330 GRPs/week - Mid-State: 230 GRPs/week - Capital City: 60 GRPs/week - Rural Southe…
Projected Impact:
— In new system with better shot creation: xFG% may increase to 47% - If shot-making holds: Actual FG%…
projection
— the tendency to attribute one's own attitudes, beliefs, and values to others, especially others we f…
Projection lag
— the time difference between the event timestamp and the status view's LAST_UPDATE_TS. Should be unde…
projects.csv
— Project registry with start dates, target completion dates, current status, and total contracted hou…
Prometheus and Grafana
— The standard open-source stack for monitoring and alerting in production systems. Essential for trad…
Prometheus Documentation
— Time-series monitoring at prometheus.io.
prompt
— the text that tells the user what to type. Always include a trailing space in your prompt so the use…
prompt engineering
— is actually a metacognitive skill. And if you've been doing the work of this book, you already have …
Prompt Engineering Fundamentals
— What is prompt engineering · Prompt anatomy · Zero-shot vs. few-shot · Role-based prompting · Iterat…
Prompt injection is the top LLM vulnerability
— LLMs cannot reliably distinguish between developer instructions and attacker instructions, making pr…
Prompt Library
— A personal or team collection of reusable prompt templates for common coding tasks. Built up over ti…
Prompt-based app builders
— platforms like Relevance AI, Flowise, and Stack AI — allow users to build AI workflows by connecting…
Prompts
— Pre-defined prompt templates that guide AI behavior for specific tasks. Prompts can include paramete…
Prompts for each entry:
— Describe the situation briefly (public space, media, social media, interpersonal). - What kind of lo…
Proof
— "This is evidence that effort produces results." In a world of theory and advice, transformation con…
Propaganda
— Intentional communication that uses techniques bypassing critical reasoning, serving the communicato…
Propaganda is not the same as:
— *Error* — unintentional misinformation lacks the intent criterion - *Education* — education aims to …
Propaganda Model
— Chomsky and Herman's analytical framework (*Manufacturing Consent*, 1988) identifying five structura…
Propaganda simplification
— The reduction of complex causation to a single, fundamentally false explanation, typically attributi…
Propaganda-democracy feedback loop
— The four-phase self-reinforcing process through which information environment degradation enables de…
Propagator
— Ch 7.3, Ch 31.2 The amplitude $K(x_f, t_f; x_i, t_i) = \langle x_f|\hat{U}(t_f - t_i)|x_i\rangle$ fo…
proper scoring rules
— formulas that reward forecasters for honest probability assessments (which we explored in Chapter 4)…
Properties of Expectation:
— $\mathbb{E}[aX + b] = a\mathbb{E}[X] + b$ (linearity) - $\mathbb{E}[X + Y] = \mathbb{E}[X] + \mathbb…
Properties of the Inverse:
— $(\mathbf{A}^{-1})^{-1} = \mathbf{A}$ - $(\mathbf{AB})^{-1} = \mathbf{B}^{-1}\mathbf{A}^{-1}$ - $(\m…
Properties of Variance:
— $\text{Var}(aX + b) = a^2 \text{Var}(X)$ - $\text{Var}(X + Y) = \text{Var}(X) + \text{Var}(Y) + 2\te…
Properties:
— Output range: (0, 1), useful for probabilities - Smooth and differentiable everywhere - Saturates fo…
Property-Based Testing
— A testing approach where you define properties (invariants) that should hold for all inputs, and the…
Prophet (Facebook)
— https://facebook.github.io/prophet/ - Time series forecasting applicable to season predictions
Propinquity effect
— The finding that people are more likely to form relationships with those who are geographically or f…
Proponents of centralization argued:
— Public health authorities need identifiable data to conduct effective contact tracing — not just ano…
Proponents of decentralization argued:
— Centralized databases create irresistible targets for repurposing. History demonstrates that data co…
Proportion test
— A detection tool: is the proposed cause (the scapegoat) actually capable of producing, by its own ag…
Proportional to the square root of string tension
— quadrupling the tension doubles the frequency (one octave higher); reducing tension to one-quarter h…
proportionality
— The requirement that the emotional intensity of a persuasive communication correspond to what accura…
proportions
— the most common type of test in everyday applications. You'll learn:
Proposed fix:
— **Seconds 0-2:** Keep a brief landscape shot (1-2 seconds) but overlay it with a verbal hook: "The c…
Pros for Meridian:
— Easy to explain: "It's the squared error between your forecast and what happened" - Bounded: worst s…
prosecutor's fallacy
— confusing P(evidence | innocent) with P(innocent | evidence). These are different conditional probab…
prosodic cues
— the tone, rhythm, and melody of the human voice — as processed by the ear and vagus nerve as social …
Prospect Database
— Store prospect profiles with measurables, ratings, statistics - Track recruiting status and visit hi…
Prospect Profile:
— Position: WR - Height: 6'0", Weight: 198 - 40: 4.42, Vertical: 38" - YPRR: 2.95 - Breakout Age: 19.2…
Prospect theory
— Kahneman and Tversky's decision framework showing that losses are weighted more heavily than equival…
prospective hindsight
— a concept Klein drew from research by Deborah Mitchell, J. Edward Russo, and Nancy Pennington (1989)…
Protect (delegate last):
— Your creative POV — the ideas, opinions, and perspective that make your content yours - Your on-came…
Protect attentional conditions:
— Block 90-minute windows in the calendar and treat them as meetings - Identify the specific time of w…
Protecting a Lead:
— Prioritize ball security and free throw shooting - Defensive versatility to prevent easy baskets - C…
Protectionist media literacy
— the dominant tradition in North American K-12 education — treats media literacy as a defensive skill…
provenance
— establishing a verified chain of custody for media. Technologies like C2PA (Coalition for Content Pr…
Provide context
— give the AI examples of the correct pattern, affected files, and any constraints. 4. **Generate** th…
provider
— it developed and trained the AI system. The city's transit authority is the **deployer** — it will o…
Providers:
— StatsBomb includes freeze frames with their event data, making them the most widely accessible sourc…
Provisions present in the draft contract:
— License grant (SaaS, multi-tenant deployment) - License fees: £220,000 per year, with "annual adjust…
Proxemics
— The study of interpersonal space and how the distance between people communicates social meaning. De…
Proximity
— code near the cursor is more relevant than code far away - **Semantic relevance** — code that uses s…
Proxy and firewall logs:
— HTTP/HTTPS requests (URLs, user agents, response codes) - Connection allow/deny decisions - Essentia…
proxy measure
— a metric that is supposed to correlate with the thing they actually care about. Weight of nails, tes…
proxy metrics
— observable behaviors that correlate with satisfaction.
Proxy targeting
— Achieving demographic exclusion in advertising by targeting variables that correlate with protected …
Proxy variable
— A variable that correlates with a protected characteristic (such as race) and can therefore serve as…
proxy variables
— technically neutral data points that carry the signal of the protected characteristic they're standi…
Proxy-based racial targeting for suppression
— using demographic proxies rather than explicit racial categories — may produce racially structured e…
Pseudo-Conversational
— A CICS programming technique in which a transaction sends a screen to the user and then returns cont…
Pseudo-serendipity
— Christian Busch's term for situations in which a person set out to find one thing and, while not fin…
Pseudovector (axial vector)
— A vector quantity that is even under parity (e.g., angular momentum, magnetic field).
PsExec
— Windows Sysinternals tool for remote command execution. NotPetya included a lightweight PsExec imple…
PSI Interpretation:
— **< 0.10**: Stable — no action required - **0.10–0.25**: Minor shift — increase monitoring frequency…
PSxG
— Post-Shot Expected Goals - extends xG by incorporating shot placement within the goal frame
psychic impairment
— that the disaster had caused not just physical injuries and property damage but profound psychologic…
psychoacoustic residue
— an acoustic afterimage that persists for a measurable time in the listener's perception.
Psychoacoustics
— The scientific study of the relationship between physical acoustic stimuli and subjective auditory p…
Psychoeducation about the attention economy
— age-appropriate explanation of variable-ratio reinforcement, the business model of social media, the…
Psychographic targeting
— Advertising targeting based on inferred personality characteristics (e.g., the OCEAN/Big Five model)…
Psychological detachment
— the recovery dimension involving genuine mental disengagement from work; the dimension most consiste…
Psychological indicators:
— Reduced threshold for emotional reactivity ___ - Persistent low mood or anxious baseline ___ - Diffi…
Psychological reactance
— The motivational state aroused when freedom feels threatened; in romantic contexts, can manifest as …
Psychological safety
— Edmondson's concept of a shared team belief that interpersonal risk-taking — speaking up, asking que…
Psychology Today Therapist Finder
— therapists.psychologytoday.com - Filter by issue, insurance, modality, and location
Psychoneuroimmunology (PNI)
— the field studying interactions between psychological processes and the nervous and immune systems.
PsycINFO (via university library)
— APA's psychology research database; most comprehensive for peer-reviewed psychology literature
PTG is not:
— Universal. A significant minority of trauma survivors do not report PTG, and that is not a failure. …
PTG is:
— Common. Approximately 60–80% of trauma survivors report at least some domains of growth in retrospec…
Public advocacy
— raising awareness of the threat through media campaigns, publications, and public events - **Diploma…
Public analytics route:
— Building a public profile through blog posts, Twitter threads, or other platforms - Contributing to …
Public Biases:
— Bet favorites - Bet home teams - Bet popular teams (Cowboys, Patriots) - Bet overs - Overweight rece…
public good
— it is non-rivalrous (my enjoyment of privacy doesn't diminish yours) and, to a degree, non-excludabl…
Public media
— Broadcasting or information organizations funded primarily by public rather than commercial means, a…
Public relations
— Term coined by Edward Bernays in the 1920s to describe organized persuasion campaigns in a more neut…
Public visibility
— How visible is your work and thinking to people who don't already know you? (1 = no public presence …
Public Work Path
— Writing for football analytics sites - Open-source contributions - NFL Big Data Bowl participation
public-key cryptography
— the mathematical foundation of secure communication on the internet. When you connect to your bank's…
Publication 535 (Business Expenses)
— The actual tax guidance for self-employed individuals in the US. Not exciting reading, but authorita…
Publication bias
— the tendency of journals to publish positive, significant results while rejecting null results — mea…
Publicly Available (NBA.com/stats):
— Aggregated speed and distance metrics - Touch statistics and time of possession - Catch-and-shoot vs…
Publish Press
— Weekly analysis of creator economy trends - **The Leap** — Creator strategy and platform updates - *…
Publisher vs. platform
— The legal and regulatory distinction between entities that exercise editorial control over content (…
Publishing (benefits):
— Potential health improvements for ~2,500 residents in three communities - $4.2 million in federal re…
Publishing (harms):
— Property value decline for ~400 homeowners - Anxiety and stigma for ~2,500 residents - Potential job…
PubMed
— pubmed.ncbi.nlm.nih.gov - Full-text access to millions of biomedical and psychology abstracts; many …
Puerto Rican independence organizations
— **American Indian Movement** (documented in related programs)
Pull Request (PR)
— A request to merge changes from one **Git** **branch** into another. Serves as a review checkpoint w…
pulsar
— a rapidly rotating neutron star emitting beams of radio energy like a cosmic lighthouse. The discove…
Pulse
— In rhythm, the basic unit of temporal measurement — a regular, isochronous beat to which music is pe…
pulse finding
— is one of the most impressive and still-not-fully-understood capabilities of the human auditory syst…
Pump power
— higher pump power gives more squeezing, up to a limit set by the damage threshold of the crystal and…
pumped-storage facilities
— systems that store energy by pumping water to an elevated reservoir when electricity is cheap (durin…
Punt
— Give up possession, gain field position 2. **Field Goal** - Attempt 3 points 3. **Go for it** - Try …
Punt Decision:
— [ ] Current field position - [ ] Expected net punt yards - [ ] Opponent's starting position EP - [ ]…
Punt:
— Expected net: ~35 yards - Opponent starts at own 5: EP = -0.5 - Punt EV = -(-0.5) = **+0.5 EP**
Punter evaluation:
— **Continuous outcomes**: Net yards on spectrum - **Situation-dependent**: Different goals by field p…
Punter Statistics (Season):
— Total punts: 58 - Gross punting yards: 2,552 - Punts inside 20: 22 - Touchbacks: 6 - Fair catches: 2…
Purchase frequency
— number of transactions in the last 12 months - **Recency** -- days since last purchase - **Average o…
pure function
— it takes input as parameters and returns output as a return value. No `input()`, no `print()`, no si…
Pure judicial discretion
— judges decide alone, bringing their expertise and their biases > 2. **Algorithm replaces judge** — t…
Pure state
— Ch 23.1 A quantum state described by a single ket $|\psi\rangle$ (or equivalently a density matrix $…
Purpose
— a sense that one's actions lead toward desired outcomes or fulfill valued goals 2. **Values** — a se…
Purpose and character of the use
— Is it commercial? Transformative? 2. **Nature of the copyrighted work** 3. **Amount and substantiali…
Purpose limitation
— traffic sensors collect traffic data, not faces, not conversations, not license plate numbers. 2. **…
Purpose:
— A few errors (0.01%) in a 10 million record file are normal (bad data in individual records) - A lar…
Purposeful
— every tool solves a specific problem; (2) **Complementary** — tools work together rather than duplic…
Purposefully vulnerable AD labs:
— **GOAD (Game of Active Directory):** Multi-domain vulnerable AD lab - **Vulnerable-AD:** PowerShell …
Push poll
— A type of campaign tactic disguised as a poll in which respondents are not genuinely sampled to meas…
Push to GitHub
— your application code lives in a GitHub repository 2. **Connect to Render** — Render watches your re…
PwnKit-Specific Defenses:
— Implement automated patch management for all systems, including non-production - Remove SUID bits fr…
PyCon
— Python community conference with relevant talks.
PyCon and SciPy Conferences
— Available on YouTube - Expert presentations on pandas, NumPy, visualization - Latest best practices
PyCon regional events
— There are PyCon events in Europe, Africa, Asia, Latin America, and Australia. Smaller, often more in…
PyCon US
— The premier annual Python conference, held in North America in late spring. Multiple days of talks, …
PyCon US talks
— Available at `pyvideo.org` and on the PyCon YouTube channel. The archive going back to 2011 contains…
PyConUS and regional PyCons
— The annual Python conference is welcoming to beginners and often has student pricing or scholarships…
Pydantic
— A Python library for data validation using type annotations. Models define expected data shapes and …
PyData Conference Talks
— YouTube channel with presentations - pandas and data cleaning talks - https://www.youtube.com/c/PyDa…
PyData conferences
— Focused on the data science and analytics ecosystem. Highly relevant for business Python practitione…
Pygmalion effect
— The phenomenon, demonstrated by Rosenthal and Jacobson (1968), in which higher expectations placed o…
Pygmalion Study
— a name drawn from the Greek myth of the sculptor who fell in love with his own creation, and Shaw's …
PyImageSearch
— https://pyimagesearch.com/ - Practical computer vision tutorials
pyjanitor
— Pandas utilities for data cleaning - Method chaining for cleaning pipelines - https://pyjanitor-devs…
PyLadies
— A global mentorship group focused on growing women's participation in Python. Active chapters in man…
Pylance
— type checking integrated into the editor - **Black Formatter** — runs black on save - **GitLens** — …
pyplot
— The `matplotlib.pyplot` module; provides a state-based interface that tracks the current Figure and …
PySpark
— When your data is too large for pandas (tens or hundreds of millions of rows), PySpark gives you the…
pytest
— a third-party framework that's simpler, more powerful, and more readable. We'll use pytest throughou…
pytest Documentation
— Comprehensive testing framework docs at docs.pytest.org.
Python
— open source since 1991, developed by a global community of thousands - **VS Code** — Microsoft's edi…
Python (pandas, numpy, scipy)
— Primary tools for this textbook - Extensive documentation - Large community support
Python 3.10+
— The programming language we use throughout this book (~5 minutes) 2. **Visual Studio Code (VS Code)*…
Python 3.8 or higher
— Download from python.org - Verify installation: `python --version`
Python 3.9 or higher
— We recommend the Anaconda distribution 2. **Jupyter Notebook or JupyterLab** — For interactive codin…
Python 3.9 or later
— Download from python.org - During installation, check "Add Python to PATH"
Python 3.9+
— Install from python.org 2. **Jupyter Lab** - `pip install jupyterlab` 3. **VS Code** - Excellent for…
Python `asyncio` documentation
— For building asynchronous trading systems that handle multiple data feeds and order streams concurre…
Python Basics
— Variables and data types - Control structures (if/else, loops) - Functions and modules - Basic error…
Python chapter appearances:
— Ch. 7: FFT and spectral analysis — visualizing timbre differences across genres - Ch. 32: Digital au…
Python Crash Course, 3rd Edition
— Eric Matthes (No Starch Press, 2023)
Python Discord
— A large, active community with channels organized by topic, experience level, and domain. The `#lear…
Python Documentation
— [docs.python.org/3/](https://docs.python.org/3/) The official documentation. Learn to read it — it's…
Python Draft Analysis Libraries
— pandas for data manipulation - scikit-learn for modeling - matplotlib for visualization
Python for Data Analysis, 3rd Edition
— Wes McKinney (O'Reilly, 2022)
Python for Football Analytics
— building the programming skills to efficiently manipulate, analyze, and visualize NFL data.
Python for the Business Professional
— Why Python · Setting up your environment · Jupyter notebooks · Variables, data types, and control fl…
Python libraries used in this chapter:
— `pandas` (pandas.pydata.org) — Data manipulation - `numpy` (numpy.org) — Numerical computing - `matp…
Python libraries:
— `scikit-learn` - Machine learning - `lifelines` - Survival analysis - `pandas` - Data manipulation
Python Package Index (PyPI)
— a repository of over 500,000 open-source Python packages — and installs them into your current envir…
Python Security Advisories
— advisories.python.org / PyPI Security Advisories The official source for Python package security adv…
Python standard library
— a collection of pre-built tools that ships with every Python installation. You'll also learn how to …
Python Type Checking (Guide)
— Real Python (https://realpython.com/python-type-checking/) A practical tutorial on type hints, `Opti…
Python Weather Libraries
— pyowm (OpenWeather) - python-weather - meteostat
Python Weekly
— `pythonweekly.com` — Free weekly newsletter. Subscribe and read the headlines each week. You will ab…
Python's `schedule` library
— simple, pure-Python scheduling that runs inside a long-running Python process. Best for quick script…
Python's Timsort
— the best of both worlds; use it
python-louvain
— Community detection - Louvain algorithm - `pip install python-louvain`
Python.org official tutorial
— [docs.python.org/3/tutorial](https://docs.python.org/3/tutorial/). If you need to brush up on Python…
Python.org/downloads
— Download Python directly - **Google Colab (colab.research.google.com)** — Run Python in your browser…
Python: Default Interpreter Path
— Point to your venv's Python executable - **Editor: Format on Save** — Set to `true` to auto-format y…
PyTorch
— The deep learning framework whose eager execution model and Pythonic design philosophy make it the i…
PyTorch Tutorials
— Deep learning fundamentals - Neural network examples - https://pytorch.org/tutorials/
PyTorch Tutorials: Video Classification
— https://pytorch.org/tutorials/ - Official tutorials for video understanding
PyTorch/TensorFlow
— Deep learning - Neural networks
PyTorchVideo
— https://pytorchvideo.org/ - Video understanding library from Facebook
pyvis
— Interactive HTML networks - Easy visualization - `pip install pyvis`
Q
Q factor (Quality factor)
— A dimensionless parameter measuring the sharpness of a resonance, defined as Q = f₀/Δf, where f₀ is …
Q10: (B)
— Abductive reasoning identifies the hypothesis that best explains available evidence; it yields proba…
Q10: B
— The `try/except` inside the loop creates an error boundary at the level of a single region. If proce…
Q10: FALSE
— The impossibility theorem demonstrates that not all fairness criteria can be simultaneously satisfie…
Q11: (B)
— Appeal to ignorance (argumentum ad ignorantiam): arguing that because something cannot be disproved,…
Q11: FALSE
— The "fairness through unawareness" approach fails because other variables in the model may proxy for…
Q12: (B)
— Cherry picking is most accurately described as the suppressed evidence fallacy: presenting a selecti…
Q12: (C)
— A Cochrane systematic review comprehensively and systematically synthesizes all available RCT eviden…
Q12: FALSE
— Individual fairness and group fairness are conceptually distinct and can conflict even with large, r…
Q13: (B)
— The winner's curse describes how published significant results from underpowered studies tend to ove…
Q13: (C)
— Modus ponens: If P then Q; P; therefore Q. Option A is modus tollens; option B is disjunctive syllog…
Q13: TRUE
— Chouldechova's proof depends on the existence of base rate differences between groups. When base rat…
Q14: (A)
— Appeal to tradition: arguing that something is correct or beneficial because it has been practiced f…
Q14: (C)
— While all Bradford Hill criteria are useful, temporality is the only strictly necessary condition fo…
Q15: FALSE
— P-values are strongly influenced by sample size. With a very large sample, even a tiny (practically …
Q15: TRUE
— A valid argument guarantees that IF the premises are true, the conclusion must be true. But validity…
Q16: FALSE
— Peer reviewers do not have access to the original raw data in standard peer review. They evaluate th…
Q16: TRUE
— Denying the antecedent is a formal fallacy: If P then Q; not-P; therefore not-Q. This is invalid bec…
Q17: FALSE
— The burden of proof lies with whoever makes a positive claim, not with the skeptic. Skeptics are not…
Q18: TRUE
— Cogency is to inductive arguments what soundness is to deductive arguments. An inductive argument is…
Q19: FALSE
— The Gish Gallop is equally effective in written media, YouTube videos, blog posts, and social media …
Q1: (B)
— Popper's criterion is that a hypothesis is scientific only if there exists possible evidence that wo…
Q1: (C)
— Validity is defined purely by the impossibility of true premises and a false conclusion simultaneous…
Q1: B
— ProPublica documented that among defendants who did not reoffend, Black defendants were flagged as h…
Q1: C
— Financial exploitation, while common in high-control organizations, is not one of Lifton's eight cri…
Q20: FALSE
— Moving the goalposts is a distinct fallacy involving arbitrary escalation of evidential standards to…
Q2: (C)
— Modus tollens: If A then B; not-B; therefore not-A. Option A is modus ponens; option B is the fallac…
Q2: B
— The Chouldechova impossibility theorem addresses the incompatibility of demographic parity, equalize…
Q2: C — `Standard`
— `revenue >= 50_000 and tier == "Gold"` → 45,000 is not >= 50,000, so the whole `and` is `False`. Ski…
Q3: (B)
— Tu quoque ("you too") is a variant of ad hominem that deflects criticism by pointing out the critic'…
Q3: A
— 918 people died on November 18, 1978, in Jonestown, Guyana, following Congressman Leo Ryan's visit a…
Q3: B
— Disparity ratio = 44%/68% = 0.647. Since 0.647 < 0.80, this triggers scrutiny under the four-fifths …
Q4: (B)
— The Gish Gallop's core mechanism is the asymmetry: producing a fallacious or weak claim takes second…
Q4: B
— Equal FPR (10% for both groups) means one component of equalized odds is satisfied. Unequal TPR (85%…
Q5: (C)
— Affirming the consequent is a formal fallacy because it is an error in logical form: If P then Q; Q;…
Q5: B
— Counterfactual fairness requires a causal model and the counterfactual analysis of what would happen…
Q6: (C)
— Soundness requires both validity (correct logical form) and truth of all premises. A true conclusion…
Q6: B
— Equal overall accuracy is a necessary but not sufficient condition for fairness. A model can have eq…
Q6: C
— Lalich's central finding was that the mechanisms of coercive control are independent of ideology. Bo…
Q7: (B)
— False dichotomy (false dilemma). The statement presents only two extreme options (ban all social med…
Q7: B
— Multicalibration requires calibration for all efficiently computable subgroups, not just the major p…
Q7: C
— The `finally` block always runs, whether the `try` block completed normally, whether an exception wa…
Q8: (B)
— Post hoc ergo propter hoc ("after this, therefore because of this") is the fallacy of concluding cau…
Q8: (C)
— The confidence interval is a procedure that, if repeated many times, would contain the true value in…
Q8: A
— The class must inherit from `Exception` (or a subclass of `Exception`). Without inheritance, Python …
Q8: B
— This is the classic formal vs. substantive fairness tension: applying formally neutral criteria that…
Q9: (B)
— The no true Scotsman fallacy involves protecting a universal claim from counterexamples by definitio…
Q9: (C)
— Relative risk reduction of 25% on a 2% baseline = 0.25 × 2% = 0.5 percentage points absolute risk re…
Q9: B
— `logger.exception(message)` logs at ERROR level and automatically appends the full traceback of the …
Q9: FALSE
— Equal overall accuracy can coexist with very different FPR and FNR across groups. For example, if Gr…
qadar
— divine decree, or predestination. In Islamic thought, God (Allah) has foreknowledge of all events; n…
QAnon (2017–present)
— The first large-scale demonstration that cultic persuasion mechanisms operate without central leader…
QB
— Non-negotiable, took Burrow #1 2. **WR** - Took Chase over OL, paid off 3. **EDGE** - Paid Hendricks…
QB A is more consistent
— Higher success rate (51% vs 44%), fewer interceptions (5 vs 8)
QB A:
— 312 completions, 478 attempts, 3,845 yards, 32 TDs, 8 INTs
QB B:
— 245 completions, 385 attempts, 3,212 yards, 28 TDs, 5 INTs
QB Checklist:
— [ ] Weight 2-3 years of data - [ ] Regress heavily for TDs/INTs - [ ] Adjust for supporting cast cha…
QB Evaluation Framework
— Combining multiple metrics - Weighting schemes - Practical applications
QB injuries are massive
— No other position creates 8+ point swings 2. **Markets price efficiently** - Major injuries are quic…
QB Model:
— Production: 50% - Athleticism: 20% - Context: 30%
QB Prospect Data:
— Adjusted Completion %: 67.5% - TD:INT Ratio: 3.5 - Yards per Attempt: 8.8 - 40-yard dash: 4.72 - Con…
QB1:
— Passing yards/game: 285 (league avg: 250, std: 45) - TD/game: 2.1 (league avg: 1.8, std: 0.6) - INT/…
QB2:
— Passing yards/game: 310 (same league stats) - TD/game: 2.5 - INT/game: 1.4 - Completion %: 61%
QM is strange but not arbitrary
— The rules of quantum mechanics are counterintuitive, but they are precise, self-consistent, and extr…
QSAM
— Queued Sequential Access Method. A z/OS access method for sequential datasets that uses buffering to…
Quadrant guidance:
— High criticality + high complexity = Handle with extreme care. Refactor or API-wrap. No big-bang. - …
QUALIFIER
— Default qualifier for unqualified table names in the SQL. Critical for moving programs between envir…
Qualitative factors to assess:
— Will the freed time actually be converted to higher-value work, or will it evaporate? - What is the …
Qualitative Issues:
— Five different error handling patterns in the backend. - The "task" module alone had 4,200 lines in …
Qualitative outcomes:
— Derek Washington could now modify the routing logic independently, without Maria's oversight - Sarah…
Qualitative Review
— What did comments tell you about what resonated? _______________ - Was there a specific comment or q…
Quality
— How much preprocessing is required? Some datasets are analysis-ready; others require significant cle…
Quality assessment:
— Error rate on client deliverables: down 23% from pre-AI baseline (she tracked this through her revis…
Quality Assurance:
— Four-stage review: self-review, peer review, technical lead review, final edit - Common deficiencies…
Quality Backup (+1 to +2 points over replacement)
— Experienced NFL starter - Former high draft pick with starts - Veteran with system knowledge
Quality checks at this stage:
— Are all expected data sources available and up to date? - Are there missing values, duplicates, or o…
Quality concerns:
— Synthetic data may not capture rare events, outliers, or edge cases that are critical for model perf…
Quality Consistency Risk
— AI-generated code varies in quality across the codebase 2. **Architectural Drift Risk** -- Quick AI …
Quality Control Staff:
— Most sophisticated data users - Needed granular filtering and custom queries - Wanted bulk export ca…
quality floor
— a minimum standard below which content hurts rather than helps — and a **quality ceiling** above whi…
Quality Metrics
— **Defect rate.** How many bugs are found in AI-generated code versus human-written code? Track per-s…
Quality metrics:
— Error rate in system-generated reports: 1.8% (target: <1%) - Error rate in manual reports: 3.4% - 2 …
Quality Movement Indicators:
— Movement that draws defenders - Movement creating passing lanes - Movement generating shot opportuni…
Quality over quantity
— three well-documented projects beat thirty bare repositories - **Your TaskFlow project** — you built…
Quality requirements:
— Professional appearance — looks like something a real business would send - Consistent formatting ac…
Quality Score
— Google's rating of the relevance and quality of keywords and ads, influencing both ad positioning an…
Quality Standards
— [ ] Define what "done" means for AI-assisted work in your context - [ ] Establish verification requi…
Quality:
— Rate the depth of your closest relationship (1 = surface only, 10 = genuine mutual understanding): _…
Qualla Boundary
— the homeland of the Eastern Band of Cherokee Indians.
QuantConnect and Zipline communities
— Open-source backtesting and live trading platforms with active communities. While focused on traditi…
Quanteda
— An R package for text analysis widely used in political science, with methods parallel to those cove…
quantification bias
— the tendency to treat quantified claims as more objective and reliable than qualitative claims, rega…
quantified personal rating system
— the notorious "1–10 scale" that reduced entire human beings to a single number representing their de…
Quantified self
— A movement and practice involving the continuous self-monitoring of bodily functions, activities, an…
Quantifying HFA
— measuring the home team's edge - **Historical trends** - how HFA has evolved - **Causal factors** - …
Quantitative review:
— Total bets placed - Win/loss record - Total profit/loss - ROI for the week - Average stake size (and…
quantitative search criteria
— a set of statistical thresholds that capture the desired profile.
Quantity:
— How many people in your life would you call in a genuine crisis? ___ - How many people do you have f…
quantization
— the restriction of a physical quantity to discrete, specific values imposed by boundary conditions. …
Quantization (acoustic)
— The restriction of pitch in a musical system to a discrete set of allowed values (the pitches of a s…
Quantization (digital)
— The process of mapping a continuous-amplitude analog sample to the nearest value in a finite set of …
quantization distortion
— systematic rounding errors that produce artifacts that correlate with the signal and are audible as …
quantization of the electromagnetic field
— treating photons as quantum objects with creation and annihilation operators (Chapter 34). The full …
quantized
— it takes only discrete values, not a continuous range. For the silver atom's unpaired electron, the …
Quantum acoustics
— the study of quantum mechanical effects in acoustic systems — became an active research area, partic…
quantum anomalous Hall effect
— a quantum Hall state without an external magnetic field — in thin films of magnetically doped topolo…
quantum chemistry and materials science
— specifically, the accurate calculation of ground state energies, reaction rates, and material proper…
Quantum computing as a development target
— AI can help write quantum programs, which are notoriously difficult due to their reliance on quantum…
Quantum computing connection
— HOM-quality photon interference is the enabling operation for photonic quantum computing (Section 27…
quantum confinement
— the same physics as the particle in a box.
quantum defect
— a measure of how much the electron "penetrates" the core and sees an enhanced nuclear charge. For hy…
quantum electrodynamics (QED)
— the QFT of electrons and photons:
quantum engineer
— someone who bridges the gap between physics research and engineering implementation. Quantum enginee…
quantum events
— the decay of a radioactive nucleus, the spin of an electron, the which-path of a photon through a do…
Quantum field theory (QFT)
— Ch 37.1 The framework unifying quantum mechanics and special relativity, in which particles are exci…
quantum gates
— unitary operators — to qubits. Every quantum gate $U$ satisfies $U^\dagger U = \hat{I}$, which guara…
quantum logic
— a topic we will touch upon in Chapter 33.
Quantum mechanics
— The branch of physics describing the behavior of matter and energy at atomic and subatomic scales, c…
Quantum number
— Ch 1.5, Ch 5.5 An integer or half-integer labeling the eigenvalues of a set of commuting observables…
quantum optics
— the quantum theory of light. Starting from the quantized electromagnetic field (the harmonic oscilla…
Quantum Simulation Toolkit
— a Python library that grows with each chapter. For Chapter 1, your checkpoint is:
Quantum state
— A complete mathematical description of a quantum system, represented as a vector (ket |ψ⟩) in Hilber…
quantum state tomography
— performing measurements in multiple bases and using the statistics to infer $\hat{\rho}$. For a sing…
quantum supremacy
— the first demonstration that a quantum computer could perform a calculation that no classical comput…
Quantum teleportation
— Ch 25.5 A protocol for transferring an unknown quantum state from one location to another using shar…
quantum thermodynamics
— the study of thermodynamic processes at the quantum level, where quantum coherence, entanglement, an…
Quantum tunneling (rectangular barrier):
— $T \approx e^{-2\kappa d}$ for thick barriers. Exponentially sensitive to width and mass. - Real app…
quantum vacuum energy
— an infinite energy density (which requires renormalization to handle mathematically, but the physica…
Quarter 1-2: Level 0 to Level 1
— Deploy MLflow for experiment tracking and model registry - Build automated training pipeline (Airflo…
Quarter 1: Deep Learning and Transformers
— Moved from scikit-learn to PyTorch for daily work - Studied transformer architecture, attention mech…
Quarter 1: Deep Learning Foundations
— Completed fast.ai course and PyTorch tutorials - Built 3 projects: image classifier, text classifier…
Quarter 1: ML Fundamentals Depth
— Completed Stanford CS229 (online) for mathematical foundations - Studied PyTorch deeply: custom data…
Quarter 2: LLMs and Applications
— Studied LLM capabilities, prompt engineering, RAG architecture - Led a cross-functional project to e…
Quarter 2: ML Infrastructure
— Studied MLOps: experiment tracking (W&B), model serving (TorchServe, TGI) - Learned about GPU profil…
Quarter 2: Production ML
— Learned Docker, Kubernetes basics, CI/CD - Built an end-to-end ML pipeline: data processing -> train…
Quarter 3-4: Level 1 Solidification
— Migrate recommendation engine (Chapter 10) and demand forecaster (Chapter 8) to the automated pipeli…
Quarter 3: AI Engineering Leadership
— Studied AI safety, responsible AI, evaluation frameworks - Developed team evaluation standards for L…
Quarter 3: LLM Engineering
— Studied RAG, prompt engineering, fine-tuning with LoRA - Built a RAG chatbot for a personal project …
Quarter 3: LLM Infrastructure
— Studied inference optimization: KV caching, speculative decoding, vLLM - Learned about distributed i…
Quarter 4: Job Search + Advanced Topics
— Studied system design for ML (Chapter 33) - Practiced ML system design interviews - Explored reinfor…
Quarter 4: Specialization + Transition
— Deep dive into distributed training (FSDP, DeepSpeed) - Built a training framework prototype for the…
Quarter 4: Strategy and Scale
— Developed AI engineering roadmap for the product org - Established MLOps practices: experiment track…
Quarter 5-6: Level 1 to Level 2
— Implement CI/CD for model code (automated testing on every code change) - Add canary deployment capa…
quarter-comma meantone
— then measure the cent differences between them and visualize the deviations on a single chart.
Quarterback
— 15-20% of cap for elite 2. **Edge Rusher** - 8-12% of cap 3. **Left Tackle** - 8-11% of cap 4. **Cor…
Quarterback Evaluation
— applying these statistical foundations to measure passing performance.
Quarterly (1-2 days):
— Conduct a personal "landscape review." What new tools have launched? What has your industry adopted?…
Quarterly (30–60 minutes):
— Map your current network clusters. Have any new clusters appeared? Have any existing bridges atrophi…
Quarterly Practices
— [ ] Calculate ROI on your AI subscriptions - [ ] Review your learning curve trend — are you still im…
Quarterly tracking:
— CLV by customer cohort - Long-term follower growth trend - Revenue mix analysis (what percentage com…
Quarterly:
— Values review: - Narrative review: - WOOP application:
Quasi-Arbitrage:
— Statistically likely profit but not guaranteed - Small probability of loss exists - Execution may no…
quasi-bound state
— a state that would be truly bound if the potential barrier were infinitely high, but that can decay …
quasicrystal
— a structure that appears complex and apparently aperiodic but is actually generated by a small numbe…
quasiparticles
— collective excitations of many-body systems that behave like particles:
Qubit
— Ch 25.1 The quantum analogue of a classical bit: a two-level quantum system $|\psi\rangle = \alpha|0…
Queer Creator Community (QCC)
— A grassroots community for LGBTQ+ creators across platforms, particularly YouTube and Instagram, pro…
query
— "What am I looking for?" 2. A **key** — "What do I contain?" 3. A **value** — "What information do I…
Query 1: REORG candidates
— Identify partitions where CLUSTERRATIOF < 0.80 or PERCDROP > 0.10
Query 2: RUNSTATS candidates
— Identify tablespaces where STATSTIME is more than 7 days old or more than 100,000 rows have been mod…
Query 3: Copy age check
— Identify tablespaces where the most recent image copy is older than 36 hours
Query 4: Pending status check
— Identify all objects in REORP, CHKP, COPYP, or RBDP status
Query 5: Recovery readiness
— For each tablespace, show the most recent full and incremental copies and calculate the estimated re…
Query parameter versioning
— `/api/accounts?version=2`. Functional but cluttered. Avoid.
query parameters
— key-value pairs that specify what data you want:
Query Side (Read Model):
— Maintains denormalized views optimized for specific query patterns. - Updated asynchronously by subs…
QUERYNO 15
— This is the 15th SQL statement in the DBRM. You match this to your COBOL source to find the actual S…
question of who is liable
— the AI developer, the deployer, the data provider, or the user --- remains unsettled in most jurisdi…
question stacking
— asking multiple questions in a single turn, before the other person has had a chance to answer any o…
questionable research practices (QRPs)
— techniques that fall short of outright fraud but systematically distort the scientific record.
Queue
— tickets should be processed in FIFO order to be fair; the first customer to submit should be served …
Queue 1: MEDCLAIM.HSA.PAYMENTS
— Carries adjudicated claim messages from MedClaim to GlobalBank.
Queue 2: GLOBALBANK.HSA.CONFIRMS
— Carries payment confirmations from GlobalBank to MedClaim.
Queue algorithm
— routes to the AOR with the shortest task queue. Best for general-purpose workloads where transaction…
Quick checks for self-grading:
— Q1: (b) — Rotations about different axes do not commute - Q3: (b) — $\hat{J}_+$ raises $m$ by 1, kee…
Quick decision rule:
— Need to look up by name? Use a **dictionary**. - Need an ordered, changeable collection? Use a **lis…
Quick Identification Guide
— Multiple rotations to turn off? → Compression faucet - Single handle, sweeping ball-socket motion? →…
Quick Reference
— A condensed summary of key definitions, formulas, or frameworks. Useful for review and for quickly r…
Quick Translation Drill:
— "The state is normalized" $\to$ $\langle\psi|\psi\rangle = 1$ - $\langle\psi|\hat{H}|\psi\rangle$ $\…
Quick Wins (Immediate Action):
— Changing default credentials - Disabling unnecessary services - Applying critical patches
Quiesce member M1
— drain work from M1 by removing it from the WLM routing table 2. **Stop M1** — shut down DB2 on M1 cl…
quiescence
— the silence of the powerless in the face of injustice, a silence that is not consent but the product…
Quilt patterns
— the geometric designs formed by the arrangement of fabric pieces — carried names, meanings, and regi…
quilting bee
— a communal gathering at which women came together to quilt — was one of the most important social in…
Quiz (quiz.md)
— 10–15 multiple-choice and short-answer questions to check your comprehension before exams. Use these…
Quizlet
— quizlet.com The most popular flashcard app among students. Easier to use than Anki, with a large lib…
Quota
— In targeting, the number of contacts or conversations a volunteer or field organizer is expected to …
Quota sampling
— A sampling method in which interviewers are instructed to recruit a specified number of respondents …
QUOTE / QUOTES
— Represents the quotation mark character. Used when you need to embed a quote character that would ot…
Quote Investigator
— A research website and methodology for tracing the actual historical origins of attributed quotation…
Quotes to Scrape
— http://quotes.toscrape.com (used in this chapter) - **Books to Scrape** — http://books.toscrape.com …
R
R (tidyverse, nflscrapR)
— Alternative statistical language - Strong sports analytics community - Good for statistical modeling
r = 0.98
— higher, as expected, since win rate mechanically determines ROI for fixed-odds bets. However, win ra…
R packages for sports analytics:
— `survival` - Survival analysis for injury prediction - `caret` - Machine learning framework - `mgcv`…
R Weather Packages
— weatherData - rnoaa - darksky
r/CFBAnalysis (Reddit)
— Community discussion of college football analytics - Shared datasets and analysis - Good for questio…
r/cobol
— Reddit community for COBOL developers (active, beginner-friendly).
r/learnpython on Reddit
— A supportive community for Python learners at all levels. Good for getting unstuck on specific probl…
r/mainframe (Reddit)
— Active community of mainframe enthusiasts and professionals. Good for setup help and career question…
r/netsec
— Security news and research (technical, professional) - **r/AskNetsec** — Questions about security ca…
r/NFLstatheads
— Reddit community for football analytics 2. **r/CFBAnalysis** - College football analytics discussion…
r/NFLstatheads (Reddit)
— Community discussion - Methodology debates - Resource sharing
r/SoccerAnalytics (Reddit)
— Community discussion of soccer metrics, tools, and methodologies. Good for staying current with new …
R1
— After working through the ODA Dataset, what surprised you most about the structure or content of pol…
R2
— In Exercise 5.12, the county targeting analysis assigns a single "opportunity score" to each county.…
R3
— Sam Harding's realization in Section 5.12 — that likely voter models systematically underrepresent c…
R4HA is tracking 1-2% below the Expected scenario
— good news, primarily because January and February are seasonally low months and the mobile banking g…
Rabat Plan of Action
— A 2012 UN document establishing a six-factor threshold test for determining when advocacy of hatred …
Rabi oscillations
— the quantum mechanical analogue of a pendulum swinging between two equivalent positions.
Race and Partisan Coalitions
— Black voters: historically stable at 85-95% Democratic; exit poll subgroup data is often unreliable …
RACF
— Resource Access Control Facility. IBM's z/OS security system that controls access to datasets, trans…
RACF integration:
— Define at least four RACF user IDs for API consumer roles - For each: CICS transaction authority, VS…
RACF resource security
— The COBOL program accesses DB2 tables and VSAM files under the mapped user ID. RACF controls access …
RACF transaction security
— The CICS transaction associated with the URIMAP (e.g., AINQ) has a RACF profile. Only mapped user ID…
RACF user/group hierarchy
— Define the complete group structure, user roles, and access levels 2. **Dataset security** — RACF pr…
RACF-CICS integration works through SAF
— CICS calls SAF, SAF routes to RACF, RACF decides. Every security check follows this path.
Racial erasure
— The systematic removal of non-white people from the dominant narrative of a region, community, or in…
Racial hierarchy (in dating)
— the empirically documented pattern in which members of certain racial groups receive systematically …
Racial Integrity Act of 1924
— one of the most extreme racial classification laws in American history — the Monacan were classified…
Racial preference
— behavioral patterns of preferring same-race or excluding other-race dating partners, which research …
Rack-renting
— the practice of dramatically increasing rents when leases expired — displaced families that had farm…
Radar Chart (Spider Chart)
— A visualization that displays multiple variables on axes radiating from a center point, commonly use…
Radicalization Pipeline
— The documented pathway on YouTube by which recommendation algorithms lead users from mainstream cont…
Radon Professionals
— **State-certified radon tester:** Conducts radon testing. Required for real estate transaction testi…
RAG (Retrieval-Augmented Generation)
— A technique that enhances AI responses by first retrieving relevant information from a knowledge bas…
Raga
— In Indian classical music, a melodic framework specifying: the scale (set of permissible pitches), c…
Railroad towns
— built at junctions, terminals, maintenance yards, and water stops — were the precursors of the coal …
Rain:
— Most common precipitation type - Affects grip and footing - Ball becomes slippery - Passing accuracy…
Rainbow Coalition
— an alliance that predated Jesse Jackson's use of the term by more than a decade. The coalition was b…
Raise the threshold
— be more selective, accept more misses.
Raj (software developer, technical, precise)
— Advantage: His technical background means he reads outputs critically, understands what "plausible b…
Raj's AI no-fly list:
— Code reviews for code that will run in production safety paths (authentication, access control, data…
Ramp suppers
— communal meals built around ramps cooked in every conceivable way (fried with eggs and potatoes, coo…
Ramps
— wild leeks, *Allium tricoccum* — push up through the leaf litter on the forest floor in dense patche…
Ramsey interferometry
— essentially the Mach-Zehnder interferometer from Section 7.1, but with atomic states instead of phot…
Random (broadband) jitter
— jitter with no periodic structure — raises the noise floor uniformly. It creates a low-level hiss th…
random Boolean networks
— simple mathematical models in which many elements are connected to each other and each element's sta…
Random Forest
— An ensemble learning method that builds multiple decision trees and averages their predictions. Prov…
Random Forest for predictions
— when we need to identify which countries need intervention > - Use the **Decision Tree for communica…
Random Forest:
— `n_estimators`: number of trees (100-1000) - `max_depth`: maximum tree depth (3-15) - `min_samples_l…
Random Forests and Gradient Boosting:
— Handle nonlinear relationships and interactions naturally. - Feature importance scores provide inter…
random I/O
— which can be orders of magnitude slower. When the cluster ratio drops below a threshold (commonly 80…
Random read
— set the key and read:
randomization
— randomly assign treatments so that confounders balance out across groups. But what about observation…
Randomization difficulty
— ethical and logistical barriers to RCTs 2. **Measurement problems** — test scores are narrow proxies…
randomized controlled experiment
— the same design used in medical trials. You randomly assign some people to get the treatment and oth…
Randomized controlled trial (RCT)
— An experiment in which participants are randomly assigned to treatment and control conditions, enabl…
Randomized Response Technique (RRT)
— Introduce random element (coin flip) that gives respondents plausible deniability - Individual answe…
Range
— decisions across different technology domains and business areas 2. **Impact** — decisions that deli…
RANK() and DENSE_RANK()
— like ROW_NUMBER but handle ties:
ranking
— and ranking is another loop with an accumulator.
ranks
— first, second, third, and so on — and analyzing the ranks instead of the raw values. This simple tri…
Rape myth
— A false belief about sexual assault that excuses perpetrators and blames victims (e.g., "if she didn…
Rapid7 Acquisition (2009)
— Rapid7, a security analytics company, acquired the Metasploit Project and hired Moore as Chief Secur…
RAPM (Regularized Adjusted Plus-Minus):
— Derived directly from play-by-play data - Uses regression to isolate individual impact - Requires re…
RAPTOR Documentation
— https://fivethirtyeight.com/features/how-our-raptor-metric-works/ - Player-level ratings that feed i…
rarely
— "occasionally" (more than once a year, less than once a week) or "hardly ever." Only about 17% repor…
RAS model
— The Receive-Accept-Sample model of attitude formation developed by John Zaller. Individuals receive …
Rasa
— in Indian classical music, the emotional "flavor" or aesthetic essence associated with a particular …
Rate limiting
— Define rate limit policies: - At least three consumer tiers (external partner, portal/mobile, intern…
Rate Limiting and Abuse:
— Identify endpoints that lack rate limiting, particularly login, password reset, coupon code validati…
Rate Limiting and Error Handling
— Implementing rate limiters, exponential backoff retry, circuit breakers, and graceful degradation.
Rate Statistics:
— Per-36 or per-100 possessions normalizes for playing time - Adjust for team pace
Rating factors (all multiplicative):
— Construction type: Frame (1.00), Masonry (0.85), Fire-resistive (0.70) - Protection class (fire dept…
Rating Scale:
— 90-100: Elite (Top 10%) - 80-89: Excellent (Top 25%) - 70-79: Good (Above Average) - 60-69: Average …
ratio'd
— When a post receives significantly more replies/QRTs than likes, indicating the post is controversia…
Rational compassion
— caring about wellbeing as a general principle — is more scalable, less biased, and more sustainable,…
Rational expectations
— The economic principle that agents form beliefs about the future based on all available information …
Rational negative EV bets:
— Insurance (when catastrophic downside has utility asymmetry) - Entertainment purchases (lottery tick…
Rational rejection of positive EV bets:
— When variance threatens survival (the company-ending marketing bet) - When probability estimates are…
Rationale:
— Two physical frames provide hardware-level redundancy. A total frame failure (extremely rare but pos…
Rationality assumption
— The liberal democratic premise that citizens can, to a sufficient degree, evaluate evidence and argu…
raw string
— one where backslashes are treated as literal characters, not escape sequences.
RB Checklist:
— [ ] Project usage separately from efficiency - [ ] Heavy regression for Y/C - [ ] Apply significant …
RB Consistency Study
— Calculate success rate by week - Analyze variance patterns - Identify reliable backs
RB Draft Premium Explanation:
— RBs have shortest career spans (~4-5 years average) - Position has highest replacement rate (waiver/…
RB Model:
— Production: 30% - Athleticism: 35% - Receiving: 35%
RB Prospect Combine Results:
— Weight: 215 lbs - 40-yard dash: 4.42 seconds
RBA (Relative Byte Address)
— a monotonically increasing byte offset into the conceptual log stream. On LUW, they are addressed by…
RDP Hijacking
— On a compromised system with SYSTEM privileges, an attacker can hijack existing RDP sessions without…
Re-identification
— The process of linking anonymized data back to identifiable individuals, typically by combining the …
Re-watchability assessment:
— On a scale of 1–5, how likely are you to watch this again? - What specifically makes it (or doesn't …
Reach
— The number of unique individuals who see a piece of content within a defined time period. Distinct f…
React
— A JavaScript library for building user interfaces, based on component composition and declarative re…
React (ShopStack Frontend):
— JSX automatically escapes values rendered in templates - `dangerouslySetInnerHTML` is explicitly nam…
React Official Documentation
— Best starting point at reactjs.org.
reactance
— the psychological pushback that occurs when people feel their autonomy is being manipulated. His hoo…
Reactance theory
— Brehm's framework proposing that perceived threats to freedom increase desire for the restricted obj…
reaction
— the moment the target's knowledge catches up with the viewer's.
Reactivate dormant ties deliberately
— identify five or ten people you've lost touch with who inhabit different professional clusters. A sp…
reactive depression
— specifically, the kind of depression that follows uncontrollable negative life events.
READ
— read a page from the GBP - **WRITE** — write a page to the GBP - **CASTOUT** — write a dirty GBP pag…
Read any betting market
— point spreads, totals, moneylines, props, futures --- and immediately understand the implied probabi…
Read Codd's 1970 paper
— even if you only read the first few pages, it will deepen your appreciation for the relational model…
Read engineering blogs
— Companies like Netflix, Uber, and Airbnb publish excellent technical content
Read from S3 instead of local CSV
— replace `pd.read_csv("data/acme_sales.csv")` with a boto3 S3 download. More complex but more robust.…
Read receipt
— A digital communication feature indicating that a message has been opened, which transforms non-resp…
Read Stability (RS)
— Use when you need all rows you read to remain stable for the duration of your unit of work — for exa…
READ statement
— A COBOL statement that retrieves the next sequential record or a record by key from a file.
Read the error message
— Python traceback tells you the file, line, and exception type 2. **Print debugging** — add `print()`…
Read-heavy
— reads transaction data, calculates aggregates, produces reports - **Tolerant of higher latency** — a…
READ-INPUT-RECORD
— Reads one record and checks file status. - **VALIDATE-INPUT-FIELDS** — Performs all field-level vali…
Readability above all
— large enough for phone screens, displayed long enough to read, short phrases (5-8 words max per line…
Readability guidelines for nested IFs:
— Indent each level consistently (4 spaces is standard) - Ensure each IF has a matching END-IF at the …
Readability is a Feature
— well-designed data descriptions are living documentation that communicates business semantics — and …
Readability:
— Are names clear and descriptive? - Would someone unfamiliar with this code understand it? - Are ther…
Reading
— Read broadly. Technical books, yes, but also books on organizational behavior, negotiation, systems …
Reading a box plot:
— Box width = IQR (spread of the middle 50%) - Median position in box = symmetry or skew - Whisker len…
Reading code is as important as writing it
— most professional developers spend more time reading code than writing it 3. **Errors are not failur…
reading illusion
— and it is one of the most pervasive examples of the central paradox you've been tracking since Chapt…
Reading the CI:
— Contains zero → no significant difference - Entirely positive → Group 1 plausibly higher - Entirely …
Reading:
— *Take Your Eye Off the Ball* by Pat Kirwan - *The Essential Smart Football* by Chris Brown - Footbal…
READS SQL DATA
— A stored procedure or function attribute indicating that the routine executes only SELECT statements…
Real authentication security
— The session-based password check above is simple but limited. It lacks password hashing, account loc…
Real comparable datasets:
— Comparative Manifesto Project (MARPOR): manifesto-project.wzb.eu — Coded party manifestos for 50+ co…
real disposable personal income (RDPI) per capita
— essentially, how much purchasing power the average person's income has grown after inflation and tax…
real in its consequences
— it shapes campaigns, policies, and political careers — but it is not a fact about the world the way …
real page frame
— or indicates that the page is not in real storage (it's been paged out to auxiliary storage). 5. If …
Real Python
— Python tutorials including pandas - Best practices - https://realpython.com/
Real Python (realpython.com)
— High-quality tutorials, articles, and a podcast focused on practical Python applications. One of the…
Real Python Tutorials
— High-quality Python tutorials at realpython.com.
Real Python Visualization Tutorials
— Practical matplotlib and plotting guides - Step-by-step examples - https://realpython.com/tutorials/…
Real Python: "Python Git and GitHub Introduction"
— A practical tutorial at realpython.com covering the git workflow as it applies to Python projects. G…
Real Statistics Resource Pack
— **Recommended:** Use Python for nonparametric analysis
Real-Time 3D Reconstruction
— Volumetric capture of sports action
Real-time acoustic adaptation
— hearing the room and adjusting dynamics, articulation, and positioning in response to the acoustic e…
Real-Time AI
— In-game strategy recommendations - Optimal substitution patterns - Live performance prediction
Real-Time Applications:
— Broadcasting enhanced by WP displays - Coaching decisions informed by leverage index
Real-Time Bidding (RTB)
— A form of programmatic advertising in which advertising inventory is auctioned in real time as a pag…
Real-time claim status notifications
— push notifications when a claim status changes 2. **Predictive claim analytics** — machine learning …
real-time ETL
— replacing traditional batch ETL jobs that extract, transform, and load data on a schedule (e.g., nig…
Real-time monitoring:
— Thread activity with drill-down to individual SQL statements - Buffer pool hit ratios with graphical…
Real-Time Statistics (RTS)
— a feature that continuously updates space and status information as data changes occur.
Real-Time Thread Monitoring:
— Active thread display showing current SQL, elapsed time, CPU, lock waits - Thread detail drilldown s…
Real-time translation during streams
— ARMY fans with Korean competency live-tweet translations of BTS livestreams, providing approximate s…
Real-World Application
— Shows the pattern at work in a specific, concrete context. These boxes ground abstract ideas in tang…
Real-World Bug Hunting
— Peter Yaworski. Case studies of real bug bounty findings with technical details. Complements Chapter…
Real-world examples:
— `crossenv` (malicious) vs. `cross-env` (legitimate) -- The malicious npm package stole environment v…
Real-World Poisoning Scenarios:
— **Web-Scraped Training Data:** Models trained on data scraped from the internet can be poisoned by a…
RealGM International
— https://basketball.realgm.com/international/ - International league statistics - European prospect t…
realism
— the philosophical position that the objects of scientific inquiry exist independently of the scienti…
Realistic Asphalt Shingle Lifespans:
— 3-tab shingles, poor conditions: 10–15 years - 3-tab shingles, good conditions: 15–20 years - Archit…
Realistic assessment before committing:
— Inspect the slab for cracks: hairline cracks are acceptable and can be filled; structural cracks wid…
Realistic Group Conflict Theory
— Sherif's theory that intergroup hostility emerges from competition over scarce resources; superordin…
Reappraisal possibilities:
— Shame → "This is specific behavioral feedback about this piece of work, not a statement about my cap…
Reasonable expectation of privacy
— *Katz* test: Fourth Amendment protects information you keep private and that society recognizes as l…
REBIND Analysis:
— Review which packages have not been rebound since the last RUNSTATS - Perform REBIND in test environ…
REBIND approval workflow
— no REBIND moves to production without sign-off from both the DBA (Ahmad) and the application lead (D…
REBIND list
— which packages must be rebound after RUNSTATS
reblog chain
— A Tumblr post that has accumulated commentary through the reblog process, showing a conversation or …
Rebounding Breakdown:
— Offensive rebounds: 1.7 per game - Defensive rebounds: 9.0 per game
Rebounding:
— Rebounds per 75 possessions - Offensive Rebound % - Defensive Rebound %
Recall
— measures what fraction of actual positives the model catches, which is critical when positive cases …
Recall bias
— Error arising when respondents inaccurately remember past events or behavior. In political surveys, …
Recall rating scale:
— 5 = Recalled easily with no hesitation - 4 = Recalled with minor effort - 3 = Recalled with signific…
Receipt
— After each transaction, ask if the customer wants a receipt. If yes, display a formatted receipt wit…
Receive feedback
— a reward (something good happened) or a penalty (something bad happened) 4. **Update your strategy**…
Receiver A's Season Stats:
— 142 targets (27% target share) - 102 receptions - 1,389 yards (3rd in NFL) - 9 touchdowns - 71.8% ca…
Receiver B's Season Stats:
— 87 targets (15% target share) - 65 receptions - 1,012 yards - 7 touchdowns - 74.7% catch rate
Receiver B: 4 years, $50M ($12.5M AAV)
— Year 1: $10M (prove-it year) - Years 2-4: $13.3M average - Incentives for Pro Bowl, 100 receptions, …
Receiver Usage:
— Routes designed for Rodgers' ball placement - Timing affected by different release - Estimated impac…
Receiving Analytics
— evaluating pass-catchers with target share, separation, and efficiency metrics.
Receiving feedback:
— Separate code from identity — it's about the code, not you - Ask for clarification when a comment is…
Recency
— When was the data collected? A dataset from 2010 may not reflect current patterns, especially in fas…
Recency bias
— Strong late-season performances - Shooting slump early in season attributed to "adjusting"
Recent Form:
— `home_last10_winpct`: Home team's win percentage over their last 10 games. - `away_last10_winpct`: A…
Recent Performance (Games 5-8):
— Record: 1-3 - Points per game: 21.0 - Yards per game: 345 - Plays per game: 65
RECFM
— Record Format. A z/OS dataset attribute specifying how records are organized: F (fixed), V (variable…
RECFM=FB (Fixed Blocked):
— Every record is the exact same length (specified by LRECL) - Records are grouped into blocks for eff…
RECFM=VB (Variable Blocked):
— Records can have different lengths (up to the maximum specified by LRECL) - Each record has a 4-byte…
Recipe 2: Training a Transformer for NLP
— Optimizer: AdamW with betas (0.9, 0.98), weight decay 0.01 - Learning rate: Peak 5e-4, linear warmup…
Recipe 3: Fine-Tuning a Pretrained Model
— Optimizer: AdamW with weight decay 0.01 - Learning rate: 1e-5 to 5e-5 for pretrained layers, 10x hig…
reciprocal disclosure
— the progressive mutual sharing of more interior experience. Friends who move through social penetrat…
Reciprocal gifts
— the inclusion of small gifts (personalized address labels, notepads, pens) in fundraising letters — …
Reciprocal liking
— the feeling of being attracted to someone because they appear to be attracted to you — is a consiste…
Reciprocity
— the deep human norm that we repay what others give us, foundational to prosocial behavior and cooper…
Reciprocity (Cialdini)
— When you celebrate someone publicly, they reciprocate through loyalty, engagement, and advocacy. Fea…
Reciprocity (influence)
— Cialdini's principle describing the human tendency to feel obligated to return favors; one of the mo…
Reciprocity norm
— The social expectation that positive gestures should be returned; in attraction contexts, the knowle…
Reclamation strategies
— including "slutwalks," deliberate aesthetic transgression, and the use of explicitly sexual self-pre…
recoding decision
— how do you classify this observation? And each choice changed the count.
Recognize Simpson's paradox
— this is a threshold concept that shows how data can tell opposite stories at different levels of agg…
Recognize the stress response earlier
— in its early physical stages, before it has fully escalated 2. **Create space between trigger and re…
Recognize Warning Signs:
— Dreading work you used to enjoy - Feeling like you can never keep up - Comparing yourself negatively…
recommendation
— pointing you toward something you might want, based on what the restaurant knows about popular dishe…
Recommendation 1: {Action}
— *Rationale:* {Why, with specific numbers} - *Expected Impact:* {Quantified benefit} - *Implementatio…
Recommendation 2: {Action}
— *Rationale:* {Why} - *Expected Impact:* {Benefit} - *Implementation:* {How}
Recommendation 3: {Action}
— *Rationale:* {Why} - *Expected Impact:* {Benefit} - *Implementation:* {How}
Recommendation Algorithm
— A system for predicting and surfacing content predicted to be engaging for a specific user, typicall…
Recommendation Systems
— Why recommendations matter · Collaborative filtering · Content-based filtering · Hybrid approaches ·…
Recommendation:
— For Buffalo games, add 20% to snow intensity estimates - Check multiple forecast models specifically…
Recommendations for Phase 2:
— Integrate real-time alert generation (the pilot system operated on a T+1 batch basis) - Extend to in…
Recommendations:
— Audit the leadership score for gender bias specifically - Consider using structured evaluation crite…
Recommended
— 16 GB RAM for larger datasets - SSD for faster data loading
Recommended (Free)
— VS Code or PyCharm (Community Edition) - GitHub account
Recommended alternatives:
— Open accounts under own name at additional legitimate sportsbooks - Use betting exchanges (Betfair, …
Recommended business datasets:
— Online Retail dataset: 500,000+ transactions from a UK gift wholesaler - Bank Marketing dataset: Por…
Recommended client tools:
— IBM Data Studio (free) for GUI-based administration and SQL development. - The Db2 command-line proc…
Recommended considerations when choosing a VPN:
— **No-logs policy:** Choose providers that have been independently audited to verify they do not log …
Recommended Data Sources:
— **CDC WONDER** (wonder.cdc.gov): Mortality data, birth data, environmental health data. Example data…
Recommended datasets (all free and public):
— **CDC BRFSS** — health behaviors and outcomes across U.S. states - **Gapminder** — life expectancy, …
Recommended datasets for beginners:
— Titanic survival data (classification practice) - House prices (regression practice) - Iris flower d…
Recommended entry points by role:
— **Writers/Content creators:** Start with Ch. 7 (Prompting Fundamentals), then Ch. 20 (Writing with A…
Recommended introductory reading:
— Leek, J. T., & Peng, R. D. (2015). What is the question? *Science, 347*(6228), 1314–1315. (2-page gu…
Recommended knowledge file types for common GPTs:
— Brand voice GPT: style guide, example posts, vocabulary lists, tone descriptions - Code assistant GP…
Recommended paths:
— **Compliance Practitioner:** Parts 1→2→3→7, then selective chapters from Parts 4–6 as relevant - **T…
Recommended posting schedule:
— YouTube: 2 videos per week (8 videos total, 4 test + 4 control; or alternating) - TikTok/Short-form:…
Recommended public sources:
— StatsBomb Open Data (via statsbombpy) - FBref (includes StatsBomb xG) - Understat (publicly availabl…
Recommended redesign:
— `StudentRegistry` — student CRUD operations - `TeacherRegistry` — teacher CRUD operations - `GradeBo…
Recommended settings:
— **Production**: DIAGLEVEL 3 (captures warnings and above — good balance) - **Performance investigati…
Recommended starter VMs from VulnHub:
— **Kioptrix Level 1:** Classic beginner VM with straightforward vulnerabilities - **Mr. Robot:** Them…
Recommended Study Resources:
— Professor Messer's free Security+ video course (YouTube) - CompTIA CertMaster Practice (official pra…
Recommended tools:
— **VS Code** with the Python extension — free, widely used, excellent for beginners - **Jupyter noteb…
Recommended:
— IBM Db2 Knowledge Center (online documentation) - *DB2 SQL Cookbook* by Graeme Birchall (free PDF, c…
Recompile annually
— prevents U4038; captures optimizer improvements - **CEEUOPT over PARM** — CEEUOPT travels with the p…
Reconnaissance
— Gathering information to plan an attack 2. **Resource Development** — Establishing resources to supp…
Reconnaissance:
— Photograph building exteriors, entrances, and security measures - Identify security cameras, guards,…
RECORD CONTAINS
— Specifies the record length. For fixed-length records, a single value. For variable-length records, …
RECORD CONTAINS n CHARACTERS
— Specifies the fixed record length. For the example above, every record is exactly 80 bytes. The tota…
RECORD CONTAINS n TO m CHARACTERS
— Specifies the minimum and maximum record sizes. The actual size of each record varies based on the d…
Record Descriptor Word (RDW)
— a 4-byte header at the beginning of each record that contains the record length. The RDW is transpar…
Record everything:
— Take detailed notes - Record the conversation (with permission) - Follow up with a written summary f…
RECORD KEY
— The clause in FILE-CONTROL that identifies the primary key field of an *indexed file*. Records are s…
Record Layout Copybooks
— The most common pattern. Define the complete 01-level record structure with 88-level conditions and …
record name
— the 01-level under the FD. This catches many beginners: > > ```cobol > * CORRECT: > WRITE OUTPUT-REC…
Record your findings:
— Meter location: _______________ - Shutoff valve type: gate / ball - Shutoff valve condition: moves f…
Record-Keeping and Logging (Article 12)
— [ ] Design the system to automatically record events (logs) relevant to identifying risks and enabli…
Record:
— Location of weatherhead or service entry - Location of meter - Service type (overhead/underground) -…
Recorded in his closet
— the clothes absorbed reverb/echo, creating a cleaner audio environment
recording head
— an electromagnet whose gap is just a fraction of a millimeter wide. An electrical current proportion…
RECORDING MODE
— Specifies the record format. This is an IBM extension, but it is widely used:
recordlinkage
— Entity resolution and deduplication - Probabilistic matching - https://recordlinkage.readthedocs.io/…
RECORDSIZE(average maximum):
— For fixed-length records, specify the same value for both. - For variable-length, `average` is used …
Recovery (after a tilt episode):
— Full session stop; no more bets until next day - Written post-mortem: trigger, emotional progression…
Recovery (Day 5-10):
— Affected workstations rebuilt from clean images - Data restored from clean backups (verified pre-com…
Recovery and Resilience
— How fast do you bounce back? Healthy = situational/specific/temporary attribution style, fast recove…
Recovery for common failures:
— SMF data partially migrated: automated recall and retry (up to 60-minute wait) - DB2 timeout during …
Recovery Metrics:
— Required sleep: 8+ hours - HRV threshold: Individual baseline - Subjective wellness: Daily assessmen…
recovery runbook
— a step-by-step document that any competent DBA can follow under pressure. Include: - Exact commands …
Recovery time
— How long does restart take? 2. **Lock duration** — How long are rows locked? 3. **Log volume** — How…
Recovery window:
— Time between last full backup and now - Estimated recovery time based on log volume since last backu…
Recovery:
— **CICS:** If you've designed your region topology properly (Chapter 13), the TOR detects that the AO…
Recreational bettor (no model, random selection):
— Expected loss rate: equal to the applied margin - At 15% margin, loses approximately $7.50 per $50 b…
Recruitment is forward-looking
— clubs are buying future performance, not past statistics. Projection models are therefore essential.…
Recruitment Process:
— Data screening of large player populations - Statistical shortlisting to identify candidates - Video…
Recurrent Neural Networks:
— Can model sequential load data (daily load time series) directly. - LSTM architectures can capture l…
Recurring examples introduced:
— Acme Corp (initial introduction) - Maya's consulting scenario (initial introduction)
Recurring Revenue
— Income that repeats predictably, usually on a monthly or annual basis, from memberships, subscriptio…
Recurring themes
— What patterns appear across multiple eras? Does the extraction pattern show up? The resistance tradi…
Recurring Themes in This Chapter:
— **Tools Built by Humans:** AI decision systems embed the assumptions, values, and biases of their de…
Recursive programs
— where a subprogram calls itself, each invocation needs its own copy of work fields 2. **Reentrant pr…
Red Flag Scorecard
— a structured assessment tool that compiles results across all 15 questions - **Traffic-light scoring…
Red flags (check all that apply):
— [ ] Horizontal cracks in foundation wall - [ ] Active water entry or standing water - [ ] Sagging or…
Red Flags by Stage:
— **Awareness**: "I don't understand why we're changing" / repeated basic questions - **Desire**: "I'd…
Red flags from `.describe()`:
— `watch_time_min` has a minimum of **-5.2** (impossible — can't watch negative minutes) - `watch_time…
Red flags:
— Single study, never replicated - Original study had very small sample size (n < 50) - Finding contra…
Red Scare
— Periods of heightened anti-Communist fear in the United States (1919-1920 and 1947-1957) during whic…
Red Team Development and Operations
— Joe Vest, James Tubberville. Comprehensive red team operations guide. Complements Chapter 35.
Red teaming is appropriate when:
— Your security program is mature enough to benefit from adversary simulation - You want to test your …
Red Zone Approach
— Heavier personnel for goal-line situations - More fade routes to larger receivers - Better play-acti…
Red zone efficiency
— scoring inside the opponent's 20 - **Third down conversions** - the critical "money down" - **Two-mi…
Red Zone Performance:
— Red zone trips: 62 (above average) - Red zone TD rate: 49% (26th) - Red zone points per trip: 3.8 (2…
Red-green color pair
— inaccessible to deuteranopic viewers. Red and green are the first two colors assigned to what are pr…
Redaction:
— Redact real IP addresses, hostnames, and domain names in client reports - Redact actual data (patien…
Reddit - r/nba
— https://www.reddit.com/r/nba/ - General NBA discussion, occasional analytics content
Reddit API
— r/CFB discussions - Game threads - Community analysis
Reddit r/MachineLearning
— General ML discussion 2. **Reddit r/NFLstatheads** - Football analytics 3. **Cross Validated (Stack …
Reddit r/NFLstatheads
— Statistical football discussion 2. **Reddit r/footballstrategy** - Xs and Os discussion 3. **Sports …
Reddit r/sportsanalytics
— Community discussions on sports analytics topics. - **Reddit r/apachekafka** - Kafka-specific questi…
Reddit:
— r/netsec (technical security research and news) - r/AskNetsec (career and technical questions) - r/o…
REDEFINES
— A COBOL clause that allows two or more data descriptions to share the same physical storage. Used wh…
REDEFINES clause
— A DATA DIVISION clause that allows two or more data items to occupy the same storage location, enabl…
Redemption narrative
— McAdams' term for a life narrative in which negative experiences are transformed through retrospecti…
redemption narratives
— show higher levels of wellbeing, generativity, and psychological maturity than people whose stories …
redemptive narratives
— stories in which suffering or adversity leads to growth, strength, or positive outcomes — are associ…
Redesigned opening (first 3 seconds):
— *Visual (0-1s):* Close-up of a clock on a classroom wall. The second hand is barely moving. Time sta…
Redirector Design:
— Design traffic redirectors that sit between implants and the C2 team server. These redirectors serve…
Redis (redis.shopstack-staging.local):
— Redis 6.0.9 (CVE-2021-32675, CVSS 7.5) - No authentication required - Bound to 0.0.0.0
Redis Cache Layer
— Add Redis caching to an existing API to understand cache patterns.
Redis documentation
— Redis is widely used in trading systems for real-time data caching, pub/sub messaging, and rate limi…
Redistricting
— The process of redrawing legislative district boundaries, typically following each decennial census.…
Redlining
— The historical practice of denying financial services (particularly mortgage lending) to residents o…
Redlining 2.0
— The reproduction of discriminatory exclusion patterns (like historical housing redlining) through al…
RedPajama
— Description: An open reproduction of the LLaMA training data, consisting of approximately 1.2 trilli…
Reduce premium when:
— Divisional opponent (familiar) - West coast team - Team in rebuild phase
Reduce task aversiveness:
— Create implementation intentions: "Sunday 9 AM, coffee made, phone in bedroom, I write for 90 minute…
reduced ambient noise
— specifically in the low-frequency, steady-noise regime. Listeners often describe the result as "quie…
Reduced mass
— Ch 5.2 In a two-body problem, the effective mass $\mu = m_1 m_2/(m_1 + m_2)$ appearing in the relati…
Reducing data exhaust:
— Use a privacy-focused browser (Firefox with uBlock Origin, Brave, or DuckDuckGo) for web browsing. -…
Reductionism vs. Emergence
— Can physics fully explain music, or does music have emergent properties that escape physical descrip…
Redundancy
— The inclusion of extra components, pathways, or capacity beyond what is strictly necessary for norma…
redundant
— they tested the same scenario as another claim - The remaining 12 golden claims covered unique scena…
Refactoring
— Restructuring existing code without changing its external behavior. The goal is to improve code qual…
reference category
— the group against which others are compared. When both urban = 0 and suburban = 0, the community mus…
reference class
— the broad category to which the case belongs -- rather than starting with the specific case and its …
Reference Data:
— Player profiles: age, height, weight, preferred foot, position(s), nationality, date of birth - Team…
reference forecast
— typically the base rate (climatological frequency) or a naive forecast of 0.5. The **Brier Skill Sco…
Reference information:
— ESMA LIS threshold for Instrument A: EUR 650,000 notional - ESMA LIS threshold for Instrument B: EUR…
Reference material:
— Section 33.3 (Extraction Scorecard) - Section 33.4 (Facade Layer Implementation) - Section 33.5 (Dat…
Reference Modification
— A COBOL feature that allows access to a substring of a data item by specifying a starting position a…
References:
— PCI DSS Requirement 4.1: Use strong cryptography and security protocols - NIST SP 800-52 Rev. 2: Gui…
referential connections
— mental links between the verbal code and the imagery code for the same concept.
referential integrity
— the guarantee that relationships between tables are valid.
Referral analytics:
— How new subscribers found the publication (Substack Network vs. direct vs. external) - Top referral …
Referral Marketing
— A strategy in which existing audience members or customers are incentivized to introduce new ones. R…
Reflect
— *This is the new step.* After reading, stop and think about what you just read. Generate examples. C…
Reflecting feelings
— The practice of tentatively naming the emotional dimension you observe in another person's communica…
Reflection
— "What do you know now that you didn't know at the start of this conversation?" - "What feels differe…
Reflection (after the sprint):
— What surprised you about the process? - What took longer than expected? - What was harder technicall…
Reflection exercises
— questions to answer in writing; help consolidate learning 2. **Hands-on tasks** — things to actually…
Reflection questions:
— In what domains do you reliably engage central-route processing? - In what domains do you reliably d…
Reflection:
— Which myth was hardest for you to let go of? Why?
Reflections:
— The organic chemistry approach worked well. The comparison table and the E1-SN1/E2-SN2 parallel were…
Reflective function
— Fonagy's term for the capacity to understand one's own and others' behavior in terms of underlying m…
Reflective Listening
— [ ] Paraphrased at least once to confirm understanding - [ ] Reflected feeling at least once (named …
reflexive control
— Russian military-strategic concept of inducing an adversary to make decisions favorable to your inte…
Reformed Governance Framework
— not an abstract policy document but a concrete, implementable plan for how VitraMed should govern da…
refraction
— they bend toward regions of lower sound speed, just as light bends at a glass surface.
Refractory period (emotional)
— The period during which an emotion is actively influencing attention, perception, and behavior, maki…
Refutes
— explains why the technique works, what makes it misleading, and what a more accurate evaluation woul…
regex
— are a pattern-matching language that has been part of computing since the 1960s. They work in Python…
Regex (Regular Expression)
— A pattern-matching language for searching and manipulating text. In Python, used via the `re` module…
regex for search
— the keyword search feature should support regex patterns (e.g., searching for `\d{3}-\d{4}` to find …
regime changes
— abrupt shifts in team performance caused by trades, injuries, coaching changes, or lineup adjustment…
regime shift
— a transition from one stable feedback-maintained state to another. We will explore regime shifts in …
Region topology affects security
— your MRO architecture determines where security checks happen and how security contexts propagate. E…
Regional breakdown
— which of the four regions is performing, which needs attention 3. **Margin vs order size** — Sandra …
Register (vocal)
— A range of pitches produced by a particular configuration of the vocal folds and resonating cavities…
registers
— perceptible qualities of voice that feel and sound distinctly different. The two primary modes corre…
Registry Risks:
— Unauthorized push access allowing image replacement - Missing vulnerability scan enforcement (images…
regression
— something that used to work stopped working because of an unrelated change. How does a test suite pr…
Regression Analysis
— Simple linear regression - Multiple regression - Interpretation of coefficients - R-squared and mode…
Regression Basics
— Simple linear regression - Interpreting coefficients and R-squared - Basic understanding of multiple…
Regression data sets
— fixed inputs that produce known outputs, version-controlled alongside code
Regression discontinuity
— A quasi-experimental research design that exploits a discontinuity (a threshold or cutoff) in treatm…
Regression discontinuity design
— A quasi-experimental method that exploits threshold-based treatment assignment to estimate causal ef…
Regression isolates individual contributions
— Each stint is an observation; outcome is point differential - Player indicators as predictors allow …
Regression metrics
— R-squared, MAE, RMSE, MAPE — each capture different aspects of continuous prediction quality. Choose…
regression models
— both linear and logistic — that translate features like polling data, economic indicators, and histo…
Regression Rates:
— TD Rate: Regress 75% to mean - Catch Rate: Regress 40% to mean - Volume: Regress 20% to mean
regression test suite
— tests that catch *regressions* (things that used to work but now don't) when you modify code.
Regression to the mean
— a subtle but powerful idea. Students scoring in the top 10% on one exam will, on average, score lowe…
Regression:
— MAE (interpretable error) - RMSE (penalizes large errors) - R-squared (variance explained)
Regression: "How much?"
— How much revenue will this campaign generate? - What price should we set for this product? - How man…
Regret minimization framework
— Jeff Bezos's decision-making heuristic of imagining yourself at age 80 looking back: what decision w…
RegTech relevance
— Credit risk models and scoring engines: likely high-risk (Annex III.5(b)) — full regime applies - AM…
Regular Confidence Audit
— investigate one high-confidence belief per month 2. **Pre-Mortem** — imagine the decision was wrong …
regular expression
— regex for short. A regex is a mini-language for describing text patterns. Instead of saying "find th…
regular practice
— not just a one-time exercise:
Regular season vs. Warriors:
— 3PA: 42.3/game - 3P%: 36.2%
Regular Season:
— Games played: 60 (73% of season) - Games missed to "load management": 22 - Minutes per game: 34.0
regularization
— a mechanism that prevents the system from locking in on old solutions indefinitely. It introduces a …
Regularization parameter selection
— Cross-validation: train on folds, evaluate on held-out data - Typical range: λ ∈ [500, 5000] for sin…
Regularization strategy:
— Dropout: 0.3 between hidden layers (moderately aggressive for this dataset size) - Weight decay: 1e-…
Regulation fundamentally shapes prediction markets
— determining what markets exist, who can trade, and how platforms operate.
regulatory arbitrage
— structuring activities to fall under the jurisdiction with the weakest requirements.
Regulatory Architecture
— Choose one of the following approaches or combine elements: (a) content-based restrictions requiring…
Regulatory bodies
— the FTC, which has jurisdiction over data practices of US companies; the Irish Data Protection Commi…
regulatory capture
— a situation where the regulated industry gains undue influence over the regulators, shaping rules in…
Regulatory Complexity
— Financial services, healthcare, and government organizations face increasing regulatory requirements…
Regulatory complexity is a business risk
— one that requires systematic identification, assessment, and management.
Regulatory data store
— unified repository with consistent definitions 3. **Calculation engine** — applies Basel, IFRS, or G…
Regulatory enforcement:
— Regular compliance audits - Significant fines for violations (UK operators have faced fines exceedin…
Regulatory focus theory
— Higgins's theory distinguishing promotion focus (oriented toward gains and growth) from prevention f…
Regulatory Landscape:
— Financial services regulations (GLBA, FFIEC, NY DFS) have become increasingly prescriptive about sec…
Regulatory relationship metrics:
— Time to close supervisory queries (compared to pre-implementation baseline) - Examination preparatio…
Regulatory reporting
— the ability to submit required regulatory returns to the FCA/PRA. Disruption impact: medium regulato…
Regulatory Reporting Aggregation
— Score: 23. Three downstream consumers, extremely data-intensive (joins across twelve tables), change…
Regulatory reporting test (01:00 — 02:00):
— Generated simulated OCC Call Report - Generated simulated FFIEC 031 report - Both produced valid out…
Regulatory Reporting:
— On-time submission rate: target > 99% - Rejected submissions: should be zero; investigate root cause…
Regulatory sandboxes
— controlled environments where companies can deploy AI systems under enhanced regulatory supervision …
Regulatory Status
— Has the outlet been required to register as a foreign agent or state media in any jurisdiction? - Ha…
Regulatory update lag
— if EMIR reporting requirements change (new fields, new thresholds, format changes), the smart contra…
REGULATORY_REPORT
— Tracking of regulatory filings.
reharmonization
— replacing the original chords of a standard with new, harmonically richer substitutions while keepin…
Rehosting platform selection:
— [ ] Micro Focus Enterprise Server - [ ] Heirloom Computing - [ ] NTT DATA UniKix - [ ] No rehosting …
Reinforcement
— is the change sustained?
Reinforcement learning
— The machine learning paradigm underlying modern recommendation systems. The algorithm learns by tria…
Reinforcement schedule
— The pattern in which consequences follow behavior; variable-ratio schedules (reward after unpredicta…
Reinforcing loop
— See *positive feedback loop*. A feedback mechanism that amplifies change. *First introduced: Ch. 2*
rejection region
— the set of test statistic values that would lead to rejecting $H_0$.
Rejection sensitivity
— A cognitive-affective processing disposition involving anxious expectations, ready perceptions, and …
Rejection sensitivity (RS)
— A dispositional tendency to anxiously expect, readily perceive, and intensely react to social reject…
Related Chapters
— Chapter 17: Brand Partnerships and Sponsorships — structuring the commercial relationship ethically …
Related file content
— code from other open tabs and files in the same project that may be relevant. If the developer is wr…
Relatedness (SDT)
— One of the three basic psychological needs in Self-Determination Theory; the experience of genuine m…
Relatedness:
— Does the quality of my relationship with someone significantly affect my ability to engage in diffic…
relational ambiance
— a cultural understanding that professional relationships operate within a broader social register th…
relational boredom
— the experience of monotony, routine, and predictability — as a distinct threat to relationship satis…
Relational crafting
— job crafting through modification of work relationships.
Relational Databases (PostgreSQL, MySQL, SQLite):
— Best for structured data with well-defined schemas (event data, player reference data, match metadat…
relational ethics
— the philosophical tradition that situates moral obligations within networks of relationship rather t…
relations
— mathematical tables where each row is a **tuple** (an ordered collection of values) and each column …
Relationship
— Build relationships with your IBM client team, your ISV account managers, and your consulting partne…
Relationship capital:
— Who are your top five "relationship capital" contacts — people with leverage who genuinely know your…
relationship deepening
— building trust and intimacy with an audience that already knows you. The luck type Instagram generat…
Relationship loss
— the end of a marriage, the dissolution of a close friendship, the estrangement of a family member — …
Relationship market
— The metaphor (and, increasingly, the literal structure) in which partners are "evaluated" and "selec…
relationship of vulnerability
— they are sick, they depend on the system for care, and they have limited power over how their data i…
Relationship prompts:
— Who has offered me care recently that I didn't fully receive? - Which relationship needs repair, and…
relationship recession
— The pattern, documented in survey data from the 2010s onward, of declining rates of sexual activity,…
relationship tag
— AO3's standardized tagging for pairings, distinguishing "/" (romantic/sexual) from "&" (platonic).
Relationships and cardinality
— modeling one-to-one, one-to-many, and many-to-many relationships with correct participation and card…
Relationships:
— Correlation: Strength and direction of linear relationship - Correlation matrix: Multiple relationsh…
Relative age effect
— The phenomenon in which individuals born in the months just after a competitive age-group cutoff dat…
relative import
— it says "import from `calculations.py` which is in the same directory as me." This is different from…
relative position bias
— a learnable bias term added to the attention logits based on the relative spatial distance between t…
relative record number
— its ordinal position within the file. The first record is at position 1, the second at position 2, a…
Relative Record Number (RRN)
— a positive integer starting at 1. Slots can be empty, allowing records to be inserted at specific po…
Relaxed (not rigid) posture
— upright enough to signal engagement, not so stiff as to communicate tension - **Hands visible**, not…
RELEASE
— When to release locks:
Release 1 (MVP) -- Must Have:
— User registration and authentication - Recipe management (create, edit, view recipes) - Weekly meal …
Release 1 -- Should Have:
— Dietary preference profiles (vegetarian, gluten-free, etc.) - Recipe scaling (adjust servings) - Sho…
Release 2 -- Could Have:
— Recipe import from URLs - Meal plan sharing between family members - Nutritional information trackin…
Relegation:
— Matchweek 10: Average of 1.6/3 relegated teams correctly identified. - Matchweek 20: Average of 2.2/…
Relevance
— Does the dataset align with your business question? A technically interesting dataset that does not …
Relevant Control Families for Penetration Testing:
— **CA (Assessment, Authorization, and Monitoring):** CA-8 specifically requires penetration testing -…
Reliability
— Uptime: 99.9% during games, 99% overall - Data backup: Daily automated backups with point-in-time re…
Reliability criteria:
— System uptime >= 99.5% - Fallback to popularity-based recommendations activates within 500ms of mode…
religious change
— particularly the growth of the nones — is restructuring the cultural coalitional landscape; and **ur…
Religious Right
— the coalition of evangelical and fundamentalist Christians that became a major political force in th…
RELOAD
— Writes the sorted rows back into the tablespace (or shadow dataset for SHRLEVEL REFERENCE/CHANGE). F…
Reloading
— The practice of composing one's response while the other person is still speaking; one of the primar…
REM sleep
— the late-night, second-half-of-the-cycle phase. The emotional regulation, creative processing, and s…
Remaining problems:
— The two documents were not sufficiently differentiated in depth or tone. The technical document was …
Remediation
— reprocess 2,800 underpaid claims with corrected adjudication logic, generating supplemental payments…
Remediation Cost Ranges:
— Retroactive permit fee: $500–$2,000+ (plus original permit fee) - Opening walls for inspection acces…
Remediation Plan Template:
— Description of harm addressed: ___ - Steps taken to remediate the harm to affected individuals: ___ …
Remediation Roadmap:
— [ ] All findings appear in the roadmap - [ ] Priorities are logical (Critical first, then High, etc.…
remediation time
— how long would it take to fix each debt item? This is measured in developer-hours or developer-days …
Remediation:
— Recommendations must be specific, actionable, prioritized, realistic, and layered - Organize by team…
Reminiscence bump
— the disproportionate concentration of vivid autobiographical memories from ages 10–25; music from th…
RemNote
— remnote.com Combines note-taking and spaced repetition in a single tool. You take notes, and RemNote…
remote associations
— connections between ideas that are far apart in your mental network. The more remote the association…
remote repository
— a copy of the repository hosted on a server that everyone can access.
Remove exact duplicate rows
— `.duplicated()`, `.drop_duplicates()` 2. **Handle missing values** — `.isna()`, `.fillna()`, `.dropn…
Remove organizational boilerplate
— approval signatures, revision history, and document metadata add noise without helping the AI. 2. **…
Remove the legend box border
— the legend labels are sufficient. 4. **Make sure the y-axis starts at zero** — for bar charts, this …
Removing items
— **Updating quantities** - **Calculating totals** - **Applying discounts** (filtering and transformin…
RENAMES
— The level-66 data item that provides an alternative grouping of elementary items from a record. Defi…
RENAMES clause
— A level 66 clause that provides an alternative grouping of elementary items within a record, allowin…
Render configuration:
— Production service: connected to `main` branch - Staging service: connected to `staging` branch - Bo…
Rendition cycle
— Shoshana Zuboff's term for the process by which surveillance capitalism converts human experience in…
renegotiate the arrangement
— to move from a situation in which she was an implicit second parent with no acknowledged authority a…
renormalization
— is one of the most important ideas in 20th-century physics.
REORG
— Eliminate fragmentation, restore physical order 2. **RUNSTATS** — Update catalog statistics so the o…
Repair approaches by scale:
— Small cracks: latex caulk (at movement joints) or patching plaster (stable areas) - Loose-but-intact…
Repair Attempt Phrases:
— "I'm feeling flooded. Can we take a 20-minute break and come back to this?" - "I'm hearing you as cr…
Repair Orchestrator
— consumed diagnoses, selected the appropriate repair playbook, verified pre-conditions, executed repa…
Repair.
— ## Repair Prompt 1: The Context Reload
Repeatable expertise
— Not every skill is productizable. The expertise needs to be something you do (or could explain) over…
Repeatable Read (RR)
— The strongest isolation level. Not only are accessed rows locked, but DB2 also locks qualifying rows…
repeated cross-sections
— fresh random samples from the same target population, asked the same questions at each time point — …
repeating group
— the same type of data (monthly sales) repeated as separate columns. It violates First Normal Form be…
Repetition
— Are you saying the same thing in multiple sections? Consolidate. - **Abrupt transitions** — Does the…
repetition increases perceived credibility
— the "illusory truth effect" — and that **epistemic confusion** (making people unsure what to believe…
REPL (Replace)
— Updates the segment most recently retrieved with a hold call. You modify the I/O area and issue REPL…
REPLACE
— Replace occurrences within a string:
Replace air filter
— **Test heating operation:** Run heat several degrees above room temperature; verify warm air from al…
Replace caulk every 3–5 years
— more often if cracking or mold appears.
Replace some-ml-plugin
— If you can find an alternative or fork the plugin > 2. **Upgrade pandas alongside scikit-learn** — p…
Replacement level concept
— +2.0 adjustment converts from league average to replacement level baseline - Replacement level ≈ -2.…
Replacement levels:
— WR25: 140 points - TE13: 80 points - RB37 (after FLEX): 90 points
REPLACING phrase
— A phrase used with COPY (to substitute text in a copybook), INITIALIZE (to set specific data categor…
replay delay
— it receives log records in real time but waits a configured interval (e.g., 1 hour) before replaying…
replicability
— a related but distinct concept. Reproducibility requires documentation (a cleaning log, code, and cl…
Replication and Context
— [ ] Has this finding been independently replicated? - [ ] Is this a single study or part of a conver…
Replication crisis
— The ongoing discovery that many published scientific findings cannot be reproduced, raising fundamen…
Replication status:
— Has the finding been replicated by independent researchers? Single studies, even well-designed ones,…
Replies:
— **R1** (reply to O1): The objection confuses the descriptive and normative valence of "emotional app…
Replit
— Replit Agent: https://replit.com - Documentation: https://docs.replit.com - Replit AI Features: http…
Replit Agent
— An AI coding agent integrated into Replit's browser-based IDE. Can build and deploy applications fro…
Report A (Monthly transaction summary by branch):
— Likely bottleneck: Full table scan on the 500-million-row transactions table. The join to accounts a…
Report B (Customer balance trend analysis):
— Likely bottleneck: Window function computation over 120 million rows, likely requiring a large sort …
Report C (Delinquent loan report):
— Likely bottleneck: Finding the most recent payment per loan requires a sort or correlated subquery o…
report formatting logic
— the part of the program that takes processed data and produces neatly formatted output. We simulate …
report groups
— the building blocks of the report. Each group corresponds to a type of report line:
REPORT HEADING
— presented before the first GENERATE (triggered by the first GENERATE or INITIATE, depending on imple…
Report Sections:
— Executive summary - Attacking analysis (corners, free kicks, throw-ins) - Defensive analysis (corner…
Report Structure:
— A professional report follows a consistent structure: cover page, document control, executive summar…
Report the following outputs:
— The median projected monthly revenue at Month 12 - The 10th percentile outcome (the "bad but not cat…
Report the workplace safety conditions
— Jordan can independently file an OSHA complaint about the safety conditions that contributed to Dieg…
Report Writer
— A COBOL feature (REPORT SECTION and associated statements) that automates the production of formatte…
REPORT YES
— Produces a statistics report in the SYSPRINT output. Useful for review and auditing.
Reporting
— Document findings with specific recommendations for remediation.
Reporting accuracy on imbalanced data
— Use F1, AUC-PR, or recall at fixed precision instead. 2. **Fitting the scaler on all data before spl…
Reporting and analytics
— offload long-running reports from the primary - **Data validation** — verify data integrity without …
Reporting Dashboard
— Individual prospect reports - Class summaries - Position-by-position analysis - Efficiency metrics
ReportScheduleService
— manages CRUD operations for report schedules, including validation that the requested report type ex…
Repositories
— ordered collections of objects that different communities can index differently. A library, a museum…
Repository metadata
— file names, directory structure, and project configuration files that provide additional signals abo…
Representation
— Who is in the data? Who is missing? What are the consequences of absence? 2. **Access** — Who can ac…
Representativeness matters more than size.
— ## Probability vs. Nonprobability Sampling
REPRO
— copy data into or out of a VSAM dataset:
Reproducibility
— Can someone else access the same data to verify your results? APIs with changing data are harder to …
Reptile Fund
— through which he secretly subsidized favorable newspapers, planted stories, and destroyed opponents'…
Repurposing
— Adapting existing content for a new platform, format, or audience segment. A 30-minute podcast episo…
Reputable providers (as of 2026):
— **Mullvad VPN** -- Swedish jurisdiction; accepts cash payment; independently audited; no email requi…
reputation
— a non-transferable score based on historical accuracy:
Reputation capital:
— What are you specifically known for, among the people who know your work? - Who would advocate for y…
Reputational:
— Significant media coverage for weeks - Customer trust damaged during a critical booking period - Scr…
Request Headers to Manipulate:
— `Host:` --- Virtual host routing; test for host header injection - `X-Forwarded-For:` --- IP spoofin…
Request/reply pattern
— the core banking program needs to know whether the payment was accepted - **Message expiry** — reque…
requests
— Making HTTP requests (API calls) - **python-dotenv** — Loading environment variables from `.env` fil…
Required (Free)
— Python 3.9 or higher - Jupyter Notebook or JupyterLab - Git (for version control)
Required columns:
— Date - Tool used - Task type - Domain - What zone you treated it as - What happened (was there an er…
Required elements (choose at least two):
— **Alternative test:** If you used a parametric test, also run the nonparametric equivalent (or vice …
Required elements:
— Clearly define the groups being compared and the metric of interest - State null and alternative hyp…
Required Features:
— End location (x, y) - Pass length - Delivery trajectory (encoded) - Height classification - Short co…
Required locations:
— **Inside every bedroom** — this is the most important location. A smoldering fire that starts in a b…
Required paragraph:
— `PROGRAM-ID`: Names the program. This is the only required element.
Required:
— You own, rent, or are considering purchasing a residential home - Basic reading comprehension - Will…
Requirement 10: Track and monitor all access
— Target had logging and monitoring in place (including the FireEye deployment) - The requirement was …
Requirement 5: Protect all systems against malware
— Target had antivirus software deployed - The requirement was met on paper - However, the BlackPOS ma…
Requirement 6: Develop and maintain secure systems
— Target maintained patch management processes - The requirement was met on paper - However, the speci…
Requirements (from the project brief):
— 100 million transactions per day (funds transfers, inquiries, loan payments) - 99.999% availability …
Requirements for CORRESPONDING:
— Both operands must be group items - Elementary items are matched by name (qualified names must match…
Requirements for Option B:
— Sections A through D of the Case Report - Full Preparation Worksheet - Documentation of the simulati…
Requirements for the partnership:
— Partner has a real situation with genuine stakes (not a trivial or already-resolved conflict) - Part…
Requirements from the project brief:
— 100 million transactions per day (PCI-DSS scope: cardholder data present) - 99.999% availability (se…
Requirements gathering
— interviewing stakeholders, analyzing existing systems, extracting entities from business processes, …
Requirements:
— Process 100 million transactions per day (funds transfers, inquiries, loan payments) - 99.999% avail…
Requires a permit in most jurisdictions:
— Adding or removing walls (especially load-bearing) - Electrical panel upgrades, new circuits, servic…
Requires relearning:
— Data definition model (COBOL's PIC/USAGE system vs. type declarations) - File-oriented processing (s…
Rereading can help when:
— There is a significant delay between the first and second reading (spaced rereading). Reading a chap…
Rereading doesn't help when:
— You reread immediately after the first reading (massed rereading). The material is still in working …
res/
— Resource files including layouts, drawables, and XML configurations.
Resampling
— the insight that you can learn about the population by cleverly reusing the sample. This is a modern…
Research Analysts:
— Focus on specific long-term research projects - Develop club's analytical methodology - Often specia…
Research centers:
— Berkman Klein Center for Internet & Society (Harvard) - Center for Information Technology Policy (Pr…
Research findings suggest:
— 500 minutes: Extremely noisy, not reliable for individual comparison - 1,000 minutes: Still substant…
Research Findings:
— A 2023 study found that GPT-4-generated spear phishing emails achieved click-through rates 60% highe…
Research literature tools
— covered in more depth below under Scientific Research — are used by medical researchers and clinical…
Research quality
— Claims need evidence. If you say your niche is underserved, show why. If you forecast $5,000/month i…
Research resources to consult:
— European Commission adequacy decisions page (ec.europa.eu) - noyb.eu announcements and legal submiss…
Research Synthesizer
— The Summarizer adapted for multi-source synthesis: multiple documents → structured insight summary w…
Researcher degrees of freedom
— the legitimate choices researchers make about data collection, analysis, and reporting — create oppo…
ResearchGate
— researchgate.net - Often provides author-uploaded PDFs of published papers; direct author contact
Reserved Space
— 20 bytes reserved for future expansion, initialized to spaces.
Reset between records (INITIALIZE each iteration):
— The input record layout - All calculation work fields - The error message table - Validation flags -…
RESETDICTIONARY vs KEEPDICTIONARY
— Controls whether the compression dictionary is rebuilt. RESETDICTIONARY rebuilds it from current dat…
Residential Clean Energy Credit (Section 25D)
— 30% of the cost of qualifying clean energy equipment - Applies to: solar panels, solar water heaters…
Residential surveillance
— the cameras on apartment buildings and doorbells that watch public streets as a byproduct of private…
residuals
— the difference between the actual outcomes and the current predictions. 3. Fit a decision tree to th…
Resilience
— The ability to adapt well in the face of significant stress, adversity, or trauma; associated with s…
Resistance Mapping
— A structured pre-conversation practice of anticipating likely forms of resistance, identifying their…
resistant measure
— a statistic that isn't heavily influenced by extreme values or outliers. The mean is *not* resistant…
RESNET (Residential Energy Services Network)
— RESNET-certified HERS Raters perform the rating system used for new construction and energy code com…
Resolution
— sometimes called *discrimination* or *relative accuracy* — is your ability to tell *which* items you…
Resolution and Clarity:
— Capture at a resolution that remains readable when printed or viewed at 100% - Use a consistent scre…
resolution criteria
— the objective rules that determine whether the event occurred. Good resolution criteria are:
Resolution criteria comparison:
— Polymarket: "Will a Supreme Court Justice announce retirement or die before February 28, 2026?" - Ka…
Resolution criteria:
— If [Candidate X] is NOT the Democratic nominee: Resolves N/A - If [Candidate X] IS the Democratic no…
resolution of the identity
— is one of the most useful results in quantum mechanics. It tells us that the eigenstates of any obse…
resolution risk
— the possibility that two platforms resolve the "same" event differently. This can happen because:
Resolution strategies:
— **Source wins** — the incoming change overwrites the local change - **Target wins** — the local chan…
Resolved: Appalachia's best days are ahead of it.
— *For:* The collapse of coal, while devastating, has liberated the region from a century of mono-econ…
Resolving M:N relationships
— junction tables as first-class entities with their own attributes.
Resonance
— The tendency of a system to oscillate with greater amplitude at specific frequencies (resonant frequ…
Resonance frequency
— The frequency at which a resonant system oscillates with maximum amplitude when driven. For a simple…
resonant modes and reverberation structure
— specifically through the following mechanisms:
resource
— something that can be produced, distributed, consumed, and used to accomplish tasks impossible with …
resource cleanup
— closing files, releasing database connections, or restoring state. Even if an unhandled exception pr…
Resource consumption:
— Buffer pool getpages and physical I/O - Log records written - Sorts performed and sort overflows
resource curse
— the paradox in which communities rich in natural resources often end up poorer than resource-poor co…
Resource ordering prevents deadlocks
— always acquire locks in a consistent, predetermined order (e.g., lower account number first).
Resources
— Storyboards, asset catalogs, localization files, and other resources.
Resources for Historical Context:
— Basketball-Reference historical data (pre-1979) - APBR metrics community research - Academic papers …
Resources required:
— Production cost estimate - Time investment (yours and team's) - Platform(s) where it lives - Launch …
Resources to Protect:
— VSAM datasets: `BANK.PROD.LOANMSTR`, `BANK.PROD.LOANTRAN`, `BANK.PROD.LOANRPT` - Batch programs: `LO…
resources.arsc
— Compiled resources including strings, layouts, and configuration values. String resources often cont…
RESP
— An option on CICS commands that stores the response code in a specified data item. Using RESP preven…
Respect persons
— treat data subjects as people, not resources 2. **Seek fairness** — examine for bias and refuse to a…
Respect the citation honesty system:
— Tier 1: Only for sources you can verify exist - Tier 2: Attributed but unverified claims — use "Rese…
Respond to code review
— maintainers will review your changes and may request modifications 8. **Celebrate** when your PR is …
Responder
— Poisons LLMNR, NBT-NS, and MDNS to capture NTLM hashes: ```bash responder -I eth0 -wrf
response
— typically an HTML page. A **web framework** is a library that handles the plumbing between requests …
Response Format:
— Success: {"user_id": "uuid", "email": "...", "message": "..."} - Validation Error: 422 with field-le…
Response Pocket
— A prepared orientation toward a specific type of resistance — not scripted words, but a clear unders…
Response Protocol:
— Batch job 10% over normal: note and watch - Batch job 25% over normal: investigate - Batch job 50% o…
Response rate
— The proportion of selected sample units from which completed interviews are obtained. AAPOR defines …
Response rate and field period:
— [ ] Is the response rate reported, or at least approximated? - [ ] Is the field period disclosed? (M…
Response scales:
— [ ] Does the scale have an appropriate number of points for the construct? - [ ] Is there a midpoint…
Response:
— New mandatory cooling-off protocol: any week with more than one discipline flag triggers a 48-hour b…
Responsibilization
— A neoliberal governance strategy that shifts responsibility for managing social risks from instituti…
responsible AI (RAI) teams
— internal specialists whose job is to embed ethical consideration across the organization's AI work. …
Responsible AI in Practice
— Operationalizing responsible AI · Red-teaming · Bias bounties · Inclusive design · Sustainability an…
Responsible AI Institute
— Offers a certification scheme for organizations, providing structured assessments of responsible AI …
Responsible Disclosure:
— When you find vulnerabilities in real products, report them responsibly - Follow coordinated disclos…
Responsible scraping:
— Check `robots.txt` before starting. - Add `time.sleep(1)` or more between page requests. - Use a des…
responsive AI attachment
— The psychological pattern in which users form emotional bonds with AI companions involving genuine f…
responsive desire
— Sexual desire that emerges in response to erotic context or stimulation rather than arising spontane…
Responsiveness
— Reis's concept of perceiving that a conversation partner understands, values, and cares for the auth…
REST
— Representational State Transfer. An architectural style for web services that uses HTTP methods (GET…
REST (Representational State Transfer)
— An architectural style for designing networked applications. Uses HTTP methods (GET, POST, PUT, DELE…
Rest and Schedule Features:
— `home_rest_days`: Days since the home team's last game. Values of 0 indicate a back-to-back. - `away…
Rest and Travel:
— The back-to-back effect is one of the most well-documented patterns in NBA betting, worth approximat…
REST API via z/OS Connect
— Mobile apps typically consume RESTful APIs with JSON payloads. z/OS Connect exposes COBOL programs a…
Rest Days Before Game:
— Normal Sunday-to-Sunday: 6 days - Thursday Night: 3 days (short week) - Monday Night to Thursday: 2 …
Rest is Resistance: A Manifesto
— Tricia Hersey's work through The Nap Ministry (thenapministry.com) offers a framework for understand…
Restart detection logic:
— On program start, check BATCH_RESTART for today's date - If found: restart mode (resume from LAST_KE…
Restart/recovery performance:
— Commit every 200 transactions in batch - Checkpoint/restart logic in all batch programs - Maximum ro…
RestCountries data
— showing GDP and population for countries where the business operates
RESTful API Consumption
— Building robust HTTP clients with `httpx`, handling async operations, setting timeouts, validating r…
RESTful API Design
— Various authors *Understanding REST principles helps you work with any sports API.*
Restore Deep Passing Threat
— Max protection packages - Play action from under center - Target deep routes to force safety respect
Restored Government of Virginia
— a Unionist rival government that claimed to be the legitimate government of the entire state. Under …
Restrictions on BY VALUE:
— The data item should be a binary integer type (COMP, COMP-5, BINARY) - Group items cannot be passed …
Restrictions on synthetic performers
— AI-generated characters that replicate the likeness of background actors without consent.
Restructured roadmap:
— **Month 1-2:** Portfolio inventory and dead code identification (deliverable: retire X batch jobs, s…
Result after Feynman rewrites:
— Views: 12,000 | Completion: 58% | Likes: 340 | Comments: 45 ("OHHH that makes so much sense!")
Result after hook changes:
— Views: 4,200 (+1,212%) | Completion: 41% (+128%) | Likes: 85
Result Set
— A set of rows returned from a stored procedure to the caller via a cursor declared WITH RETURN. The …
Result:
— Outside Red Zone EPA: +0.12 - Red Zone EPA: -0.08 - Drop-off: -0.20 EPA per play
resultant luck
— Sofia was explaining something (an action), and an unexpected, favorable outcome (the recommendation…
Results (2000 games):
— ATS Accuracy: 51.8% - Not statistically significant (p = 0.21) - Conclusion: No edge against the mar…
Results after one year:
— 47 repositories cataloged - Subject access requests fulfillable in 5 business days (down from "unabl…
Results after Phase 1:
— All 48 engineers had read and acknowledged the AI usage policy. - System prompts were deployed acros…
Results after Phase 2:
— The prompt library grew to 41 prompts with an average rating of 4.1 out of 5. - Three new hires comp…
Results after Phase 3:
— Average cycle time decreased from 4.2 days to 3.1 days (26% improvement). - Defect rate decreased fr…
Results agility
— the ability to deliver outcomes in unfamiliar situations by drawing on transferable skills and frame…
Results closely paralleled the dog studies:
— Escapable-noise participants and no-noise participants learned the solution quickly. - Inescapable-n…
Results from initial testing:
— 13 of 15 on-brand samples: correctly identified as strong or acceptable - 11 of 15 off-brand samples…
Results:
— 67 batch programs migrated to Azure (Micro Focus Enterprise Server) - Batch window: 2.5 hours (mainf…
Resume Best Practices
— Lead with relevant skills and projects - Quantify impact where possible - Highlight sports-specific …
RESUME YES
— Appends data to existing rows in the table. RESUME NO (the default) replaces all existing data — equ…
resurgence of severe black lung disease
— a dramatic increase in advanced cases of progressive massive fibrosis among Appalachian coal miners …
Retail / E-commerce
— sales records, product catalogs, customer transactions - **Finance** — stock prices, company financi…
Retail and Supply Chain
— Inventory management, point-of-sale transaction processing, and supply chain logistics involve high-…
Retargeting
— Showing advertisements to users who have previously visited a website or viewed specific products, f…
Retention
— The measure of how well a creator keeps their audience engaged and subscribed over time. High retent…
retention cliff
— a sharp drop in viewership that occurs in the first 2-5 seconds of most videos. This cliff represent…
retention curve
— a line graph showing the percentage of viewers still watching at each moment in the video. On YouTub…
Retention Curve Analysis
— Biggest drop-off point: _____ minutes / _____ seconds - What was happening at that moment: _________…
retention interval
— the gap between sessions. During this gap, forgetting happens. And here's the counterintuitive part:…
Retention of "r" in all positions
— Appalachian English is fully rhotic (pronouncing "r" wherever it appears in spelling), a feature of …
Retirement Wave
— The average age of mainframe professionals continues to increase. As senior architects retire, the s…
Retractable Roof (4 teams):
— Lucas Oil Stadium (Colts) - NRG Stadium (Texans) - Hard Rock Stadium (Dolphins, partial)
retransition
— a passage that prepares the return of the tonic.
retrieval failure
— which you learned about in Chapter 2 — is often the primary culprit. The information may still be st…
Retrieval Practice
— retrievalpractice.org Pooja Agarwal's website dedicated to the science and practice of retrieval-bas…
Retrieval Practice (Ch 5)
— In Chapter 5, you solved the Schrodinger equation for the hydrogen atom using spherical coordinates,…
Retrieval Practice (Ch 8)
— The time evolution operator $\hat{U}(t) = e^{-i\hat{H}t/\hbar}$ was introduced in Chapter 8 as the s…
Retrieval-Augmented Generation (RAG)
— a technique that grounds the LLM's responses in Athena's actual documents rather than relying on the…
retroactive ADRs
— Architecture Decision Records written to document past decisions before the decision-maker retires o…
Retroactive interference
— The impairment of earlier memories by later learning; relevant to the fragility of autobiographical …
Retrosheet (retrosheet.org)
— Free play-by-play data for every MLB game from 1921 to present. Event files can be parsed with the C…
Retrospective voting
— The theory that voters evaluate incumbents or governing parties based on past performance (particula…
Retry logic:
— All programs implement retry for -911 and -913 - Online: 3 retries with no delay (transactions are f…
RETURN
— The topmost operator. Delivers result rows to the application. Its TOTAL_COST is the cost of the ent…
return a new string
— they don't modify the original. Strings in Python are **immutable**: once created, they cannot be ch…
return line
— a dedicated pipe running from the furthest point on the hot water distribution back to the water hea…
Return migration
— the movement of migrants back to their communities of origin — was a consistent, if smaller, counter…
Return to This Card When:
— You are avoiding a conversation you know you need to have - You have just handled something badly an…
RETURN-CODE
— A COBOL special register (PIC S9(4) COMP) that is set by the program to indicate its completion stat…
Return-to-Play:
— Extended timelines (9-12 months minimum) - Psychological readiness assessment - Graded return protoc…
Returns (measured at Month 3):
— Velocity recovered from 9 to 16 story points per sprint (78% increase) - Bug density decreased by 60…
Revenue
— Does this initiative enable revenue growth? How? 2. **Cost** — Does this reduce cost? By how much? O…
Revenue concentration change
— If the top 10 customers now represent 80% of revenue compared to 65% last year, risk is increasing e…
Revenue Forecasting (Chapter 25):
— `monte_carlo_revenue` — multi-stream Monte Carlo simulation - `calculate_income_volatility` — coeffi…
Revenue Share
— A model in which a platform or business partner pays a creator a percentage of the revenue generated…
Revenue Stack
— The full combination of income streams a creator operates simultaneously. A healthy revenue stack is…
Revenue:
— Monthly revenue consistency (same order of magnitude for at least 6 months): __/5 - Monthly net reve…
Reverberation
— The persistence of sound in an enclosed space after the original source has ceased, caused by multip…
Reverse Engineering
— IEEE conferences on reverse engineering (WCRE, SANER) include papers on automated COBOL analysis tec…
Reverse image search
— A technique for finding other occurrences of an image on the web, used to identify the earliest and …
reverse inference
— inferring mental states from brain activity patterns. The same region is activated by many different…
Reverse mentoring
— junior professionals teaching modern technologies to senior professionals — builds mutual respect, d…
reversing valve
— a four-way valve that redirects refrigerant flow so that the roles of the indoor and outdoor coils a…
Review (10 minutes)
— What worked? Be specific — ask for examples, not just "it went okay." - What was hard? Normalize the…
Review after every infrastructure change
— new storage subsystem, new LPAR, new CICS region, any GDPS configuration change
Review and understanding tasks:
— Reviewing pull requests from colleagues - Reading unfamiliar codebases - Understanding legacy code w…
Review on first run
— Manually review the first automated output before trusting the schedule - [ ] **Check PDF page break…
Review your attributions:
— For items 1–5: Did you attribute primarily to the person's character/disposition, or to circumstance…
Revised portfolio:
— Positions: 39 (down from 42) - Deployed capital: $21,210 (down from $22,890) - Deployment ratio: 65%…
Revisionism and the Ideology Debate
— Converse (1964): most Americans lack ideological constraint — their views on one issue don't predict…
revolution
— the paradigm shift proper. A new paradigm is proposed that accounts for the anomalies that the old p…
Revolutionary War Records:
— DAR Patriot Index: dar.org — searchable database of documented Revolutionary War patriots, organized…
Reward controllable outcomes
— individual statistics the player can influence 2. **Incentivize team success** --- bonuses tied to c…
REWRITE
— A COBOL statement that replaces an existing record in a file. For sequential files opened I-O, REWRI…
Rewrite ACCTINQ in Java
— Estimated 4 months, risk of introducing logic bugs in a critical program 2. **CICS Transaction Gatew…
REWRITE statement
— A COBOL statement that replaces an existing record in a file. The record must have been previously r…
Rewrote the workforce section
— expanded from 2 paragraphs to a full section including a detailed hiring analysis, a vacancy rate co…
Rex (Ruby Extension Library)
— The foundation layer. Rex provides fundamental functionality: socket handling, protocol implementati…
RFC 4253: SSH Transport Layer Protocol
— The security foundation for SFTP. Understanding SSH key exchange and encryption helps with troublesh…
RFC 959: File Transfer Protocol (FTP)
— The foundational FTP specification. Understanding the protocol helps diagnose transfer issues, parti…
Rhetorical question
— A question to which the asker already knows the answer; used to make a point; typically escalates co…
Rhiannon Giddens
— MacArthur Fellow, Grammy winner, cofounder of the Carolina Chocolate Drops — has done more than any …
rhotic
— speakers pronounce the "r" at the end of words and before consonants ("car," "farm," "water") where …
Rhythm
— The organization of sound events in time, including the durations of notes and silences, the groupin…
Rhythm (Days 8-30)
— Weekly posting target: _____ videos - Posting days: _______________ - Month 1 topics (list 6-8 speci…
Richard Trumka
— a young, charismatic leader from a coal mining family in Nemacolin, Pennsylvania — understood that t…
Richardson arms race model
— that capture the positive feedback between two nations' military spending. The equations are simple.…
RID pool
— a dedicated area of memory in DBM1 where RID lists are built, sorted, and merged.
Ridge Party
— was led by **Major Ridge**, his son **John Ridge**, and **Elias Boudinot**, the former editor of the…
Ridge solution: (X'WX + λI)^(-1)X'Wy
— Adding λI to X'X increases all eigenvalues by λ - Guarantees invertibility and improves condition nu…
RIDSCN
— RID scan operator for list prefetch operations.
right not to know
— the idea that individuals have a right *not* to receive information about their future health if the…
Right of access
— You can request a copy of all personal data held about you - **Right to rectification** — You can co…
Right to be forgotten
— EU right to request removal of personal information from public circulation
right to explanation
— the right to receive a meaningful, human-understandable account of how an algorithmic decision was r…
right-skewed
— you can't have a negative F (it's a ratio of positive quantities) - It starts at 0 and has a long ri…
Right-trimming is a fundamental pattern
— compute actual length, then use it everywhere
rigid rotor
— the rotational energy levels are:
Rim Protection Without Blocks:
— Alters shots through positioning - Forces difficult angles - Opponents shoot worse at rim with Green…
Rim Protectors:
— Essential for defensive integrity - May overlap with switchable defenders - Often staggered with off…
ring polymer
— a closed chain of $P$ "beads" connected by harmonic springs of stiffness $m/\Delta\tau^2$, with each…
Risk 1: Platform Algorithm Change / Reach Decline
— **Likelihood:** High (affects virtually every creator at some point) - **Impact:** High (primary rev…
Risk 2: Brand Deal Revenue Drought
— **Likelihood:** Medium - **Impact:** High if brand deals are primary revenue - **Mitigation strategy…
Risk 3: Creator Burnout / Health Disruption
— **Likelihood:** Medium (creator burnout is extremely common) - **Impact:** High (content stops, audi…
Risk 4: Platform Shutdown or Policy Change
— **Likelihood:** Low–Medium (TikTok ban risk is real; others have folded) - **Impact:** High for plat…
Risk 5: Reputational Risk / Public Controversy
— **Likelihood:** Low–Medium (increases with audience size) - **Impact:** Potentially catastrophic - *…
risk assessment instruments (RAIs)
— are used at multiple points in the criminal justice process:
Risk Assessment:
— Probability Leonard is healthy: 60-70% - Probability he leaves in free agency: 50-60% - Expected cha…
Risk Configuration
— [ ] All risk limits set conservatively (you can always loosen later) - [ ] Daily loss limit is set a…
risk management
— all simultaneously, often in the space of a single sentence.
Risk Management System (Article 9)
— [ ] Establish a documented risk management process covering the entire AI system lifecycle - [ ] Ide…
Risk Management:
— NIST CSF 2.0 provides six core functions (Govern, Identify, Protect, Detect, Respond, Recover) for o…
Risk metrics:
— Sharpe ratio (mean return / standard deviation of returns) - Maximum drawdown (largest peak-to-troug…
Risk Panel:
— Current pending exposure - Daily loss vs. limit - Bet count vs. limit - Bankroll trajectory
risk points
— moments in the plan that are most vulnerable to disruption (Weeks 5-6, when she has end-of-semester …
Risk Portfolio
— Are you taking the right kinds of bets? Healthy = multiple bets across domains, explore/exploit bala…
risk premium
— the amount a rational, risk-averse person will pay above the expected loss to eliminate variance. Fo…
Risk Ratings:
— CVSS provides standardized numerical scores - Risk matrices that combine technical severity with bus…
Risk regulation
— Murray's model of how self-esteem shapes defensive behaviors in established relationships, particula…
Risk scoring
— See *Actuarial surveillance.*
Risk tolerance
— An individual's psychological and financial capacity to accept variance in outcomes. Risk tolerance …
Risk-based classification:
— *Unacceptable risk (prohibited)*: Social scoring by public authorities; subliminal manipulation; exp…
Risk.net
— Leading practitioner publication covering stress testing developments, regulatory changes, and vendo…
Risks in "Risk-Free" Trades:
— Settlement risk (platform failure or delayed resolution) - Resolution ambiguity (different platforms…
Risks:
— Encouraging quantity over quality (trading for streaks rather than information) - Trivializing serio…
Rivalry Preservation
— 78% of traditional rivalries preserved as conference games - 22% became non-conference (scheduling c…
Rivals
— Regional recruiting coverage - https://rivals.com/ - Historical archives
Rivera's 8 Interceptions:
— 3 in red zone (high cost) - 2 on third down (moderate cost) - 2 on first down (moderate cost) - 1 ti…
RLHF (Reinforcement Learning from Human Feedback)
— A training technique that uses human evaluations of model outputs to teach the model to generate mor…
RMA (Risk Management Association)
— US banking industry body with active publications and webinar series on DFAST implementation for com…
RMS (root mean square) loudness
— the square root of mean squared amplitude, which measures average acoustic power; (2) **spectral fla…
Roadmap
— [ ] Three-horizon roadmap constructed with dependency mapping - [ ] Prioritization scoring completed…
Roads and wagon tracks
— connecting the ore bank, the charcoal yard, the limestone quarry, and the furnace itself. Transporti…
ROAS
— Revenue generated per dollar of ad spend. Meaningful only relative to your gross margin. Break-even …
Robert Gipe
— a community arts organizer from Harlan County, Kentucky — has published a series of graphic novels (…
Roboflow Sports Datasets
— roboflow.com/sports Curated datasets for sports object detection, including annotated soccer frames …
Roboflow, "How to Detect Soccer Players"
— blog.roboflow.com. A step-by-step tutorial on training a custom YOLOv8 model for soccer player detec…
robust
— they work under weaker assumptions. But they're less **powerful** when the parametric assumptions ac…
Robust RB Philosophy:
— Locks up elite RB workloads early - Accepts WR depth as adequate - Works when: Elite RBs healthy, WR…
Robust z-score
— the distribution is right-skewed, so median/IQR better represent typical values. The robust score co…
Robustness
— The ability of a system to maintain its function despite perturbation; achieved through redundancy, …
ROC-AUC
— The area under the Receiver Operating Characteristic curve, measuring a classifier's ability to dist…
roguelite
— Game genre terms derived from the 1980 game Rogue; roguelikes feature procedurally generated content…
ROI (Return on Investment)
— A measure of the financial gain relative to the cost of an investment. In creator businesses, ROI ap…
ROI calculation:
— 8.5 hours/week × average team member value ($45/hour) × 26 weeks = $9,945 in time value recovered - …
role
— A Discord server designation that assigns permissions, identity markers, and channel access to speci…
Role 1 — Claims Processor:
— Can see: Procedure codes, billing amounts, payment status, provider info, patient name - Cannot see:…
Role 2 — Clinical Reviewer:
— Can see: Diagnosis codes, treatment notes, physician orders, lab results, patient name - Cannot see:…
Role 3 — Billing Specialist:
— Can see: Billing amounts, copay, deductible, OOP max, EOB, patient name, address - Cannot see: Diagn…
Role 4 — Privacy Officer:
— Can see: All fields (full access for investigations) - All access is logged with AUDIT(ALL)
Role 5 — Auditor:
— Can see: All fields (read-only) - Cannot modify any records - All access is logged with AUDIT(ALL)
Role 6 — Provider (external):
— Can see: Claims status, payment amounts, patient name only - Cannot see: Clinical data, SSN, other p…
Role and Expertise Priming
— Tell the AI what role to play. Most useful when you need domain-specific knowledge (for example, "yo…
Role assignments (final):
— Destiny: content concepts, primary streaming, on-camera talent, final approval on published content …
Role Considerations:
— Young international players often play limited roles on veteran teams - Per-minute production may be…
Role player targets:
— Prioritized floor-spacing shooters - Targeted corner three specialists - De-emphasized mid-range sco…
role prompting
— asking the model to adopt a specific persona or expertise.
Role Quality
— Scope of responsibilities - Access to data and tools - Influence on decisions - Growth opportunities
Role stacking
— combining multiple roles simultaneously or sequentially — is effective for tasks that genuinely bene…
role-based prompt
— we are asking the AI to act as a code reviewer rather than a code generator. The AI suggests:
Role-Based Prompting
— A **prompting** technique that asks the AI to adopt a specific persona or expertise: "Act as a senio…
ROLLBACK
— A DB2 operation that reverses all database changes made since the last *COMMIT*, restoring the datab…
rolled off
— uncataloged and optionally deleted. This provides automatic data lifecycle management.
Rolling deployment
— Update instances one at a time. Each new instance is health-checked before moving on to the next. If…
Rolling vs. Expanding:
— Rolling = fixed window, moves through data (recent trend) - Expanding = window grows from start to c…
Rolling Window
— A computation over a fixed-size, moving subset of rows.
Romantic love
— sometimes called *passionate love* or *companionate love* depending on stage and intensity — is a mo…
Ron Rash
— born in 1953 in Chester, South Carolina, raised in Boiling Springs, North Carolina, rooted in the mo…
Roof
— from the ground, all four elevations. Binoculars are useful if you have them.
Roof cap termination
— a small dome or louvered cap on the roof. Effective but requires a leak-proof installation around th…
roof fall
— the sudden collapse of the rock above a miner's head.
Roof falls
— the collapse of the mine ceiling — were the leading cause of death. **Methane gas** (called "firedam…
Roof Inspection Costs:
— Professional roof inspection: $150–$400 (some roofers offer free estimates but call them inspections…
Roofing
— Class A roofing is the minimum standard for WUI areas. This includes asphalt shingles with fiberglas…
Rookie BPM Expectations by Pick:
— Picks 1-5: Average BPM of +1.0 - Picks 6-10: Average BPM of -0.5 - Picks 11-14: Average BPM of -1.5
Rookie Kicker Profile:
— 4-year college career: 108/118 (91.5%) - Strong leg (5/7 from 50+ in college) - No NFL experience - …
rooms
— stores chat rooms: - `id` (primary key) - `name` (unique, 1-100 characters) - `description` (optiona…
Root Cause Analysis:
— What was the immediate cause? (The corrupt data in the input file.) - What was the contributing caus…
Root Causes:
— No suitable index exists - Index exists but predicates do not match leading columns - Statistics are…
Root fix
— update the MQ bridge configuration to strip null terminators during character conversion.
root metaphors
— the foundational analogies that shape how a field conceptualizes its subject matter.
Roots (underground lateral):
— Mature trees + pre-1970 clay tile = significant risk - Signs: whole-house slow drainage, especially …
RoPA maintenance:
— [ ] Annual review of all entries; more frequent review after system changes - [ ] Owner assigned for…
RoPA must capture for each processing activity:
— [ ] Activity name and description - [ ] Purpose(s) of processing - [ ] Categories of data subjects -…
Rose's Actual Timeline:
— Cleared to play: Early 2013 - Actual return: October 2013 (17 months post-surgery) - Reason for dela…
Roster Construction Principles:
— Build through the draft for cost-controlled talent - Pay premium only for premium positions (QB, EDG…
Rotation operator
— $\hat{R}(\hat{n}, \theta) = e^{-i\hat{\mathbf{J}}\cdot\hat{n}\theta/\hbar}$, generated by angular mo…
Rotter I-E Scale
— presenting pairs of statements and asking participants to choose the one they agreed with more:
rough-in phase
— when pipes, wires, and ducts are run through the structure — is inspected before walls are closed. -…
ROUND
— Round to a specified number of decimal places:
Round 1 (2018): APT3 (Gothic Panda)
— Chinese cyber espionage group - Known for exploiting vulnerabilities in internet-facing applications…
Round 2 (2020): APT29 (Cozy Bear)
— Russian intelligence service (SVR) - Sophisticated tradecraft with emphasis on stealth - Two-day eva…
Round 2 Strategy:
— RB scarcity accelerating (workhorses disappearing) - WR depth remains strong through Round 4 - TE dr…
Round 3 (2021): Carbanak + FIN7
— Financial crime groups targeting banks and retail - Blending espionage techniques with financial the…
Round 4 (2022): Wizard Spider + Sandworm
— Ransomware operations (Wizard Spider/Ryuk/Conti) and destructive attacks (Sandworm/NotPetya) - Most …
Round 5 (2023): Turla
— Russian FSB-linked group known for sophisticated malware - Carbon and Snake backdoors - Complex mult…
ROUNDED phrase
— An option on COBOL arithmetic statements that rounds the result to the precision of the receiving da…
Route
— A mapping between a URL path and a Python function that handles requests to that path.
Route:
— Start: Chapters 1, 2, 3 (context and ecosystem) - Core: Your domain chapters from Parts 2, 3, or 4 -…
Router and access point exploitation
— Leveraging vulnerabilities in hotel network equipment to gain administrative access - **Rogue access…
routine
— background noise in an ordinary Tuesday.
routine parasocial contact
— the digital equivalent of seeing someone at school every day. Consistency breeds familiarity, and fa…
Routing logic:
— EVALUATE based on which search fields the user populated - Open only the appropriate cursor - Common…
Routing rules
— Define how the gateway routes requests: - Path-based routing to z/OS Connect instances - Load balanc…
Row Permissions
— Control which rows a user can see (row-level security) 2. **Column Masks** — Control what values a u…
Row/Page-Level Locks:
— **S (Share):** "I am reading this row. Others may also read it, but no one may modify it until I rel…
ROW_NUMBER()
— assigns a sequential integer to each row within a partition:
RPM (Revenue Per Mille)
— The actual revenue a creator earns per 1,000 views, after the platform takes its cut. Distinct from …
RRDS
— Relative Record Data Set. A *VSAM* file organization where records are accessed by their relative re…
RRDS (Relative Record Data Set)
— Records are accessed by relative record number, similar to COBOL relative file organization.
RT60
— The time required for the reverberant sound level in a room to decay by 60 dB after the source is sw…
Rtfm: Red Team Field Manual
— Ben Clark. Quick-reference command guide for pentesters. Keep on your desk during engagements.
RTLM
— (Radio Télévision Libre des Mille Collines) The Hutu Power radio station that broadcast in Rwanda fr…
RTO/RPO Matrix
— Classify your system's business processes into tiers and assign RTO/RPO/RLO to each.
Rubber Duck Debugging
— The practice of explaining a problem step by step to find the solution. AI assistants serve as an in…
Rubric:
— (a) 2 points: correctly identifies the causal vs. descriptive gap. - (b) 4 points: 2 points per plau…
Rule Changes:
— Three-point line (1979) - Zone defense legalization (2001) - Pace variations across eras
Rule of thumb:
— If your data looks like a spreadsheet (rows and columns, all the same fields), use CSV. - If your da…
rule-based architecture
— the direct descendant of the expert systems described in Section 1.1.1 of this chapter. Over 4,500 h…
Rules (required by Python):
— Variable names can contain letters, numbers, and underscores - Variable names cannot start with a nu…
Rules for concatenation:
— All datasets must be sequential (or PDS members) - The dataset with the largest block size should be…
Rules for PROCEDURE DIVISION USING:
— Each item named in USING must be defined in the LINKAGE SECTION (01 or 77 level). - The order of par…
Rules for program names:
— 1 to 30 characters (8 in older standards) - Must begin with a letter - Can contain letters, digits, …
Rules for RENAMES:
— Level 66 entries must immediately follow the last data item in the 01-level record. - The items bein…
Rules of Engagement:
— RoE documents are the single most important protection for both tester and client - They must cover …
Rules of thumb:
— Start with K-means for a quick baseline - Use DBSCAN when you expect non-convex clusters or signific…
Rules:
— You may not spend money on any equipment for this exercise - You have 60 minutes total: planning, fi…
Rumination
— a specific cognitive pattern associated most strongly with depression — involves repetitive, passive…
run
— they depend on the energy scale at which they are measured. The fine structure constant $\alpha \app…
Run `.info()`
— Check data types and non-null counts - [ ] **Run `.describe()`** — Look for impossible min/max, susp…
Run A (BLKSIZE=200, 1 record/block):
— EXCPs = 10,000,000 / 1 = 10,000,000
Run B (BLKSIZE=6000, 30 records/block):
— EXCPs = 10,000,000 / 30 = 333,334 (rounded up)
Run both the parametric and nonparametric test:
— Two independent groups → t-test AND Mann-Whitney U - Paired data → paired t-test AND Wilcoxon signed…
Run C (BLKSIZE=27800, 139 records/block):
— EXCPs = 10,000,000 / 139 = 71,943 (rounded up)
Run CI with dependency matrix
— Test against both minimum and maximum supported versions of key dependencies (numpy, pandas, scikit-…
Run the analysis both ways
— with and without the missing rows — and report whether the conclusions differ. 2. **Create a "Not Re…
run unit
— the main program and all subprograms. If a subprogram executes STOP RUN, the calling program does no…
runaway feedback loop
— a cycle in which an AI system's outputs become its own future inputs, reinforcing and amplifying the…
Runaway selection
— the co-evolutionary process by which a trait and a preference for that trait amplify each other, oft…
runc
— Standard OCI runtime 2. **gVisor (runsc)** — Application kernel providing system call interception 3…
Running
— actually executing on a processor (dispatched by the CICS dispatcher, which in turn was dispatched b…
Running Back
— Short careers, high replacement level 10. **Tight End** - Unless elite receiving threat
Running Back Projected Stats:
— Games: 17 - Carries/game: 18 - Yards/carry: 4.5 - Rush TDs: 10 - Receptions/game: 4 - Yards/receptio…
Running Game Changes
— More outside zone to avoid loaded boxes - Jet sweeps and reverses to stretch defense - Quarterback d…
Running Stats (1st Half):
— Colts: 8 carries, 22 yards - Bills: 16 carries, 75 yards
RUNSTATS Review:
— Verify RUNSTATS ran on schedule for all high-activity tablespaces - Check for tablespaces where row …
RUNSTATS runs
— catalog statistics updated 2. **Package remains bound with old access path** — until: - Manual REBIN…
Runtime Security:
— Deploy Falco or similar runtime security monitoring - Alert on container escapes, privilege escalati…
Runtime Threats:
— Container escape to host - Lateral movement between containers - Privilege escalation within contain…
Runtime:
— Physical gate time: $\sim 1\,\mu$s (surface code cycle time) - Logical gate time: $\sim d \times 1\,…
rupture-repair cycle
— The normal rhythm of close relationships: some form of connection failure followed by a repair attem…
rural electric cooperatives
— locally organized, member-owned entities that would build the lines, purchase wholesale power (often…
rural treatment gap
— a chasm between the demand for addiction treatment and the available supply. Wait lists for treatmen…
Rushing Analytics
— why traditional rushing stats mislead and how to properly evaluate running backs.
Rust Belt
— the band of formerly industrial cities stretching from Pittsburgh through Youngstown, Cleveland, Akr…
Rydberg energy
— and $a_0 = 4\pi\epsilon_0\hbar^2/(m_e e^2) = 0.529\;\text{\AA}$ is the **Bohr radius**, the characte…
S
S-Corp (S Corporation)
— A US business structure that allows income to pass through to shareholders' personal tax returns whi…
S-curve
— A sigmoid curve describing the typical lifecycle of growth: slow start, rapid acceleration, and even…
S.T.O.P. Score:
— S: 1 (generic talking-head, no visual distinction) - T: 1 (no tension yet — just "you know how") - O…
S.T.O.P. Scoring:
— **S (Salience): 5** — A vivid fantasy landscape is high-color, high-detail, visually stunning. The h…
S0C7 is the #1 COBOL abend
— caused by non-numeric data in packed decimal fields. Common sources: uninitialized fields, group mov…
SABR (Society for American Baseball Research)
— Despite name, includes basketball content - Basketball research committee
SABR Analytics Conference
— Society for American Baseball Research - Increasingly multi-sport - Statistical methodology focus
SABR Analytics Conference Materials
— Annual sports analytics conference - Research presentations available online - Cutting-edge methodol…
SABR Career Development Resources
— Networking opportunities - Industry connections - Conference presentations
Sack Statistics:
— NCAA didn't officially track sacks until 2000 - Historical sack data is incomplete or inconsistent
Sacred Harp singing
— is one of the oldest continuously practiced participatory musical traditions in America.
Sacred Science
— Present. Jones's interpretation of the Bible, of current events, and of the Peoples Temple's mission…
saddle points
— points where some dimensions curve up and others curve down, like the center of a horse saddle. At a…
SADIE Database
— sadie-project.org A freely available HRTF database with measurements from 20 subjects (including hum…
SAF/RACF integration
— API access is controlled by RACF profiles. A mobile app user authenticated via OAuth2 is mapped to a…
Safe music solutions:
— **YouTube Audio Library**: Free music and sound effects you can use in YouTube videos without claims…
Safeguards:
— Use victim-reported crime data (calls for service) rather than arrest data - Exclude minor offenses …
safety
— when you pass a string to a function, you can be certain the function cannot alter your original str…
Safety first:
— Wear a good-quality N95 or P100 respirator. Crawlspaces contain accumulated dust, insulation fibers,…
Safety items
— always ask for these to be addressed - **Major mechanical issues** — aging furnace that shows signs …
safety net
— a catch-all that fires if a programmer forgets to check FILE STATUS at a particular I/O statement.
safety stock
— extra inventory above the forecast level — to buffer against under-prediction.
safety/immediate items first
— these require action regardless of any other consideration. - Elevate any finding involving **water,…
Sagacity serendipity
— Christian Busch's term for serendipity that requires preparation: an unexpected event occurs, but re…
Salary ranges (US, 2024--2025):
— Junior Trader: $55,000--$80,000 - Trader: $75,000--$120,000 - Senior Trader: $110,000--$170,000 - He…
Sales setup:
— Create a free Gumroad account - List your product at a price between $7 and $47 - Write a sales page…
SALFMT
— Currency formatting subprogram - Accepts numeric amount and format code - Returns formatted string w…
saliency maps
— computational models that predict which parts of an image the human eye will look at first based on …
salient
— stimuli that matter, that carry either positive or negative significance. In the early stages of rom…
SALPOST
— Batch posting program - Reads validated sales file (sorted by region/salesperson) - Updates DB2 SALE…
SALRPT
— Report generation program - Reads DB2 SALES_DETAIL with SALESPERSON and REGION joins - Produces 132-…
salt furnaces
— until the water evaporated and the salt crystallized. The fuel for the furnaces was initially wood (…
Salt licks
— natural mineral springs where saline water seeped to the surface — were scattered across the Appalac…
Salted Hashed Storage
— A random value (the "salt") is prepended or appended to the password before hashing. This ensures th…
SALVALID
— Batch validation program - Reads sequential daily sales file - Validates: salesperson ID against VSA…
Sam is at approximately the 84th percentile
— he scored higher than about 84% of test takers. Not bad.
Sam Nakamura's arc
— from the fourteen-year-old recognizing something unnamed in Supernatural to the twenty-something who…
Sam's starting position:
— Niche: History content (short, dramatic retellings of historical events) - Platform: TikTok - Follow…
Same emotional energy
— Marcus was smiling and trying hard on both days. The before wasn't sad or reluctant — it was enthusi…
Same song
— identical musical piece isolates the skill variable 2. **Same visual setup** — same camera angle, ro…
Same time each day
— evening works well because you're reviewing the day; morning works well because it primes the day's …
Same visual setup
— Same camera angle, same room, same shirt. The only visual difference was skill. This isolated the va…
SAMHSA Treatment Locator
— findtreatment.gov - Behavioral health treatment services
sample
— a subset of the larger population — and draw conclusions about the whole from the part.
Sample and generalizability:
— How large is the sample, and how was it recruited? A study of 120 university students in a single co…
Sample and stability
— How many seasons of data? - Is performance consistent or variable?
Sample design:
— [ ] Is the sampling method described? (probability vs. nonprobability; stratification design if any)…
Sample size
— larger samples give more power. (2) **Effect size** — larger effects are easier to detect. (3) **Sig…
Sample Size Awareness
— Goalkeeper stats require patience
Sample size concerns worked both ways
— 25 games gave limited FT attempts - Evaluators may have dismissed it as noise - But small samples sh…
sample size determination
— deciding how large your sample needs to be to achieve a desired margin of error.
Sample Size Issues
— Star players rarely miss games - Each injury situation is unique - Limited historical comparable sit…
Sample Size Limitations
— Prospects have 30-50 college games - Limited snaps at NFL-quality competition - Injury history often…
Sample sizes
— situational stats have fewer plays 2. **Context** - opponent quality matters 3. **Clutch** - largely…
sample space
— the complete set of all possible outcomes. We denote it with the Greek letter omega: **S** (or somet…
Sample temporal queries:
— Account balance as of a specific date (FOR SYSTEM_TIME AS OF) - All changes to an account in a date …
Sample the data
— use `df.sample(5000)` to plot a random subset. Fast, but loses some information. (2) **Aggregate** —…
Sampling
— The process of measuring the instantaneous amplitude of an analog signal at discrete, equally spaced…
sampling bias
— a systematic tendency for your sample to differ from the population in ways that affect your conclus…
sampling distribution of the median
— the very thing we couldn't derive a formula for. The spread of this distribution tells you how much …
Sampling error
— The random variation in sample statistics that arises because a sample, rather than the entire popul…
Sampling frame
— The list or rule from which a sample is drawn. The quality of a sampling frame determines the extent…
Sampling frame:
— [ ] Is the sampling frame described? (voter file, RDD, ABS, online panel?) - [ ] Is the frame approp…
Sampling rate
— The number of samples taken per second during analog-to-digital conversion, measured in Hz or kHz. C…
Sampling variability
— each random sample selects different countries, producing different results. This is the fundamental…
Sampling variance in individual polls
— captured by sample size and MOE. 2. **Fundamental model uncertainty** — our fundamentals estimates a…
sanctification
— the belief that a Christian could achieve, through a second definitive spiritual experience after co…
Sanctions screening:
— False positive rate: reduced from 94% to 82% - Weekly screening volume: 12,400 items (unchanged) - F…
Sandra Chen
— COO of Acme Corp. She has a board meeting in three days and needs to explain why customer satisfacti…
Sandstone or conglomerate
— deposited by rivers flowing across a low-lying landscape 2. **Shale** — deposited in quieter water a…
Sandvoss (2005)
— "Mirror of consumption": fan merchandise as identity investment, not merely utility. Explains fan ec…
Sanity checks:
— $\hat{J}_+ |j, j\rangle = \hbar\sqrt{(j-j)(j+j+1)} |j, j+1\rangle = 0$ ✓ (top of ladder) - $\hat{J}_…
Sanvello
— Mood tracking, CBT tools, community; used in some health plan employee assistance programs.
Sarah Kim
— Business Analyst Sarah came to IT from the business side of insurance. She spent five years as a cla…
Sarah Okonjo
— Chief Risk Officer (CRO): Has direct accountability for Solvency II Pillar III reporting. Is sponsor…
Sash terminology you need to know:
— **Jamb:** The vertical side members of the window frame that the sash slides within - **Head:** The …
Satellite analyst responsibilities:
— Delivering local analytics services to their club's coaching and recruitment staff - Providing local…
Satellite imagery surveillance
— The use of satellite-mounted cameras and sensors to observe the earth's surface at various resolutio…
Satire and parody
— No intent to deceive, but potential to be mistaken for genuine news when stripped of satirical marke…
Satisfaction
— how rewarding the relationship is relative to expectations (Thibaut and Kelley's *comparison level* …
Satisfaction features:
— `nps_score_last_survey` — self-reported satisfaction (use carefully — sparse)
Satisfaction Metrics
— **Developer satisfaction.** Regular surveys asking developers how they feel about AI tools, team pra…
Satisfaction Spacing:
— 0-8s: Scroll-stop visual (immediate engagement) - 8-12s: First micro-satisfaction (4s gap) - 15-22s:…
Satisfaction types activated:
— **Transformation** (primary) — messy becomes organized; the before/after gap drives satisfaction; gr…
Satisfactory findings:
— BIA is current (updated 2022, reviewed 2023) - Contingency plan is current (updated 2023, reviewed q…
satisfice
— you search until you find an option that meets your requirements, and then you stop searching.
Satisficing
— Herbert Simon's term for choosing an option that meets a minimum threshold of acceptability rather t…
Satisficing vs. maximizing
— Herbert Simon's framework for decision-making under information overload. Viewers in a feed are "sat…
Saturday (flex time):
— Ideation for next week - Trend monitoring (30 minutes) - Back catalog review: identify old content t…
SAUCE test
— that you can apply to any data claim you encounter:
Save it somewhere safe
— you will not be able to see it again after closing this page.
Save, document, and deploy
— Mistake: not saving the fitted pipeline, not recording library versions, or not documenting assumpti…
saved / crossposted
— Archiving a post for personal reference or sharing it in multiple subreddits.
SAVINGS_ACCOUNT (subtype)
— ACCOUNT_ID (PK, FK to ACCOUNT) - INTEREST_RATE - MIN_BALANCE - INTEREST_ACCRUAL_METHOD
SAVINGS_DETAIL
— Subtype: savings-specific attributes.
SBA Community Advantage Program
— sba.gov The Small Business Administration's Community Advantage program makes loans of up to $350,00…
SBNation (Football Study Hall)
— Bill Connelly's work - SP+ explanations - Advanced stats
SBOM formats:
— **SPDX (Software Package Data Exchange):** ISO/IEC 5962:2021 standard. Originally focused on license…
SCADA Servers
— Central systems that aggregate data from multiple PLCs and HMIs, provide historical data storage, an…
Scaffolding for the CON position:
— The co-evolutionary model shows that biological and cultural influences are constitutively entangled…
Scaffolding for the PRO position:
— Some components of attraction appear consistently across very different cultural contexts (symmetry …
Scaffolding transfers.
— In teaching, he used formative assessment — checking student understanding throughout the lesson, no…
Scalability
— Support 10 years of historical data - Handle 1000+ plays per week during season - Accommodate additi…
Scalar (spin-0):
— Higgs boson $H$ (mass generation)
Scalar Function
— A UDF that accepts one or more input values and returns a single value. Used inline in SQL expressio…
Scalars, Vectors, and Matrices
— Scalars are denoted by lowercase italic letters: $x$, $y$, $\theta$. - Vectors are denoted by lowerc…
scale
— more parameters, more data, and more compute. The architecture itself changed remarkably little. As …
Scale invariance
— The property of looking the same at every level of magnification; characteristic of fractals, power …
Scale of the Problem:
— By mid-2023, thousands of unique jailbreak prompts had been cataloged - OpenAI acknowledged spending…
scale-free correlations
— the same kind of correlation structure found in systems at the critical point between order and chao…
scale-invariant
— it looks the same at every scale. Zoom in on the small earthquakes and you see the same statistical …
scaled to epistemic influence
— those who have large platforms exercise power over others' beliefs at scale, and this power generate…
Scaling Challenges:
— Finding and retaining qualified testers (the talent market is extremely competitive) - Maintaining q…
Scaling law
— A mathematical relationship between two quantities that holds across many orders of magnitude; revea…
scaling laws
— mathematical relationships that describe how the properties of systems change as they change in size…
SCAMPER
— a systematic method for generating creative alternatives to any existing idea, product, process, or …
Scanner configuration:
— Enable credentialed checks for maximum coverage - Configure appropriate scan policies (aggressive fo…
Scanning activities include:
— **Network scanning:** Identifying live hosts, open ports, and running services (tools: Nmap, Masscan…
Scarcity (influence)
— Cialdini's principle describing the increase in perceived value when supply is limited or opportunit…
Scarcity effect
— The tendency to assign higher value to objects or people that are perceived as rare or in limited su…
scarcity principle
— the cognitive tendency to value things more highly when they are rare or limited — is among the most…
SCARF Trigger Analysis:
— "Unreasonable requirements" → Fairness threat. He may genuinely feel that the workload is unreasonab…
Scattering theory
— Ch 22.1 The formalism for analyzing what happens when a particle interacts with a potential and emer…
Scenario 1: Churn Prediction (Athena Retail Group)
— **True Positive:** Model predicts customer will churn, and she does. Athena sends a retention offer.…
Scenario 1: Normal completion — fresh start.
— Run the program from the beginning. - Verify all records are processed. - Verify the restart table s…
Scenario 2: Fraud Detection (Financial Services)
— **True Positive:** Model flags a fraudulent transaction. The bank blocks it. Loss prevented. - **Fal…
Scenario 3: Failure after first checkpoint.
— Run the program, and after the first or second checkpoint, simulate a failure. - Verify the restart …
Scenario 3: Medical Screening
— **True Positive:** Model identifies a disease. Patient receives treatment early. - **False Positive:…
Scenario 3: Weekly rollup fails
— Daily generations are still available (LIMIT=14 provides 2-week window) - Restart the weekly rollup …
Scenario 4: Failure before first checkpoint.
— Run the program and simulate a failure before the first commit. - Verify the restart table shows RUN…
Scenario 5: Multiple failures.
— Run the program, simulate failure, restart, simulate another failure, restart again. - Verify the pr…
Scenario A: Status Quo
— Continue running everything on z/OS with incremental modernization (API wrapping, CI/CD). - Year 1-1…
Scenario B: Full Cloud Migration
— Rewrite core banking in cloud-native over 7 years. - Year 1-10 total cost: $1.7B (including $680M mi…
Scenario C: Designed Hybrid
— Core transactions stay on z/OS; operational and peripheral workloads migrate to cloud; integration i…
Scenario decomposition:
— Strong Garza (>+6): 28% - Moderate Garza (+3 to +6): 35% - Narrow Garza (0 to +3): 16% - Narrow Whit…
Scenario:
— Week 13 game: Seahawks vs Cardinals - Seahawks coming off Week 12 bye (very late) - Cardinals had no…
Scenario: Email subject line test
— Version A ("Save money on taxes this year"): 1,847 sends, 394 opens (21.3% open rate) - Version B ("…
Schedule adjustment calculation:
— Bye week: +1.2 × 1.0 (standard timing) = **+1.2** - Travel (2 TZ): 2 × 0.2 = **+0.4** - West-to-East…
Schedule Advantages:
— Chiefs: 13 days rest (bye week) - Eagles: 7 days rest (played Sunday) - Game at Arrowhead (high-HFA …
SCHEDULE AN ELECTRICIAN WITHIN A WEEK:
— Frequently tripping breakers (but they reset and stay reset) - Lights flickering in multiple rooms s…
Schedule and Rest Analysis
— examining how bye weeks, short weeks, and schedule strength affect team performance and predictions.
Schedule Context:
— Game in Germany (Frankfurt) - 9:30 AM ET kickoff (2:30 PM local) - Both teams traveling 4,000+ miles…
SCHEDULE ELECTRICIAN WITHIN THE WEEK:
— You've identified a Federal Pacific Stab-Lok or Zinsco panel - You've identified aluminum branch cir…
Schedule-Adjusted Analysis:
— Raw power rating difference: KC +5.0 - Schedule penalty: -2.5 - Road team adjustment: -2.3 - True sp…
Schedule-Adjusted View:
— Both losses came on the road (standard HFA loss) - Jacksonville game: Short week (Thursday), no trav…
Schedule:
— 02:00: Incremental COPY (TSACTTXN, TSAUDIT, TSACCTMS — parallel, 15 min) - 02:15: RUNSTATS with prof…
Scheduling optimization:
— Bye weeks before long trips - West coast timing accommodations - Reduced back-to-back road games
schema
— an organized framework of knowledge that connects new information to existing understanding. Every n…
Schema confirmation
— content that matches expectations perfectly — is easy to process but forgettable. Your brain efficie…
Schema violation
— content that completely breaks expectations — is attention-grabbing but can be confusing or alienati…
schematic representations
— the key features (contour, rhythm, register, character) that allow recognition even when the theme i…
Scheme Adjustments for Quicker Passing
— Hot routes and sight adjustments - RPOs to punish blitzes - Quick screens to get ball in space
Scheme modifications:
— More play-action from under center - Fade routes to larger receivers - Power running plays with pull…
Schmidt rank
— $\lambda_k > 0$ are the **Schmidt coefficients** satisfying $\sum_k \lambda_k^2 = 1$ - The bases $\{…
Schrodinger equation
— Ch 2.1 The fundamental equation of non-relativistic quantum mechanics. Time-dependent: $i\hbar\frac{…
Schumpeter's framework better describes:
— Platform businesses that create new categories (social networks, ride-sharing, streaming) - Technolo…
scientific forestry
— *Normalbaum*, the "normal tree" approach. The concept was elegant in its simplicity. Replace the cha…
scikit-learn
— Machine learning integration - EPA modeling - Prediction applications
Scikit-Learn Documentation
— Official tutorials and examples - API reference - https://scikit-learn.org/stable/
scikit-learn Text Processing
— Text feature extraction - TF-IDF, CountVectorizer - Pipeline integration
scikit-learn, deepened
— You have seen it in action. The next level is cross-validation pipelines, custom transformers, hyper…
scipy
— https://scipy.org - Statistical functions - Optimization - Distribution fitting
SciPy Documentation: `scipy.special.airy`
— [docs.scipy.org](https://docs.scipy.org/doc/scipy/reference/generated/scipy.special.airy.html) Pytho…
SciPy Lecture Notes
— Scientific Python fundamentals - Statistical analysis and signal processing - https://scipy-lectures…
SCLM
— Software Configuration and Library Manager. An older IBM mainframe source code management system, la…
Scope
— Exactly which systems, networks, and applications are in scope - **Timing** — When testing may occur…
Scope and Methodology:
— [ ] All in-scope targets are listed with correct IPs/hostnames - [ ] Out-of-scope items are document…
Scope Creep
— The gradual expansion of a project's requirements beyond the original plan. AI tools can accelerate …
Scope definition
— specifies exactly which systems can be tested; important in healthcare because some medical devices …
Scope Definition:
— In-scope IP addresses, domains, URLs, and applications (explicit listing) - Out-of-scope items (with…
Scope terminator
— A COBOL-85 keyword that explicitly ends a statement: END-IF, END-PERFORM, END-READ, END-EVALUATE, EN…
SCOPING
— [ ] Write scope of work document (by room and system) - [ ] Define include/exclude for each item - […
Score Correlation:
— High-scoring games: both teams elevated - Low-scoring games: both teams depressed - Typical correlat…
Score differential
— Strategies change when leading/trailing 2. **Time remaining** - Late-game plays have different impli…
SCORE Educational Workshops
— score.org/find-workshop SCORE offers free and low-cost workshops on business topics including financ…
Score Interpretation:
— 0–6: Low current risk — continue with structural prevention - 7–14: Moderate risk — implement at lea…
SCORE Mentorship
— score.org SCORE is a nonprofit that provides free business mentorship from retired executives and bu…
Score systems (social credit)
— See *Social credit system.*
Score yourself:
— Problems 1-3 (Statistics): 3 points each - Problems 4-5 (Python): 4 points each - Problems 6-7 (Socc…
Score:
— Meets all 14 criteria: **Architect-ready** — your hybrid architecture is production-grade - Meets 10…
Scoring Breakdown:
— Two-point field goals: 7.2 made per game (14.4 attempts) - Three-point field goals: 1.8 made per gam…
Scoring Guide:
— Section 1 (Multiple Choice): 2 points each (20 points total) - Section 2 (True/False with Justificat…
Scoring indicators:
— 🟢 **Healthy (8-10):** Dissent is actively sought — through red teams, devil's advocates, pre-registe…
Scoring:
— 16/16: Production-ready security architecture - 13-15: Strong design, address gaps before proceeding…
Scotch-Irish
— a term that requires immediate unpacking, because it confuses nearly everyone who encounters it for …
Scotch-Irish (Ulster Scots)
— Descendants of Scottish Lowlanders settled in the Irish province of Ulster in the 1600s who emigrate…
Scotch-Irish sacramental tradition
— a practice, brought to America by Presbyterian settlers from Ulster, of holding multi-day communion …
Scouting Department
— Contribute prospect evaluations - Quantify college performance - Identify analytical red flags
Scraping when an API exists
— check for APIs first. They are always the better option.
Scrapy
— Description: Python framework for building web scrapers. Useful for collecting domain-specific text …
SCRATCHPAD
— Persistent storage allocated by DB2 for table functions to maintain state across OPEN, FETCH, and CL…
SCRATCHPAD 100
— Allocates 100 bytes of persistent storage across calls. Use it to maintain cursor position, counters…
Screen 1 — Member Verification:
— Enter Member ID - Display member name, plan, coverage level for verification - Representative confir…
Screen 1 — Search:
— Employee ID input field - Enter = lookup, PF3 = exit
Screen 2 — Claim Entry:
— Enter: Provider ID, service code, service date, billed amount - Program validates provider exists, s…
Screen 2 — Edit:
— Display employee data with editable fields: name, department, salary, status - Employee ID, hire dat…
Screen 3 — Confirmation:
— Display complete claim summary - Show estimated payment (based on plan rules) - Enter = submit, PF3 …
Screen for physical outliers
— Extreme length - Elite athletic testing - Unique combinations
Screen Metrics:
— Screens set per game - Screen assists (passes leading to scores off screens) - Slip frequency (rolli…
Screen resolution and color depth
— **Installed fonts:** Which fonts are present on the system - **Plugin list:** Which browser plugins …
screening function
— the average number of electrons inside radius $r$. The effective potential is then:
scrip book
— a small booklet issued by the company, from which the store clerk tears coupons as you make purchase…
Script runs manually on your laptop
— where Chapter 23 leaves you 2. **Script uploads its output to cloud storage** — what this chapter co…
script switching
— adjusting their courtship behavior depending on the gender of their current partner, with different …
Script theory (sexual/romantic)
— William Simon and John Gagnon's sociological theory (1973) proposing that sexual and romantic behavi…
SCT02 (Skeleton Cursor Table)
— Contains the executable form of plans (as opposed to packages). Plans are the older binding unit in …
SDV (Synthetic Data Vault)
— Description: Comprehensive library for generating synthetic relational, tabular, and time-series dat…
SE Asia has the widest interval
— with only 11 countries, there's substantial uncertainty. The mean could plausibly be anywhere from a…
seaborn
— Statistical visualization - Heatmaps
Seafarers
— officers and crew operating vessels, with traditions dating back centuries - **Terminal workers** — …
Seagrove pottery tradition
— centered in and around the community of Seagrove in Randolph County — has been producing utilitarian…
Sean Carroll's podcast "Mindscape"
— Episodes on quantum mechanics, Many-Worlds, and decoherence. Carroll is an exceptionally clear expla…
SEARCH
— A COBOL statement that performs a serial (linear) search through a table defined with *OCCURS* and *…
Search advertising
— paid placement in response to specific search queries—is often overlooked in discussions of politica…
SEARCH ALL
— A COBOL statement that performs a binary search through a table, requiring the table to be defined w…
Search and Information Tools
— `grep(pattern, path)`: Search file contents with regex - `web_search(query)`: Search the web for doc…
Search ARGument ABLE
— a predicate is sargable if the database engine can use an index to evaluate it. This is the single m…
Search Engine Journal
— industry publications that follow platform changes closely and whose editorial standards she trusts …
Search for evidence of women's economic activity
— spinning wheels and looms in estate inventories, women's names in store accounts, female property ow…
Search modes (cursor pool):
— By account number (exact match, primary key index) - By customer name (last name exact, first name L…
SEARCH statement
— A COBOL statement for searching a table defined with OCCURS. SEARCH performs a sequential search; SE…
Search tasks by keyword
— case-insensitive using `lower()` 2. **Formatted task display** — aligned columns using f-string form…
Search trend data
— Google Trends, Bing query volumes — has been proposed as a predictor of election outcomes on the the…
searching
— finding a specific item in a collection — and **sorting** — putting items in order.
Searching CT logs:
— **crt.sh**: Free web interface for CT log searching. Query `%.medsecure.com` to find all certificate…
Season Impact:
— Elite special teams: +1.5 to +2.0 wins/season - Average special teams: Neutral - Poor special teams:…
Season Level:
— Total xA correlates with actual assists (r ≈ 0.7) - Over/underperformance regresses to mean
Season projection update:
— Expected wins rest of season: from 7.5 to 4.2 - Playoff probability: from 95% to 45% - Super Bowl od…
Season Totals:
— ML Model: 167/267 = 62.5% - Elo Baseline: 163/267 = 61.0% - Market Lines: 168/267 = 62.9%
Season-Level Data
— One row per team per season - Aggregated totals and averages - Good for year-over-year comparisons -…
Season-Long Pacing:
— Minute management strategies - Rest game decisions - Playoff preparation
seasonal effects
— systematic deviations in performance or betting market behavior that recur at regular intervals. Fro…
Seasonal preparation:
— List of science-related cultural moments for the next 3 months (eclipses, space launches, anniversar…
seasonal round
— a cyclical pattern of movement through the landscape, timed to the availability of specific resource…
Seats-votes curve
— The historical relationship between a party's national vote share and its seat share in a legislatur…
second brain
— a trusted external system for capturing, organizing, and retrieving knowledge — builds on a principl…
Second Half (Games 42-82):
— Role: Starter - Minutes per game: 34 - Net Rating On: +3.2 - On/Off: +4.8
Second Line (Risk/Compliance):
— Who commissions pentests? - Who reviews reports? - Who tracks remediation metrics?
Second quantization
— Ch 34.1 A formulation of quantum mechanics for systems with variable particle number, using creation…
Second quantization approach:
— The state is $|\psi\rangle = |n_1, n_2, n_3, \ldots\rangle$ — a list of occupation numbers. - Antisy…
Second Quarter:
— Minutes 0-6: Second substitution wave - Minutes 6-12: Return of starters, closing lineup
Second Screen Integration
— Detailed play breakdowns - Advanced stats during stoppages
Second Spectrum
— AI-powered sports analysis - NBA official tracking partner - Advanced visualization examples
Second Spectrum / Hawk-Eye
— Optical tracking data for NBA and Premier League. Player and ball position at 25 fps. Powers advance…
Second Spectrum / NFL Next Gen Stats
— Player tracking data - Professional use primarily
Second Spectrum / SkillCorner
— Tracking data providers - Enable position-based xG enhancements
Second Spectrum Engineering Blog
— Insights from NBA tracking provider
Second Spectrum Products:
— Coaching tablets with annotated video - Automated play tagging - Real-time broadcast graphics - Cust…
Second Spectrum Public Releases:
— Occasional academic partnerships - Published research papers
Second Spectrum Research
— Focus: Tracking data defensive applications - Key Content: Off-ball defensive value models
Second Spectrum Set Piece Tracking
— Type: Tracking data provider - Features: Player movement during set pieces
Second Spectrum:
— Optical tracking systems installed in MLS (all stadiums), La Liga (all stadiums), and the Premier Le…
Second-generation immigrants
— the children born in the coalfields to immigrant parents — attended company schools where English wa…
Secondary Data Center (West):
— IBM z16 Model A01, 8 CPs configured as 6 GCPs + 2 zIIPs - Two LPARs: PPAY3 (DR/active for reads) and…
Secondary engagement variables:
— **Smile rate:** Frequency of genuine (Duchenne) smiles directed at others - **Initiation rate:** Num…
Secondary Infektion
— A long-running Russian influence operation documented operating from 2014–2020, characterized by pla…
Secondary Issue: Deep Passing Confidence/Ability
— Deep attempts down 46% - Deep completion rate down 16 percentage points - Deep EPA per attempt down …
Secondary metrics:
— Precision and recall at several probability thresholds - The confusion matrix at the threshold used …
secondary research questions
— these are related questions that emerge naturally from your primary question and that your methods c…
secondary succession
— the recovery of an ecosystem after a disturbance like fire, flood, or logging that leaves soil intac…
secondary traumatic stress
— the vicarious experience of trauma through close contact with trauma survivors.
Secrecy as a structural norm
— the classification system that removed large domains of government activity from democratic accounta…
Secret Base / SB Nation
— Jon Bois football statistics videos - Engaging statistical storytelling - Historical analysis
Secrets management requires active design
— Kubernetes Secrets are base64-encoded, not encrypted by default. Proper Secrets management requires …
Section
— A named block of code in the COBOL Procedure Division consisting of one or more *paragraphs*. Sectio…
Section 10.2: Berry's Phase
— Griffiths provides his characteristically clear and conversational treatment. The proof of the adiab…
Section 1030(a)(5) — Damaging a Computer
— (A) Knowingly causing the transmission of a program, information, code, or command that intentionall…
Section 10: References (no word count)
— All data sources with URLs and access dates - Any external references cited in the analysis - Tools …
SECTION 1: Brand Overview
— Creator name / channel name - In one sentence: what you make and who it is for - In one paragraph: t…
Section 1: Definitions (recall of terms)
— Group 1 (Traditional): 78% average - Group 2 (Outline): 82% average - Group 3 (Sketch-Notes): 75% av…
Section 1: Executive Summary (1 page)
— Final bankroll, ROI, total bets, win rate - One-paragraph summary of what happened - One-paragraph s…
Section 1: Identity and Situation
— Name (fictional, but specific): - Age: - Location and living situation: - Occupation or student stat…
Section 1: Product Brief
— Exact product description (category, material, design, colorways, sizes) - Manufacturing approach: P…
Section 1: Project Overview
— **Project name:** VitraMed Predictive Health Analytics (PHA) Platform v2.0 - **Processing purpose:**…
Section 1: Purpose and Ownership
— What is the ICAAP and who owns it? - How does it differ from a regulatory reporting obligation? - Wh…
Section 1: Title and Abstract (200-300 words)
— A descriptive title (not "Capstone Project" but something specific and interesting) - A brief abstra…
Section 1: Where I Am Now
— Six-dimension scores with brief evidence - Strengths and gaps summary - The one most important impro…
Section 1: Workshop Card
— Title (clear and outcome-forward, e.g., "Build Your First Content Calendar in Two Hours") - Target a…
Section 2.3
— The harmonic oscillator. Covers both algebraic and analytical methods at an introductory level. Grif…
Section 21.3: The Adiabatic Approximation
— Shankar provides a careful proof of the adiabatic theorem with clear physical motivation. While his …
Section 230
— The provision of the U.S. Communications Decency Act (1996) that protects internet platforms from le…
Section 230 reform debates
— Section 230 of the Communications Decency Act shields platforms from liability for most user-generat…
Section 2: Decision-Making Process
— What moderation decisions can a single mod make alone? - What decisions require mod team consultatio…
Section 2: Necessity and Proportionality
— Is the processing necessary to achieve the stated purpose? - Could the same purpose be achieved with…
Section 2: Relationship to Your Topic
— How did they first become interested in this topic? - How much do they already know? What do they ca…
Section 2: Strategy Description (2 pages)
— Detailed description of your betting approach - Models used and their theoretical basis - Staking me…
Section 2: The 30-Day Sprint
— Goal - One habit - Quick win
SECTION 2: Voice
— Voice persona statement (the one sentence, like Maya's "older sister" line) - Three to five tone adj…
Section 3: Inner Life
— What does this person feel proud of? - What are they embarrassed or ashamed about, related to your t…
Section 3: Performance Analysis (3--4 pages)
— All metrics from the table above, with visualizations - Cumulative P&L chart with drawdown overlay -…
Section 3: The 90-Day Plan
— Primary skill investment and goal - New capability to explore - Learning investment
SECTION 3: Visual Identity
— Color palette (with hex codes) - Typography (font names and uses) - Imagery style description - Link…
Section 4.3: Angular Momentum
— Griffiths presents the algebraic theory with his trademark clarity, building up to the eigenvalue sp…
Section 4.4: The WKB (Semiclassical) Approximation
— Sakurai develops WKB from the Hamilton-Jacobi equation perspective, emphasizing the connection to cl…
Section 404 --- Assessment of Internal Controls:
— Access controls around financial data must be documented and tested. - Audit trails must be maintain…
Section 4: Accountability and Review
— How often does the moderation team review its collective decisions for patterns? - Who holds the mod…
SECTION 4: Guardrails and Constraints
— [ ] Input validation: `[How inputs are validated before reaching the prompt]` - [ ] Output filtering…
Section 4: Skill vs. Variance Analysis (2 pages)
— Was your result (good or bad) primarily skill or variance? - Use the binomial test or bootstrap conf…
Section 4: The One-Year Vision
— Written vision (400 words) - Three metrics - Growth path and what progress looks like
SECTION 4: Topic Focus and Values
— Core topic areas you cover (and how they relate to each other) - Topics you explicitly do not cover …
Section 5.1
— Time-independent perturbation theory in Dirac notation, at a somewhat higher level than Griffiths. S…
Section 5.3: Variational Methods
— Sakurai presents the variational method concisely but rigorously, emphasizing the connection to the …
Section 5.4.1
— Second quantization for bosons, briefly introduced in the context of identical particles. Griffiths …
SECTION 5: Audience Relationship
— How you talk to your audience (peer? guide? entertainer?) - What your audience calls themselves (if …
Section 5: Behavioral and Process Review (2 pages)
— Honest assessment of your decision-making discipline - Specific examples of good process (even with …
Section 5: Content Implications
— What kind of content would this person be most likely to watch/read/listen to? - What specific quest…
Section 5: Stakeholder Consultation
— Have data subjects or their representatives been consulted? (If not, why not?) - Has the Data Protec…
Section 5: The Three Commitments
— Start - Stop - Improve
Section 6: Decision and Sign-Off
— [ ] Risks are acceptable after mitigation — proceed - [ ] Risks remain high — escalate to ethics com…
Section 6: Lessons Learned (1--2 pages)
— What are the three most important things you learned? - How has this simulation changed your underst…
SECTION 6: Partnership Guidelines
— Categories of brands you would work with - Categories you will not work with under any circumstances…
Section 6: Review Schedule
— When you'll review this plan (monthly? quarterly?) - What you'll track - How you'll know if you're o…
Section 7.1
— Non-degenerate perturbation theory. Griffiths's presentation is the most accessible introduction at …
Section 7.6
— The quantization of the radiation field. Sakurai develops the field quantization with his typical el…
SECTION 7: The Don'ts
— Content types you do not make - Tonal registers you avoid - Topics that are off-limits - Aesthetic c…
Section 8.1: The WKB Approximation
— Griffiths provides an exceptionally clear and concise development of WKB, including the connection f…
Section 9.2
— Electromagnetic waves: classical treatment of the radiation field. Useful as a review of the classic…
Section 9: Ethical Reflection (300-500 words)
— Who is represented in your data, and who might be missing? - Could your findings be misused? By whom…
Section A: Financial Record
— Total campaign contributions received in their most recent race (use FEC or state equivalent) - Top …
Section A: Overall Philosophy (1 page)
— What is your betting philosophy? (e.g., model-driven, market-driven, hybrid) - Which sports and mark…
Section A: Performance Summary (1 page)
— Current bankroll and ROI - Win rate by sport and market type - Cumulative P&L chart - Comparison to …
Section B: Bankroll Management Plan (1 page)
— What staking method will you use? (Flat bet, percentage, Kelly, fractional Kelly) - Justify your cho…
Section B: Model Assessment (1 page)
— Is your model performing as expected? - Calibration analysis: are your probability estimates accurat…
Section B: Public Statement Record
— At least two public statements on a policy issue where you can document a clear position - At least …
Section C: Model Description (1--2 pages)
— What predictive model(s) will you use? - What data inputs drive your model? - How do you estimate pr…
Section C: Official Record
— For legislators: three votes that you would flag as potentially difficult to defend in a general ele…
Section C: Strategy Adjustments (1 page)
— Based on the data, what will you change for the second half? - Adjustments to staking (increase/decr…
Section D: Process and Discipline (0.5 page)
— Describe your weekly workflow: how will you analyze games, select bets, and record decisions? - What…
sector-specific governance
— the specialized frameworks that govern data in finance, health, and education. These sectors present…
Sector-Specific Requirements
— **HIPAA (health data):** Breach notification to affected individuals within 60 days. Breaches affect…
Sectoral approach
— U.S. model of separate privacy laws for different sectors rather than comprehensive protection
Secure attachment
— An adult attachment style characterized by low anxiety and low avoidance; securely attached individu…
Secure Delivery:
— Encrypt the report (password-protected PDF or PGP-encrypted email) - Send the password via a separat…
SecureFirst (Yuki/Carlos):
— Internal admin tools → Cloud (12 transactions, 200/day — low-volume CICS success story) - Mobile API…
SecureFirst Digital
— A retail bank modernization project wrapping COBOL services behind APIs for a new mobile banking app…
Securing CICS Applications with RACF
— Detailed coverage of CICS-RACF integration, resource-level security, and role-based access control p…
Security
— Role-based access control - Encryption at rest and in transit - Audit logging for sensitive data acc…
Security (Part VI):
— [ ] RACF group and access control design - [ ] Encryption architecture (at rest, in transit, key man…
Security Benefits of Service Meshes:
— Automatic mTLS encrypts all inter-service traffic - Fine-grained access policies control which servi…
Security Characteristics of GraphQL:
— **Single Endpoint:** Typically `/graphql`, making traditional URL-based security rules ineffective. …
Security Characteristics of gRPC:
— **Binary Protocol:** Protocol Buffers are binary-encoded, making manual inspection difficult but not…
Security Characteristics of REST APIs:
— **Stateless:** Each request must contain all information needed for authentication and authorization…
Security Controls:
— WAF (identified above) - SSL/TLS configuration and certificate authority - Security headers - Authen…
Security first
— credential management, then everything else 2. **Correct connections** — authenticated, validated, t…
Security implications of IPv6:
— **Dual-stack configurations:** Many networks run both IPv4 and IPv6 simultaneously. Security control…
Security Incidents
— Ransomware encrypting database files - A malicious insider deliberately corrupting data - SQL inject…
Security Maturity:
— Maturity models help calibrate testing approach and recommendations - Low-maturity organizations nee…
Security Monitoring:
— Splunk Enterprise Security as SIEM, ingesting logs from: CrowdStrike, Palo Alto firewalls, Zscaler, …
Security must be as available as the system
— in an HA architecture, security components (RACF databases, certificates, surrogate definitions) mus…
Security on z/OS
— IBM Redbook SG24-7023 A comprehensive security reference covering RACF, ICSF, AT-TLS, and z/OS commu…
Security Requirements:
— Hash passwords with bcrypt (never store plaintext) - Generate a cryptographically secure email verif…
Security Risks of Service Meshes:
— Increased attack surface through additional control plane components - Misconfigured policies may al…
Security theater
— Surveillance or security measures that are visible and reassuring but that provide little actual sec…
Security:
— `FLASK_DEBUG` is `false` in production - `SECRET_KEY` is a long random string, not a hardcoded defau…
seed savers
— gardeners and small farmers across Appalachia who preserve heirloom plant varieties that have adapte…
seed saving
— preserving heirloom plant varieties that have adapted to Appalachian conditions over generations.
Seek outside help when:
— The pattern is multigenerational and systemic - The family member has significant mental health chal…
Seek PYMK recommendations from diverse corners
— use the "People You May Know" feature, but specifically look for recommendations in industries and f…
Segment
— A defined subset of an audience or customer base grouped by shared characteristics. Segmenting enabl…
Segment assignment
— using the clustering approach from Chapter 9, she identifies seven behavioral segments within the lo…
Segment by time period
— weekday vs. weekend, business hours vs. batch window, month-end vs. mid-month. 3. **Calculate statis…
Segment Labels (sum of R + F + M):
— 10–12: Champions — reward and leverage - 8–9: Loyal Customers — nurture and deepen - 6–7: Potential …
Segment Search Arguments (SSAs):
— Unqualified SSAs specify a segment type name only (9 bytes). - Qualified SSAs add search conditions …
Segmented evaluation
— performance broken down by key dimensions (city, time of day, customer segment), ensuring that a mod…
segregated
— sometimes rigidly, sometimes partially, always deliberately.
SELECT
— A clause in the FILE-CONTROL paragraph that assigns an internal file name (used in the FD and I/O st…
SELECT (Restriction)
— choosing rows that satisfy a condition — corresponds to the SQL **WHERE** clause. 2. **PROJECT (Proj…
Select and compare models
— Mistake: trying only one model, or comparing models on a single train/test split instead of cross-va…
Select base image
— Choose a minimal Linux image (Alpine, Debian slim) with the COBOL compiler/runtime installed - [ ] *…
Select columns
— display only a subset of columns chosen by the user. *(Chapter 8)*
SELECT file-name
— Declares a logical file name that you will use throughout the program. This name appears in FD entri…
Selected Red Flag scores:
— Q3 (Falsifiability): 🟡 — What would disprove the paradigm shift model? Since it describes a general …
Selected Stories:
— Story 1 (Team Workspaces) — core feature, everything else depends on it - Story 5 (Task Templates) —…
Selecting the appropriate medium
— defaulting to in-person for significant confrontations, being clear-eyed about the costs of every st…
Selection bias
— A systematic error introduced by the non-random selection of data or subjects, leading to conclusion…
Selection criteria:
— 25+ PPG - Primary scoring option - Similar playing style (mid-range focused, iso-heavy) - Perimeter-…
selection problem
— fact-checkers must choose which claims to investigate from among far more claims than they can check…
Selection rule
— A constraint on matrix elements derived from symmetry, specifying which transitions are forbidden.
selection rules
— not all transitions are permitted. For an electron in an atom, the selection rules for electric dipo…
selective attention
— the ability to focus on one input while ignoring others. Your attention works like a spotlight on a …
selective documentation
— is one of the most insidious tools in the construction of regional stereotypes. It does not require …
Selective exposure
— The tendency of individuals to seek out and consume information that confirms their existing beliefs…
Selective inaccessibility can increase attraction
— when the other person perceives that you are hard to get *generally* but specifically interested in …
selective sharing
— the idea that emotional authenticity (vulnerability about creative struggles, doubts, growth, values…
Selenium / Playwright
— Description: Browser automation tools for scraping JavaScript-rendered pages. - Chapters: 28.
Self prompts:
— Is the person I'm being today consistent with the person I want to be? - Whose voice is the critical…
Self-assessment — you should be able to:
— [ ] Draw a z/OS address space diagram from memory, labeling system region, private region, and commo…
Self-attention:
— $\mathbf{Q}$, $\mathbf{K}$, $\mathbf{V}$: all derived from the *same* input sequence, typically thro…
Self-awareness
— in conflict contexts, the capacity to know your triggers, patterns, blind spots, and impact with acc…
self-blame
— people who work extremely hard and don't break through conclude they are personally deficient, when …
Self-Categorization Theory
— Turner's extension of Social Identity Theory proposing that the level of identity salience (personal…
Self-check before delivering:
— [ ] Does the Observation contain only observable behaviors? (No "attitude," "disrespect," or other e…
Self-closing AND self-latching
— test yours right now - **Penetrations:** All pipes, wires, ducts through separation wall must be fir…
Self-compassion
— Neff's three-component construct: self-kindness (treating oneself with care rather than harsh critic…
Self-compassion and relapse
— Neff and Homan's research: treating oneself with kindness after a behavioral setback reduces subsequ…
Self-concept clarity
— The extent to which self-beliefs are clearly and consistently defined; associated with psychological…
Self-concept differentiation
— having a self-concept that is rich and diverse, with multiple important domains rather than centrall…
self-consistency
— for behavior, feedback, and experience to align with existing self-concept. This creates a conservat…
Self-construal
— Markus and Kitayama's framework distinguishing independent self-construal (bounded, autonomous self)…
Self-contained examples
— each code file can be run independently - **Progressive framework usage:** NumPy (Ch 1–10) → PyTorch…
self-correction illusion
— is itself a failure mode. It is the revision myth (Chapter 20) applied to the institution's correcti…
Self-defeating humor
— Excessive self-deprecation used for social ingratiation; associated with lower perceived social stat…
Self-determination theory (SDT)
— Deci and Ryan's motivational framework proposing that autonomy, competence, and relatedness are univ…
self-differentiation work
— the deliberate, often therapeutic, effort to understand one's family emotional system and to remain …
Self-disclosure
— The act of sharing personal information with another person; in relationship formation, gradual mutu…
Self-efficacy
— Bandura's concept of the belief in one's capacity to execute the behaviors required to produce speci…
Self-Employment Tax
— The combined Social Security and Medicare tax paid by self-employed individuals, covering both the e…
Self-enhancing humor
— The ability to maintain a positive or amused perspective in difficult circumstances; associated with…
Self-esteem
— A person's overall evaluation of their own worth; sociometer theory (Leary & Baumeister) proposes th…
Self-expansion model
— Aron & Aron's theory that attraction is motivated partly by the prospect of incorporating a new pers…
Self-fulfilling prophecy
— A belief that causes itself to become true through the behavior it triggers. Positive expectations o…
Self-Instruct / Evol-Instruct
— Description: Methods for using a strong LLM to generate instruction-response pairs, optionally evolv…
self-join
— the enrollments table is joined with itself, using different aliases (`e1` and `e2`). The `WHERE` cl…
Self-kindness
— When I fail or fall short, I treat myself with the warmth I would offer a friend in the same situati…
self-monitoring
— a background process of attention in which the speaker constantly evaluates their own speech for fea…
Self-objectification
— The internalization of an observer's perspective on one's body, leading to ongoing self-monitoring o…
Self-organization
— The spontaneous emergence of order from the interactions of components without external direction or…
Self-organized criticality
— Per Bak's concept that many complex systems naturally evolve toward a critical state where small per…
self-presentation
— and skilled listeners evaluate not just the content of the stories but the *way* they are told.
self-regulated learning
— the ability to plan, monitor, and adjust your own learning process. Self-regulated learners don't ju…
Self-regulation
— The capacity to govern attention, emotion, and behavior in the service of goals; includes cognitive,…
self-reliance
— the conviction that communities and individuals should take care of themselves rather than depending…
Self-report measures
— surveys, questionnaires, rating scales — are cheap, scalable, and give direct access to subjective e…
self-schemas
— cognitive generalizations about the self in specific domains. If you consider yourself "an athletic …
Self-serving attribution
— crediting successes to skill and failures to bad luck — operates asymmetrically and systematically d…
self-sufficiency myth
— the idea that early Appalachian settlers lived entirely outside market economies, producing everythi…
Self-Supervised Learning
— He, K., et al. (2020). "Momentum Contrast for Unsupervised Visual Representation Learning." CVPR.
self-testing
— deliberately quizzing yourself on material you're trying to learn, not because someone assigned a te…
Semantic memory
— memory for general knowledge: facts, concepts, meanings, and rules that are not tied to specific per…
Semantic Scholar
— semanticscholar.org Academic search engine covering 200M+ papers. Best for citation discovery and li…
semantics
— using elements that describe the meaning of the content, not just its appearance.
Semester 2 (Parts IV-VI, Chapters 17-32):
— Chapters 17-22 are the approximation methods that constitute the working toolkit of a practicing phy…
semi-classical approximation
— actually works surprisingly well for many phenomena, including the photoelectric effect and stimulat…
Semi-supervised learning
— Use unsupervised clustering to propagate labels. If you have a small set of labeled examples and a l…
Semmelweis reflex
— the tendency to reject new knowledge because it contradicts established beliefs.
Senescence
— The process of aging and deterioration in biological organisms; extended as a pattern to institution…
Senior (8-15 years experience):
— Financial services: $130,000 - $175,000 - Government: $100,000 - $135,000 - Insurance: $115,000 - $1…
Senior level (8+ years experience):
— Campaign analytics leadership at major national campaign: $150,000-$200,000+ - Polling firm founder/…
Senior management approval
— EDD package summary prepared by compliance - Review and approval required from: Chief Compliance Off…
SenseTime and Megvii (Face++)
— Chinese AI companies whose facial recognition software powers aspects of the Xinjiang system — were …
sensitive
— more attuned to their infant's signals, more contingently responsive, more comfortable with the full…
Sensitive data categories
— religious affiliation, health information, financial distress indicators, precise location history —…
Sensitive to negation in simple cases
— "not bad" scores slightly positive — but it struggles with complex negation like "I wouldn't say it …
Sensitive topics:
— [ ] Have sensitive questions been designed to minimize social desirability bias? - [ ] Have sensitiv…
Sensitivity analysis
— Systematic variation of model parameters to identify which assumptions most strongly influence the o…
Sensor
— something that measures the current state; (2) **Reference signal** — the desired state or target; (…
Sensory amplification
— specialized microphones and close-up filming amplify eating sounds beyond natural volume, pushing th…
sensory processing and reward circuits
— the visual cortex, auditory cortex, and dopamine system. It does NOT strongly activate the **languag…
Sensory reward
— The art process itself provides visual and auditory satisfaction: brushstrokes, color mixing, the em…
sentdex
— Data science with Python - Machine learning tutorials - Practical projects
Sentiment analysis
— computational methods for detecting and measuring emotional valence in text — allows researchers and…
Sentiment Features:
— `sentiment_mean_1h`: Average sentiment of articles in the past 1 hour. - `sentiment_mean_24h`: Avera…
sentinel value
— a special value that signals the end of data. In COBOL, HIGH-VALUES (x'FF...') and LOW-VALUES (x'00.…
SentiWordNet
— Word-level sentiment scores - English lexicon
SEO (Search Engine Optimization)
— The practice of structuring content to rank higher in search results, driving organic discovery. SEO…
Separable state
— Ch 11.4 A state of a composite system that can be written as a product: $|\psi_{AB}\rangle = |\phi_A…
Separate buffer pool for batch
— BP2 for batch access, BP0 for CICS, preventing batch sequential prefetch from flushing CICS's hot pa…
Separate devices/accounts for sensitive activities
— a separate browser profile or device for activism, journalism, or other high-risk activities.
Separate long emotional messages into paragraphs
— wall-of-text formatting communicates urgency or emotional flooding regardless of content.
Separate repositories
— frontend and backend in different repositories, deployed independently.
Separation (acculturation)
— Berry's acculturation strategy in which cultural heritage is maintained and the new cultural context…
Separation Data
— Tracking-based metrics - Coverage tightness measurement - Next Gen Stats applications
separation of concerns
— A software design principle: keep business logic (calculations) separate from presentation logic (fo…
separation of variables
— allows us to reduce it to a simpler equation in many important cases.
September 2017
— School districts in several US cities send home notices to parents about Snap Map, advising teenager…
September:
— Schedule HVAC heating service (October appointment) - Order weatherstripping materials for annual re…
Septic-Specific Checks (if applicable)
— Date of last pump-out: _______________ - Pump-out interval recommended by your service provider: ___…
sequence
— it has no notion of order. Positional encodings inject position information into the token represent…
Sequence speed
— measured as meters progressed per second -- distinguishes fast transitions from patient build-up. Co…
Sequential composition
— Output of tool A becomes input for tool B 2. **Parallel composition** — Tools A and B run simultaneo…
Sequential File
— A file in which records are stored and accessed in the order they were written. The simplest and mos…
Sequential Files:
— **TXNINPUT** -- Daily transaction input file (input to batch processing). - **STMTFILE** -- Statemen…
Sequential input repositioning:
— Same skip-forward approach as STEP020.
Sequential output handling
— how POST.AUDIT is managed on restart g) **Termination paragraph** that marks the run as complete
sequential palette
— A color palette that varies in intensity along a single hue, used to represent magnitude from low to…
Sequential read
— read the next occupied record:
Sequential testing
— running Price A for a period, then Price B for a comparable period — avoids the simultaneous exposur…
Sequoyah
— known in English as George Gist or George Guess — was born around 1770 in the Cherokee town of Tuske…
seral stages
— each characterized by a different community of species, each creating conditions that favor the next…
Serendipity antenna
— Christian Busch's metaphor for the receptive orientation that increases the probability of serendipi…
serendipity antennae
— the attentional posture that notices the unexpected interesting thing even while dealing with the fa…
serendipity budget
— a deliberate allocation of time and resources specifically to high-luck environment exposure — is no…
Serendipity engineering
— The practice of deliberately designing one's environment, behaviors, and social exposure to increase…
serendipity filter
— the interpretive step where you decide whether an unexpected input is worth pursuing.
serendipity hooks
— statements, behaviors, or questions that make it more likely for productive accidents to be triggere…
Serendipity science
— a newer field — has begun mapping the conditions under which fortuitous discoveries and connections …
serendipity triggers
— behaviors that don't guarantee specific serendipitous outcomes but significantly increase the probab…
Serialism
— A compositional technique in which a fixed ordered sequence (a tone row or series) of the twelve pit…
Serialized:
— Commitment level: High — episodes must be watched sequentially; new viewers must start from Episode …
Series
— a one-dimensional array with labels:
Series:
— **Book 1:** *Learning COBOL Programming* --- The Foundation - **Book 2:** *Intermediate COBOL: Beyon…
Serious Cryptography
— Jean-Philippe Aumasson. Practical cryptography for security professionals. Complements Chapter 28.
Serious delinquency
— The consumer has one or more accounts with payments 90+ days past due. 2. **Proportion of balances t…
SERVER
— Client sends user ID and password; DB2 (via RACF) authenticates - **CLIENT** — DB2 trusts the client…
Server Infrastructure:
— Windows Active Directory domain (MEDSECURE.LOCAL) with approximately 200 servers - Windows Server 20…
Server instantiation
— Creating a `Server` object with a name that identifies it. 2. **Tool listing** — Implementing a hand…
server.xml
— Liberty server configuration including: - Feature list (z/OS Connect, CICS service provider, MQ serv…
Serverless
— A cloud computing model where the cloud provider manages the infrastructure and automatically scales…
Serves:
— Query B: MATCHCOLS=2 (ACCOUNT_ID equality, TRAN_DATE range). TRAN_TIME in key enables sort avoidance…
Service A: Order Service
— Create, read, update orders - Validates product availability by calling Service B - Publishes order …
Service Account
— a bot identity for your script, separate from your personal Google account. Go to IAM and Admin, the…
Service Archive (.sar)
— A deployable unit that contains the mapping between the API's JSON structures and the backend's data…
Service archive specifications
— For each of the six API operations, document: - Service archive name and description - Backend type …
Service B: Inventory Service
— Manages product inventory - Reserves and releases inventory - Responds to availability checks from S…
service contract
— not insurance. This distinction matters enormously. Insurance covers sudden, unforeseen losses. A ho…
Service Provider
— A connector that knows how to communicate with a specific backend. The CICS service provider invokes…
Service selection justification
— extraction scorecard with scores and rationale 2. **Seam analysis** — where are the clean extraction…
session
— a dictionary stored on the client as a signed, encrypted cookie. As long as your `SECRET_KEY` is kep…
Session 1 (Monday, 2 hours):
— 40 minutes on Passage A: she plays it repeatedly, slowly at first, gradually increasing tempo. By re…
Session 1 — Course Introduction
— Reading due: Preface, How to Use This Book - In class: Course overview, learning path selection, "Fr…
Session 12 — Chapter 10: Bayesian Reasoning
— Reading due: Chapter 10 (full chapter) - Discussion: How do you update your beliefs in your field? W…
Session 12 — Midterm Essay (in class or take-home)
— **Midterm Essay prompt:** "Select a system you know well (an organization, a technology, a community…
Session 13 — Chapter 24: The Adjacent Possible
— Reading due: Chapter 24 - Discussion: Why innovations appear "when the time is right"; what is in th…
Session 14 — Chapter 13: Annealing and Shaking
— Reading due: Chapter 13 (full chapter) - Discussion: How do organizations "anneal"? What counts as p…
Session 14 — Chapter 29: Scaling Laws
— Reading due: Chapter 29 - Discussion: How things change when they grow; why organizations, cities, a…
Session 16 — Chapter 37: Survivorship Bias
— Reading due: Chapter 37 - Discussion: What the survivors cannot tell you; how success stories system…
Session 16 — Midterm Exam
— **Midterm Exam: Covers Chapters 1-15** (see `additional-assessments/midterm-exam.md`) - Format: Mult…
Session 17 — Chapter 42: The Pattern Atlas
— Reading due: Chapter 42 - Discussion: How do all the patterns relate to each other? Which clusters e…
Session 19 — Capstone Presentations (Group 1)
— Half the class presents capstone projects (10 minutes each + 5 minutes Q&A) - Capstone format: Analy…
Session 2 — Chapter 1: The View From Everywhere
— Reading due: Chapter 1 (full chapter) - Discussion: What is a cross-domain pattern? How does structu…
Session 2 — Chapter 2: Feedback Loops
— Reading due: Chapter 2 - Discussion: Positive and negative feedback across domains; the thermostat a…
Session 3 — Chapter 2: Feedback Loops
— Reading due: Chapter 2 (full chapter + Case Study 1) - Discussion: Positive vs. negative feedback; t…
Session 3 — Chapter 3: Emergence
— Reading due: Chapter 3 - Discussion: Why the whole is more than the sum of its parts; weak vs. stron…
Session 4 — Chapter 3: Emergence
— Reading due: Chapter 3 (full chapter + Case Study 1) - Discussion: Can emergence be "real" if it is …
Session 4 — Chapter 4: Power Laws and Fat Tails
— Reading due: Chapter 4 - Discussion: Mediocristan vs. Extremistan; where Gaussian assumptions fail -…
Session 5 — Chapter 4: Power Laws and Fat Tails
— Reading due: Chapter 4 (full chapter) - Discussion: Where do your field's assumptions about "normal"…
Session 5 — Chapter 5: Phase Transitions
— Reading due: Chapter 5 - Discussion: Sudden qualitative change; tipping points; early warning signal…
Session 6 — Chapter 5: Phase Transitions
— Reading due: Chapter 5 (full chapter + Case Study 1) - Discussion: Can you identify a phase transiti…
Session 6 — Chapter 6: Signal and Noise
— Reading due: Chapter 6 - Discussion: The sensitivity-specificity tradeoff; signal detection across d…
Session 7 — Chapter 6: Signal and Noise
— Reading due: Chapter 6 (full chapter) - Discussion: Sensitivity vs. specificity tradeoffs; where doe…
Session 8 — Part I Review and Synthesis
— Reading due: Review all Part I key takeaways - Discussion: How do the six foundation patterns relate…
Session 9 — Chapter 7: Gradient Descent
— Reading due: Chapter 7 (full chapter) - Discussion: Local optima in career decisions, organizational…
SET
— A COBOL statement with multiple uses: SET index-name (table processing), SET condition-name TO TRUE …
Set a time limit
— `START TRACE(PERFM) ... TIMED(5)` stops after 5 minutes 5. **Coordinate with systems programmers** t…
Set and enforce responsible gambling limits
— loss thresholds, session constraints, and cooling-off triggers --- backed by mathematical analysis o…
Set Boundaries, Find Peace
— Nedra Tawwab's book on boundary-setting, written specifically with Black women in mind but widely ap…
Set Boundaries:
— Define "off" hours where you do not read security news or practice - Do not feel obligated to know e…
Set Piece
— A restart of play from a dead-ball situation: corners, free kicks, throw-ins, goal kicks, and penalt…
Set Piece Analysis Series
— StatsBomb - Corner and free kick analysis - xA from set pieces - Design and execution
Set Piece Coaching Tutorials
— Platform: Various coaching platforms - Focus: Practical training implementation
Set pieces account for 25-35% of goals
— a significant portion of scoring 2. **Throw-ins are most frequent** but corners/free kicks have high…
Set random seeds everywhere
— different results each run without them. 2. **Record library versions** — different scikit-learn ver…
Set up and use a Jupyter notebook
— students need this working by the end of class to stay on pace. 2. **Perform basic pandas operations…
Set up automated dependency update checks
— Use Dependabot or Renovate to create PRs for dependency updates weekly, catching conflicts early whe…
Sets and Indices
— Sets are denoted by calligraphic uppercase letters: $\mathcal{S}$, $\mathcal{T}$, $\mathcal{P}$. - T…
Settlement Date Determination
— Given a trade date and a settlement convention (T+1, T+2, T+3), compute the settlement date using bu…
Setup (from Washington's expanded dataset):
— The base rate of re-offense in the studied population is 20%: $P(\text{re-offense}) = 0.20$. - The a…
Setup (imagine 100,000 people):
— 100 have the disease (1 in 1,000) - 99,900 do not have the disease
Setup efficiency
— Lighting, camera, and audio setup takes the same time whether you film one video or five. Batching a…
setup-punchline structure
— building an expectation through the setup, then violating it with the "punchline" (which, in this ca…
Setup:
— Input: **x** (shape: n_0 x 1) - Hidden layer: **W**^[1] (shape: n_1 x n_0), **b**^[1] (shape: n_1 x …
several thousand
— and that excludes the continuous background data collection by their phone's operating system, adver…
Severance taxes
— taxes levied on the extraction of natural resources — were either nonexistent or set at rates far be…
severely endangered
— a language with so few speakers that its survival beyond the current generation is not assured witho…
Severity estimation:
— If the feared outcome occurred, how bad would it be on a 0–10 scale? ___ - How long would the impact…
Severity levels
— with `print()`, all messages look the same; with `logging`, a `WARNING` is visually distinct from `D…
Severity levels:
— **Mild:** 4-5 criteria met - **Moderate:** 6-7 criteria met - **Severe:** 8-9 criteria met
Severity of conditions
— Even aggressive adjustments weren't enough 2. **Both teams' struggles** - Expected Bills to perform …
sex recession
— The documented trend, observable in GSS data from the 2010s onward, of declining rates of sexual act…
sexual double standard
— The norm by which sexually active men are treated more positively than equally sexually active women…
Sexual fluidity
— Lisa Diamond's term for the capacity for variation in sexual attraction over time, context, and rela…
sexual script
— The culturally learned set of expectations about how sexual interactions should proceed, who should …
Sexual selection
— the evolutionary mechanism by which traits that enhance mating success are differentially passed on,…
SG24-6503: "Developing SQL and External Routines"
— Step-by-step guide for creating SQL and external stored procedures and functions on DB2 for z/OS, wi…
SG24-8077: "DB2 11 for z/OS Technical Overview"
— Covers SQL PL enhancements in DB2 11, including array support, new handler capabilities, and perform…
SG24-8418: "IBM Event Streams (Kafka) on z/OS"
— Guide to running Kafka on z/OS for event-driven architectures with DB2, including CDC integration pa…
SG24-8481: "z/OS Connect Enterprise Edition V3"
— Step-by-step implementation guide for z/OS Connect, including real-world examples of exposing DB2 st…
SG: Off the Tee (SG:OTT)
— Driving performance, tee shots on par 4s and par 5s 2. **SG: Approach (SG:APP)** --- Approach shots …
Shadow analysis
— Using the direction and length of shadows in images to determine approximate time of day and season.
Shadow Ban
— The practice of a platform algorithmically suppressing a creator's content without notification, red…
Shadow copybooks
— The same name in multiple libraries; concatenation order determines which version the compiler uses.
Shadow profile
— A profile constructed and maintained by a platform about an individual who has not registered for or…
Shadowing is particularly effective for:
— Organizational knowledge (how decisions are made, who to contact) - Vendor relationship management (…
shallow copies
— they copy the list itself but not the objects *inside* it. For nested lists, this matters:
Shallow processing
— interacting with surface features, not meaning 2. **Fluency illusion** — ease of reading is misinter…
Shame
— Jade's default response in family conflict — is particularly complex. Shame says: I am fundamentally…
SHAP
— https://github.com/slundberg/shap - Model interpretation library - Essential for explaining predicti…
Shape
— Is it symmetric? Skewed? How many peaks? 2. **Center** — Where is the "middle" of the data? 3. **Spr…
Shape arithmetic:
— Melting a table with R rows and C value columns produces R x C rows - Pivoting reduces rows by the n…
Shape-note singing
— a system of musical notation in which the shape of each note indicates its pitch within the scale — …
Shapley values
— a method for fairly distributing the "payout" of a cooperative game among players — to feature attri…
Share
— copy and redistribute the material in any medium or format - **Adapt** --- remix, transform, and bui…
SHARE Association
— https://www.share.org/ — Professional community for mainframe users, with conferences, webinars, and…
SHARE Association (share.org)
— The premier z/OS user group. Annual conferences include multiple sessions on automation, REXX progra…
SHARE Conference
— The SHARE user group (share.org) hosts mainframe-focused sessions, including DB2 migration planning …
SHARE Conference Proceedings
— https://www.share.org SHARE, the oldest and largest IBM user group, publishes conference presentatio…
SHARE Conference — CICS Performance Track
— The annual SHARE conference includes dedicated sessions on CICS performance tuning, THREADSAFE conve…
SHARE Conference — CICS Recovery Track
— Annual presentations on CICS recovery architecture, testing methodologies, and real-world incident a…
SHARE Conference — CICS Track
— The annual SHARE conference includes a dedicated CICS track with presentations from IBM CICS develop…
SHARE Conference — CICS Web Services Track
— Annual presentations from IBM CICS architects and enterprise customers on web service implementation…
Share Options
— critical for production:
SHARE Presentations on CICS Security
— The SHARE user group archive contains numerous presentations from mainframe security practitioners. …
Share Rate
— The percentage of viewers who share a piece of content. The highest-quality engagement signal: shari…
Share triggers:
— Which of Berger's STEPPS is most active? (Social currency, Triggers, Emotion, Public, Practical Valu…
Share with AI
— ask what seems wrong given the observed state 4. **AI suggests** what to inspect next 5. **Step thro…
share.org
— SHARE sessions cover DB2 optimizer topics in the context of z/OS system-level performance. Presentat…
shared audience values
— Different format, but **shared audience demographics** - Different platform strength, but **shared a…
Shared Elements
— Title format (if coordinating): _______________ - Hashtags (if coordinating): _______________ - Any …
Shared experience simulation
— Humans evolved to process experiences collectively. Watching alone feels incomplete; the reactor bec…
shared informational infrastructure
— common facts, sources, and experiences that people across the political spectrum can engage with. Pu…
shared laughter
— genuine mutual amusement that arises from something both people find funny — and **performed humor**…
Shared meaning matters
— couples who have deliberately constructed shared rituals and narratives report higher satisfaction a…
shared meaning systems
— the rituals, symbols, and narratives that a couple builds over time and that constitute the culture …
Shared responsibilities with rotation:
— Discord moderation: Priya and Destiny on alternating weeks - Social media reposts: Theo (for clips h…
Sharing-as-endorsement heuristic
— The cognitive shortcut by which recipients of shared content treat the act of sharing as an implicit…
Sharp Characteristics:
— Large bet sizes - Early week action - Move lines with their bets - Positive CLV track record
sharp power
— The National Endowment for Democracy's term for the Chinese approach to international influence: not…
shell middens
— massive accumulations of discarded mussel shells, mixed with ash, bone, and other refuse, that built…
Shelton Laurel massacre
— Confederate soldiers execute thirteen suspected Unionist men and boys in Madison County, NC, the you…
Sherron Watkins (Enron, 2001)
— Internal corporate whistleblower; the legal response was SOX 2. **Edward Snowden (NSA, 2013)** — Nat…
Shidduch
— The matchmaking system in Orthodox Jewish communities, involving community members or professional m…
Shift+Enter
— **(C)** Press **Ctrl+N** - **(D)** Press **Insert** on your keyboard
Shimcache / Amcache:
— **Shimcache (AppCompatCache):** Records executables that Windows evaluated for compatibility. Locate…
Shingle condition
— uniform color and texture vs. patches of darker or lighter coloring, which can indicate moisture abs…
Shingles:
— Missing shingles (obvious gaps in the field) - Curling shingles — if the corners of shingles turn up…
Shooting
— Shot distance - Closest defender distance - Touch time before shot
Shooting (17.6% 3PT, 68.6% FT)
— Poor shooting indicators - Traditional stretch-4 role unlikely
ShopStack
— serve as running examples throughout the entire book. You'll conduct reconnaissance on MedSecure in …
ShopStack Examples:
— Default credentials on the PostgreSQL admin interface - Directory listing enabled on the static file…
ShopStack Testing Points:
— Credential stuffing resistance (rate limiting, CAPTCHA) - Password policy enforcement - Session fixa…
short story
— A **television series** (analyze 3–5 key episodes or a season arc, not the entire run) - A **song** …
Short Yardage Analytics
— Formation tendencies - Personnel grouping impact - Success rate by play type
Short-cycling check:
— With the pump running and the system refilling, listen to how frequently the pump cycles on and off.…
Short-Form Video
— Video content typically under 90 seconds, designed for mobile consumption on platforms like TikTok, …
Short-form video interventions
— brief (60–90 second) videos explaining a single manipulation technique with example — produce modera…
Short-term (2025-2027):
— Expansion of Kalshi and other DCMs into new event categories - Implementation of MiCA for European c…
Short-term (Weeks 3-6):
— DEBT-001: Standardize on one database access pattern - DEBT-002: Standardize error handling with cus…
Shortfall: 120 alerts per week
— the team can only review approximately 49% of the expected alert volume. This is a material capacity…
Shoshana Zuboff
— *The Age of Surveillance Capitalism* (2019); theorized behavioral data as raw material in a new econ…
shoshin
— "beginner's mind" — refers to the attitude of openness, eagerness, and lack of preconception that a …
shot noise
— photon counting fluctuations that scale as $1/\sqrt{\bar{n}}$. At high laser power, the sensitivity …
Shot on Target
— A shot that would enter the goal if not saved by the goalkeeper. Not all shots with high xG are on t…
Shot Quality Created
— Assists counted equally regardless of shot difficulty - Did not capture screens set or gravity creat…
Shot-Creating Action (SCA)
— Any offensive action in the two actions preceding a shot attempt.
Should Rose have been playing?
— Bulls were up 17 points with 1:22 remaining - Game was effectively decided - Playoff series context:…
Show Notes Outline
— What links will you include in the show notes? - What is the one most important thing you want liste…
Show the investment
— time, money, effort already committed 2. **Make it personal** — "this is for my mom's birthday" 3. *…
Show-Don't-Tell
— Demonstrate the concept visually instead of describing it. Best for: physical phenomena, surprising …
Shower:
— Showerhead rough-in: typically 80" from the floor to the center of the showerhead outlet - Shower va…
Shrink
— This is the most common case. The simple regression coefficient was "bloated" because it included th…
SHRLEVEL CHANGE
— Allows both read and write access during the copy. The copy includes pages modified during the copy …
SHRLEVEL REFERENCE
— Allows read access during the copy. The tablespace is drained of writers at the start, the copy is t…
Sid Hatfield
— no close relation to the feuding Hatfields of a generation earlier, though the coincidence of the na…
Side Hustle
— Supplemental income-generating work performed outside of a primary job. Many creators begin as side …
sideblog
— A secondary Tumblr blog attached to a primary account; many fans maintain fandom-specific sideblogs …
SIFT
— A digital media literacy framework: Stop, Investigate the Source, Find Better Coverage, Trace Claims…
SIFT method
— A four-move web verification framework: Stop, Investigate the source, Find better coverage, Trace cl…
sifting property
— the delta function "sifts out" the value of $f$ at $x = a$.
SIGINT (Signals Intelligence)
— Intelligence gathered by intercepting electronic signals, including communications (COMINT) and non-…
Sigma-delta conversion
— the architecture used in virtually every modern ADC and DAC — achieves high dynamic range through ov…
Sign overpunch
— An *EBCDIC* convention where the sign of a numeric display item is stored in the high nibble of the …
Sign-on Security
— authenticating users entering the CICS region 2. **Transaction Security** — controlling who can exec…
Signal
— Meaningful information embedded in a background of noise; detecting genuine signals is a universal c…
Signal 1 (Week 8, Convention Bounce):
— Convention drove price to 0.62, exceeding the upper band at 0.60 - Volume was elevated but driven by…
Signal 1: Historical trend extrapolation
— what does her 30-month revenue history say about the next 6 months?
Signal 2 (Week 11):
— Z-score of -1.8 did not exceed the 2.0 threshold. No trade.
Signal 2: Pipeline-based forecast
— what does her current project list plus historical new business win rate say about the next 6 months…
Signal 3 (Week 17, Post-Debate Spike):
— Debate win drove price to 0.63, exceeding the upper band at 0.60 - Bought NO at 0.37 - Price reverte…
Signal 3: Athletic Profile
— Lane agility: Top 10% for forwards - Vertical: Above average - Sprint: Elite - Combined with length …
Signal 3: Free Throw Percentage
— 75.7% FT in 2013-14 - Improved to 80%+ the following year - Indicated shooting touch that would tran…
Signal 4 (Week 20, Scandal Drop):
— Scandal drove price from 0.59 to 0.48, well below the lower band at 0.50 - Volume was extremely high…
Signal 5 (Week 21, Continued Scandal):
— Price at 0.45, Z-score -3.2. Extremely oversold. - Volume starting to decline (scandal becoming old …
Signal and Noise
— the challenge of detecting meaningful patterns in the presence of randomness. Phase transitions will…
Signal Collector
— gathered metrics (from Prometheus), logs (from Elasticsearch), and health check results (from the sy…
signal misreading
— particularly the finding that heterosexual men, on average, tend to interpret friendly behavior from…
Signal specifically
— use your LinkedIn headline, summary, and posts to communicate what you're working on, what you're lo…
Signal-to-noise ratio (SNR)
— The ratio of meaningful information to background noise in a communication channel or dataset; a mea…
Signals the algorithm tracks:
— Watch time (total and percentage) - Completion rate - Share rate - "Watch next" behavior (did they w…
Signature devices:
— Opening each chapter with a vivid scene involving one or more characters - "Myth vs. Reality" boxes …
Signature framings:
— "The question is not whether platforms are manipulative — it's how, to what degree, and what we can …
Signature moves:
— Open chapters with a scene, not a definition - Use "we" to include reader in inquiry; shift to "you"…
Signature of layering:
— Multiple orders placed within a short time window on the same side (e.g., buy side) at different but…
Significance Quest Theory
— Arie Kruglanski's empirically supported framework finding that people join violent extremist movemen…
Significant media coverage
— the campaign was covered by major business, technology, and marketing publications, generating an es…
Signs a furnace is reaching end of life:
— Age over 15 years with increasing repair frequency - Escalating utility bills without colder weather…
Signs it may be genuine decline:
— Performance was stable before declining - Decline goes well below the historical average - An identi…
Signs it's regression:
— The initial peak was dramatically above historical baseline - The drop returns performance toward th…
Signs of a failing sewer line:
— Multiple drains backing up simultaneously (a single slow drain is usually a local clog; multiple dra…
Signs of genuine agreement:
— Both parties can articulate the specific behavioral change in their own words - Both parties have st…
Signs of heat exchanger problems
— some of which you may be able to observe yourself:
Signs of Moisture and Pest Activity
— Any staining on the roof sheathing (dark patches, discoloration): _______________ - Any daylight vis…
Signs of overfitting:
— Training accuracy >> test accuracy (gap > 10-15%) - Test score varies wildly across cross-validation…
Signs of pump failure:
— No water at all (motor failure, or pump running dry because the well is low) - Pump runs constantly …
Signs the drop is regression to the mean:
— The initial peak was at an extreme — dramatically above the historical baseline - There was no ident…
Signs the drop may be genuine decline:
— Performance was stable for a long time before declining - The decline continues well below the histo…
Signs you're outsourcing rather than supporting:
— You're framing the prompt as "What should I do?" rather than "Help me think through X" - You're acce…
Signs you've hit the editing bottleneck:
— You're consistently publishing late because editing runs over - You've published less frequently tha…
Signs your conversation is too long:
— The AI starts "forgetting" requirements you stated earlier. - Responses become inconsistent with ear…
Signs your pressure tank is failing:
— The pump runs very briefly and very frequently (you can hear the pump turn on every few seconds when…
Signs Your System Is Fighting High Static Pressure
— Furnace or air handler cycles on and off more frequently than normal - You can hear the blower "stra…
Signs:
— Training accuracy much higher than test accuracy - Performance degrades on new seasons - Complex mod…
Sigstore ecosystem components:
— **Cosign:** Signs and verifies container images and other artifacts - **Fulcio:** Certificate author…
Silas House
— born in 1971 in Lily, a community in Laurel County, Kentucky — represents a generation of Appalachia…
Silence strategies:
— *Masking:* Understating or selectively showing true opinions. Agreeing, using sarcasm, or making jok…
Silence-side verbal cues:
— Short, minimal answers ("I'm fine," "Sure," "Whatever you think") - Sudden hedging where there was d…
silent graveyard
— Taleb's metaphor for the accumulated mass of invisible failures -- is the complement to any visible …
silicosis
— a well-recognized occupational disease caused by silica dust — and coal workers' pneumoconiosis, arg…
Silver Ticket Advantages:
— Stealthier than Golden Ticket (no DC interaction) - Harder to detect (no TGT request logged on DC) -…
Silver, N. et al. "How Our NBA Predictions Work."
— https://fivethirtyeight.com/methodology/how-our-nba-predictions-work/ - Documentation of FiveThirtyE…
Similar distribution shapes
— the two populations should have roughly the same shape, just shifted horizontally (if you want to in…
Similarities:
— Both are **grammar systems** that constrain what can follow what — linguistic grammar constrains wor…
Similarity-attraction effect
— The robust empirical finding that people are more attracted to others who are similar to them in att…
similarity-attraction hypothesis
— that we are drawn to people who are similar to us — is one of the most robust findings in relationsh…
Simple
— stripped to the essential kernel - **Unexpected** — violates expectations, demands engagement - **Co…
Simple factual retrieval
— "What is Athena's headquarters city?" Adding reasoning steps just adds noise. - **Creative generatio…
Simple interest
— Interest calculated only on the original principal amount. Contrast with *compound interest*.
Simpler models often suffice
— always establish baselines and question whether complexity is warranted.
Simpson's paradox
— data can tell opposite stories at different levels of aggregation. This is deeply counterintuitive a…
Simulated annealing
— A computational optimization technique inspired by metallurgical annealing, using controlled randomn…
simulation
— the art and science of using random number generation to explore the behavior of complex systems. Mo…
Simulation is best when:
— The problem is complex and hard to solve analytically - You want to check your analytical answer - Y…
Simulation is your Swiss Army knife:
— Generate random outcomes, count successes, divide by total - Works for problems that would be diffic…
Simulation provides:
— Full probability distributions - Confidence intervals - Scenario analysis ("What if?" questions) - P…
Simultaneous A/B price testing
— showing different people different prices at the same time for the same product — is ethically fraug…
simultaneous invention
— the same innovation appearing independently in multiple places at roughly the same time. It is one o…
Sine wave
— The simplest periodic waveform, described by x(t) = A·sin(2πft + φ), with amplitude A, frequency f, …
Singapore: Personal Data Protection Act (PDPA)
— covers all personal data MediLink processes, including patient health data and payment information. …
singer's formant cluster
— a concentration of acoustic energy in the 2,800–3,200 Hz range that distinguishes professionally tra…
Single (Inline) Payloads
— Self-contained payloads that include all functionality in one block of code. They are generally larg…
Single exit point
— All paths through the paragraph converge at the exit paragraph. This satisfies the "one entry, one e…
Single point of failure in DB2 storage
— no automatic space management, no overflow capability 2. **Inadequate error handling** — program abe…
single-industry dependency
— a condition in which an entire community's economic survival rests on a single employer or a single …
Single-point predictions have limitations:
— A predicted spread of -7 doesn't tell us the probability of winning by 14+ - Win probability doesn't…
Singleton Pattern
— A **design pattern** that ensures a class has only one instance and provides a global point of acces…
Sink/Vanity:
— Sink drain centerline: typically 17"–24" from the floor (P-trap area) - Hot supply: typically 4" lef…
SIR model
— one of the most fundamental tools in epidemiology. SIR stands for: - **S**usceptible: can catch the …
sit-in
— an act of civil disobedience in the tradition of the lunch counter sit-ins of the civil rights movem…
Siting rules:
— At least 10 feet from the foundation (you're putting water in the ground here — it must be far enoug…
Situation
— establishes the baseline (things were good in 2019). 2. **Complication** — introduces the problem (p…
Situation selection
— before the conversation 2. **Situation modification** — during the conversation, if it escalates 3. …
Situation selection and modification
— choosing or avoiding situations and modifying them to reduce the emotional demands encountered — is …
Situation:
— `down` - Current down (1-4) - `ydstogo` - Yards needed for first down - `yardline_100` - Yards from …
Situational bettor (uses simple rules):
— Rules: bet pass on 3rd & long, bet run on goal line, avoid 1st down bets - Accuracy improvement: ~3%…
Situational breakdown
— Performance in pressure situations - Third down, red zone, clutch
situational elements
— aspects of real situations that the rules didn't mention. The advanced beginner driver notices that …
Situational Factors:
— Rest days differential (~1-2 points) - Travel distance (minor) - Altitude (Denver: +1-2 points) - Sc…
Situational Features:
— `dome`: Binary indicator for games played in a dome or retractable-roof stadium. Dome games tend to …
Situational Football
— red zone, third downs, two-minute drills, and critical game situations.
Situational Performance:
— Game-winning/tying kicks (final 2 min): 8/10 (80.0%) - 4th quarter, within one score: 22/26 (84.6%) …
Situational Responses
— [ ] Protecting lead playbook - [ ] Chasing deficit playbook - [ ] Tie game playbook - [ ] Two-for-on…
Situations to avoid:
— Situations that are genuinely dangerous (confrontations where your physical safety is at risk are ou…
Six patterns that work until they don't:
— The universal cursor (defeats the optimizer) - The uncommitted marathon (triggers lock escalation an…
Six retrieval calls, three update calls
— GU, GN, GNP (and their hold variants GHU, GHN, GHNP) for retrieval; ISRT, REPL, DLET for updates. Ho…
Six types of bias
— historical, representation, measurement, aggregation, evaluation, and deployment — can enter at diff…
Six-month impact (all 41 programs):
— Total batch failures requiring restart: 14 incidents - Average recovery time: 6 minutes - Maximum re…
Six-month summary:
— Followers: 6,800 → 52,000 - Average views per video: 2,100 → 28,000 - Highest-performing video: 420,…
Size
— Is the dataset large enough for your chosen method? Deep learning generally needs thousands of examp…
Size receiving fields appropriately:
— For addition/subtraction: the result needs one more integer digit than the larger operand - For mult…
Size the lock table appropriately
— more entries = fewer hash collisions - **Monitor LOCK_ENTRY_SHORTAGE and FALSE_CONTENTION counters**…
Size/length profile
— 6'7" with 6'11" wingspan - Ideal wing dimensions
Skeletal Tracking
— Body pose estimation - Hand and arm positioning - Shooting form analysis
sketch notes
— whichever feels most unfamiliar or uncomfortable to you. (The discomfort is a feature, not a bug. De…
skewed right
— a long tail to the right is pulling the mean above the median. > 3. Standard deviation measures the …
Skill Assessment
— Quantify improvement areas - Compare movement to elite players - Track physical development
Skill Building:
— CTFs develop problem-solving and expose you to new techniques - Lab platforms (HTB, THM, Proving Gro…
Skill capital:
— What is your current deepest skill area? - Is it rare enough to be valuable? (Would most people at y…
Skill demonstration
— Your ability applied to their prompt 2. **Expert reaction** — Your knowledge applied to their conten…
Skill level required
— Does this require specialized training, or can a careful, motivated homeowner learn it from written …
skill maintenance
— the recognition that cognitive skills, like all skills, require practice to remain sharp. The most s…
Skill Preparation
— Are you ready when luck arrives? Healthy = deep expertise in at least one domain, deliberate practic…
Skill progression time-lapse
— Compiles clips from the same activity over weeks/months, showing gradual improvement. The gradient i…
SkillCorner
— Broadcast tracking data - Physical metrics - Off-ball movement data - Link: skillcorner.com
SkillCorner Open Data
— Access: Research partnerships - Type: Broadcast tracking - Use: Movement and positioning
SkillCorner Open Research
— Focus: Publicly available tracking research - Key Content: Defensive intensity and pressing data
SkillCorner:
— Tracking data derived from broadcast video using computer vision, requiring no stadium hardware - Fo…
Skills Applied:
— NumPy vectorized computation for feature engineering - pandas DataFrame operations for data cleaning…
Skills not developed
— the human capital you didn't accumulate because you stayed in a low-growth environment - **Connectio…
Skills required:
— Deep knowledge of specific sports (most traders specialize in one or two sports) - Statistical liter…
Skin in the game
— The condition of bearing the consequences of one's own decisions; Taleb's argument that systems func…
Skip a gate if:
— The step is purely mechanical (reformatting, counting, sorting) - An error in this step would be imm…
skipped
— we already found a match 4. Continue to `print`
Skipping inspection
— Always look at your data before analyzing 2. **Ignoring missing values** - Understand why data is mi…
SKU (Stock Keeping Unit)
— A unique identifier for a distinct product variant in inventory management. Relevant for creators se…
SLA management
— Each API has a defined SLA:
Slack
— the software that failed game studio Glitch accidentally built while trying to coordinate the buildi…
Slater determinant
— Ch 15.4 An antisymmetrized product state for $N$ fermions: $\psi(\mathbf{r}_1,\ldots,\mathbf{r}_N) =…
slave hiring system
— a practice that was widespread in Appalachia and that has received less scholarly attention than it …
Sleep 7-9 hours
— consistent times, even on weekends 2. **Exercise 3+ times per week** — 20-30 minutes, moderate inten…
Sleep disruption
— noise above approximately 40 dB at night fragments sleep architecture, reducing slow-wave sleep and …
Sleep pressure
— The homeostatic drive for sleep that builds during waking hours (adenosine accumulation); one of the…
Sleep pressure (adenosine)
— the accumulation of adenosine throughout the day creates mounting pressure to sleep. This is the hom…
Sleep science basics
— Understanding rest importance 2. **NFL schedule overview** - How schedules are made 3. **Basic SOS c…
sleep spindles
— bursts of neural activity that appear to play a role in transferring information from the hippocampu…
Sleeper effect
— The phenomenon in which the persuasive impact of a low-credibility message increases over time, beca…
SleepTown / Sleep Cycle
— Track sleep timing and quality; useful for the sleep audit in Chapter 30.
Slide 1: Engagement Overview
— What we did, when, and why - One sentence summary of scope - Testing approach in non-technical terms
Slide 1: Title Slide
— Title: "Protecting Our Children: Data-Driven Recommendations for Improving Vaccination Rates in [Cou…
Slide 2: Overall Risk Assessment
— Single, clear risk rating with visual (traffic light, gauge, or similar) - One-sentence summary of w…
Slide 3-4: Top Risks
— Three to five highest-impact findings - Each described in business terms: what data is at risk, what…
Slide 5: Risk Trend
— If this is a recurring engagement, show trend over time - Chart showing findings by severity across …
Slide 6: Remediation Roadmap
— Prioritized actions with timelines and estimated costs - Categorized into immediate, short-term, and…
Slide 7: Investment Recommendation
— What budget is needed for remediation? - What is the cost of inaction? (regulatory fines, breach cos…
slightly behind completed work
— never significantly ahead. - Standard structure: 10-30% deposit at signing, 2-3 progress payments ti…
Slogans for analysis:
— "Ein Volk, Ein Reich, Ein Führer" (Nazi Germany, 1933–45) - "Make America Great Again" (U.S. politic…
Slow thinking (System 2)
— Daniel Kahneman's term for deliberate, effortful, analytical cognition. System 2 can override System…
Slow-wave sleep
— NREM Stage 3; the most physiologically restorative sleep stage; associated with glymphatic clearance…
Slower than regular browsing
— routing through three relays adds latency - **Some sites block Tor exit nodes** - **Not immune to al…
SlowFast
— https://github.com/facebookresearch/SlowFast - Video recognition models
Small Business Administration Learning Center
— sba.gov/learning-center The SBA's online learning center offers free courses on business plan develo…
Small Business Development Centers (SBDCs)
— americassbdc.org SBDCs are funded by the SBA and hosted by universities and colleges across the coun…
Small sample size: 25 games
— Washington went 9-22 - Limited high-quality competition
Small Sample Warning Signs:
— Large confidence intervals - Inconsistent with career norms - Extreme percentile rankings - High vol…
Small-scale agriculture and artisan production
— the farmers' market economy, craft brewing and distilling, specialty food production, fiber arts, po…
Small-world network
— A network topology, formalized by Duncan Watts and Steven Strogatz, characterized by high local clus…
Smart city
— An urban environment in which networked sensors, data analytics, and automated systems are used to m…
Smart Contract Risk
— **Code bugs**: Vulnerabilities in the prediction market's smart contracts can lead to loss of funds.…
SMART goals
— Specific, Measurable, Achievable, Relevant, Time-bound — are a practical application of goal-setting…
SMB Attack Surface:
— **EternalBlue (CVE-2017-0144):** The vulnerability exploited by WannaCry and NotPetya. This SMBv1 vu…
SMBv1 must be disabled
— there is no legitimate reason to run this protocol on modern networks > - **Detection speed matters*…
SMF
— System Management Facility. A z/OS component that collects system and application performance data i…
SMF 110 records
— CICS writes SMF 110 subtype 2 records for every web service request. These contain: URI, HTTP method…
SMF recording policy:
— Record types collected: _______________ - Retention period: _______________ - Daily review process: …
Smith-Mundt Act (1948)
— Legislation establishing the framework for U.S. overseas information operations while prohibiting th…
Smoke Detector Costs:
— Basic ionization only: $8–$15 - Basic photoelectric only: $15–$25 - Combination dual-sensor: $20–$45…
Smosh
— the comedy duo Ian Hecox and Anthony Padilla — was one of the earliest YouTube creators to build a g…
smtplib connection modes:
— `SMTP_SSL("smtp.gmail.com", 465)` — encrypted from the start (Gmail standard) - `SMTP("smtp.gmail.co…
SNA/APPC (LU 6.2)
— Traditional SNA communication. Reliable, well-understood, but requires VTAM definitions and network …
SNMP Attacks:
— **Community String Guessing:** Testing for default or weak community strings. - **Information Disclo…
SNMP Versions:
— **SNMPv1:** No encryption, community string in plaintext - **SNMPv2c:** Still no encryption, communi…
Snow:
— Dramatic visual impact - Field markings obscured - Running game advantages - Passing significantly i…
So what
— why does this matter? What's the insight? 3. **Now what** — what action does this suggest?
Soap-making
— rendering animal fat with lye leached from wood ashes — produced a household essential that was also…
SoapUI / ReadyAPI
— Test SOAP and REST web services, useful for end-to-end integration testing.
SOC 2 Penetration Testing Best Practices:
— Conduct testing at least annually - Include both internal and external testing - Test all components…
Soccer Example:
— Player A: 20% conversion vs strong teams, 15% vs weak teams - Player B: 18% conversion vs strong tea…
Soccer-Specific Conventions
— Pitch coordinates: origin at the bottom-left corner of the pitch, $x$-axis running along the length …
Soccer:
— Understanding of basic soccer rules and gameplay - Familiarity with common tactical concepts (format…
socceraction
— `pip install socceraction` - SPADL data format and VAEP implementation - Academic research tools - h…
socceraction (Python)
— GitHub: ML-KULeuven/socceraction - Use: VAEP calculations including defensive value
Soccermatics Course - Defensive Analysis Module
— Platform: Various - Focus: Mathematical modeling of defense - Level: Advanced
Soccerment
— Advanced metrics platform - xA and creativity metrics - Player comparison tools - Link: soccerment.c…
Soccerment (soccerment.com)
— Football analytics content including research papers, data visualizations, and industry commentary.
SoccerNet
— https://www.soccer-net.org/ - Large-scale soccer video understanding benchmark
SoccerNet Challenge Workshops
— CVPR/ECCV annual workshops. Presentations from leading research groups on the latest advances in soc…
SoccerNet GitHub
— github.com/SoccerNet Open-source tools, benchmarks, and pre-trained models for soccer video understa…
Social acknowledgment
— the best servers have members (or moderators) who welcome new arrivals personally. This does not sca…
Social baseline theory
— James Coan's framework proposing that the human brain and nervous system evolved to operate in a fun…
Social bonding
— Shared laughter creates in-group identity (Ch. 9, social currency/STEPPS) 2. **Emotional arousal** —…
Social categorization
— the automatic cognitive grouping of people into social categories based on shared characteristics
social closure
— the process by which social groups maintain exclusivity by limiting access to resources and opportun…
Social comparison (digital context)
— comparison to curated, globally selected, algorithmically amplified representations of others' lives
Social comparison theory
— Festinger's (1954) framework proposing that people evaluate their opinions and abilities through com…
social constructionist position
— regardless of students' personal views. Both teams have 5 minutes to prepare.
Social Content AI
— AI-assisted social media content generation 2. **Email Personalization Platform** — AI email subject…
social credit logic
— comprehensive behavioral scoring for access determination — is already present in Western commercial…
Social credit system
— China's government-operated system of behavioral scoring and sanction that aggregates data from fina…
Social desirability bias
— The tendency of survey respondents to report attitudes and behaviors that they believe are socially …
Social eating simulation
— eating alone activates mild stress responses; eating with others activates social bonding circuits. …
Social ecology prompts:
— What environmental force is shaping my behavior most significantly right now without my deliberate c…
Social engineering
— Convincing the user or helpdesk to register a new token - **Downgrade attacks** — Forcing fallback t…
Social engineering and credential theft:
— SIM swapping to bypass MFA (convincing mobile carriers to transfer a victim's phone number to an att…
Social engineering resilience:
— Employee awareness of social engineering tactics - Willingness to challenge unknown individuals - Ad…
Social Engineering:
— Fake login prompts (identical to real site) - Fake software update notifications - Clipboard hijacki…
Social environment:
— [ ] Relationships in inner circle receiving proportionate investment — Chapter 20 - [ ] Support stru…
Social exchange theory
— The framework proposing that interpersonal relationships involve implicit cost-benefit calculations;…
Social facilitation
— Zajonc's finding that the presence of others enhances performance of well-learned dominant responses…
social graph
— the network of nodes (people) and edges (connections between people) that defines the structure of a…
Social Identity Theory
— Tajfel & Turner's framework: social identities are components of self-concept maintained through pos…
Social Identity Theory (SIT)
— Tajfel and Turner's framework proposing that group membership is a source of self-concept and self-e…
Social inhibition
— impaired performance of novel or complex tasks in the presence of others
Social jetlag
— the discrepancy between biological circadian timing and socially imposed sleep-wake timing; associat…
Social jetlag:
— Weekend sleep timing drift undermines weekday sleep quality - Limit weekend timing variation to <1 h…
Social loafing
— The reduction in individual effort when working in a group compared to working alone; mediated by di…
social media infrastructure
— the tools, services, and platforms that enable creators, businesses, and individuals to build on top…
social metacognition
— the process of monitoring and regulating learning at the group level.
Social mobility
— The ability of individuals or families to move between different social positions over time. Social …
Social network analysis (SNA)
— Quantitative methods for studying the structure and properties of social networks.
Social pain overlap theory (SPOT)
— Eisenberger's proposal that neural systems processing physical pain are partially co-opted to proces…
Social Penetration Theory
— one of the most influential models of how relationships develop over time. The theory uses the metap…
Social pressure mailer
— A type of GOTV direct mail that shows recipients their own and their neighbors' voting histories, fo…
Social proof
— Cialdini's principle: when uncertain, people look to others' behavior as information about the corre…
Social proof and opinion validation
— Viewers use reactions as crowdsourced opinions, checking whether their own response is "correct" by …
social resources theory
— a framework for understanding why network position matters so much for occupational attainment.
social reward circuit
— centered on the nucleus accumbens, ventral tegmental area, and prefrontal cortex — is activated by b…
Social role theory (Eagly & Wood)
— The proposition that gender differences in mate preferences reflect societal role differentiation ra…
Social sorting
— David Lyon's concept of surveillance as a mechanism for sorting populations into categories that rec…
social support
— the functional perception that others are available, caring, and capable of providing assistance.
Social support quality
— particularly the availability of emotionally validating support from friends and family — is a robus…
Social system
— A structured set of relationships among elements exhibiting properties at the system level not reduc…
Social-behavioral psychology
— how platforms exploit known cognitive vulnerabilities - **Neuroscience** — the biological mechanisms…
Socialist Realism
— officially mandated as the only acceptable artistic style — enlisted every art form in the project o…
Socialized mind
— Kegan's developmental stage in which identity and values are determined primarily by one's social co…
socially shared regulation of learning (SSRL)
— the process by which group members jointly plan, monitor, and evaluate their collective learning eff…
society
— asking how data systems interact with the deepest challenges of our time: misinformation, inequality…
Society for Clinical Psychology (APA Division 12)
— div12.org/psychological-treatments - Research-supported treatments database; useful for finding evid…
Society for the Teaching of Psychology (STP)
— teachpsych.org Division 2 of the American Psychological Association. While focused on psychology edu…
Socioemotional selectivity theory
— Carstensen's theory that as perceived time horizons shorten, people orient toward emotionally meanin…
Sociology of forecasting
— The social dynamics — reputational incentives, professional culture, media pressures — that shape ho…
Sociometer theory
— Mark Leary and Roy Baumeister's theory that self-esteem is a psychological gauge of one's social inc…
Sofia Reyes
— First-year graduate student in cello performance preparing for a graduate recital. Represents patter…
Sofia, Marcus, and Priya
— CS professionals featured in the career profiles of Chapter 1. Composite characters representing com…
soft assignments
— the probability that each point belongs to each cluster.
Soft Skills:
— Communication with non-technical audiences - Collaboration across departments - Humility about limit…
softening frame
— language that presents the reframe as a possibility rather than a correction.
Software Engineering
— How to build large software systems in teams. Chapter 26 introduced you to the software development …
Software Engineering Daily
— Regular episodes on distributed systems and streaming. - **Data Engineering Podcast** - Stream proce…
Software Failures
— DB2 itself crashes due to a bug or resource exhaustion - The operating system panics or crashes - A …
Software failures:
— DB2 engine crash (trap, assertion failure) - Operating system crash (kernel panic) - Storage driver …
sojourning
— migration with the intention of return — was common among Italian immigrants across the United State…
Sole Proprietorship
— The default legal status for a self-employed individual operating a business without formal business…
Solely automated
— The GDPR Article 22 criterion for decisions that trigger the provision's protections. A decision is …
SOLID Principles
— Five object-oriented design principles: Single Responsibility, Open/Closed, Liskov Substitution, Int…
Solo 401(k)
— A tax-advantaged retirement account available to self-employed individuals with no employees (other …
Solomon Asch
— Conformity experiments (1951, 1956); documented social pressure's effect on individual judgment; ide…
Solution:
— Used color schemes that remain distinguishable in grayscale - Added value labels so color wasn't sol…
Solutions implemented:
— Built an ETL pipeline using Apache Spark to normalize data from multiple hospital systems into a com…
Solutions:
— **Popularity-based fallback.** Show the most popular items overall or within broad categories. This …
Some evidence of modest effectiveness
— personality-matched messaging does slightly outperform non-matched messaging in laboratory condition…
Some productive synthesis questions:
— Across all five lenses, what is the most important thing this text does? Is there a single dominant …
Son clave (3:2 form):
— Measure 1 (three side): beats 1, 2+, 4 (where 2+ = the "and" of beat 2, the subdivision between beat…
SonarQube COBOL Plugin
— Code quality metrics, complexity measurement, and coding standard enforcement.
Sonic Visualiser
— https://sonicvisualiser.org Free, open-source software for analyzing audio files. Produces spectrogr…
Sonification
— the use of sound to represent non-auditory data — is a growing application of the physics-music conn…
SORT
— Sorts the unloaded rows into clustering index order using DFSORT. This phase is CPU-intensive and re…
SORT statement
— A COBOL statement that sorts records from one or more input files and writes the sorted records to a…
Sort topics into three piles:
— **Green:** I can explain this from memory. (Low priority — quick review only.) - **Yellow:** I recog…
Sort transactions by account number
— 15 minutes 2. **Transaction processing (TXN-PROC)** — 4 hours 20 minutes 3. **Balance reconciliation…
SORTDATA YES
— Sorts data pages into clustering sequence. Almost always YES unless you have a specific reason. - **…
SORTDATA YES / SORTKEYS YES
— Sorts data rows into clustering order and sorts index keys during rebuild. Both should be YES for op…
SOS Above the Bar
— Similar behavior for EDSA exhaustion, but more impactful because most workload uses EDSA.
SOS Below the Bar
— CICS suspends new task creation for transactions that require below-the-line storage. Existing tasks…
Sound effects
— sudden, novel, or impact sounds that trigger the orienting response 3. **Music** — continuous backgr…
Sound-off friendly
— Works perfectly on mute (Ch. 22), which matters when 50-85% of viewers watch with sound off. The vis…
Sound-off optimization
— content works identically with sound on or off 2. **Process sound preservation** — natural ASMR-adja…
Soundscape ecology
— pioneered by Bernie Krause and elaborated by researchers including Almo Farina and Bryan Pijanowski …
Source
— Who is the stated source of this advertisement? - Who is the actual funding source? Are there interm…
Source 1: Coverage estimates
— One CSV file downloaded from the WHO portal. It arrives in *wide format*, with each vaccine-year com…
Source 2: Population data
— Total under-5 population per country (for weighting averages).
Source 3: Economic indicators
— GDP per capita for correlation analysis.
Source and Context Questions:
— Who produced this image, and what are their goals? - Where did you first encounter it, and how did i…
Source and Transparency
— [ ] Is the source of the communication clearly identified? - [ ] Does the source have an institution…
Source breakdown of mischaracterization:
— Social media accounts: 71% of Whitfield-leading characterizations - Local news outlets: 14% (several…
Source code manipulation
— Compromising developer accounts or source repositories 2. **Dependency injection** -- Introducing ma…
Source concealment
— The practice of obscuring the actual originator of a communication, through astroturfing, anonymous …
Source contamination
— The process by which a reliable source's credibility is partially transferred to an unreliable sourc…
Source Control Risks:
— Secrets committed to repositories (even in history after removal) - Branch protection bypass allowin…
Source libraries
— COBOL, JCL, copybooks, and procedure libraries - **Load libraries** -- compiled and link-edited prog…
Source of funds (for initial investment)
— Bank statements (3 months) showing origin of $8 million - Wire transfer instructions identifying sou…
Source of Funds (for specific transactions)
— [ ] Bank statements showing origin of funds to be deposited - [ ] Wire transfer confirmations identi…
Source of wealth
— Client narrative: written career summary and wealth accumulation history - Documentary corroboration…
Source Questions
— Who apparently created this content, and what evidence supports that identification? - What would th…
Source Selection
— [ ] Identify one domain-specific AI newsletter or community to follow consistently - [ ] Identify on…
Source system and target system
— **Data content** (what entities and fields are exchanged) - **Integration pattern** (file, message, …
Source transparency
— Disclosure of who is communicating and, where material, what interests they represent; a necessary c…
Source Use and Evidence
— Do you draw on at least five primary and five secondary sources? Are claims supported by evidence? A…
SOURCE-COMPUTER
— A CONFIGURATION SECTION paragraph that specifies the computer on which the program is compiled.
Source-filter model
— A model of sound production in which the output spectrum is the product of a source spectrum (produc…
Sources for Organizational Mapping:
— **LinkedIn**: Search for "[Company Name]" and filter by current employees. LinkedIn reveals titles, …
Sources of Carbon Monoxide in Homes
— **Fuel-burning appliances:** Gas furnaces, boilers, water heaters, ranges, and dryers. Properly func…
Sources the student has not yet found
— "Your county has a WPA oral history collection at the state archives; have you looked for it?" 2. **…
Sources to consult:
— Your state legislature's website (search for electronic monitoring + employees) - The National Confe…
Sources to examine:
— The organization's leadership team (who is featured on their website's About page?) - Job postings (…
Sources:
— Transfermarkt: The largest publicly accessible source of transfer data, player valuations, injury hi…
Sourcing data:
— Is the data available internally? - Do we need to purchase from a provider? - Can we collect it ours…
Sousveillance
— a term coined by Steve Mann — refers to the monitoring of authorities *by* the public, rather than t…
Southern Strategy
— the deliberate effort to attract white Southern voters alienated by the Democratic Party's support f…
southwestern Virginia
— the New River Valley and surrounding counties — the enslaved population was smaller but still signif…
Sovereignty declaration
— Who has authority over community data? > 2. **Governance body** — How is the community represented i…
SP+ Methodology (Bill Connelly)
— Football-specific efficiency ratings - Play-by-play adjustments - Historical analysis
SPACE
— A figurative constant representing one or more blank (space) characters.
SPACE / SPACES
— Represents the space character. Used to clear alphanumeric fields and test for blank fields.
spaced repetition
— encountering the same information at increasing intervals dramatically slows the forgetting curve. E…
spaced retrieval practice
— combining two of the most powerful strategies in learning science. We'll explore spacing in detail i…
SPACED REVIEW
— Before proceeding, briefly recall: > - **From Chapter 1:** How does z/OS networking work? TCP/IP in …
Spaced Review (Chapter 2)
— Recall that $|\psi(x)|^2$ is the probability density for finding the particle at position $x$ (Born …
Spaced Review (Chapter 4)
— Recall the harmonic oscillator ladder operators from Chapter 4: $\hat{a}|n\rangle = \sqrt{n}|n-1\ran…
Spaced Review (Chapter 6)
— In Chapter 6, you learned that Hermitian operators ($\hat{A}^\dagger = \hat{A}$) have real eigenvalu…
Spaced Review (Chapter 7)
— In Chapter 7, we used the momentum-space wave function to analyze wave packet propagation. A Gaussia…
Spaced Review (Chapter 8)
— In Chapter 8, we introduced ladder operators and showed that $\hat{a}^\dagger|n\rangle = \sqrt{n+1}|…
SPACED REVIEW — Chapter 13
— Recall from Chapter 13 that MRO connections create cross-region dependencies. In a multi-region topo…
SPACED REVIEW — Chapter 8
— Recall from Chapter 8 that DB2 locks are held for the duration of the unit of work. In a CICS enviro…
SPACED REVIEW: CHAPTER 5
— WLM service classes for CICS. Review how you defined service classes, classification rules, and velo…
SPACES
— **Numeric** (PIC 9) fields are set to **ZEROS** - **Alphanumeric-edited** fields are set to SPACES -…
spacing effect
— one of the deepest and most replicated findings in learning science.
Spacing Metrics (2015-16)
— Average player spacing: 14.2 feet (league avg: 12.8 feet) - Players beyond 3PT line on average posse…
spaCy Documentation
— https://spacy.io/ - Production-ready NLP - Custom model training
Spamouflage
— A Chinese state-linked influence operation network characterized by high-volume, cross-platform, com…
Spanish-Language Creator Resources:
— HubSpot Academy offers full Spanish-language versions of its core marketing courses - Google Digital…
Sparse key values
— Employee numbers may not be contiguous (1001, 1003, 1007...) 2. **Deleted records** -- Slots that on…
Spatial Analysis
— Defender distance on shots - Court coverage on defense - Rebounding positioning
Spatial Dimensions:
— Yard line (field position) - Down and distance - Play direction (if tracking data available)
Spatial Features (per frame):
— Player positions (from tracking) - Ball position - Player velocities and accelerations - Spatial con…
Spatial Features:
— Ball distance to basket - Closest defender distance - Spacing metrics (team spread) - Lane penetrati…
Spatial Model and Its Limits
— Downs (1957): rational candidates converge to the median voter; rational voters choose the nearest c…
Spatial reduction attention
— it reduces the spatial resolution of keys and values by a factor $R$ before computing attention, cha…
Speaker Verification:
— **Equal Error Rate (EER)**: The point where false acceptance rate equals false rejection rate - **mi…
Spearphishing Campaign Design:
— **Target Selection:** Identify 5–10 FinanceForward employees to target based on role, access level, …
Special Addresses:
— **127.0.0.0/8:** Loopback addresses. 127.0.0.1 (localhost) is the most commonly used. - **169.254.0.…
special methods
— also called **dunder methods** (short for "double underscore") — that let your objects integrate wit…
Special Teams Analytics
— the often-neglected third phase that can swing close games. We'll examine kicking, punting, and retu…
Specialized libraries:
— **Hugging Face Transformers**: The de facto standard library for working with pre-trained transforme…
Specialty inspections to evaluate:
— Sewer scope - Radon air test - Radon water test (well only) - Mold/air quality survey - Lead paint t…
SPECIFIC
— A unique identifier for a particular version of a function, used to distinguish overloaded functions…
Specific acknowledgment of what was wrong
— not vague ("I made some errors") but precise ("I used the phrase 'dopamine hit' twelve times and pre…
SPECIFIC CALC_ALLOWED_V1
— A unique name for this specific version of the function. Useful for dropping or altering a specific …
Specific numbers outperformed round numbers
— "$11.47" beat "$12" by 11 percentage points in 3-second retention 3. **Direct Questions underperform…
specific outcomes
— trying to engineer the exact discovery you'll make 2. The level of **probability structures** — tryi…
Specific Recommended Talks
— "Attention Is All You Need" (Vaswani et al.) -- various conference presentations explaining the tran…
Specific Rules:
— 4th & 1-2 at opponent's 26-40: Go for it unless trailing by 7+ in final 2 minutes - 4th & 3 at oppon…
Specific sub-skill target
— what exactly are you practicing? 2. **At the edge of competence** — not so easy it is comfortable, n…
Specific Tests to Attempt:
— Register two merchant accounts and verify complete session isolation between them. - Capture a JWT t…
specific, unstable, external
— "I failed on this task (specific) this time (unstable) because of the difficult circumstances (exter…
specification prompt
— it tells the AI exactly what to produce, including specific field names, types, and defaults. Specif…
Specification-Driven Prompting
— A **prompting** technique where you provide a formal or semi-formal specification (requirements docu…
Specifications:
— The statevector should be stored as a complex numpy array of length $2^n$ - Gates should be applied …
Specificity
— Vague plans fail. The best work in these capstones is granular and concrete. "I'll post on TikTok" i…
Specificity creates relatability
— "47 times" is more compelling than "many times" because it sounds like a real person counted 2. **Cu…
spectacle
— a cultural condition in which lived experience is replaced by its representation. In the courtship c…
Spectral centroid
— A measure of the "center of mass" of a sound's frequency spectrum, calculated as the weighted averag…
Spectral envelope
— The smooth curve connecting the peaks of the harmonics in a spectrum, describing the overall shape o…
spectral profile
— they are acoustic filters.
Spectral theorem
— Ch 9.2 Every Hermitian operator has a complete orthonormal set of eigenstates with real eigenvalues:…
Spectrogram
— A two-dimensional representation of audio showing frequency (vertical axis) versus time (horizontal …
spectrum analyzer
— a device that separates a complex sound into its component frequencies.
Speech prosody hypothesis
— the proposal that the minor-sad association derives partly from acoustic similarities between minor …
Speech Recognition:
— **Word Error Rate (WER)**: $\frac{S + D + I}{N}$ where $S$ = substitutions, $D$ = deletions, $I$ = i…
Speed
— The time taken to execute the order from receipt to completion. Speed may be critical for certain cl…
Speed and Distance
— Average speed (mph) - Distance traveled per game (miles) - Speed differential: offense vs. defense
SPEED vs. RECOVERY:
— `SPEED` — Skips preformatting of CIs during initial load. Faster loading, but if the load fails mid-…
Speed:
— Average speed - Maximum speed - Acceleration count (hard accelerations)
speedrun
— Completing a game as fast as possible, often using sophisticated techniques. Speedrunning communitie…
Spelman College Entrepreneurship Program
— Spelman's entrepreneurship curriculum and associated mentorship programs serve women of color at the…
Spending income without reserving for taxes
— the most common serious financial mistake; self-employment taxes significantly exceed expectations 2…
spending more time exercising
— Gratitude participants reported feeling **more connected to others** and more likely to have helped …
Spherical harmonics
— Ch 5.3 The angular eigenfunctions $Y_l^m(\theta, \phi)$ of the orbital angular momentum operators $\…
Spielverlagerung
— Focus: Deep tactical analysis including set pieces - Language: English/German
Spike point reading:
— Rising spikes = viewers rewatching → these are your content's highlights - Drop-off spikes = specifi…
Spillover
— Contamination of the control group through treatment-to-control transmission mechanisms such as soci…
spin
— a form of angular momentum with no classical analog. Many atomic nuclei have nonzero spin: hydrogen …
Spin dictatorship
— Guriev and Treisman's term for contemporary authoritarian governance built primarily on information …
Spin-orbit coupling
— Ch 18.2 The interaction between a particle's spin and its orbital angular momentum, arising from rel…
spin-orbital
— the product of a spatial orbital and a spin function ($|\!\uparrow\rangle$ or $|\!\downarrow\rangle$…
spin-squeezed state
— a collective state where the quantum noise is redistributed so that the phase-sensitive quadrature h…
spin-statistics theorem
— is one of the deepest results in theoretical physics. We will explore it further in Chapter 15 (iden…
Spine
— One of the four borders of the Axes plot area (top, bottom, left, right).
Spiral of silence
— Elisabeth Noelle-Neumann's theory that individuals who believe their opinion is in the minority will…
splinternet
— fragmentation of the global internet — is a growing concern as more countries implement digital sove…
Split
— Read one file, write to multiple files based on content.
Split sample
— An experimental design embedded in a survey in which different randomly assigned subgroups of respon…
Sponsor (career)
— A person in a position of power who actively advocates for another person's advancement, uses their …
Sponsorship Placement (if applicable)
— Where would a mid-roll ad go, and why that placement?
Sponsorship/Brand Deal
— A commercial arrangement where a creator promotes a brand's product or service within their content …
Spontaneous emission
— an excited atom in a vacuum decays even though there is no classical field to stimulate it. The quan…
Spontaneous order
— Order that emerges from the voluntary interactions of individuals without being imposed by a central…
spoofing
— see Section 7.8), and the depth chart can change dramatically in seconds.
SPOOL
— Simultaneous Peripheral Operations Online. The *JES2/JES3* mechanism that manages print and punch ou…
Sporting outcomes:
— League titles: Neymar contributed to multiple Ligue 1 championships, though PSG was already dominant…
Sportradar (sportradar.com)
— Industry-standard data provider. Official data partner of the NFL, NBA, NHL, MLB, and NASCAR. Real-t…
Sports Analytics Career Guide
— Alamar - Industry overview - Required skills - Career pathways
Sports Analytics Certificate Programs
— Various universities offer online courses - Comprehensive coverage of EPA methods - Project-based le…
Sports Analytics Courses on Coursera
— University of Michigan Sports Analytics specialization - Covers statistical foundations - Programmin…
Sports Analytics Meetups
— meetup.com has groups in many cities - Search "sports analytics [your city]"
Sports Analytics Research
— MIT Sloan Sports Analytics Conference talks - Available on YouTube - Professional presentations
Sports Analytics Slack communities
— **Kaggle discussion forums**
Sports Analytics Society
— Professional organization for sports analysts.
Sports Analytics Twitter
— @benaborowitz - @EaglesXOs - @maborowitz - @SethWalder
Sports Analytics Twitter/X
— Key accounts: @benbbaldwin, @PFF_College, @ESPN_Analytics - Real-time discussion - New research shar…
Sports Analytics World
— Community and resources for sports analytics professionals
Sports Analytics World Series
— Global events - Industry practitioners - Educational workshops
Sports betting markets:
— Extremely well-calibrated for major events (NFL, Premier League) with ECE often below 0.02. - Less w…
Sports Business Classroom
— Industry career guidance - **The Sports MBA** - Career resources - **Business of College Sports** - …
Sports Business Journal Careers
— Senior-level positions and industry news - **Work In Sports** (workinsports.com) - Entry-level and i…
Sports Info Solutions
— Charting data - Player tracking - Research partnership options
Sports Info Solutions (SIS)
— Advanced tracking data - Professional analytics services
Sports Innovation Lab Summit
— Various sports technology and analytics topics
Sports Markets:
— Average spreads: 1-3 cents on major events (Super Bowl, World Cup) - Spreads tighten significantly c…
Sports Odds History
— https://www.sportsbookreview.com/betting-odds/ - Historical betting lines (limited free access)
Sports Performance Bulletin
— https://www.sportsperformancebulletin.com/ - Practical sports science content including injury preve…
Sports Reference
— Comprehensive historical data - Team and player statistics - https://www.sports-reference.com/cfb/
Sports Reference - College Football
— `https://www.sports-reference.com/cfb/` - Historical kicking statistics - Punting records and averag…
Sports Reference / Basketball-Reference
— https://www.basketball-reference.com/ - Historical NBA statistics - College basketball statistics (S…
Sports Reference / College Football Reference
— https://www.sports-reference.com/cfb/ - Comprehensive historical statistics - Box scores, season tot…
Sports Reference / Pro Football Reference
— Historical statistics and data - Play-by-play archives - https://www.pro-football-reference.com/
Sports Reference Data Guide
— Understanding sports-reference.com data - Glossary of statistics - https://www.sports-reference.com/
Sports Reference Family (sports-reference.com)
— **Pro-Football-Reference.com** -- Comprehensive NFL statistics from 1920 to present. Game logs, play…
Sports Reference Limitations:
— No official API (must scrape or use unofficial tools) - No play-by-play data - Terms of service rest…
Sports Reference Strengths:
— Deepest historical coverage - Clean, consistent formatting - Excellent for historical research - No …
Sports-1M
— Million sports videos for recognition research
Sportsbook A:
— Player X: -180 - Player Y: +155
Sportsbook B:
— Player X: -160 - Player Y: +145
Sportsbook X:
— Lakers: -145 - Celtics: +130
Sportsbook Y:
— Lakers: -135 - Celtics: +120
SportsBookReview (sportsbookreview.com)
— Historical line movement data for NFL, NBA, MLB, NHL, and college sports. Shows opening and closing …
sportsdataverse
— Multi-sport data ecosystem - Standardized data formats - Cross-sport analysis tools
sportsipy
— Sports reference scraping - Automated data collection - Multiple sports support
sportyR
— https://github.com/rossdrucker/sportyR - R package for sports field visualization - Includes footbal…
Spotify Creator Fund
— Spotify has launched creator support programs for independent podcasters from underrepresented backg…
Spray foam insulation
— both open-cell and closed-cell varieties — off-gasses as it cures. Properly installed and fully cure…
spread
— represents the cost of immediacy. If you want to buy *right now* without waiting, you must pay the a…
Spread and Context Questions
— How many people have apparently viewed or shared this content? Does that number function as social p…
Spread → Probability:
— Each point ≈ 3% probability shift - P(home) = 1 / (1 + 10^(spread/8))
Spring (after last freeze):
— Exterior perimeter walk with photos - Roof inspection (ground-level or professional) - Clean gutters…
Sprinkler Installation Costs (Residential):
— New construction integration: $1.00–$2.00 per square foot (very cost-effective during construction) …
Sprint 1 (Weeks 1-2): Foundation and Core Features
— Database schema and data models (Tier 1) - Authentication and multi-tenant architecture (Tier 2) - A…
Sprint 2 (Weeks 3-4): Feature Completion
— Email integration (Tier 1) - Analytics charts and dashboard (Tier 2) - User management and role-base…
Sprint 3 (Weeks 5-6): Polish, Testing, and Launch
— Comprehensive testing (integration, E2E) (Tier 1 for generation, Tier 3 for strategy) - Performance …
Sprint Planning:
— Explicitly categorize each story by AI acceleration tier - Discuss which stories are best suited for…
Sprint Retrospective:
— Review AI acceleration factor accuracy (estimated versus actual) - Identify tasks where AI helped mo…
Sprint Review:
— Demonstrate features as usual, but note which were AI-accelerated - Discuss code quality metrics for…
spruce-fir forests
— dark, mossy, fog-shrouded communities that more closely resembled the boreal forests of Canada than …
SPT01 (Skeleton Package Table)
— Contains the executable form of SQL packages. When you BIND a package, DB2 compiles the SQL statemen…
spurious
— it reflects their shared cause, not a direct link between them.
spurious correlation
— two variables that track each other over time purely by coincidence. Both happened to increase over …
spurious correlations
— statistical artifacts of looking at enough variables over enough time.
SQL
— Structured Query Language. The standard language for relational database access. COBOL programs use …
SQL (Structured Query Language)
— The standard language for interacting with relational databases. Operations include SELECT, INSERT, …
SQL Activity Counters:
— Number of SELECT, INSERT, UPDATE, DELETE, OPEN, FETCH, CLOSE - Number of COMMIT and ROLLBACK - Numbe…
SQL activity counts:
— SELECT, INSERT, UPDATE, DELETE counts - PREPARE, BIND, OPEN/CLOSE cursor counts - Commit and rollbac…
SQL Cheat Sheet
— W3Schools (https://www.w3schools.com/sql/sql_cheatsheet.asp) Quick reference for SQL syntax. Keep a …
SQL fundamentals
— SELECT, INSERT, UPDATE, DELETE, JOINs, GROUP BY, and aggregations -- form a universal language for d…
SQL Injection
— A security vulnerability where untrusted input is incorporated into SQL queries without proper sanit…
SQL Injection Prevention
— Parameters are sent to DB2 as data, not as SQL text. They cannot alter the query structure.
SQL injection testing
— RockYou was compromised through one of the most basic web vulnerabilities. MedSecure's web applicati…
SQL Injection, XSS, CSRF
— Classic web application vulnerabilities. - **Deserialization Attacks** — Exploiting insecure deseria…
SQL is the universal query language
— SELECT, INSERT, UPDATE, DELETE, JOIN. These operations work across SQLite, PostgreSQL, MySQL, and SQ…
SQL Reference for DB2 11.5 for LUW
— The LUW counterpart to the z/OS reference. Note the differences in tablespace management, BOOLEAN su…
SQL Reference for DB2 13 for z/OS
— The authoritative reference for all DDL syntax on z/OS, including CREATE TABLE, CREATE TABLESPACE, C…
SQLAlchemy
— The comprehensive Python SQL toolkit. If you are working with relational databases seriously, SQLAlc…
SQLAlchemy 2.0
— sqlalchemy.org The Python ORM used in the case studies. Understanding SQLAlchemy's session managemen…
SQLAlchemy ORM Cheat Sheet
— Search "SQLAlchemy ORM cheat sheet 2.0" for community-maintained quick references. The syntax change…
SQLAlchemy session not being closed properly
— sessions holding references to objects 2. **Caching without eviction** — in-memory caches growing un…
SQLCA
— SQL Communication Area. A data structure included in COBOL programs (via EXEC SQL INCLUDE SQLCA) tha…
SQLCA is available
— the procedure can execute SQL statements. 5. **The program should not perform STOP RUN** — it return…
SQLCODE
— A field in the *SQLCA* indicating the result of the most recent SQL statement. SQLCODE = 0 means suc…
SQLite
— A file-based database engine built into Python's standard library. No server required. Perfect for d…
SQuAD (Stanford Question Answering Dataset)
— URL: https://rajpurkar.github.io/SQuAD-explorer/ - Description: SQuAD 1.1 contains 100,000+ question…
squatters
— occupying land they could not afford to buy, making improvements that increased the value of someone…
Squatting
— occupying land without legal title — was one of the most common methods of land acquisition on the A…
Squeezed states
— minimum uncertainty with asymmetric quadratures. One quadrature below the vacuum noise level. Enable…
SR 11-7 / OCC 2011-12
— Federal guidance on model risk management requiring banks to validate models for conceptual soundnes…
SRD program constraints:
— Devices remain Apple's property and must be returned - Researchers must sign a research agreement - …
SSAs control navigation
— unqualified SSAs accept any segment; qualified SSAs specify selection criteria; command codes (D, F,…
SSRANGE
— An Enterprise COBOL compiler option that generates runtime checks for subscript out-of-range and ref…
SSRF + Cloud metadata = Remote Code Execution
— Find an SSRF vulnerability - Access the cloud provider's metadata service (169.254.169.254) - Retrie…
SSRF to Cloud Metadata:
— Any SSRF vulnerability discovered in Target Area 2 should be tested for access to the AWS Instance M…
SSRN (Social Science Research Network)
— ssrn.com — Preprint server for social science research. Many researchers post working papers here be…
stable
— equal elements maintain their original relative order. This combination of properties, plus its C im…
Stable Diffusion / SDXL
— Description: Open-source text-to-image models that can generate synthetic training images. Useful fo…
Stack
— browser tabs follow LIFO: you typically close the most recently opened tab first, and "close" undoes…
Stack Overflow
— Technical Q&A - Code examples
Stack Overflow [cobol] tag
— Active community of COBOL developers answering questions. Search for questions about program structu…
Stack Overflow: ibm-db2 tag
— Community Q&A for Db2 development, including cloud-specific questions. https://stackoverflow.com/que…
Stack Trace
— A report of the active function calls at a specific point in program execution, typically displayed …
Stacking vs. Blending
— Implementation differences - When to use each
Stadium design
— Open ends funnel noise onto field 2. **Seismic activity** - Fans have caused detectable earthquakes …
Staff costs:
— The monitoring team consists of 6 analysts (average fully-loaded cost: £62,000 per year) and one lea…
Staffing
— Data scientists with sports medicine background - Biostatisticians familiar with survival analysis -…
Stage 1 — Awareness
— Primary discovery platform(s): - Primary discovery mechanism(s) — algorithm push, search pull, or re…
Stage 1: Ad Hoc (1-2 people)
— Single analyst or small team - Reactive work driven by coaching requests - Basic tools (Excel, basic…
Stage 1: Awareness
— They discover you exist
Stage 1: Cloud Curious (6-12 months)
— Move dev/test to cloud - Build team's cloud skills - Establish network connectivity (Direct Connect …
Stage 1: Correctness Review
— Define the role and prompt 2. **Stage 2: Security Review** — Define the role and prompt 3. **Stage 3…
Stage 1: Data Screening
— Player databases covering 50+ leagues worldwide were screened using proprietary statistical models -…
Stage 1: Data-Led Discovery
— Analysts define search parameters based on tactical needs - Automated screening produces a long list…
Stage 1: Feature Alignment Pre-training
— Data: 595K image-text pairs from CC3M (filtered) - Only the projection layer $\mathbf{W}$ is trained…
Stage 1: Source Commit
— Trigger: code committed to version control (Git, Endevor, or SCLM export to Git) - Actions: validate…
Stage 1: Source Mapping
— [ ] Can you trace the story to a primary source? Follow the citation chain — does it lead to an orig…
Stage 2 — Interest
— What subscriber/follow CTA do they use? - Do they use series, challenges, or "part 2" mechanics? Des…
Stage 2: Build (Compile + Link)
— Mainframe: invoke IGYCRCTL via JCL or IBM Dependency Based Build (DBB) - Distributed: invoke GnuCOBO…
Stage 2: Cloud Capable (12-24 months)
— Migrate first batch workload (reporting or analytics) - Implement CDC for near-real-time data replic…
Stage 2: Foundational (3-5 people)
— Dedicated roles for match analysis and recruitment - Established data pipelines from providers (Opta…
Stage 2: Interest
— They choose to learn more
Stage 2: Scout-Led Evaluation
— Scouts review video of data-identified candidates - Live scouting assignments are prioritized based …
Stage 2: Statistical Shortlisting
— Players passing initial screens were evaluated more deeply, with per-90 metrics compared to position…
Stage 2: The Blend Analysis
— [ ] Identify the factual claims in the story. Which are independently verifiable? - [ ] Identify the…
Stage 2: Visual Instruction Tuning
— Data: 158K multimodal instruction-following examples generated using GPT-4 - The projection layer an…
Stage 3 — Trust
— Posting consistency: how many times per week, how long have they maintained it? - Community-building…
Stage 3: Collaborative Assessment
— Joint meetings between analysts and scouts to discuss candidates - Data provides context for scout o…
Stage 3: Established (6-12 people)
— Specialized roles including data scientists and engineers - Custom models and tools - Proactive anal…
Stage 3: Hybrid Optimized (24-48 months)
— Multiple workloads running on cloud - Mature data synchronization (batch + CDC + API) - Integrated m…
Stage 3: The Strategic Interest Question
— [ ] Who benefits from this story being believed? - [ ] Does the story serve the interests of a forei…
Stage 3: Trust
— They develop a relationship with you
Stage 3: Unit Test
— Execute unit tests (zUnit, COBOL-Check, or custom test harnesses) - Measure code coverage if tooling…
Stage 3: Video and Live Scouting
— Scouts received targeted shortlists with specific questions to address (e.g., "Confirm or deny the d…
Stage 4 — Conversion
— What products/services do they offer? List them with prices: - Where/how do they deliver CTAs? (In-v…
Stage 4: Advanced (13-25+ people)
— Full-stack analytics operation - Proprietary data collection and tracking systems - Research and dev…
Stage 4: Conversion
— They take a commercial action
Stage 4: Decision and Negotiation
— Final decisions were made by a committee including the data team, scouting leadership, and football …
Stage 4: Decision Support
— Combined data-scout reports for the sporting director / decision-maker - Clear presentation of both …
Stage 4: Proficient
— the stage where she would begin to *hear* the music holistically, where the shape of a phrase would …
Stage 4: Static Analysis
— Run coding standards checks (naming conventions, structured programming rules, banned patterns like …
Stage 4: Strategic Hybrid (48+ months)
— Workload placement decisions are routine, data-driven - New workloads are deployed to the optimal pl…
Stage 4: The Destabilization Test
— [ ] Is the story primarily persuasive (trying to convince you of something specific) or primarily de…
Stage 5 — Loyalty
— Do they have recurring revenue products (membership, subscription, Patreon)? - Do they have an upsel…
Stage 5: Integration Test
— Execute tests that exercise multiple programs together, including DB2, CICS, and file I/O - Use test…
Stage 5: Loyalty
— They stay, buy again, and refer others
Stage 6: Package
— Create a versioned deployment artifact (load module, container image, or deployment package) - Tag t…
Stage 7: Deploy (Dev → QA → Prod)
— Deploy to Dev automatically on successful build - Deploy to QA on approval (manual gate or automated…
stage shells
— curved reflective surfaces behind and above the orchestra that redirect some energy toward the audie…
Stagers
— Small payloads that establish a communication channel and then download a larger "stage." Stagers ar…
Stages
— The larger payload downloaded by the stager. Meterpreter is the most common stage, but there are oth…
stagflation
— the simultaneous occurrence of high inflation and high unemployment. The Keynesian paradigm said thi…
Staggering Pattern:
— James and Davis rarely rested simultaneously - Rondo provided secondary playmaking when James sat - …
Staging
— A production-like environment for final testing before release. Should mirror production's infrastru…
stakeholder deliberation
— a process in which the people affected by the system have a voice in determining what fairness means…
Stakeholder Facilitation Services
— something she has always done informally but never named.
Stakeholder testing
— consulting with key stakeholders (employees, civil society, academic partners) before finalizing app…
stakeholders and relationships
— the system in which every conflict is embedded. Who is directly involved, who is indirectly affected…
stale markets
— markets where the outcome has become clear but the price has not fully adjusted. This happens becaus…
Stale statistics
— The table has grown or the data distribution has changed since RUNSTATS was last executed - **Correl…
Staleness indicators:
— Last trade more than 12 hours ago, OR - Fewer than 20 active traders, OR - 24-hour volume below 50 c…
Stalkerware
— covert monitoring applications used in intimate partner contexts — is documented as a tool of coerci…
Stalking
— Repeated, unwanted contact or monitoring of a person that causes fear; often begins with behaviors t…
Stance
— where you are positioned relative to your audience. Are you the expert talking to a student? The pee…
Standard
— External partners get 100 requests/minute. Enough for normal usage, not enough to impact mainframe c…
Standard -110 both sides:
— Risk $110 to win $100 - Implied probability: 52.38% - Vig ≈ 4.76%
Standard ACL Recovery:
— Surgery: May 2012 - Initial rehabilitation: 6-9 months - Full clearance: 10-12 months
Standard Contractual Clauses
— pre-approved contractual templates adopted by the European Commission that impose GDPR-level data pr…
Standard Definition (Wyscout):
— Moves the ball at least 25% closer to the opponent's goal - Or enters the penalty area from outside …
Standard form:
— P1: Social media platforms have financial incentives to promote engagement over accuracy. - P2: Sens…
Standard Injury Insurance:
— Coverage: 80% of salary for games missed beyond threshold - Premium: 2-5% of salary - Deductible: Us…
Standard kill fee terms:
— Campaign cancelled before script/concept approval: 25% of total fee due - Campaign cancelled after a…
standard library
— often described with the phrase "batteries included." These modules are already installed. No `pip i…
standard normal distribution
— a special normal with $\mu = 0$ and $\sigma = 1$.
Standard Risk Factors:
— Customer type (natural person / legal entity / PEP / high-risk business) - Country of origin / count…
Standardization
— Making equivalent values look the same ("NYC" and "New York City" should become a single value) 2. *…
Standardization reduces friction
— A consistent setup process helps new team members become productive quickly 2. **Tiered requirements…
Standardization:
— Z-scores: Compare across different scales - Composite scores: Combine multiple metrics
Standardized forms
— structures that impose a common format on information from different communities. The medical intake…
standardized patient encounters
— carefully designed simulations where trained actors portray patients with specific conditions.
standardized scores
— they strip away the original units and put everything on the same "standard deviations from the mean…
Standards:
— Siding should be a minimum of 2 inches above soil (6 inches is recommended) - Wood elements (window …
Standing seam materials:
— **Galvalume steel:** The most common residential standing seam material. Steel coated with zinc-alum…
Standing wave
— A wave pattern produced by the superposition of two waves traveling in opposite directions with the …
Stanford AI for Sports
— Tracking data research - Computer vision
Stanford CS224N
— Advanced NLP course - Free lecture videos - Research-oriented
Stanford CS231n: CNNs for Visual Recognition
— http://cs231n.stanford.edu/ - Premier course on deep learning for vision - Lecture videos and assign…
Stanford Human-Centered AI (HAI)
— Regular policy briefs and research on AI governance - **Berkman Klein Center at Harvard** — Research…
Stanford Institute for Human-Centered AI (HAI)
— *Focus:* Advancing AI research, education, policy, and practice for the benefit of humanity - *Notab…
Stanford SIFT method
— Stop, Investigate the source, Find better coverage, Trace claims — provides a structured framework f…
Stanford Sports Analytics
— Research initiatives - Industry connections - Technical papers
Stanford Technology Law Review
— **Harvard Journal of Law & Technology** - **Computer Law & Security Review** (Elsevier) - **Internat…
Star Inflation Research
— Rating creep over time - Calibration adjustments - Cross-era comparisons
STAR Method guides
— Various online resources - **Glassdoor** - Company-specific interview experiences - **Indeed Intervi…
stare decisis
— the principle that courts should follow prior decisions — functions as an error-preservation mechani…
Start broad:
— "What does this system do in business terms?" - "What would happen if this program stopped running?"…
Start hunting:
— Begin with VDPs (no monetary reward but low pressure) - Move to public programs with broad scope - F…
Start over when:
— **You have given contradictory instructions across multiple turns** and the conversation context has…
START statement
— A COBOL statement that positions the file pointer for subsequent sequential READ operations on an in…
Start the first member
— it creates the group 6. **Install and start additional members** — they join the existing group
Start with "so what?"
— why should the viewer care? (implication first, definition later) - **One concept per video** — teac…
Start with a title cell
— Markdown with heading, author, date, purpose 2. **Use section headings** — `##` for major sections, …
Start with CFBD documentation
— Understand available endpoints 2. **Complete Chapter 2 exercises** - Hands-on API practice 3. **Read…
Start with fundamentals
— Understand distributed systems basics before diving into specific technologies.
Start with Harris (2003)
— Chapters 14–16 — to understand market microstructure and price discovery before engaging with manipu…
Start with read-only services
— they have simpler data synchronization and higher risk tolerance - **Use the extraction scorecard** …
Start with the decision
— Analysis without action is wasted effort 2. **Respect the noise** — Small samples mean humility abou…
Start with the foundation
— project structure, database models, basic API. 2. **Build the happy path** — core CRUD functionality…
starting
— not completing, but initiating — shifts the cognitive status of the task from unstarted (maximum Zei…
Starting Center (Player C):
— On Court Net Rating: +4.5 - Off Court Net Rating: -8.2 - On/Off: +12.7
Starting contract terms (brand's first offer):
— Fee: $8,000 total (paid net-60 upon brand approval) - Deliverables: 2 YouTube videos (6+ minutes), 3…
Starting metrics (TikTok + Instagram):
— Views: 22,000 average | Completion: 64% | Saves: 1,800/video | Followers: 41K
Starting metrics (TikTok):
— Views: 45,000 average | Completion: 72% | Shares: 3,200/video | Followers: 89K
Starting metrics (YouTube):
— Views: 3,200 average | Completion: 68% | Save rate: 8.2% | Subscribers/week: 35
Starting metrics:
— Views: 15,000 average | Completion: 61% | Comments: 85/video | Followers/week: 220
Starting state:
— Tablespace T is GBP-dependent (both M1 and M2 have P-locks in IX mode) - Page P (containing the row …
startup order
— it ensures that the `db` service container is started before the `backend` service container. Howeve…
Stat Quest (YouTube)
— https://www.youtube.com/c/joshstarmer - Clear explanations of statistical concepts
State hypotheses:
— $H_0$: The variable follows the specified distribution - $H_a$: The variable does not follow the spe…
State management
— Store Terraform state remotely (S3, Terraform Cloud) to enable team collaboration and prevent state …
State the question clearly
— reframe for nuance 2. **Present the strongest opposing view** — steelman, don't strawman 3. **Presen…
State Tracking
— [ ] Current score differential - [ ] Time remaining (game clock) - [ ] Possession status - [ ] Timeo…
State University Defense:
— Points per game allowed: 18.5 - Yards per play allowed: 4.9 - Red zone TD rate allowed: 52% - Third-…
State University Offense:
— Points per game: 34.2 (12th nationally) - Yards per play: 6.4 - Red zone TD rate: 68% - Third-down c…
State University Special Teams:
— Field goal accuracy: 84% (21/25) - FG accuracy 40+: 75% (6/8) - Punting average (gross): 43.8 yards …
Stated Values and Policies
— Locate and read the platform's Community Guidelines or Terms of Service - Locate any public statemen…
Statement Generation (currently 120 min serial):
— 8 partitions by account number hash - Target: 15 minutes per partition - Depends on interest calcula…
Static Analysis
— The examination of source code without executing it, to detect potential errors, enforce coding stan…
Static Call
— A CALL statement resolved at link-edit time, where the called subprogram is bound into the same *loa…
Static files
— Assets that do not change with each request: CSS, JavaScript, images. Served directly by Flask in de…
Static SQL
— SQL statements embedded in source code at compile time and bound into a *plan* or *package*. The SQL…
Static SQL is bound at BIND time
— access paths, authorization, and validation are all predetermined. This eliminates runtime overhead …
stationary
— i.e., where the first-order variation of $S$ vanishes:
Stationary state
— Ch 2.5 An energy eigenstate: $\hat{H}|\psi_n\rangle = E_n|\psi_n\rangle$. In a stationary state, the…
statistic
— a number calculated from a sample of shots (the 65 she's taken so far). It's his best estimate of th…
Statistical Analysis
— [ ] I've used at least three distinct statistical methods - [ ] Each method is appropriate for the d…
Statistical Analyst (Marcus)
— Needs: pandas, scipy, statsmodels for hypothesis testing - "I'm running regression models on player …
Statistical Foundations
— probability, inference, and the math behind EPA and win probability.
Statistical functions
— MEAN, MEDIAN, STANDARD-DEVIATION, VARIANCE, and RANGE -- provide built-in data analysis capabilities…
Statistical Inference
— Point estimates and sampling distributions - Confidence intervals and their interpretation - Hypothe…
Statistical methods
— Sophisticated modeling 2. **Non-linear effects** - Handling extremes 3. **Market efficiency** - Find…
Statistical power
— The probability that an experiment will detect a true treatment effect if one exists; depends on sam…
Statistical Projection (Year 1):
— Points: 4-8 PPG - Rebounds: 3-5 RPG - Win Shares: 0.5-2.0 - Wide confidence intervals due to data li…
Statistical Red Flags:
— Poor free throw percentage (< 70%) for guards - High turnover rate relative to usage - Low steal rat…
Statistical significance
— Calculate confidence intervals for both QBs - Do they overlap? Is 0.05 significant?
Statistical significance ≠ practical importance
— large samples can make tiny effects "significant" - Always pair hypothesis tests with effect size es…
Statistical thinking
— seeing the world through the lens of variation and uncertainty. This is a gradual shift that begins …
statistical weighting
— the process of adjusting survey data so that the sample matches the known characteristics of the tar…
Statistical/quantitative analysis:
— Calculating metrics and aggregations - Building models (regression, machine learning) - Testing hypo…
Statistics freshness:
— z/OS: SYSIBM.SYSTABLESPACESTATS.REORGINSERTS / REORGUPDATES / REORGDELETES - LUW: SYSCAT.TABLES.STAT…
Statistics is about decisions under uncertainty
— not just formulas and calculations. Frame this as the course's central idea from day one. 2. **Descr…
STATISTICS TABLE(ALL) INDEX(ALL)
— Inline statistics collection. This eliminates the need for a separate RUNSTATS step, saving a full p…
STATISTICS USE PROFILE
— Collects statistics using the statistics profile defined for the table. This eliminates a separate R…
Statistics:
— Understanding of descriptive statistics (mean, median, standard deviation) - Familiarity with probab…
StatQuest with Josh Starmer
— Clear explanations of statistical concepts - Visual approach to learning - https://www.youtube.com/u…
StatQuest with Josh Starmer (YouTube)
— Excellent visual explanations of statistical concepts - Covers regression, probability, inference - …
StatQuest: "Chi-Square Tests" (YouTube)
— visual walkthrough of the goodness-of-fit and independence tests - **Khan Academy: "Chi-Square Distr…
StatQuest: "Confidence Intervals" (YouTube)
— Josh Starmer's explanation of what "95% confident" really means - **OnlineStatBook: Confidence Inter…
StatQuest: "Hypothesis Testing" (YouTube)
— Josh Starmer's explanation of the logic behind hypothesis tests - **Seeing Theory — Hypothesis Testi…
StatQuest: "One-Proportion Z-Test" (YouTube)
— focused walkthrough of the proportion test - **Khan Academy: "Hypothesis Test for a Proportion" (kha…
StatQuest: "One-Way ANOVA" (YouTube)
— clear visual walkthrough of the $F$-test - **Khan Academy: "ANOVA" (khanacademy.org)** — step-by-ste…
StatQuest: "Statistical Power" (YouTube)
— clear visual explanation of what power is and why it matters - **Khan Academy: "Effect Size" (khanac…
StatQuest: "Student's t-test" (YouTube)
— focused walkthrough of the one-sample t-test - **Khan Academy: "One-sample t-test" (khanacademy.org)…
StatQuest: "Two-Sample t-Test" (YouTube)
— clear walkthrough of the independent-samples t-test - **Khan Academy: "Paired t-Test" (khanacademy.o…
STATS Perform
— Tracking data provider - Analytics products
Stats Perform (statsperform.com)
— Formerly Opta. Premier soccer data provider. Event-level data with 2,000+ events per match. Expected…
StatsBomb
— Pitch dimensions: 120 x 80 (arbitrary units, not metres) - Origin: top-left corner of the pitch when…
StatsBomb (statsbomb.com)
— Industry-leading analytics company whose blog and public research set the standard for football anal…
StatsBomb - Set Piece Analysis Series
— URL: statsbomb.com/articles - Key Articles: "The Art of the Set Piece", "Corner Kick Efficiency"
StatsBomb 360
— Full event and tracking data - Freeze frame information - Industry standard for clubs - Link: statsb…
StatsBomb Articles
— Industry-leading analysis - xA methodology explanations - Player evaluation examples - Link: statsbo…
StatsBomb Articles on Goalkeeper Metrics
— URL: statsbomb.com/articles - Key Articles: "PSxG Explained", "Evaluating Goalkeepers", "Distributio…
StatsBomb Blog
— https://statsbomb.com/articles/ - Regular posts on methodology and applications - Case studies from …
StatsBomb Conference
— Annual event showcasing latest research - Mix of academic and industry presentations
Statsbomb Conference Presentations
— Annual research presentations - Industry practitioner talks - Video archives available
StatsBomb Conference Talks
— Tracking data analysis - Industry best practices
StatsBomb Conference.
— Annual event - Technical presentations - Networking opportunities
StatsBomb IQ
— Type: Commercial platform - Defensive Features: PPDA, pressure maps, defensive action analysis
StatsBomb IQ - Goalkeeper Module
— Type: Commercial platform - Features: PSxG, distribution analysis, comprehensive profiles
StatsBomb IQ - Set Piece Module
— Type: Commercial platform - Features: Comprehensive set piece tracking and visualization
StatsBomb IQ Articles on Defensive Metrics
— URL: statsbomb.com/articles - Focus: PPDA, pressing metrics, defensive analysis - Key Articles: "Wha…
StatsBomb Open Data
— Soccer passing data - Transferable methods - https://github.com/statsbomb/open-data
StatsBomb Open Data - Corner Analysis
— Platform: GitHub/Documentation - Focus: Working with corner kick data - Level: Beginner to Intermedi…
StatsBomb Open Data Repository
— https://github.com/statsbomb/open-data - Sample code for data access - Specification documents
StatsBomb Open Data Tutorials
— Platform: GitHub/YouTube - Focus: Working with event data for defensive analysis - Level: Beginner t…
StatsBomb Through Ball Analysis
— Methodology explanation - Player rankings - Tactical implications
Statsbomb's Ted Knutson
— Industry pioneer perspectives - Metric development insights - Historical context
statsbombpy
— `pip install statsbombpy` - Official StatsBomb Python API - Access to open data with built-in xG
statsbombpy (Python)
— GitHub: statsbomb/statsbombpy - Use: Accessing StatsBomb open data
StatsbyLopez YouTube Channel
— Expected points explained - Win probability tutorials - NFL analytics methodology
statsmodels
— Regression analysis - Time series - Statistical testing
Statsmodels documentation
— `statsmodels.org` — The official documentation includes detailed tutorials for time series analysis,…
Status (first subparameter)
— the initial state of the dataset:
Status 21
— Records are not in ascending key order - **Status 22** -- A record with the same primary key already…
Status by chapter:
— Ch 1: Introduced. Study is being designed; Okafor and Reyes meet at conference, debate framing - Ch …
Status code
— A three-digit number in an HTTP response. 200 = success; 404 = not found; 429 = rate limited; 500 = …
Status Codes:
— Spaces = success. GE = not found. GB = end of database. II = duplicate on insert. - DA = key field c…
Status Flags
— Account active/inactive, overdraft protection enrolled, paperless statement preference, foreign nati…
status of your contact
— their position in the occupational hierarchy — significantly predicts how effective they are as a ca…
Status quo bias
— The tendency to prefer the current state of affairs and to require disproportionately strong evidenc…
Status/arc by chapter:
— Ch 2: Introduced — all three in same seminar on relationships; initial characterization - Ch 4: Disc…
Status:
— Do I find it hard to recover when I feel disrespected or talked down to? - Does being corrected in f…
Stay current
— Subscribe to newsletters like Software Lead Weekly, Data Engineering Weekly
Stay procedural when:
— You're writing stateless utility functions (verbs: calculate, parse, convert) - You have a simple in…
Stay roughly the same
— If the predictors are uncorrelated with each other (rare in observational data), adding new variable…
Stay within scope
— the authorization document defines your legal boundaries 3. **Document everything** — your activity …
Staying wins in 1 out of 3 scenarios.
— **Switching wins in 2 out of 3 scenarios.**
Stays on the mainframe:
— Core payment processing (ACID transactions, regulatory requirement) - Settlement (requires DB2 data …
Steady Steve:
— Mean ≈ Median (symmetric distribution) - Low skewness and kurtosis - Narrow IQR (consistent performa…
stem walls
— short foundation walls, typically 18–36 inches tall — built on continuous footings around the buildi…
Stemming
— Reducing a word to its root form by rule (e.g., "running" → "run"), less linguistically precise than…
Step 1 -- Assess Accumulation
— What damage, complexity, or deferred maintenance has accumulated? - How long has it been accumulatin…
Step 1 -- Assess Degrees of Freedom
— How complex is the model, theory, or explanation? - How many adjustable parameters, interpretive cho…
Step 1 -- Assess System Complexity
— How many interacting components does the system have? - How well do you understand the interactions …
Step 1 -- Assess the Stakes
— What is the cost of a suboptimal choice? (Low: cereal. High: surgery.) - Is the decision reversible?…
Step 1 -- Check for Multiples
— Was this discovery made independently by others at roughly the same time? - If so, the discovery was…
Step 1 -- Data Ingestion:
— Input: External APIs (schedule, odds, injury reports, box scores from prior games) - Process: API cl…
Step 1 -- Diagnose the Situation
— Are you trapped at a local optimum? (Performance is adequate but not great, and all incremental impr…
Step 1 -- Identify the Boundary Object
— What shared artifact, concept, or practice sits at the center of the collaboration? - If there is no…
Step 1 -- Identify the Components
— What is the signal? What are you trying to detect? - What is the noise? What irrelevant variation ob…
Step 1 -- Identify the Current Paradigm
— What are the shared assumptions that practitioners take for granted? - What methods are considered l…
Step 1 -- Identify the Dark Knowledge at Stake
— What undocumented knowledge does the affected community possess? - What do experienced members know …
Step 1 -- Identify the Debts
— What resources is the system consuming faster than they regenerate? - What costs is the system defer…
Step 1 -- Identify the Game Structure
— Is this a one-shot interaction or an iterated one? - Can players recognize each other across interac…
Step 1 -- Identify the Knowledge Iceberg
— What explicit knowledge is involved? (Facts, rules, procedures, techniques) - What tacit knowledge i…
Step 1 -- Identify the Landscape
— What quantity is being optimized (minimized or maximized)? - What are the dimensions -- the variable…
Step 1 -- Identify the Map
— What representation am I using? (A model, a metric, a theory, a category, a word, an image) - What w…
Step 1 -- Identify the Narrative
— What is the story? Who are the characters? What is the causal chain? What is the resolution? - Where…
Step 1 -- Identify the Phase
— Is the system in Phase 1 (slow start: small, fragile, invisible growth)? - Phase 2 (explosive growth…
Step 1 -- Identify the Streetlight
— What data was collected? From whom? By what method? Under what conditions? - Why was *this* data col…
Step 1 -- Identify the Structure
— Who is the principal (cares about the outcome)? - Who is the agent (produces the metric)? - What is …
Step 1 -- Identify the Successional Stage
— Is the system in a pioneer stage (new, unstable, dominated by r-selected entities)? - An intermediat…
Step 1 -- Identify the Tradeoff
— What is the exploit option? What reliable reward does it offer? - What is the explore option? What p…
Step 1 -- Identify Your Prior
— What do you believe about this hypothesis before seeing the new evidence? - Where does this belief c…
Step 1 -- Locate on the Arc
— Is this system in first-generation success (metrics improving, stakeholders celebrating)? - Or in ea…
Step 1 -- Map the Coupling Structure
— How tightly are the system's components connected? - Can a failure in one component propagate direct…
Step 1 -- Map the Critical Functions
— What must this system do to fulfill its purpose? - Which functions are essential (failure is catastr…
Step 1 -- Map the Incentive Ecology
— What behavior does the incentive intend to motivate? - What other behaviors could satisfy the incent…
Step 1 -- Map the Information Structure
— Where does the relevant information reside? Is it concentrated in one place or dispersed across many…
Step 1 -- Map the Preconditions
— What technologies, knowledge, skills, cultural conditions, and institutional structures does this in…
Step 1 — Browser audit:
— What browser do you currently use? - Open your browser's extension list. Which extensions are instal…
Step 1 — Is the application still needed?
— If NO: **Retire.** Decommission the application. Ensure data retention requirements are met. - If YE…
Step 1: Assess the current state.
— What AI tools are developers already using (officially or unofficially)? - What types of code and da…
Step 1: Baseline Assessment (2-4 weeks)
— Audit current set piece performance - Calculate xG and conversion rates - Map delivery patterns and …
Step 1: Calculate expected value (EV) of winnings.
— 2% × $1,500 = $30.00 - 10% × $200 = $20.00 - 88% × $0 = $0.00 - Total EV of winnings = $50.00
Step 1: Calibration Data Preparation
— Selected 256 representative conversations from production logs. - Ensured coverage of all financial …
Step 1: Check conditions.
— *Random sample?* Yes — Maya used a random sample from the county's health records. - *Independence?*…
Step 1: Check the Performance Index.
— PI < 1.0 → WLM is giving this work adequate resources. The issue is in the application code, DB2 acc…
Step 1: Choose K
— Decide how many clusters you want. (We'll come back to *how* you choose K. For now, imagine someone …
Step 1: Compilation
— The COBOL compiler translates source code into an *object module*. This contains machine code, but e…
Step 1: Compute the group means and grand mean.
— $\bar{x}_1 = (72 + 78 + 65 + 74 + 80 + 71 + 76 + 69 + 77 + 73)/10 = 73.5$ - $\bar{x}_2 = (68 + 75 + …
Step 1: Define pressure situations
— 4th quarter, margin ≤ 7 points - Final 2 minutes, any margin - Playoff games - Kicks that would tie …
Step 1: Define the Problem
— What are you forecasting? (Binary outcome, multi-class, continuous?) - What is your evaluation metri…
Step 1: Define your posting commitment
— What is your minimum viable output (minimum frequency you'd post even in a difficult week)? - What i…
Step 1: Define your terms.
— A = "Policy is announced this month" - B = "News reports officials are drafting the document" - P(A)…
Step 1: Describe the Practice
— What data is being collected, used, or shared? - What is the stated purpose? - Who are the data subj…
Step 1: Determine your bankroll.
— Identify the total amount you can allocate to betting without impacting your financial stability. - …
Step 1: Filter and prepare data
— Filter to pass plays for each QB - Verify sample sizes are adequate (100+ dropbacks each) - Check fo…
Step 1: Frame the problem
— **Target:** Vaccination rate (a continuous number from 0 to 100) - **Features:** GDP per capita, hea…
Step 1: Hypotheses
— $H_0: p = 0.03$ (county prevalence equals the national rate) - $H_a: p > 0.03$ (county prevalence ex…
Step 1: Individual item classification
— Classify each of the 497 items using a structured prompt with claude-haiku (fast and economical for …
Step 1: M1's transaction begins updating the row.
— M1 requests an L-lock (exclusive) on the row via the CF lock structure - The CF grants the X lock (n…
Step 1: Reconnaissance
— Identify the LLM provider and model version - Map the application's functionality and tool integrati…
Step 1: Set the opening line.
— Use power ratings, models, and situational adjustments. - Post at low limits to gather information.
Step 1: State the hypotheses
— H₀: μ_high = μ_low (no difference in population means) - H₁: μ_high ≠ μ_low (there is a difference)
Step 2 -- Assess Anomaly Accumulation
— What observations or findings do not fit the paradigm's expectations? - Are anomalies being ignored,…
Step 2 -- Assess Coherence
— Does the story hang together? Are the causal connections plausible? Does the conclusion follow from …
Step 2 -- Assess Current Transfer Mechanisms
— How is the explicit knowledge currently transmitted? (Books, courses, documentation) - How is the ta…
Step 2 -- Assess Interactive Complexity
— Do the system's components interact in ways that are well-understood and predictable? - Are there po…
Step 2 -- Assess the Asymmetry
— What consequences does the decision-maker bear? (Financial? Reputational? Physical? Legal?) - What c…
Step 2 -- Assess the Compounding
— For each debt, is the interest rate stable, increasing, or accelerating? - Is each increment of defe…
Step 2 -- Assess the Coordination Requirement
— Do the agents need to act in synchrony? How costly is miscoordination? - Are there standards that mu…
Step 2 -- Assess the Data
— How large is the sample? - How representative is it? - Was the data collected before or after the th…
Step 2 -- Assess the Environment
— How much information is available? (Rich information: use more of it. Sparse/noisy: use less.) - How…
Step 2 -- Assess the Environmental Modifications
— How is the current dominant entity modifying the environment? - What conditions are being created th…
Step 2 -- Assess the Gap
— What aspects of the underlying reality does the metric fail to capture? - How large is the gap betwe…
Step 2 -- Assess the Risks
— What is the cost of staying at the current local optimum? (If it is truly good enough, satisfice. If…
Step 2 -- Assess the Vital Complexity
— What dimensions of the system are being discarded as "noise"? - Are any of these dimensions essentia…
Step 2 -- Check for Simultaneity
— Are others working on the same innovation? Is there evidence of convergence? - If multiple independe…
Step 2 -- Check the Proxy
— What proxy measure does the incentive use? (Cobra skins, rat tails, carbon credits, income threshold…
Step 2 -- Classify the Darkness
— Is the dark knowledge hard to articulate (Polanyi's Paradox)? - Has nobody thought to ask about it (…
Step 2 -- Diagnose the Failure
— Is the shadow of the future too short? (Players do not expect future interaction) - Is defection und…
Step 2 -- Evaluate Repair Capacity
— What are the system's repair and renewal mechanisms? - Are those mechanisms functioning at full capa…
Step 2 -- Evaluate the Evidence
— How likely is this evidence if your hypothesis is true? (The likelihood) - How likely is this eviden…
Step 2 -- Feature Computation:
— Input: Raw data from the data store, feature transformer definitions - Process: Feature transformers…
Step 2 -- Identify Single Points of Failure
— For each critical function, is there a single component whose failure would disable that function en…
Step 2 -- Identify the Carrying Capacity
— What is the ceiling that will cause growth to slow? - Is the carrying capacity fixed or changing? - …
Step 2 -- Identify the Dark
— What data was *not* collected? Who was not sampled? What variables were not measured? - What made th…
Step 2 -- Identify the Distortions
— What features of the territory does the map omit? - Are the omissions well-understood, or have they …
Step 2 -- Identify the Gradient
— What local information does the system use to determine its next step? - How does the system sense t…
Step 2 -- Identify the Unmeasured
— What dimensions of the system are not being tracked? - What did practitioners say the metrics miss? …
Step 2 -- Look for Scaling Walls
— At what size will the current architecture reach its limits? - What is the mechanism of the limit? (…
Step 2 -- Map the Communities
— What communities use the boundary object? - How does each community interpret it? What does each com…
Step 2 -- Map the Errors
— What does a false positive look like? What are its consequences? - What does a false negative look l…
Step 2 -- Map the Preconditions
— What knowledge, tools, concepts, and institutional conditions had to be in place for this discovery?…
Step 2 — App permission audit:
— On your smartphone, go to Settings > Privacy and review which apps have access to: location, microph…
Step 2 — Venue-level dark percentages:
— XLON Dark: 3,800,000 / 86,690,000 = **4.38%** — **BREACH (>4%)** - BATD: 2,100,000 / 86,690,000 = **…
Step 2: Assess your edge.
— If you have a documented, backtested edge with at least 200+ bets of history: proceed to Kelly-based…
Step 2: Build Diverse Base Models
— Start with at least 3-5 models using different approaches: - A simple baseline (historical base rate…
Step 2: Calculate basic descriptive statistics.
— Mean (average) score for each condition - Range (highest and lowest scores) for each condition - Mea…
Step 2: Check Conditions
— Random sample? Yes. - Independence? $500 \leq 0.10 \times 85{,}000$. ✓ - Success-failure? $np_0 = 50…
Step 2: Check conditions.
— *Random sample?* Yes. - *Independence?* $800 \leq 0.10 \times 500{,}000$. ✓ - *Success-failure?* $n\…
Step 2: Check the dispatching priority.
— Priority is in the expected range for its importance → WLM is doing what you asked. The system may b…
Step 2: Drop random anchors
— Place K points randomly in your data space. These are the initial *centroids* — the centers of your …
Step 2: Estimate the likelihoods.
— P(B|A): If the policy IS going to be announced, how likely is it that drafting news would leak? Let'…
Step 2: Human validation sample
— Present the customer success director with a random sample of 50 classified items and ask her to mar…
Step 2: Identify stakeholders.
— Engineering leadership - Legal and compliance teams - Information security - Privacy officers - HR (…
Step 2: Identify the schema
— what does your niche's "default" format look like?
Step 2: Install
— *Windows*: Run the `.exe` installer. When prompted, check "Add Anaconda to my PATH environment varia…
Step 2: Link-edit (Bind)
— The linkage editor (or binder, its modern replacement) resolves external references: - For **static …
Step 2: M1's transaction commits.
— M1 writes the commit log record to its local active log - M1 writes the dirty page P to the GBP (thi…
Step 2: Observe early action.
— If sharp bettors hit one side, move the line. - If only recreational bettors bet, hold the line and …
Step 2: Personnel Optimization (2-4 weeks)
— Match player strengths to target zones - Design movement patterns for key personnel - Develop primar…
Step 2: Physiological regulation — body first.
— Cold water on face/wrists (activates dive reflex, slows heart rate) - Extended exhale (4 counts in, …
Step 2: Specific factors.
— Governor Smith has a 52% approval rating (moderate, not strong) - Her primary opponent is a well-fun…
Step 2: Stakeholder Mapping
— Who benefits from this practice? - Who bears the risks? - Who has been consulted? - Who is absent fr…
Step 2: Subtract the entry fee.
— EV of the bet = $50.00 − $50.00 = $0.00
Step 2: Univariate analysis for each QB
— Calculate summary statistics (mean, median, std of EPA) - Create histograms of EPA distribution for …
Step 2: Verify CLT conditions.
— $n\hat{p} = 1000 \times 0.54 = 540 \geq 10$ ✓ - $n(1-\hat{p}) = 1000 \times 0.46 = 460 \geq 10$ ✓ - …
Step 3 -- Apply Structural Remedies
— Lengthen the shadow of the future (increase the probability of repeated interaction) - Improve detec…
Step 3 -- Assess Interpretive Flexibility
— Does the boundary object sustain multiple valid interpretations? - Is the flexibility productive (en…
Step 3 -- Assess Lock-In
— What institutional constituencies depend on the continuation of the legibility regime? - What sunk c…
Step 3 -- Assess Observability
— Can the incentive administrator observe whether agents are performing the intended behavior or gamin…
Step 3 -- Assess Qualitative Changes
— What emergent properties will appear at the new scale that do not exist at the current scale? - What…
Step 3 -- Assess the Adaptation Requirement
— Do conditions vary significantly across locations, agents, or time periods? - How important is speed…
Step 3 -- Assess the Confusion Level
— Am I at Level 1 (using the map consciously, aware of its limits)? - Am I at Level 2 (treating the ma…
Step 3 -- Assess the Expanding Frontier
— What new rooms will this innovation open? What future innovations will it make possible? - How many …
Step 3 -- Assess the Local Optimum Risk
— Does the landscape have multiple optima? - Is the system likely to get stuck? How deep and wide are …
Step 3 -- Assess the Pressure
— How high are the stakes tied to the metric? (Career, funding, reputation, survival) - Is the optimiz…
Step 3 -- Assess the Risk of Loss
— How many people currently hold this dark knowledge? - How is it being transmitted to new members (if…
Step 3 -- Assess the Risk Profile
— What is the distribution of disruptions this system faces? Are they frequent and small, or rare and …
Step 3 -- Assess the Structural Forces
— Is measurement availability driving the bias (studying what is easy to measure)? - Are institutional…
Step 3 -- Assess Visibility Asymmetry
— Are the benefits of the intervention immediate and measurable? - Are the costs delayed, diffuse, or …
Step 3 -- Check Correspondence
— What evidence supports the story? What evidence contradicts it? - Has contradicting evidence been ac…
Step 3 -- Check for Legibility Traps
— Is there pressure to make the tacit knowledge legible (articulable, measurable, scalable)? - If so, …
Step 3 -- Check for Out-of-Sample Testing
— Has the claim been tested on independent data? - Has the finding been replicated? - Has the strategy…
Step 3 -- Check the Base Rate
— How common is the signal in the population being tested? - If the base rate is low, expect a high ra…
Step 3 -- Check the Distribution
— Is this a Gaussian domain (outcomes cluster near the mean) or a power-law domain (extreme outcomes d…
Step 3 -- Choose Your Strategy
— Low stakes + low variation + time pressure = fast satisficing (habit, recognition, single cue) - Hig…
Step 3 -- Classify the Legibility
— Is this legibility-as-observation (thermometer) or legibility-as-intervention (reshaping the system)…
Step 3 -- Design the Perturbation
— How large a perturbation is needed? (Small perturbations for escaping shallow local optima; large pe…
Step 3 -- Evaluate Strategy Fit
— Is the entity you are advising or managing using a strategy appropriate to its successional stage? -…
Step 3 -- Evaluate the Information Quality
— Do the decision-maker's choices reflect genuine beliefs about what is best? Or are they shaped by ca…
Step 3 -- Identify the Propagation Pathways
— Through what connections would failure propagate? - Are these the same connections that provide norm…
Step 3 -- Locate the Inflection Point
— Has the system passed its inflection point? Is growth accelerating or decelerating? - If still accel…
Step 3 -- Locate the Threshold
— How much more debt can the system absorb before servicing costs exceed productive capacity? - Are th…
Step 3 -- Look for the New Paradigm
— Is an alternative framework emerging? - Does it explain the anomalies that the current paradigm cann…
Step 3 -- Measure Rigidity
— How difficult is it to change the system in response to new demands? - Are there areas of the system…
Step 3 -- Model Prediction:
— Input: Feature vectors for all 8 games, active model from model registry - Process: The prediction s…
Step 3 -- Separate Content from Form
— What is the fundamental insight (the content)? This is what multiple discoverers converge on. - What…
Step 3 — Account security audit:
— List your five most important accounts (email, banking, social media, etc.) - For each: (a) Is your …
Step 3 — Write the truth sandwich correction:
— *Opening (truth first — approximately 2 sentences):* State the accurate claim with emotional engagem…
Step 3: Apply each framework:
— **Utilitarian:** What are the consequences? Who benefits, who is harmed, and by how much? - **Deonto…
Step 3: Apply the test to each group.
— Of the 100 with disease: 99% test positive → **99 true positives**, 1 false negative. - Of the 99,90…
Step 3: Apply the three tests
— **The disclosure test:** Would you be comfortable if the full details of this action appeared in a w…
Step 3: Boundary Testing
— Test content policy bypasses - Attempt to access restricted functionality - Try to make the LLM gene…
Step 3: Check for contention.
— Is there higher-importance work that is also missing its goal? If so, WLM is correctly prioritizing …
Step 3: Choose one dimension to violate
— don't change everything (confusing). Change one thing dramatically.
Step 3: Choose your Kelly fraction.
— New model or uncertain edge: Quarter Kelly (0.25) - Moderately confident, some track record: Half Ke…
Step 3: Combining estimates.
— Base rate estimate: 65% - Polling-based estimate: 75% - Qualitative assessment (strong campaign infr…
Step 3: Define risk tolerance.
— How much IP risk is acceptable? - What data classifications can be shared with external tools? - Wha…
Step 3: Direct comparison
— Create overlapping density plots or side-by-side box plots - Calculate and compare key metrics: EPA/…
Step 3: Environmental Design
— Private space: The open-plan office is not appropriate. Sam should book the small conference room fo…
Step 3: Ethical Analysis (Multi-Framework)
— *Consequences:* What are the best-case and worst-case outcomes? How likely is each? - *Rights and di…
Step 3: Evaluate Individual Models
— Assess each model's calibration, discrimination (AUC), and overall accuracy (Brier score). - Use pro…
Step 3: Identify structural power constraints
— Economic dependencies operating in this situation: - Gatekeeping power: what can they control that y…
Step 3: Load
— At execution time, the system's program loader reads the load module from the load library into memo…
Step 3: Look for patterns.
— Did the evidence-based strategy group perform better, as predicted? - Was the difference large or sm…
Step 3: M2's transaction reads the row.
— M2 checks its local buffer pool for page P — finds it marked invalid - M2 reads page P from the GBP …
Step 3: Manage the book.
— If one side has significantly more liability, consider shading the line (adjusting odds slightly to …
Step 3: Opponent Integration (Ongoing)
— Build opponent defensive tendency database - Create pre-match scouting reports - Adjust routines bas…
Step 3: Recalibration (if needed)
— If the validation sample showed systematic errors in specific categories, revise the classification …
Step 3: Sample size considerations
— Require minimum 10 pressure kicks - Calculate confidence intervals - Use Bayesian approach for small…
Step 3: Sensory grounding — present focus.
— Name five things you can see right now - Name four things you can physically feel - Name three sound…
Step 4 -- Apply the Five Laws
— Law 1: What ecology of strategic responses will this incentive create? List at least five possible r…
Step 4 -- Assess Stacked S-Curve Readiness
— Is a new S-curve being developed while the current one is still healthy? - If yes: is it being devel…
Step 4 -- Assess the Narrative
— Is the story being told as a heroic genius narrative or as a structural inevitability narrative? - W…
Step 4 -- Assess the Social Dynamics
— Is the old guard dismissing the alternative? If so, are the dismissals substantive or reflexive? - A…
Step 4 -- Check Against Ostrom's Principles
— Are boundaries clear? - Do rules match local conditions? - Do affected parties participate in rule-m…
Step 4 -- Check for Cobra Effects
— Will the formalization create the illusion of knowledge preservation? - Will the illusion reduce inv…
Step 4 -- Check for Debt Traps
— Is the system spending all available resources on debt servicing (interest) rather than principal re…
Step 4 -- Check for Feedback Loops
— Does the current pattern of observation reinforce itself? Does data generation in one area lead to m…
Step 4 -- Check for Intervention Bias
— Is there institutional pressure to "do something"? - Will the decision-maker be rewarded for acting …
Step 4 -- Check for Map-Shaped Territory
— Has the map begun to shape the territory? (Are people acting as though the map's categories are natu…
Step 4 -- Check for Multiple Testing
— How many hypotheses were tested before this one was selected? - Were corrections applied for multipl…
Step 4 -- Choose the Right Type of Redundancy
— Duplication: for protection against random, independent component failures - Diversity: for protecti…
Step 4 -- Construct the Counter-Narrative
— What is the strongest story that leads to the opposite conclusion from the same evidence? - Is the c…
Step 4 -- Design the Cooling Schedule
— How will you transition from exploration back to refinement? - What signals will tell you that you h…
Step 4 -- Design the Hybrid
— Centralize what needs coordination: standards, strategy, conflict resolution, accountability. - Dist…
Step 4 -- Edge Computation and Bet Decision:
— Input: Predicted probabilities, current market odds from multiple sportsbooks - Process: For each ga…
Step 4 -- Estimate the Consequences
— What would go wrong if this dark knowledge were lost? - Would the consequences be immediately visibl…
Step 4 -- Evaluate Constraints
— Are the constraints on this innovation functioning as enablers (focusing exploration productively) o…
Step 4 -- Evaluate Environmental Stability
— Is the landscape changing? If so, how fast? - If stable: you can safely reduce exploration over time…
Step 4 -- Evaluate Escape Routes
— Can decision-making authority be distributed to where metis resides (polycentricity)? - Can qualitat…
Step 4 -- Evaluate the Threshold
— Where is the detection threshold currently set? - Does the threshold reflect an explicit values choi…
Step 4 -- Evaluate the Tradeoff
— What is the legitimate purpose of the legibility (coordination, accountability, safety, rights)? - W…
Step 4 -- Locate the Circuit Breakers
— Where can the system be deliberately disconnected to contain a cascade? - Are the circuit breakers a…
Step 4 -- Locate the Threshold
— How close is the system to the point where maintenance costs exceed productive capacity? - What frac…
Step 4 -- Look for Arrested Succession
— Is a dominant entity actively preventing successor establishment? - What mechanisms maintain the arr…
Step 4 -- Look for Escape Mechanisms
— Does the system have any mechanism for escaping local optima? - Is there randomness, disruption, or …
Step 4 -- Look for Symptoms
— Are the metrics improving while qualitative assessments suggest no improvement? - Are there statisti…
Step 4 -- Set the Threshold
— Too low: you accept genuinely bad options - Too high: you are maximizing under another name - Just r…
Step 4 -- Update
— Strong evidence + strong prior = strong posterior (in the same direction) - Strong evidence against …
Step 4 — Communication audit:
— Which messaging apps do you currently use? Does any provide E2EE? - Who in your life already uses Si…
Step 4: Assess safety
— Physical safety concern? (Y/N, describe if yes) - Economic safety risk: (Low/Medium/High, describe) …
Step 4: Calculate risk of ruin.
— Use the Monte Carlo simulator from Section 4.5 to estimate your risk of ruin under your chosen strat…
Step 4: Choose a Combination Method
— **Start with simple averaging** as a baseline. - **Try weighted averaging** if you have enough histo…
Step 4: Closing line.
— The closing line reflects the full information set: sharp action, recreational action, news, and the…
Step 4: Consider alternative explanations.
— Could prior knowledge differences explain the results? - Could motivation or effort differences expl…
Step 4: Contextual analysis
— Compare in different situations (down, field position, score) - Look at supporting cast (receiver qu…
Step 4: Continuous Refinement (Ongoing)
— Track success rates by routine type - Monitor opponent adaptation - Develop new variations as needed
Step 4: Find $J$ values for each term.
— ${}^1S$: $J = 0$ $\Rightarrow$ ${}^1S_0$ - ${}^3P$: $J = 2, 1, 0$ $\Rightarrow$ ${}^3P_2, {}^3P_1, {…
Step 4: Synthesis
— With validated classifications, run the frequency analysis and generate the synthesis narrative usin…
Step 4: Test the "phone test"
— if someone described your format to a friend, would the friend recognize it from the description alo…
Step 4: Year-over-year analysis
— Does clutch performance persist? - Correlation between years
Step 5 -- Act on the Diagnosis
— If the system is in first-generation success: introduce mixed methods now, before the trap closes - …
Step 5 -- Anticipate the Next Stage
— Based on the environmental modifications underway, what kind of entity will the next stage favor? - …
Step 5 -- Apply Countermeasures
— Can the conclusion be triangulated from multiple independent sources? - Would mixed methods (combini…
Step 5 -- Apply Occam's Razor
— Is there a simpler explanation that accounts for the key evidence? - Does the added complexity of th…
Step 5 -- Apply Remedies
— Add independent metrics that capture different dimensions of the reality - Supplement quantitative m…
Step 5 -- Apply the Outside View
— Step outside the story. What does the reference class say? What do the base rates predict? - If the …
Step 5 -- Apply the Part V Lifecycle Diagnostic
— What scaling constraints shape the carrying capacity (Ch. 29)? - What debts have accumulated during …
Step 5 -- Assess Path Dependence
— Is this innovation creating path dependence? Will it establish a standard or practice that becomes d…
Step 5 -- Assess Retirement Risk
— Who are the experts? What tacit knowledge do they hold? - What would be lost if they departed tomorr…
Step 5 -- Calibrate
— Can the legibility requirement be reduced to the minimum necessary for its purpose? - Can the "under…
Step 5 -- Check for Common Errors
— Are you committing base rate neglect? (Ignoring the prior) - Are you committing the prosecutor's fal…
Step 5 -- Check for Failure Modes
— Capture: Has one community co-opted the boundary object? - Loss of common identity: Do communities s…
Step 5 -- Check for Optimization Traps
— Are you over-researching a low-stakes decision? (Paradox of choice) - Are you optimizing a metric th…
Step 5 -- Consider Improvements
— Can the noise floor be reduced? - Can the signal be amplified? - Can a better detector be built? - A…
Step 5 -- Consider the Landscape's Origin
— Who or what shaped this landscape? Can it be reshaped? - Would changing incentives, constraints, or …
Step 5 -- Consider Via Negativa
— Is there an existing intervention that could be removed rather than a new one that must be added? - …
Step 5 -- Design for Honest Information
— What structural change would increase consequence-bearing for the most insulated decision-maker? - W…
Step 5 -- Design for Resilience
— Can the incentive system include multiple, independent measures rather than a single proxy? - Can th…
Step 5 -- Design Preservation Strategies
— Which dark knowledge can be partially extracted (through debriefing, storytelling, or documentation)…
Step 5 -- Evaluate Jubilee Mechanisms
— Does the system have a built-in mechanism for periodic debt cancellation? - If not, what would a jub…
Step 5 -- Evaluate Rejuvenation Options
— Can accumulated damage be cleared? At what cost? - Can repair capacity be restored? What would it ta…
Step 5 -- Evaluate the Dark Side
— Could the new paradigm be wrong? What evidence would refute it? - Could the social script be weaponi…
Step 5 -- Evaluate the Swiss Cheese Layers
— How many independent layers of defense exist between a trigger and catastrophic failure? - Are the l…
Step 5 -- Execute and Monitor
— Introduce the perturbation and observe the results. - Accept temporary worsening as the cost of expl…
Step 5 -- Extract the General Pattern
— Does this discovery illustrate a broader pattern about how innovation works? - Can the precondition …
Step 5 -- Guard Against Biases
— Are you exploiting because it is genuinely optimal, or because you are risk-averse and prefer the ce…
Step 5 -- Guard Against Failure Modes
— Centralization failure: single point of failure, knowledge problem, information bottleneck, slow ada…
Step 5 -- Plan for the Pace-of-Life Shift
— How will the system's speed of operation change at the new scale? - If the system will slow down (su…
Step 5 -- Protect the Redundancy
— Who has the authority to cut this redundancy in the name of efficiency? - What institutional mechani…
Step 5 -- Risk Management:
— Input: 3 bet recommendations, current portfolio state (today's existing bets, cumulative P&L) - Proc…
Step 5 -- Seek Additional Maps
— What other maps of this territory exist? - What does each alternative map capture that mine misses? …
Step 5: Choose your approach
— Direct confrontation: appropriate? (Y/N) - If yes, which strategies from the ladder apply? - If no, …
Step 5: Design retrieval cues
— what elements of your format might viewers encounter in their daily lives? Optimize for real-world t…
Step 5: Equivalents.
— Transatlantic flights: 60.32 / 1600 = 0.04 flights (a small fraction) - Car miles: 60.32 / 0.21 = 28…
Step 5: Indirect Injection Testing
— If the LLM processes external data (URLs, documents, emails), embed adversarial instructions in thos…
Step 5: Mitigation and Monitoring
— What safeguards will be implemented? - How will the practice be monitored for unintended consequence…
Step 5: Repeat Steps 3 and 4
— With the centroids in new positions, some data points are now closer to a different centroid. Reassi…
Step 5: Set review points.
— Review your unit size monthly or quarterly. - Increase unit size only after sustained growth (25--50…
Step 5: Validate the Ensemble
— Use time-series cross-validation (never peek at the future). - Compare the ensemble to each individu…
Step 6 -- Act Before the Loop Closes
— If the senescence feedback loop has not yet become self-sustaining, intervene now. - If the loop is …
Step 6 -- Act Before the Trap Closes
— If the system is approaching the debt trap, intervene before the feedback loop becomes self-sustaini…
Step 6 -- Apply the Burden of Proof
— Has the intervener demonstrated that expected benefits exceed expected costs? - Has the cost assessm…
Step 6 -- Assess Evolution
— Is the boundary object evolving appropriately as communities change? - Is it at risk of lock-in to a…
Step 6 -- Assess the Stakes
— Who benefits from the current pattern of illumination? Who is left in the dark? - What decisions are…
Step 6 -- Bet Execution:
— Input: Approved bets with target sportsbook and odds - Process: The execution engine verifies that t…
Step 6 -- Check for Skin in the Game
— Who is telling the story? Do they bear the consequences of acting on it? - If the narrator does not …
Step 6 -- Check Your Priors
— Do you want this claim to be true? - Are you evaluating the evidence differently because of your pri…
Step 6 -- Choose Your Response
— If the paradigm shift appears genuine: position yourself to learn the new framework without abandoni…
Step 6 -- Decide: Build, Jump, or Let Go
— If in Phase 1: invest in the fundamentals. Build the base. Be patient. The growth phase is coming if…
Step 6 -- Decide: Ride the Wave or Build the Ark
— If you are in a pioneer stage: invest in environmental modification. Build the soil. Create the cond…
Step 6 -- Determine Perrow Quadrant
— Is this system tightly coupled AND interactively complex (normal accidents quadrant)? - If so, casca…
Step 6 -- Monitor for Organizational Amnesia
— After any disruption (layoff, reorganization, retirement wave), monitor for the characteristic signs…
Step 6: Monitor and Update
— Track ensemble performance over time. - Periodically re-estimate combination weights. - Add new mode…
Step 7 -- Monitoring and Logging:
— Input: Data from all prior steps - Process: All predictions, decisions, and executions are logged. M…
Step COMPILE:
— `PGM=IGYCRCTL` — The IBM Enterprise COBOL compiler - `PARM='RENT,LIST,MAP,XREF,OFFSET'` — Compiler o…
Step GO:
— `PGM=ACCTINQ` — Run the compiled program - `COND=(8,LT)` — Skip if any previous step had a return co…
Step LKED:
— `PGM=IEWL` — The linkage editor (linker) - `COND=(8,LT,COMPILE)` — Skip this step if the COMPILE ste…
Step potential:
— Partial quantum reflection even when $E > V_0$ — no classical analogue. - Total reflection for $E < …
Step-by-step interpretation:
— **PLANNO 1, METHOD 0:** EMPLOYEE is the outer table (METHOD 0 = first table accessed). ACCESSTYPE = …
STEPPS
— remains the most comprehensive model for understanding shareability.
STEPPS framework
— Berger and Milkman's model of content virality: Social currency, Triggers, Emotion, Public, Practica…
Steps, heart rate, calories burned
— personal health/biometric data (clearly personal, as it relates to an identifiable individual via th…
Stereotype
— a cognitive schema associating traits and expectations with members of a social category
Stereotype and Identity (Chapters 14, 35)
— How do your interviewees talk about how Appalachia is perceived by outsiders? Do they experience ste…
Stereotype threat
— Steele and Aronson's (1995) concept of the threat of confirming a negative stereotype about one's gr…
Stern & Stern's COBOL for the 21st Century
— Classic textbook with thorough coverage of the master-transaction update pattern, including pseudoco…
Stern, Stern, & Ley, "COBOL for the 21st Century"
— Chapter on copybooks and program libraries. Provides a textbook treatment of COPY and REPLACING with…
Sternberg's triangular theory
— Robert Sternberg's model proposing that love consists of three components — passion, intimacy, and c…
stiffness
— a resistance to bending. This stiffness causes the higher modes to vibrate at frequencies slightly h…
stigmergy
— coordination through modification of the shared environment.
Still difficult to measure:
— Release quality off the line - Route-running precision - Contested catch ability (truly isolating it…
stochastic gradient descent
— which jostles the system out of shallow local optima and saddle points. Learning rate schedules star…
Stochastic processes
— Mathematical systems that contain inherent randomness. Content virality is stochastic — even with pe…
stockades
— where they were held in conditions that contemporary observers described as appalling.
Stop
— interrupts the emotional automaticity that drives impulsive sharing.
Stop. Don't sign without addressing these:
— **Unlimited, perpetual usage rights for the base rate.** The brand wants your creative work forever.…
Stopping Point 1
— Take a break here if you need one. When you return, we'll tackle the most famous (and most misunders…
Stopping Point 2
— Good place for a break. When you return, we'll define exactly what deliberate practice is — and isn'…
Stopping Point 3
— Take a break if needed. When you return, we'll tackle why experts often struggle to teach beginners.
Stopping Point 4
— Final stopping point. The remaining sections are the retrieval prompts, progressive project, spaced …
Stopping research after confirmation
— finding evidence for the narrative you wanted to tell and not asking "what would complicate this?" 2…
Stops
— the number of times a player ends an opponent's possession:
Stopwords
— Common words (the, a, is) that are filtered out because they carry little analytical meaning.
Storage Class
— defines where and how data is stored from a performance perspective. A storage class named `HIGHPERF…
Storage retention cost
— total DASD and tape GB at steady state
Storage savings:
— A 62% compression ratio on 840 GB of TRANSACTION_HISTORY saves 520 GB of disk. - At $0.10/GB/month f…
Storage Section:
— Region size requested and region size used - High-water mark for virtual storage below and above the…
Storage Statistics
— How much storage is in use? Key fields: - Current and peak allocation for each DSA sub-pool - Number…
STORAGE(xx,yy,zz) explained:
— `xx` = initial value for heap storage. `00` fills with binary zeros. Helps catch uninitialized data …
Stored Procedure
— A named program registered in the DB2 catalog that can be invoked via the SQL CALL statement. Encaps…
Stores data in structured tables
— rows and columns, like a spreadsheet, but with strict rules about what goes in each column 2. **Answ…
storge
— the slow, comfortable, friendship-based love — in several relationships that never quite sparked int…
story
— a narrative that integrates past experience, present life, and anticipated future into a coherent ac…
story spine
— a fill-in-the-blank template for story structure:
storytelling
— the extended narrative sequences that allow one person to present a version of themselves through ho…
Storytime content:
— Setup: "I thought moving to a new city would be the worst decision of my life..." [establish expecta…
Strange attractors govern expressive performance
— timing, dynamics, and timbre variations in expert performance are not errors but structured irregula…
Strange Loop
— Software engineering conference with data systems content.
Strange Loop Conference
— Annual talks on distributed systems and stream processing. - **QCon** - Software architecture talks …
Stranger-on-a-train effect
— The well-documented phenomenon of people sharing deeply personal information with strangers they wil…
Strangler Fig Pattern
— A strategy for incrementally replacing a legacy system by gradually building new functionality along…
Strangler Pattern
— A modernization strategy (named by Martin Fowler) in which legacy functionality is gradually replace…
StratCom
— Strategic Communications; also the informal name for NATO's Strategic Communications Centre of Excel…
Strategic ambiguity
— The deliberate construction of verbal messages with multiple possible interpretations, allowing inte…
Strategic Analysis:
— Fourth down decisions - Play-calling tendencies - Situational aggressiveness
Strategic challenges:
— Whether to establish EU-based data processing infrastructure or rely on cross-border transfer mechan…
Strategic clarity
— knowing which AI investments create competitive advantage and which are table stakes - **Organizatio…
Strategic coherence
— The pieces have to fit together. Your platform choice should follow from your audience. Your revenue…
Strategic communication
— Purposeful communication designed to achieve specific goals; when ethical, distinguishable from prop…
Strategic Control Section:
— What native monetization options exist on this platform? - Can you export your audience's contact in…
Strategic Foundation
— [ ] Regulatory obligation inventory completed and current - [ ] Compliance maturity assessment condu…
Strategic omission
— The deliberate absence from a message of information that, if present, would change the audience's e…
Strategic Omissions
— What information, if included, would significantly change the audience's assessment of the message? …
Strategic passivity
— The behavioral tendency to withhold initiation as a self-protection strategy that avoids the risk of…
Strategic Planning Phase
— Start with the **AI Maturity Self-Assessment** (Template 15) to understand where you are. - Use the …
Strategic questions:
— Which stream has the highest effective hourly rate? Does this surprise you? - Which stream has the m…
Strategic restatement
— Paraphrasing another person's position under pressure with full accuracy — including uncomfortable o…
Strategic silence
— The deliberate use of conversational pauses as a listening tool; the practice of allowing space afte…
Strategic vision
— The ability to connect AI capabilities to business strategy, build organizational capacity for AI ad…
strategically rigid
— they play similarly regardless of the score. Teams with large $\|\Delta \mathbf{v}_s\|$ are **strate…
Strategies for finding analogues:
— **Think about who else faces this structure.** Who else needs to transfer a complex system between t…
Strategies for keeping PRs small with AI tools:
— **Split AI output across multiple PRs.** If you ask an AI to generate an entire feature, break the r…
Strategies to improve calibration:
— Reference class forecasting (base rate before case-specific reasoning) - Premortem analysis (imagine…
Strategies:
— Dedicate a full 20--30 minutes to NULLs early in the course. Do not treat NULL handling as an aside.…
Strategy B: Register as DCM (Kalshi's approach)
— Revenue: Lower initially (compliance costs, slower time to market), higher long-term (US market acce…
Strategy Pattern
— A **design pattern** that defines a family of interchangeable algorithms, encapsulating each one and…
Strategy Phase
— the period where individual AI projects coalesce into an organizational capability. Ravi Mehta estab…
Stratified
— stratify by urban/suburban/rural and sample within each stratum. This ensures representation of each…
Stratified K-Fold
— A cross-validation variant that preserves the class distribution (e.g., goal/no-goal ratio) in each …
Stratified sampling
— A sampling procedure in which the population is divided into non-overlapping groups (strata), and se…
straw poll
— an informal, unscientific survey conducted by a newspaper or organization, typically by approaching …
Streak mechanism
— This is a variable reward schedule combined with loss aversion. The streak creates an artificial cos…
Streaks
— Consecutive sequences of similar outcomes. Most apparent streaks in human performance data are consi…
Stream 1: Pre-trade control enhancement
— Price band checks extended to market orders: for any market order, the system fetches the current or…
Stream 2: Data quality validation
— Currency denomination validation added to all pricing feeds including fallbacks: any price sourced f…
Stream 3: Real-time monitoring enhancement
— Volume rate alerts: in addition to absolute volume limits, FI-EXEC-03 now monitors its execution rat…
Stream co-watches and game nights
— for gaming communities, playing together in voice channels is one of the most powerful engagement ev…
Streaming coordination networks
— the most active area of Brazilian ARMY organizational activity. Streaming coordination in Brazil req…
Streamlit
— The fastest way to turn a Python script into a shareable web app. Excellent for prototyping dashboar…
Streamlit documentation
— `docs.streamlit.io` — Clear, well-organized documentation with a gallery of example applications. Th…
Street-level drive-by
— before you even park. Look at the slope of the grade relative to the house. Do neighboring propertie…
Streetlight effect
— The observational bias of searching for answers only where it is easy to look (under the streetlight…
Streitbare Demokratie (Militant democracy)
— The doctrine, embedded in the West German Basic Law, that democracies must be constitutionally prepa…
Strength of Schedule
— how to measure and adjust for opponent quality.
Strength of Schedule Adjustment:
— `home_sos`: Average net rating of the home team's opponents over their last 15 games. A team with a …
Strengthened provisions:
— The definition of "sharing" was expanded to cover cross-context behavioral advertising, closing a lo…
Strengths in this context:
— Produces a diverse student body that "looks like" the applicant pool - Addresses the historical excl…
Strengths of Event Data:
— Widely available for most professional matches across dozens of leagues - Standardized formats allow…
Strengths of LIME:
— Works with any model (model-agnostic) - Produces intuitive, feature-attribution explanations - Can e…
Strengths of OSSTMM:
— Quantitative metrics (rav) provide measurable, comparable results - Channel-based approach ensures c…
Strengths of PTES:
— Comprehensive coverage of the entire engagement lifecycle - Explicit inclusion of threat modeling an…
Strengths of SHAP:
— Mathematically grounded in a framework with desirable properties (consistency, local accuracy, effic…
Strengths of the analogy:
— Both the director and the physicist enforce rules that keep a complex system in a specified, coheren…
Strengths of the OWASP Testing Guide:
— Extremely detailed, prescriptive test cases for web applications - Regularly updated by a large comm…
Strengths of the study:
— The ethological methodology is genuinely appropriate for the research question — it allowed descript…
Strengths of Tracking Data:
— Captures everything that happens on the pitch, including off-ball movement - Enables analysis of pre…
Strengths:
— Flexibility to adapt to rapidly evolving technology - Lower compliance costs for businesses (no new …
Stress inoculation
— Meichenbaum's approach to building resilience through graduated exposure to manageable stressors com…
Striker metrics:
— **Non-penalty goals per 90** (npG/90): Removes penalty distortion - **Non-penalty xG per 90** (npxG/…
STRING
— A COBOL statement that concatenates the contents of multiple data items into a single data item, usi…
string band
— was the standard musical unit of rural Appalachian life.
String concatenation for URL joining
— use `urljoin()`. String concatenation breaks on paths starting with `/`.
String functions
— especially TRIM, UPPER-CASE, LOWER-CASE, and CONCATENATE -- dramatically simplify text processing ta…
STRING statement
— A COBOL statement that concatenates partial or complete contents of multiple data items into a singl…
strings
— Python's text processing powerhouse. You'll learn to slice, search, transform, and format text data.…
Strings are immutable
— you can't change them in place, only create new ones - **String methods** like `split()`, `join()`, …
Strip whitespace
— remove leading/trailing spaces with `.str.strip()` 2. **Standardize case** — convert to lowercase (o…
stroke style
— the technique of striking the strings with the back of the fingernail in a downward motion while the…
Strong alignment:
— Thumbnail: Marcus looking shocked with text "YOUR BRAIN LIES TO YOU" - Title: "5 Times Your Memory I…
Strong case for gas furnace:
— Gas prices in your market are significantly lower than electricity on a BTU-equivalent basis - Your …
Strong case for heat pump:
— You don't have gas service and are currently using electric resistance heat, oil, or propane (all ex…
Strong case for variable-speed:
— You live in a humid climate (Southeast, Gulf Coast, mid-Atlantic) where dehumidification matters as …
Strong data foundations
— the organizations that had invested in data quality and infrastructure before the generative AI wave…
Strong Positive Correlation:
— xG and actual goals (r ≈ 0.85): This validates xG as a predictive metric - Shots and xG (r ≈ 0.75): …
Strong ties
— Close, frequent connections between individuals (friends, family, close colleagues); important for t…
Strong turnover margins
— Created more turnovers than expected 2. **Close game success** - Won a disproportionate share of one…
Structural
— a mathematical structure that appears in music is noticed to also appear in physics, and the musicia…
Structural approaches
— changing the conditions that produce objectification rather than the responses of individuals to obj…
Structural barriers matter
— registration requirements, ID laws, roll purges, and polling place accessibility all affect particip…
structural blueprint
— a narrative skeleton you can apply to any content type. They're organized by category, and each incl…
structural buffers
— institutional protection (tenure), geographic distance from the power center, supportive collaborato…
Structural changes:
— Reduce posting frequency to a sustainable level (it's better to post three times a week indefinitely…
Structural comparison:
— Did you successfully translate the structural element you identified? - Was there a gap between what…
Structural concerns:
— **One-sided proceedings.** In a traditional court, both sides present arguments. In the FISC, only t…
Structural coupling
— The mutual influence between a system and its environment, each shaping the other over time through …
Structural dimension questions:
— What specifically needs to be different? - What am I actually doing or changing to make it different…
Structural Distinctiveness
— A format nobody else in your niche uses - An unexpected content approach (comedy in a serious niche;…
Structural elements I can see or infer:
— Exterior walls (almost certainly load-bearing) - Any beams or columns - Any spots where walls seem t…
Structural factors pushing toward escalation:
— **Algorithms reward strong reactions** — anger generates comments, shares, watch time - **Monetizati…
Structural features:
— **Eleven judges** serve on the FISC, appointed by the Chief Justice of the Supreme Court from among …
Structural functionalism (of family)
— Minuchin's approach examining family structure (subsystems, boundaries, hierarchies, triangles) as t…
Structural hole position:
— Broadway musical theater + hip-hop culture: the exact gap that made *Hamilton* possible and that no …
Structural holes
— Ronald Burt's term for the gaps between groups in a network — the absence of direct connections betw…
structural homology
— the same abstract architecture operating on different substrates.
Structural interventions
— expanding hiring networks beyond elite institutions, addressing internship accessibility, investing …
Structural limitations:
— Fact-checking is inherently reactive — it can only address claims that have already spread - The sca…
Structural luck
— Luck arising from the social, economic, and institutional structures into which a person is born or …
Structural model
— An election forecasting model based on stable, measurable features of the political environment (pre…
structural nature of epistemic failure
— once you understand that being wrong is usually about systems, not stupidity, you can never unsee it…
Structural plasticity
— physical changes in neural architecture, including the growth of new dendritic branches, changes in …
Structural power
— Power that derives from one's position in social systems (gender hierarchies, economic systems, inst…
Structural racism
— Systems, policies, and institutional practices that produce racial inequities regardless of individu…
Structural regulation
— targeting the infrastructure of disinformation including dark money advertising, algorithmic amplifi…
Structural Signature:
— A principal who cares about an outcome they cannot directly observe - A proxy metric chosen to repre…
structural similarity
— domains that share deep relational structures despite looking very different on the surface. The bur…
Structural surveillance
— Surveillance that operates not through conscious intent to watch but through the design of environme…
Structure
— foundation type, bearing walls, beams 2. **Plumbing** — water entry, shutoffs, water heater, drains …
Structure and Formatting:
— [ ] Cover page has correct client name, engagement dates, and classification - [ ] Document control …
Structure placement policy (CFRM):
— Every critical structure (DB2 lock, SCA, GBPs, GRS star, XCF signaling) has a primary allocation on …
Structure your bug reports
— The quality of AI's debugging assistance is directly proportional to the quality of the information …
Structure your notes by:
— Date - Target (what machine/application you were testing) - Objective (what you were trying to achie…
Structure:
— **Aether Committee:** A cross-company advisory committee with working groups on fairness, reliabilit…
Structured
— Rows and columns with defined types. Challenge: missing values, inconsistent coding across departmen…
Structured data immediately
— no parsing, no regex, no extracting values from HTML noise - **More stable** — API response schemas …
Structured error handling
— The `SQLException` provides `getErrorCode()` (the DB2 SQLCODE) and `getSQLState()` (the standard 5-c…
structured inevitability
— the idea whose time has come.
Structured reading habits:
— **Daily arXiv scan**: Use tools like arXiv Sanity, Semantic Scholar alerts, or Papers With Code to s…
Struggling (Low EPA + Low Success):
— Needs improvement everywhere - Inconsistent and inefficient - Likely losing record
STU-REC
— Student record with ID, name, major, GPA, enrollment date, and status 2. **CRS-REC** — Course record…
Student C is underfitting
— using a model that's too simple to capture the real patterns.
Student Home Lab
— the environment you are building right now. While MedSecure and ShopStack are fictional scenarios fo…
Student Mainframe Lab
— Your personal development environment, whether using Hercules emulator, IBM Z Xplore, or GnuCOBOL. P…
Student's t-distribution
— or simply the **t-distribution**.
Students should be able to work offline
— the campus Wi-Fi is unreliable in some buildings.
Study Design
— [ ] What type of study is this? (experimental, correlational, observational, survey, qualitative, ne…
Study production systems
— Read engineering blogs from companies running real-time systems at scale.
Studying and Learning
— edX (various institutions) Search edX for current offerings on study skills, metacognition, and lear…
Stuff rate is league average
— holes are being created
Style
— the structural and linguistic choices you make. Do you write long compound sentences or short punchy…
Style rules
— concrete, specific guidance: - "Write at roughly an 8th grade reading level." - "Use 'you' more than…
Style:
— Does the code follow the project's conventions? - Is formatting consistent?
sub
— On Twitch: a subscription to a streamer's channel; subscribers pay monthly fees in exchange for emot…
Subclinical anxiety
— worry, nervousness, social inhibition, avoidance of minor challenges — is present in a majority of t…
Subclinical depression
— persistent low mood, anhedonia, reduced motivation, negative self-evaluation — similarly extracts re…
subcultural capital
— the specific forms of knowledge, style, and authenticity that function as status within a particular…
Subdomain Takeover:
— Enumerate ShopStack subdomains (merchant storefronts, API endpoints, development environments). - Ch…
subject
— is introduced in one voice, then imitated by successive voices while the first voice continues with …
Subject Access Request (SAR)
— GDPR mechanism for requesting all personal data held by an organization
Subject Areas:
— Media Studies - Information Science - Critical Thinking - Political Science - Cognitive Psychology -…
Subject to:
— Total budget constraint - Talent constraint (limited ML engineers, data scientists) - Risk tolerance…
sublattice symmetry
— A and B atoms are identical (both carbon), so their on-site energies are equal. Setting them to zero…
Submission checklist:
— [ ] Core tracker class implemented with all methods - [ ] Test script creates 10+ requests and exerc…
Submodules:
— Link to a specific commit in an external repository. - Require special commands (`git submodule init…
Subplot
— One Axes within a Figure that contains multiple Axes arranged in a grid.
Subprogram
— A COBOL program designed to be invoked by another program via a *CALL* statement. Subprograms receiv…
Subprogram design principles
— single responsibility, defined interface contracts, defensive input validation, minimal coupling, an…
subqueries
— complete SELECT statements embedded inside other SELECT statements. A subquery computes one result, …
subreddit
— A specific community within Reddit organized around a topic; fan communities organize into subreddit…
Subscriber
— A user who has actively chosen to receive a creator's content — by subscribing on YouTube, following…
Subscriber-level data:
— Individual subscriber open history (for their own subscribers) - Subscription date - Whether a subsc…
Subscription Box
— A physical product sold on a recurring subscription basis, typically monthly. A niche but high-LTV m…
Subscription Model:
— Free tier: 1 location, up to 10 employees, basic scheduling - Pro tier ($29/month): Unlimited employ…
Subscription queue depths
— all five subscription queues are monitored with alerts at 5,000 messages. The analytics queue tolera…
subscription schools
— informal arrangements in which a community would hire a teacher (often an itinerant young man or, oc…
Subscriptions:
— Math: audience size × conversion rate × monthly price = recurring monthly revenue - 1% conversion of…
subsidiarity
— that decisions should be made at the lowest level of the hierarchy that can make them effectively --…
Subsidy analysis:
— Total collected: $44.16 - If "Yes" wins: Payout = $50 (50 Yes shares), Loss = $50 - $44.16 = $5.84 -…
Subsistence agriculture
— farming primarily for household consumption rather than market sale — was real in Appalachia. It was…
subsistence farming
— growing what your family needed, with modest surpluses traded at the county seat — supplemented by l…
Substack
— An email newsletter and publication platform that allows writers to publish to subscribers and offer…
Substance abuse
— already a significant concern in the region, as Chapter 33 documented — was exacerbated by the combi…
Substantive intention
— what you intend to communicate or accomplish in terms of content; (2) **Relational intention** — how…
Substrate independence
— The property of a pattern or process that functions identically regardless of the physical medium in…
Subtrees:
— Merge the external repository's code directly into your repository. - No special commands needed for…
subtweet
— A post that refers to a person, ship, or community debate without naming it directly; common in fan …
Subtweeting
— posting about a person without naming them explicitly — is the digital-age version of the passive-ag…
Subtypes and supertypes
— modeling inheritance hierarchies and choosing implementation strategies (single table, table-per-typ…
subverted payoffs
— videos where the expected outcome is deliberately violated — generated dramatically higher engagemen…
SUCCES framework
— Heath and Heath's model of effective communication: Simple, Unexpected, Concrete, Credible, Emotiona…
Success
— Play 2: 3 yards on 2nd & 5 → 3 ≥ 2.5 (50%) → **Success** - Play 3: 4 yards on 3rd & 2 → 4 ≥ 2 (100%)…
Success Metrics
— The standards by which you evaluate whether a confrontation succeeded. Process metrics (what you did…
Success Metrics Beyond Agreement
— a parallel measurement system that evaluates process quality alongside outcome quality. The things y…
Success Rate vs EPA:
— **Success rate** measures consistency of stops - **EPA** captures magnitude of plays
Success-failure condition:
— $np_0 = 400 \times 0.47 = 188 \geq 10$ ✓ - $n(1 - p_0) = 400 \times 0.53 = 212 \geq 10$ ✓
Successes:
— CBA achieved faster product launches (new products in weeks rather than months) - Real-time payment …
Succession (ecological)
— See *ecological succession*. The predictable sequence of changes in community composition after a di…
succession question
— whether BTS can continue to generate ARMY-level fandom intensity after the hiatus, and whether BTS a…
Sudden changes in dynamics
— a piano (p) suddenly becoming fortissimo (ff): a large prediction error at the dynamic level - **New…
Sudden onset
— the reaction is triggered rapidly, not gradually 2. **Disproportionate intensity** — the reaction is…
Sufficient sample size
— Minimum ~50,000 actions for stable estimates - One full league season typically provides adequate da…
Suggested analysis:
— Compare 2022 Eagles (14-3) to 2022 49ers (13-4) - Analyze the 2021 AFC playoff field - Look at histo…
Suggested datasets for the project:
— CDC's Behavioral Risk Factor Surveillance System (BRFSS) - Gapminder (global health and economics) -…
Suggested frequency:
— **Monthly:** Check and pour water into any infrequently used floor drains or spare bathroom fixtures…
Suggested interview questions:
— How would you describe what you were attracted to in your twenties? How is that different from now (…
Suggested Issues:
— Should your city adopt a facial recognition moratorium? - Should your state pass a comprehensive dat…
Suggested primary sources:
— FCA Consultation Paper CP23/15: "UK Consolidated Tape for Bonds" - FCA Policy Statement on Wholesale…
Suggested reading pace:
— Main chapter text: 45–90 minutes per chapter, with pauses for reflection - Exercises: Budget 30–90 m…
Suggested Systems:
— Your university's learning management system (LMS) and its data practices - A ride-sharing or delive…
Suggested technologies:
— Biometric identification (fingerprinting → facial recognition) - Criminal database (criminal record …
Suicide and Crisis Lifeline
— Call or text: **988** - Chat: suicidepreventionlifeline.org - Available 24/7; serves adults and yout…
Summarizing
— Condensing a longer exchange into its main themes and checking for accuracy; used to keep complex co…
Summary
— regional totals, side-by-side comparison 2. **Northeast** — order detail + category breakdown 3. **S…
Summary Card
— Print or bookmark this page as a quick reference for the core formulas, concepts, and decision frame…
Summary of electrical needs:
— At least three 240V circuits (table saw, dust collector/compressor, CNC router) - Multiple 120V circ…
Summary of what you'll design:
— REST API endpoints for balance inquiry, fund transfer, transaction history, and payment scheduling -…
summary report
— control footings with SUM values are produced, but no detail lines. This is useful when you want onl…
Summer:
— Exterior painting and caulking projects (optimal temperature window) - Deck inspection and treatment…
sunburst
— A plotly chart type that displays hierarchical data as nested rings, with the innermost ring being t…
Sunday (1–2 hours):
— Review the week's content plan - Confirm topic for pillar content - Batch-film any distribution cont…
sundown town
— a community that excluded Black residents entirely, either by formal ordinance or by informal but un…
Sunk cost fallacy
— Where are you continuing something primarily because of past investment rather than future expected …
Sunset clauses
— regulations that automatically expire after a set period unless affirmatively renewed, forcing perio…
Sunset Provision
— Include a provision requiring review and reauthorization of the framework after five years, with spe…
Super PAC
— A type of political action committee that may raise unlimited funds from corporations, unions, and i…
Super-predator
— A racially coded term introduced in the mid-1990s to describe a predicted wave of youth violent crim…
Super-spreader events
— where a single infected individual causes a disproportionate number of new cases — explain why early…
superconductivity
— the complete disappearance of electrical resistance below a critical temperature. The BCS theory (Ba…
superconductor
— a qualitatively different state of matter with properties that seem to violate common sense. The tra…
Superfan
— An audience member who is exceptionally invested in a creator's work — purchasing every product, att…
Superforecaster
— A person demonstrating significantly above-average calibration in probabilistic forecasting across d…
SuperGLUE
— URL: https://super.gluebenchmark.com - Description: A more challenging successor to GLUE, including …
superintelligence
— intelligence that substantially surpasses the best human minds in virtually every domain.
Superluminal propagation
— the Klein-Gordon propagator $G(\mathbf{r}, t; \mathbf{r}', 0)$ is nonzero outside the light cone (fo…
Superordinate goal
— a goal achievable only through cooperation between groups, reducing intergroup conflict
superposed
— they represent multiple features simultaneously in overlapping directions. A sparse autoencoder with…
superposition
— encoding many features as nearly orthogonal directions in a lower-dimensional space. This is analogo…
superposition principle
— the single most important property of quantum mechanics.
superpositions
— combinations of multiple possible states simultaneously. An electron can be in a superposition of sp…
superspreader event
— analogous to a disease superspreader who infects far more people than the average. The stitch didn't…
Superstore Sales Dataset
— Available on Kaggle. Contains retail transaction data with region, category, sub-category, sales, pr…
Supertype/subtype
— Used when entities share common attributes but have type-specific attributes. Appropriate when the s…
Supervised learning comes in two flavors:
— **Regression:** Predicting a continuous number (price, temperature, vaccination rate) - **Classifica…
Supervised Learning — Classification
— Classification overview · Logistic regression by intuition · Decision trees · Random forests · Gradi…
Supervised Learning — Regression
— Regression overview · Linear regression · Multiple regression · Regularization (Ridge/Lasso intuitio…
Supervisory housing
— the homes of foremen, engineers, the company doctor, the schoolteacher — clustered near the superint…
Supplement 1: Relativistic Quantum Mechanics
— Sakurai's supplement covers the Klein-Gordon and Dirac equations with his characteristic elegance an…
Supplementary Sources:
— Player biographical data (height, weight, position, age) - Team schedule and travel data - Injury re…
Supply Chain Attack Design:
— Design a supply chain attack vector targeting FinanceForward's CI/CD pipeline: - Option A: Compromis…
Supply chain OSINT techniques:
— **Job postings**: "Experience with [vendor product] required" reveals vendor relationships - **Press…
Supply chain security
— **Security in network and information systems acquisition, development, and maintenance, including v…
Supply Chain Threats:
— Compromised upstream images - Dependency confusion in package managers - Typosquatting in container …
Supply-Side Platform (SSP)
— A technology system allowing publishers to make advertising inventory available for programmatic pur…
Support and Accountability
— Who (if anyone) will you tell about these commitments? Naming an accountability partner is not requi…
Support features (friction signals):
— `support_contacts_last_90_days` — unresolved product issues - `days_since_last_support_contact` — re…
Support score
— An individual-level model estimate of a voter's probability of supporting a specific candidate or pa…
Supported:
— Core facial expressions for a set of basic emotions show significant cross-cultural recognition, sug…
Supporters counter:
— Attackers already have these capabilities; tools like Metasploit ensure defenders can match them - O…
Supporting Arguments (For Moderation):
— **S1:** Platforms have already made editorial choices by building recommendation algorithms; moderat…
Supporting Arguments (Lippmann):
— **S1:** Modern political and economic systems are too complex for citizens without specialized train…
Supporting Arguments:
— **S1:** Propaganda targets the non-rational pathways of belief formation — emotion, identity, and ha…
Supporting documentation:
— The email from her professor dated March 9th (two days after the alleged drop) - A printout of her c…
Supporting Evidence:
— A 2003 meta-analysis by Bekelman, Li, and Gross in *JAMA* found that industry-funded studies were si…
Suppression analytics
— using data to discourage specific voters from participating — represents the clearest application of…
SupTech
— supervisory technology — refers to the technology tools used by regulatory supervisors to improve th…
SupTech (Supervisory Technology)
— Technology deployed by regulatory supervisors to enhance their own supervisory capacity, including a…
surface mining
— a method in which the overburden (the rock and soil above the coal seam) was removed to expose the c…
surface similarity
— and stubbornly blind to **structural similarity.**
Surface story
— what happens (first viewing) 2. **Emotional texture** — subtle nuances (second viewing) 3. **Craft**…
Surfacing Their Own Analysis
— "What do you think is really going on under the surface here?" - "If you had to give the most genero…
Surge Synthesizer (surge-synthesizer.github.io)
— A free, open-source software synthesizer whose source code is publicly available. Allows students to…
Surowiecki's "Wisdom of Crowds"
— Understand collective intelligence 2. **Miller & Davidow's "Logic of Sports Betting"** - Modern bett…
surrogate endpoints
— measurable biological markers that are supposed to correlate with the outcome you actually care abou…
surrogate key
— it has no business meaning, it simply exists to identify rows.
Surrogate user model:
— Does the CICS region userid connect to DB2? _______________ - Is the end user's userid passed as sec…
Surveillance and reconnaissance:
— Covert cameras for documenting security gaps - Directional microphones (where legally permitted) - W…
Surveillance Capitalism
— Zuboff's broader framework describing an economic system in which human behavioral data is the prima…
Surveillance creep
— See *Function creep.*
Surveillance studies
— An interdisciplinary academic field examining the social, political, ethical, and technical dimensio…
Survey experiment
— A research design that uses random assignment of question wording, frames, information, or condition…
Survey findings:
— 92% of engineers used at least one AI coding tool daily. - Engineers used seven different AI tools i…
Survey/Research
— "We're conducting a security awareness survey on behalf of your company. Can you answer a few questi…
Survival Analysis
— Statistical methods for analyzing time-to-event data, accounting for censoring. Applied in soccer fo…
Survival Analysis:
— Cox proportional hazards models estimate the hazard of injury as a function of time-varying covariat…
Survivorship bias
— The logical error of focusing on entities that passed some selection process while overlooking those…
Survivorship Bias at Scale
— how fields build on the evidence that survived while ignoring what didn't.
survivorship-bias-free databases
— databases that include the performance records of defunct funds alongside surviving funds -- has tra…
Suspect class
— A population defined by religion, ethnicity, or national origin as presumptively suspicious, subject…
Suspension of belief
— (related term) The specific condition during propaganda reception in which the audience has not mere…
Suspension of disbelief
— The cognitive state in which audiences bracket their knowledge that they are watching a representati…
Suspicious Activity Reporting:
— Operators must file Suspicious Activity Reports (SARs) with financial intelligence units when they d…
suspicious order monitoring program
— to flag and investigate orders that were unusually large or that deviated from normal patterns. A ph…
Sustainability concern
— This level of over/underperformance is hard to maintain - If France played this tournament 100 times…
Sustainable approach:
— Choose a consistent lens (ethical? cultural? comedic?) rather than just being "the drama person" - U…
Sustainable Content
— A content production approach calibrated to a creator's energy, resources, and creative capacity ove…
Swap test
— could another creator say the same thing? (If yes, too generic) 2. **Audience test** — would your id…
SWATting
— making false emergency reports to law enforcement about a target's location, designed to trigger a d…
SWE-bench
— A **benchmark** that evaluates AI models on their ability to resolve real-world GitHub issues from p…
sweet spot
— aspirational enough to be interesting, relatable enough to be accessible. The viewer thinks: "This p…
Swing voter
— A voter who does not have a strong attachment to either major party and whose vote choice varies fro…
Swipe fatigue
— The exhaustion, emotional numbness, or cynicism that develops from prolonged high-volume use of swip…
Swipe File
— A curated collection of exceptional examples of content, copywriting, design, or strategy that a cre…
SWITCH
— Swaps the shadow dataset into place as the active dataset (when FASTSWITCH YES). This is the only ph…
Switch Coverage:
— Possessions tested: 140 - Ball handler shot frequency: 52% - Ball handler shot value: 0.94 - Roll ma…
Switch to pyproject.toml with pip-compile
— Separate abstract requirements (what you need) from concrete dependencies (exact versions). Use `pip…
Switch:
— Screener's defender takes ball handler - Creates potential mismatches (EPV impact varies) - Best wit…
Switches everything
— No defensive liability 2. **Protects the rim** - Despite 6'6" height 3. **Initiates offense** - Acts…
Switching Capability:
— Can guard positions 1-5 - No matchup forces lineup change - Enables Warriors' switching schemes
sycophancy
— agreeing with the user's stated position even when that position is incorrect. If you tell the model…
syllabary
— not an alphabet (which represents individual sounds, or phonemes) but a system in which each symbol …
Symbol and Association Questions:
— What symbols appear in the image? What is the history of those symbols' use? - What pre-existing ass…
Symbolic Map
— A COBOL copybook generated from a *BMS* map definition. Contains the data structure (field names, le…
Symmetrization/Antisymmetrization
— Constructing physical multi-particle states from product states using projection operators $\hat{\Pi…
Symmetry
— An invariance under transformation; a property that remains unchanged when the system is rotated, tr…
Symmetry (musical)
— A transformation of a musical object (a melody, chord, or rhythm) that leaves some property invarian…
Symmetry breaking
— The process by which a symmetric system transitions to a less symmetric state, typically triggered b…
symmetry principle
— an ethical requirement that you should not impose risk on others without bearing that risk yourself.
Symmetry properties:
— Even permutation of columns: unchanged. - Odd permutation of columns: multiplied by $(-1)^{j_1+j_2+J…
Symmetry satisfaction
— something asymmetrical becomes symmetrical (raked sand, tiled grid); rewards the visual cortex's pre…
Symmetry transformation
— An operation on the Hilbert space that preserves all physical predictions (transition probabilities)…
Symmetry-breaking
— The process by which a symmetric state gives way to an asymmetric one, creating differentiation, str…
symmetry-breaking problem
— initialization must introduce asymmetry.
Symptom: Condensation on windows in winter
— Humidity is too high for the outdoor temperature. - Lower humidistat setpoint. - Improve bathroom ve…
Symptom: Dry cough, nosebleeds, dry skin in winter
— Check humidity: is relative humidity below 30%? - Humidifier needs servicing or the humidistat needs…
Symptoms:
— Mood on any given day heavily influenced by how the most recent video performed - Checking analytics…
Synaptic plasticity
— individual synaptic connections strengthened or weakened by use. The foundation of learning and habi…
synchronous
— the commit does not complete until the GBP write is acknowledged. This adds to commit latency.
synchronous write
— the application thread is suspended while the dirty page is written to disk. Synchronous writes are …
Syncretism
— The creative blending of two or more cultural systems — what actually happens in most cases of globa…
syndromes
— parity checks on pairs of qubits — without measuring the qubits themselves:
Synergy Sports
— Play-type data and video (subscription)
synoptic map
— a map showing weather conditions simultaneously across a large area — became possible only with the …
Synopticism
— Thomas Mathiesen's concept, proposed as a complement to panopticism, describing the condition in whi…
synopticon
— Mathiesen's concept of the many watching the few — as a complement to Bentham's panopticon (the few …
Syntax error
— Python catches the missing `)` before running. > 2. **Runtime error** — `IndexError` occurs when the…
Syntax highlighting
— Python keywords, strings, and variables are color-coded - **IntelliSense** — code completion as you …
SyntaxError
— the closing quotation mark is missing. Should be: `print("Welcome to data science!")`
Synthesis:
— How does this connect to other analyses? - What is the bigger picture? - What questions remain?
synthetic personas
— entirely fabricated online identities whose biographical details, photographs, and digital histories…
Synthetic respondents
— AI-generated simulated survey responses without real respondents — are least reliable for the local-…
Synthetic transaction testing (20:45 — 21:00):
— Balance inquiry (CICS → DB2): 500 transactions, 100% success, avg response 12ms - Fund transfer (CIC…
Syntorial (syntorial.com)
— Interactive synthesizer training software that teaches synthesis principles by doing. Demonstrates t…
syringe service program
— a facility where people who injected drugs could exchange used syringes for clean ones, receive nalo…
SYSCAT.INDEXCOLUSE
— One row per column in each index key. The LUW equivalent of SYSIBM.SYSKEYS on z/OS.
SYSCAT.REFERENCES
— One row per foreign key relationship. The LUW equivalent of SYSIBM.SYSRELS.
SYSCAT.ROUTINES
— One row per stored procedure, function, or method.
SYSCAT.TABLES
— One row per table, view, alias, nickname, or MQT.
SYSCAT.TABLESPACES
— One row per tablespace.
SYSCOLUMNS / SYSCAT.COLUMNS
— Find all tables using the same column name (potential join partners) 2. **SYSRELS / SYSCAT.REFERENCE…
SYSIBM.SYSCOLUMNS
— One row per column in every table and view.
SYSIBM.SYSDATABASE
— One row per database.
SYSIBM.SYSFOREIGNKEYS
— One row per column in each foreign key. Join with SYSRELS to get the full foreign key definition.
SYSIBM.SYSINDEXSPACESTATS
— Real-time index space statistics.
SYSIBM.SYSKEYS
— One row per column in each index key. Join with SYSINDEXES on IXNAME and IXCREATOR to get the column…
SYSIBM.SYSPACKAGE
— One row per package (bound plan component).
SYSIBM.SYSRELS
— One row per foreign key relationship.
SYSIBM.SYSTABAUTH
— Table-level privileges.
SYSIBM.SYSTABLES
— One row per table, view, alias, or materialized query table.
SYSIBM.SYSTABLESPACE
— One row per tablespace.
SYSIBM.SYSTABLESPACESTATS
— Real-time tablespace statistics.
SYSLGRNX (Log Range Table)
— Maps each object (tablespace partition, index space) to the range of log records that contain change…
SYSOUT
— A JCL DD parameter that directs output to the *JES spool* for printing or viewing. COBOL DISPLAY sta…
Sysplex Distributor
— a z/OS TCP/IP feature that load-balances incoming connections across target systems.
System 1
— Fast, automatic, emotionally responsive cognitive processing that operates without conscious effort.
System 1 processing
— fast, automatic, intuitive — is primarily subcortical. The amygdala, basal ganglia, and related stru…
System 2
— Slow, deliberate, effortful analytical cognitive processing that can override System 1 impulses give…
System 2 processing
— slow, deliberate, effortful — is primarily cortical, especially prefrontal. The PFC is involved in h…
System components:
— **Suction pit(s):** Holes cored through the slab (typically 4" diameter) at carefully chosen locatio…
System Context
— No universal "best" profile; fit matters
System cost:
— Heat pump and air handler: $5,800 installed (Carla's quote) - Electrical panel upgrade (Dave needed …
System Dependencies
— College production heavily scheme-dependent - Competition level varies dramatically - Role in colleg…
System dynamics
— A methodology for studying complex systems using feedback loops, stocks, and flows, pioneered by Jay…
System Health Panel:
— Data ingestion success rate - API latency - Feature freshness (time since last update) - Alert histo…
System Metrics:
— CPU/GPU utilization - Memory usage - Disk I/O - Network latency
System performance:
— Average report generation time: reduced by 28% for system-generated reports - System uptime: 99.6%
system prompt
— a special instruction that defines the model's persona, capabilities, constraints, and behavioral gu…
system Python
— the Python installation that ships with your operating system (or the one you installed in Chapter 2…
System requirements (from Chapter 1):
— 100 million transactions per day - 99.999% availability (five nines — max 5.26 minutes unplanned dow…
Systematic > Intuitive
— Models beat gut feelings long-term 2. **Evaluation is mandatory** - No testing = no credibility 3. *…
Systematic error
— Bias that produces consistent directional deviation, not corrected by larger sample sizes.
Systematic Processes
— pre-bet checklists, qualification criteria, and process documentation --- shift decision-making from…
Systematic sampling
— A probability sampling procedure in which every kth unit is selected from a list after a random star…
systematic tracing with edge cases
— the techniques from section 7.3. Specifically:
Systematic Value Identification:
— Value exists when your estimated true probability exceeds the implied probability from the odds - Ed…
Systematization:
— Core content process is documented and repeatable: __/5 - Content could be produced without you for …
Systemic costs:
— Erosion of public trust in digital services - Increased costs of security for the entire industry (e…
Systemic lessons:
— **Third-party risk is your risk.** Target was breached through a vendor. Organizations must extend t…
systemic risk assessments
— structured evaluations of whether their design choices, including algorithmic recommendation, create…
Systemic transparency
— Transparency about the aggregate patterns of AI decision-making, as distinct from individual transpa…
Systems and infrastructure (Chapters 23--26):
— Cloud platforms (AWS, GCP, Azure) - Containerization (Docker, Kubernetes) - Distributed computing - …
Systems elements I can see:
— Electrical outlets, switches, panels, meters - Plumbing supply and drain pipes, water heater - HVAC …
Systems in operation:
— KYC platform (Vendor A): Customer identity verification, risk classification, PEP/adverse media scre…
Systems Programmer
— Working with the operating system (z/OS), middleware (CICS, IMS, MQ), and database (DB2) layers that…
Systems/DevOps:
— Multiple terminal sessions (often using a tool called tmux) - SSH connections to remote servers - In…
SYSUTILX (Utility Table)
— Tracks the status of running and recently completed utilities. When you issue a DISPLAY UTILITY comm…
T
T+0:00
— GDPS halts Metro Mirror replication 2. **T+0:05** — GDPS reverses the mirror direction (Indianapolis…
T-shaped professional
— deep expertise in one area (the vertical bar of the T) combined with broad knowledge across many are…
t-SNE:
— Non-linear visualization - Preserves local structure - Not for preprocessing (use PCA)
t-test for means
— the most commonly used hypothesis test in practice. The logic is identical to what you've learned he…
Tab 1: Insurance Policies
— Homeowners insurance: Policy number, insurer name, agent name and direct phone, 24-hour claims numbe…
Tab 1: Match Overview (Level 0 + Level 1)
— Top bar: Score, match time, momentum indicator (colored bar) - Main panel: Pitch map with player dot…
Tab 1: Monthly Snapshot
— Updated once per month Columns: Platform | Followers | Monthly Growth | Monthly Growth % | Primary E…
Tab 2: Content Performance Log
— Updated after every piece of content Columns: Date | Platform | Content Topic/Title | Format | Week …
Tab 2: Physical Load (Level 2)
— Table with one row per player: distance, HSR, sprints, fatigue index - Sparkline trends for each met…
Tab 2: Utility Contacts and Shutoffs
— Electric utility: Account number, outage reporting number, emergency number - Gas utility: Account n…
Tab 3: Contractor and Service Contacts
— Plumber: Name, phone, license number - Electrician: Name, phone, license number - HVAC contractor: N…
Tab 3: Email List Health
— Updated weekly Columns: Week | Total Subscribers | New Subscribers | Unsubscribes | Open Rate | Clic…
Tab 3: Tactical Detail (Level 2)
— Defensive compactness chart (line height over time) - Inter-line gap visualization - Pressing intens…
Tab 4: Halftime Report (Level 3)
— Auto-generated summary text - Key statistics comparison table - Top 3 observations
Tab 5: Important Documents (Copies)
— Property deed - Mortgage documents - Birth certificates, passports (copies — keep originals in a fir…
Tab 6: Evacuation Plan
— Primary evacuation route: specific streets and destination - Secondary evacuation route (in case pri…
Table
— In COBOL, a data structure defined with the OCCURS clause, analogous to an array. Tables can be one-…
TABLE (ALL)
— Collect statistics for all tables in the tablespace. You can specify individual tables, but ALL is t…
Table cardinality and page count
— via basic RUNSTATS (always collect this) 2. **COLCARD for all indexed columns** — essential for filt…
Table Function
— A UDF that returns a set of rows (a table). Used in the FROM clause of SQL statements via the TABLE(…
Table Handling
— The set of COBOL features for working with arrays (tables): *OCCURS*, *INDEXED BY*, *SEARCH*, *SEARC…
TABLE(ALL)
— Collect statistics for all tables in the tablespace. You can also specify individual tables with TAB…
Table: HACCT_HOLD (fraud holds)
— `LOCKSIZE ROW` — High contention from fraud detection batch + online customer service - `LOCKMAX 200…
Table: HACCT_MASTER (core account table)
— `LOCKSIZE ROW` — Minimizes false contention between online transactions - `LOCKMAX 10000` — High thr…
Table: HTXN_HISTORY (transaction log)
— `LOCKSIZE PAGE` — Insert-heavy, row locking overhead not justified - `LOCKMAX 5000` - Partitioned by…
Tableau Public
— Free version available - Good for exploratory analysis - Professional visualization tool
tabular
— rows of games with columns of features --- a domain where tree-based models like XGBoost have tradit…
Tabular Data Adversarial Examples:
— Modifying features within plausible ranges to evade fraud detection - Crafting inputs that exploit f…
tacit
— known to individuals through personal experience but not articulable in explicit propositions. Much …
Tacit knowledge
— Knowledge that is difficult or impossible to articulate in words or formulas; includes skills, intui…
Tackle Depth Analysis
— Contact point measurement - Efficiency beyond tackle totals - Resource: PFF tackle data
Tackle totals without context
— Depth matters more than volume 2. **Raw sack numbers** - Pressure rate is more predictive 3. **Ignor…
Taconic orogeny
— the first of three mountain-building episodes that would create the Appalachians. An **orogeny** is …
Tactical Analysis YouTube Channels
— Channels: Tifo, The Coaches' Voice, Pep Confident - Focus: Visual tactical defensive analysis - Leve…
Tactical Effects:
— Passing game generally suffers - Running game relatively favored - Kicking becomes less reliable
tag wrangling
— The volunteer work of organizing, merging, and standardizing AO3's tagging system; tag wranglers are…
tail recursion
— a special form where the recursive call is the very last thing the function does:
Tailored Fit Pricing
— IBM's newer pricing models (Tailored Fit) offer consumption-based pricing that can be more predictab…
Take responsibility
— Even partial. "You're right that I did that part poorly."
taker
— they "take" liquidity from the book. For example, if the best ask is $0.57 and you submit a buy limi…
Takes a content topic as input
— you provide the subject you want to create content about 2. **Generates research questions** — a str…
taking responsibility
— the capacity to find and acknowledge the legitimate grain of truth in what is being raised, even whe…
Taking the relationship seriously
— treating the community as people with genuine emotional investment, not just an audience metric or a…
Tala
— The rhythmic cycle framework of Indian classical music, consisting of a fixed pattern of beats (matr…
Talent:
— The "analytics team" consists of two business analysts who primarily build reports in Excel and Tabl…
Talk Python to Me
— `talkpython.fm` — Episode archives cover practitioners across every Python domain. The interviews wi…
Tall WR Prospect:
— Height: 6'4" (76 inches) - 40-yard: 4.52 seconds
tamahagane
— a type of steel produced in a traditional smelter called a *tatara*. The tamahagane is repeatedly fo…
Tankathon
— https://tankathon.com/ - Draft order and pick value - Trade simulator
Tape coat
— embeds paper tape over joints and fills screw dimples 2. **Fill coat** — feathered wider, builds ove…
Target and Function
— [ ] Who or what is being designated as the threat in this communication? - [ ] Does the designated t…
Target Architecture:
— What stays on z/OS? - What moves to cloud? - How do they integrate? - What does the monitoring/obser…
Target Audience
— The specific group of people a creator primarily creates for, defined by demographics, interests, be…
Target Audience:
— Undergraduate students in sports analytics programs - Data science students with interest in sports …
Target milestones:
— Distance 11–15: Sufficient for quantum advantage in quantum chemistry simulations ($\sim 10^3$–$10^4…
Target Quality Adjustment
— Adjusting for receiver quality faced - Controlling for opportunity - EPA per target models
Target Research (Simulated OSINT):
— Create a target profile based on the organizational information provided. In a real engagement, you …
target stacks
— the LPARs running DB2 members 3. Routing decisions use WLM health information: members with more ava…
Target values:
— Data pages: > 80% for OLTP workloads; 95%+ is achievable for well-tuned systems - Index pages: > 95%…
Target variable:
— `defaulted`: Whether the borrower defaulted within 2 years (1 = yes, 0 = no)
Target:
— `home_win`: 1 if the home team won, 0 if the away team won
Target: 16+/20 before posting.
— ## 50 Scroll-Stop Techniques (Quick Reference)
targeted surveillance
— focused monitoring of specific individuals or communications based on individualized suspicion — and…
Targeting
— The systematic allocation of campaign contact resources toward specific voters based on their estima…
Targeting and reach:
— What specific audiences was the campaign designed for? What existing divisions or grievances did it …
Targeting identical creators
— overlapping audiences mean fewer new viewers from the collaboration 2. **Self-centered outreach** — …
Targets:
— Amazon Machine Learning - Google Prediction API - BigML
Task
— In *CICS*, a unit of work created to process a *transaction*. Each task has its own storage, program…
Task crafting
— job crafting through modification of work tasks.
Task priority
— a value from 0 (lowest) to 255 (highest), assigned by the TRANCLASS or the transaction definition's …
task switching
— rapidly alternating attention between two tasks, with a cognitive cost at each switch.
task switching cost
— a measurable loss of time, accuracy, and cognitive efficiency. The cost comes from two sources:
Task:
— Use AI to generate the REST version with multiple endpoints - Use AI to generate the GraphQL version…
TaskFlow
— a command-line task and project manager. It starts simple: in Chapter 2, it just says hello. By Chap…
TaskFlow CLI
— The progressive project built across all 27 chapters. A command-line task manager that evolves from …
TaskFlow: Task Comments
— Users can add comments to tasks, with support for @mentions that trigger notifications. b) **DataLen…
tawakkul
— trust in God, or reliance on divine wisdom. The person who practices tawakkul does not passively res…
Tax considerations:
— Bug bounty income is taxable in most jurisdictions - Platform payments may or may not include tax wi…
TAX IDENTIFICATION AND ELECTIONS
— [ ] **6. Obtain an EIN (Employer Identification Number).** Apply free at IRS.gov (US). An EIN is req…
Taxes (US):
— Creator income = self-employment income = self-employment tax (~15.3%) + income tax - Set aside 25–3…
TBSCAN
— Table scan. Reads all rows in a table (or a range partition). Check the estimated cardinality and th…
TCB time
— Time spent executing your application code under the Task Control Block. This is the time your COBOL…
TCPIPSERVICE
— Defines the TCP/IP listener:
TD/INT rates are highly variable
— Heavy regression needed 2. **Development curves add significant value** - Especially for underclassm…
TDQ (Extrapartition)
— Extrapartition TDQs map to external sequential datasets and are ideal for print/spool output.
TDQ (Intrapartition)
— Trigger-level processing is only available with intrapartition TDQs. The trigger level would be set …
Teaching
— The best way to solidify your understanding of something is to teach it. Write blog posts, present a…
teaching to the test
— restructuring their curricula not around what students most needed to learn, but around what would a…
Team A
— similar win margin but much more consistent performance suggests reliability in playoffs.
Team A Injuries:
— Starting QB (Elite tier): Questionable, 40% miss probability - WR1 (Pro Bowl caliber): Out - Startin…
Team A preparation notes:
— Employers have legitimate interests in employee health (productivity, insurance costs) - Financial i…
Team A Receives:
— Player X: BPM +5.5, expected 2,200 minutes - Player Y: BPM +1.0, expected 1,500 minutes
Team A:
— Starter: Elite tier (+6 value) - Backup: Experienced veteran with 15 career starts (+2 value)
Team Actions:
— Pick and roll execution - Fast break - Zone defense rotation - Inbound plays
Team Analysis:
— Overall offensive efficiency - Passing vs rushing efficiency - Situational performance (down, field …
Team Analytics
— examining how individual performances combine into team success, efficiency metrics, and what drives…
Team and cost data:
— AML Analyst (3 FTEs): fully-loaded cost £58,000 per year each. 1,600 productive hours per year. - Se…
Team and Culture
— Analytics team size and experience - Leadership support for analytics - Collaboration with coaches/f…
Team B
— negative kurtosis means fewer extreme outcomes, more predictable totals.
Team B preparation notes:
— The "voluntary" character of programs with significant financial incentives is questionable, especia…
Team B Receives:
— Player Z: BPM +4.0, expected 2,800 minutes
Team B:
— Starter: Good tier (+4 value) - Backup: Undrafted third-year player with 0 starts (-1 value)
Team Building and Roster Construction
— how successful teams allocate resources across positions, the value of draft picks, free agency stra…
Team Context:
— Needs: WR, EDGE - Pick: 15th overall
Team Defense > Individual Defensive Stats
— The Pistons ranked 10th in steals but 1st in defensive rating - Collective excellence transcended in…
Team Defensive Rebounding:
— Opponent OREB%: 25.2% (2nd lowest allowed) - Detroit DRB%: 74.8% (2nd highest)
Team Defensive Statistics:
— Steals per game: 8.1 (10th in NBA) - Blocks per game: 6.6 (4th in NBA) - Opponent turnovers forced: …
Team Defensive Stats:
— 25 interceptions (1st in NFL) - 32 total turnovers (T-3rd) - -0.02 EPA per play allowed (16th) - 45.…
Team Level (recommended):
— Team-specific prompt libraries and templates. - Tool configuration for the team's technology stack. …
Team pace ratings
— adjusted possessions per 48 minutes, weighted by recency 2. **Rest differentials** --- the differenc…
Team Possession %
— Use PADA formula 2. **Opposition Strength** - Weight by opponent xG created 3. **Game State** - Segm…
Team Rebounding:
— Team Rebounds: 44.8 per game (4th in NBA) - Opponent Rebounds: 40.2 per game - Rebounding Differenti…
Team Rushing Stats:
— 402 rushing attempts - 1,489 yards (3.70 YPC) - 18.5% stuff rate (league avg: 19.2%) - 8 rushing tou…
Team Strength Features:
— `home_net_rating`: Home team's net rating (offensive rating minus defensive rating), computed as a r…
Team Strength:
— Warriors set regular season record (73-9) - Cavaliers were 3-1 underdogs before series - Warriors ha…
Team Success Rate Distribution:
— Elite offenses: 48%+ success rate - Good offenses: 45-48% - Average offenses: 42-45% - Below average…
Team X Injury History (last 3 seasons):
— Season 1: 52 player-games missed - Season 2: 78 player-games missed - Season 3: 45 player-games miss…
Team-based allocation
— Team defensive success distributed by playing time - Individual adjustments for STL%, BLK%, DRB% - ~…
Team-level statistics (rolling):
— Offensive/defensive efficiency (points per 100 possessions, yards per play) - Win/loss record over r…
Team-Only Access:
— Raw coordinate data (x, y, z positions) - Frame-by-frame tracking files - Custom metric calculations…
Team:
— Test director: Kwame Mensah - DB2 recovery lead: Lisa Tran - Batch recovery lead: Rob Calloway - CIC…
TeamWork Online
— https://www.teamworkonline.com/ - Primary sports industry job board
Technical
— Addressable through data and model fixes 2. **Institutional** — Addressable through organizational p…
Technical Accuracy:
— [ ] All IP addresses and hostnames are correct (verify against scope) - [ ] All URLs are correct and…
Technical API Reference
— for developers integrating the API. Needs endpoint specifications, request/response schemas, error c…
Technical Appendices:
— Detailed tool output and command logs - Indicators of Compromise (IOCs) from the engagement - Networ…
Technical challenges:
— Data architecture redesign to implement GDPR-required data minimization, purpose limitation, and sto…
Technical Considerations:
— Web scraping is inherently fragile: changes to a website's HTML structure can break your scraper wit…
Technical Constraints:
— Mobile-first design (most employees check schedules on their phones) - Must handle time zones correc…
Technical Controls:
— Deploy deepfake detection tools for voice and video communications - Implement email authentication …
Technical debt
— Ward Cunningham's metaphor for the accumulated cost of shortcuts and deferred maintenance in softwar…
Technical Documentation (Article 11)
— [ ] Prepare technical documentation before the system is placed on the market - [ ] Include: general…
Technical evaluation:
— How does the vendor distribute updates? - What access does the vendor have to your environment? - Ho…
Technical Factors:
— **No Rate Limiting:** Duo Security (at the time) did not limit the number of push notifications with…
Technical feasibility and specificity (10 points):
— **Phase 1:** Batch window crisis addressed with specific optimizations (DB2 buffer pool tuning, SORT…
Technical fluency
— Not expert-level coding, but the ability to ask the right questions of technical teams, evaluate AI …
Technical Indicators
— *Unnatural amplification patterns*: Content achieving very high sharing rates without an identifiabl…
Technical insights:
— Net rating difference and winning percentage difference are the two most important predictors — toge…
Technical output problems:
— The AI generated generic REST API documentation with placeholder endpoints like `/api/payments` — no…
Technical problems:
— 30-second intervals is extremely aggressive. The friend's IP will likely get blocked quickly. Even 1…
Technical projects:
— xG model built from scratch, with documentation explaining methodology, validation, and limitations …
Technical Requirements:
— Python implementation with pandas/numpy - Database storage (SQLite or PostgreSQL) - Automated data c…
Technical Skills:
— Programming (Python, R, SQL) - Statistics and machine learning - Data visualization - Database manag…
Technical Specifications:
— 25 frames per second - X-Y coordinates for all 10 players - Ball tracking in 3D (X, Y, height) - Pos…
Technique 1: Concept Mapping
— Write key concepts in boxes/circles - Draw labeled connections between related concepts - Look for c…
Technique 1: False equivalence
— treating two things as equivalent when they are not (e.g., "One study shows X, another shows Y, so t…
Technique 2: Anecdote as data
— using a single case to generalize (e.g., "I know someone who was fully vaccinated and still got COVI…
Technique 2: Sketch-Noting
— Combine handwritten text, simple drawings, arrows, and spatial layout - Visual vocabulary: circles, …
Technique 3: Cherry-picking
— selecting supporting evidence while ignoring contradicting evidence.
Technique 3: Visual Analogy Construction
— Step 1: Identify the abstract concept - Step 2: Identify the key structural features - Step 3: Find …
Technique Identification
— [ ] What fear appeals are present? What threat is being constructed? - [ ] What emotional appeals ar…
Technique inoculation
— Protection against a class of manipulation strategy, regardless of the specific claim, enabling broa…
Technique-based inoculation
— Prebunking that targets the technique used rather than the specific claim, building broad-spectrum r…
techno-nationalism
— the idea that a nation's technological capabilities are directly tied to its economic competitivenes…
Techno-panic
— the sense that the situation is so dire, the platforms so powerful, and the individual so compromise…
technological determinism
— the belief that technology develops according to its own internal logic and that society must adapt …
Technology adoption S-curve
— A model of how new technologies spread through a population: slow initial adoption (early adopters),…
Technology Advancement
— Computer vision enabling new analyses - Deep learning improving prediction - Natural language proces…
Technology companies
— initially embarrassed by their cooperation with PRISM — began implementing stronger encryption, incl…
Technology pace
— in fast-moving technological environments, first movers often establish standards and network effect…
technology stack
— a layered architecture of hardware, software, and services that work together to enable training, se…
Technology Stack Context
— Frameworks, libraries, language versions, and architectural patterns 2. **Codebase Context** — Exist…
Technology Stack:
— Python 3.8+ - pandas, numpy, matplotlib, seaborn - scikit-learn, statsmodels - mplsoccer, socceracti…
Technology use more broadly
— social media, smartphone use, notification-checking — activates the same dopaminergic mechanisms as …
Tecumseh
— born in Ohio in the 1760s but deeply connected to the Appalachian homeland of his ancestors — would …
telehealth
— the delivery of healthcare services through video conferencing, telephone, and other remote communic…
Telematics
— The use of connected vehicle data — location, speed, driving behavior — for insurance pricing, fleet…
Telematics insurance
— also known as "usage-based insurance" or "pay-as-you-drive" insurance — uses driving behavior data t…
Teleperformance
— a French company operating in 91 countries - **Majorel** (now part of Teleperformance) - **Samasourc…
telescope
— the total paid out by the market is:
telomeres
— the protective caps on chromosomes that shorten with cell division and age. Telomere length is a mar…
TEMP
— Materializes the input into a temporary table. This often occurs for subqueries, CTEs, or when the o…
Temperament
— Biologically based individual differences in emotional reactivity and self-regulation that are prese…
Temperature
— A parameter that controls the randomness of AI model output. Lower temperatures (near 0) produce mor…
Temperature Scaling
— Neural network calibration - Simple and effective
Template
— An HTML file containing Jinja2 expressions that are filled in with data at render time.
Template inheritance
— A Jinja2 pattern where a child template extends a base template, filling in named blocks while inher…
template method pattern
— the month-end processing loop in the main program calls `ProcessMonthEnd` on every account without k…
Templates
— HTML files with Jinja2 expressions, rendered with `render_template()` - **Template inheritance** — `…
Tempo and pace metrics
— measuring how fast teams operate - **Play selection patterns** - pass/run ratios and tendencies - **…
TEMPORA
— The UK's Government Communications Headquarters (GCHQ) program that tapped over 200 fiber optic cabl…
Temporal Adjustments:
— Early-season statistics (Weeks 1--4) are noisy. We apply Bayesian shrinkage, blending current-season…
Temporal Dimensions:
— Game time (quarters, minutes, seconds) - Play sequence within drives - Season week for longitudinal …
Temporal Features (across frames):
— Optical flow (pixel-level motion between frames) - Trajectory patterns (player and ball movement ove…
Temporal Features:
— [ ] Extract all relevant time components (hour, day, month, day of week). - [ ] Apply cyclical encod…
Temporal Metrics (change over time):
— Exploit Code Maturity: How developed available exploit code is - Remediation Level: What type of fix…
temporal plateau
— a region of musical time where the sense of directed harmonic motion is suspended, and the listener'…
temporal resolution
— the minimum gap between two events for them to be heard as distinct — is approximately 2–5 milliseco…
Temporal tables
— system-time, business-time, and bitemporal — let DB2 manage the time dimension, providing automatic …
temporally overlapping positive pairs
— since video narrations are loosely aligned with visual content, VideoCLIP samples overlapping (but n…
Temptation bundling
— Milkman's technique of pairing a behavior you need to do with something you enjoy, to increase its a…
Ten fingerprints
— all ten fingers, both hands - **Two iris scans** — both eyes - **A facial photograph**
Tenant farming
— renting land for a fixed payment rather than a share of the crop — was another arrangement common in…
Tennis
— Point-by-point data, well-understood probability models, frequent scoring 2. **Soccer** -- Massive l…
tension-release
— exactly the moments when a violated expectation is followed by the expected resolution. The tension …
Tensions in this context:
— If average academic preparation differs across groups (due to school quality, not ability), admittin…
Tensor product
— Ch 11.1 The mathematical construction for combining two quantum systems: $\mathcal{H}_{AB} = \mathca…
TensorFlow
— https://www.tensorflow.org/ - Google's deep learning framework - Good production support
term
— definition (first used: Ch. X)`
Terminal Tools
— `run_command(command, timeout)`: Execute a shell command - `run_tests(test_path)`: Run a test suite …
Terminal-Owning Region (TOR)
— Owns the connection to the end user. Whether that connection is a 3270 terminal, a web service reque…
Termite swarmers
— winged termites near windows or light sources indicate a colony nearby or inside the structure. This…
Terms of Use:
— Free for educational, personal, and non-commercial use - Attribution to StatsBomb is required in any…
ternary expression
— we will cover it fully in Section 4.8.
Territorial Index
— A comparative metric measuring the relative average field positions of two teams.
Terror management theory
— Jeff Greenberg and colleagues' theory that awareness of mortality drives much human behavior, includ…
Tertiary Issue: Third Down Execution
— Overall third down conversion dropped 9 percentage points - Third and medium conversion dropped 13 p…
Test 1: Chemistry experiments (10 videos)
— Average completion: 72% - Save rate: 6.1% - Share rate: 4.8% - Comment quality: "Cool!" and "Do more…
Test 1: Smoke Test (5 minutes)
— 100 account lookups by customer ID - 100 balance inquiries by account number - 50 fund transfers bet…
Test 2: ATM Simulation (30 minutes)
— 200 concurrent simulated ATM sessions - Each session: balance check, withdrawal, receipt generation …
Test 2: Space facts (10 videos)
— Average completion: 61% - Save rate: 4.3% - Share rate: 3.1% - Comment quality: Questions, debates, …
Test 3: Sustained Load (2 hours)
— Continuous Test 2 workload - Monitor buffer pool hit ratios and response times - Hit ratios should s…
Test 4: Peak Load (30 minutes)
— Double concurrent sessions to 400 - Verify graceful degradation (linear, not exponential) - Target: …
Test at every boundary
— language boundaries, data type boundaries, encoding boundaries, and edge-case boundaries. The most i…
Test Cases to Write:
— Debit that goes into overdraft but within limit - Debit that exceeds overdraft limit - Debit on savi…
Test cases:
— Verify that the hydrogen $1s \to 2p$ transition rate matches the known value $A = 6.27 \times 10^8\,…
test conditions
— closed book, timed, no external resources. The goal isn't to get every problem right during practice…
Test Coverage
— The percentage of code that is executed during testing. Measured by tools like `coverage.py`. Higher…
Test data management
— the ability to set up, verify, and tear down test data - **Transaction isolation** — tests must not …
Test data requirements
— describe the test dataset (how many records, what characteristics) b) **At least 8 test scenarios** …
Test edge cases
— earliest year, latest year, each region individually. (2) **Check for empty results** — some region-…
Test health metrics:
— Test coverage percentage (line, branch, path) - Test pass rate over time - Test execution time trend…
Test on a small string first
— use `re.findall()` on a single example 2. **Build incrementally** — start with the simplest pattern …
Test one thing at a time
— isolating variables is the entire point 2. **Wait for statistical meaning** — for smaller channels, …
test sets
— they fit the model on one portion and evaluate it on another. If you'd tested your Chapter 22 regres…
Test the business logic program independently
— pass test data via COMMAREA without any screen interaction 4. When a REST API or web service interfa…
Test the negative cases
— security testing means verifying that unauthorized users are denied, not just that authorized users …
Test thoroughly
— compile and test after every removal. Remove one paragraph or variable at a time.
Test tooltips exhaustively
— hover over edge cases (small countries, missing data, outliers) to ensure they display correctly. - …
Test with:
— Perfect rating scenario: 10/10, 400 yards, 4 TDs, 0 INTs - Average QB: 22/35, 250 yards, 2 TDs, 1 IN…
Test your model:
— 35-yard FG, clear weather, grass: Should be ~82% - 50-yard FG, 15 mph wind, rain: Should be ~35-45% …
Test-Driven Development (TDD)
— A development methodology where tests are written before the code they test. The cycle is: write a f…
Testimonial
— A statement from a customer or community member describing the value they received from a creator's …
Testimonials from satisfied users
— the anecdotal case that substitutes for clinical evidence > - **Pseudoscientific language** — "detox…
Testimony
— communicating information from one person to another — is the primary mechanism by which humans tran…
Testing Approach:
— Test every endpoint with different privilege levels - Attempt Insecure Direct Object Reference (IDOR…
Testing checklist:
— Are credentials stored in plaintext in SharedPreferences/NSUserDefaults? - Is the local database enc…
Testing Considerations:
— Never inject persistent XSS payloads in a production healthcare system - Use only non-destructive pr…
testing effect
— the robust finding that retrieving information from memory strengthens retention more effectively th…
Testing Parameters:
— Testing hours and days (e.g., "Monday through Friday, 8 AM to 6 PM EST only") - Blackout periods (e.…
Testing Python Applications with pytest
— Brian Okken (Pragmatic Bookshelf) The most comprehensive pytest reference available. Covers fixtures…
Testing Quality:
— Pre-testing setup ensures tools work and documentation structures are in place - Structured phase-ba…
Testing scenarios:
— Create a test file with 50 records and verify normal processing - Create a test scenario where the e…
Testing with pytest
— The standard testing framework. Writing tests for your business code makes it more reliable and demo…
Testing without written authorization
— This ends careers and can result in prosecution. 2. **Exceeding scope** — If you find a path outside…
Testing:
— Are there tests for the new functionality? - Do the tests cover edge cases? - Do existing tests stil…
Testosterone
— A steroid hormone associated with libido, competitive behavior, and (in some studies) facial masculi…
Tests built-in Python features, not your own code
— these tests verify that Python's `+`, `upper()`, `append()`, and dict indexing work. You should be t…
Tests multiple unrelated things in one function
— if the addition assertion fails, you don't know if the string, list, or dict tests would also fail. …
Tests:
— All commutation relations hold for $j = 1/2, 1, 3/2, 2, 5/2$ - Rotation matrices are unitary - $d^{(…
Tetlock's key findings:
— Most expert pundits are barely better than chance at political prediction - A small subset of people…
Texas, Indiana, Tennessee
— more business-friendly versions with limited private rights of action - **Montana, Oregon** — includ…
Text Adversarial Examples:
— Character-level perturbations (homoglyphs, invisible Unicode characters) - Word-level substitutions …
Text Classification
— Assigning text to predefined categories. A customer inquiry gets classified as "billing question," "…
Text Features:
— [ ] Preprocess text (lowercasing, removing noise, tokenizing). - [ ] Choose between BoW, TF-IDF, and…
text normalization
— the process of making equivalent text values consistent.
text on screen
— the words that appear over, around, and sometimes instead of your visual and audio content.
text structure
— a different way of organizing information. And text structure awareness — recognizing what kind of t…
text structure awareness
— the habit of asking, before you start reading, "What kind of text is this, and what reading strategy…
text structure ignorance
— not recognizing that different texts are organized differently and require different cognitive appro…
Text-based inoculation messages
— brief written explainers of manipulation techniques — produce the smallest effects but remain measur…
Text:
— Arabic script on buildings, street signs, and vehicles - Shop names and advertisements often referen…
TextBlob
— Simple sentiment API - Part-of-speech tagging - Good for prototyping
Textbooks
— *OpenIntro Statistics* (free online): Excellent introduction to statistical concepts - *Statistics* …
Textbooks:
— *OpenIntro Statistics* (free online) - Excellent introduction - *Statistics* by Freedman, Pisani, an…
Textual poaching
— Fan practice of taking cultural texts one does not own and using them as raw material for creative a…
TF-IDF
— Term Frequency-Inverse Document Frequency; a weighting scheme that gives higher weight to terms that…
Thanksgiving Day Game:
— Lions (home) played Sunday - Bears (away) played Monday Night
That capability is now yours.
— ## Reflection Questions
The "block on sight" culture
— in which community members proactively block known harassment participants before being targeted — h…
The "Dying" Argument:
— No major *new* systems are being built in COBOL. Greenfield projects choose modern languages. - The …
The "ethics" framing
— using a legitimizing frame (ethics in journalism; content warnings; community safety) to conduct wha…
The "false positive" problem
— AI flagging intentional decisions as mistakes — is one of the most trust-destroying failures in AI-a…
The "I Was Today Years Old"
— "I just found out that..." Positions the creator as equally surprised, building solidarity.
The "last mile" problem
— the gap between a deployed model and a model that is actually used — is the most common cause of AI …
The "one general plus one specialized" strategy
— maintaining a general-purpose AI for broad tasks and one carefully chosen specialized tool for your …
The "regulation channels innovation" argument:
— GDPR catalyzed a global privacy technology industry worth an estimated $15 billion by 2025 - Compani…
The "regulation kills innovation" argument:
— The EU has no tech company valued at over $100 billion. The US has many. This gap predates GDPR and …
The "screenshot" thumbnail
— using a random moment from the video rather than designing specifically for click motivation 2. **Ov…
The "Thriving" Argument:
— The installed base is *growing*, not shrinking — 1.5 billion new lines per year. - Transaction volum…
The $p(1-p)$ in the numerator
— this is maximized when $p = 0.5$ and smaller when $p$ is near 0 or 1. This means proportions near 50…
The 1994 midterm elections
— Newt Gingrich's "Republican Revolution" — brought a wave of Republican victories in Appalachian cong…
The 20% (monthly showcase videos):
— iPhone but with intentional composition (Ch. 19 principles) - Full lighting setup with both panels -…
The 2024 Watershed Election Study
— A detailed post-election analysis project where students reconstruct how analysts read the race in r…
The 30-Day Test
— Ask yourself: "Can I make 30 different pieces of content about this without running out of ideas?" I…
The 4-7-8 Pattern:
— Inhale through the nose for 4 counts - Hold the breath for 7 counts - Exhale through the mouth for 8…
The 70/30 data rule:
— **70% of content** follows what data suggests works — serves the built audience, tests variations wi…
The 70/30 rule:
— 70% follows proven patterns → consistency, algorithmic trust, serving existing audience - 30% is exp…
The 80% (daily/regular content):
— iPhone on desk mount - One diffused LED panel + window fill - USB microphone - Jump cut editing, sim…
The 80/20 implementation:
— 80%: TikTok quick tips (lo-fi, 20 min production, reach-building) - 20%: YouTube full tutorials (hi-…
The account has a term
— a defined number of months over which the loan must be repaid.
The ACCT-MAINT pattern
— reading transactions from a sequential file and applying CRUD operations to a VSAM master file — is …
The accurate information
— what the research actually says, including the genuine complexity and the parts that are still conte…
The actual mechanism was aeroelastic flutter
— a self-excited oscillation. The bridge's solid plate girder cross-section caused wind to separate in…
The administrative data is systematically inflated
— by about 16-19 percentage points based on the three survey comparisons. This could be due to denomin…
The administrative ordering of nature and society
— the drive to make complex systems legible and controllable. 2. **A high-modernist ideology** -- the …
The Advancement of Sound Science Coalition (TASSC)
— established by PR firm **APCO Worldwide** — pioneered the systematic manufacture of scientific doubt…
The advantages:
— No roof work, no installation, no permit - Available to renters - Works on any roof orientation - No…
The aftermath:
— Lost 22,000 followers in one week - Received a cease-and-desist letter from the targeted creator - T…
The agent
— Who creates and distributes the content? Individuals, organized groups, states, automated bots? 2. *…
The AI-Powered Organization
— The AI landscape today · A brief history of AI · AI maturity models · The Athena Retail Group story …
The alternative framing
— "union busting," "free rider laws," "anti-collective bargaining" — frames the same policy as an atta…
The amygdala
— two almond-shaped clusters (one in each hemisphere) that function as the brain's threat-detection sy…
The analyst
— What are my incentives? Am I under pressure to find certain results? > 2. **The decision-maker** — W…
The Analyst (Opta)
— Official Opta content - Data visualizations - Industry insights - Link: youtube.com/theanalyst
The Analyst Podcast
— Regular discussions on soccer analytics trends and methods. - **Tifo Football** --- Accessible tacti…
The Analytics Hour
— Deep statistical discussions - Practitioner interviews - Technical topics
The Anchoring of First Explanations
— why the first answer proposed becomes the hardest to dislodge.
The Antique Phonograph Society
— www.antiquephono.org Historical resources on mechanical recording, including technical documentation…
The API is incomplete
— it does not expose certain data visible on the web interface. 3. **Historical data** is only availab…
The Application Binary
— A Mach-O executable compiled from Swift or Objective-C source code. iOS binaries are compiled to nat…
The Archive and the Outlier
— The Supernatural/Destiel community on AO3 and LiveJournal, tracing queer fan reading practices, fan …
The ARMY Files
— The international BTS fan network, with focus on a Filipino ARMY server and Brazilian streaming coor…
The Art of Deception
— Kevin Mitnick. Social engineering from the perspective of a reformed hacker. Complements Chapters 9,…
The Art of Unit Testing
— Roy Osherove (Manning) Language-agnostic but the principles translate directly to Python. Chapters 1…
The ASMR Open
— Rich, textured sound (tapping, scratching, liquid pouring) — even if the video isn't ASMR content.
The Athletic
— Team-specific analytics - Draft analysis - Historical studies
The Athletic (Analytics Coverage)
— In-depth analysis - Model explanations - Industry insights
The Athletic (Soccer Analytics Coverage)
— Long-form analytics journalism that demonstrates effective metric communication to a general audienc…
The Athletic (Subscription)
— Quality sports analytics journalism - Team-specific deep dives - Statistical explainers
The Athletic - College Football
— Premium analytics content - Fourth-down analysis articles - Special teams feature pieces
The Athletic - College Football Analytics
— `https://theathletic.com/` - Weekly EPA analysis - Premium content
The Athletic - Football Analytics Coverage
— Professional sports journalism - Data-driven analysis articles - Industry perspective
The Athletic - Goalkeeper Analytics
— Notable Authors: Tom Worville, Mark Thompson - Focus: Applied goalkeeper analysis
The Athletic - Set Piece Features
— Notable Authors: Various tactical analysts - Focus: Applied set piece analysis for major clubs
The Athletic - Soccer Analytics
— Premium long-form analysis - xA applications in player evaluation - Tactical analysis with data - Li…
The Athletic - Tactical Analysis
— Focus: In-depth defensive tactical analysis - Notable Authors: Michael Caley, Tom Worville
The Athletic --- Analytics Coverage
— Premium sports journalism with regular, high-quality football analytics content, including profiles …
The Athletic Draft Coverage
— Sam Vecenie's draft analysis - Detailed prospect reports - Statistical projections
The Athletic Tactics Coverage
— theathletic.com In-depth tactical analysis combining data and video for match strategy breakdowns.
The attention economy and temporal scarcity
— Herbert Simon's observation that "a wealth of information creates a poverty of attention" applies te…
The attention economy basics:
— User attention = product sold to advertisers - Engagement optimization ≠ wellbeing optimization - Va…
The attic floor had been upgraded at some point
— the auditor measured approximately R-22 in loose-fill fiberglass. Better than original but below the…
The attractiveness halo effect
— assuming attractive people have unrelated positive qualities — is a primary mechanism of the attract…
The Attribution Battle
— Defenders successfully blame execution, not the paradigm 2. **The Reform Exhaustion Effect** — Cosme…
The Audience Check
— Search for each passion item on your target platform. Can you find 5-10 creators with 10K-500K follo…
The Audio Loop
— last sound matches first sound; exploits continuous auditory processing (the brain doesn't register …
The author's name and date
— so readers know who created the analysis and when. This matters for accountability and for understan…
the authorship gradient
— the recognition that authorship in AI-assisted creation exists on a spectrum from "AI did everything…
The backdoor debate:
— Law enforcement: need "exceptional access" to preserve lawful surveillance capacity - Cryptographers…
The baking process
— mixing ingredients, a small flour explosion, egg cracking attempts (some messy) - **A mistake** — Av…
the bars in a histogram touch
— because the data is continuous. Moving from one bin to the next means moving along a continuous numb…
The batch system:
— Sunday afternoon: 3-hour batch filming session (3 videos) - Sunday evening: batch editing (1.5 hours…
The Beauty Profile
— a voluntary questionnaire that asks about skin type, skin tone, hair type, beauty concerns, and prod…
The Beginner Path
— You are new to prediction markets and want a comprehensive understanding. Read the book in order, Pa…
The behavioral effect of elevation:
— Increased desire to help others (measured in actual behavior, not just reported intention) - Increas…
The Berry phase can be neglected when:
— The evolution is non-cyclic (open path). - The parameter space is 1D (no area to enclose). - The Ber…
The Berry phase is significant when:
— A quantum system undergoes cyclic or near-cyclic evolution in a parameter space. - The system remain…
The Best Defense May Not Gamble
— High steal totals often indicate gambling - Detroit's moderate steal total reflected disciplined pos…
The Big Five (OCEAN)
— Openness, Conscientiousness, Extraversion, Agreeableness, Neuroticism — is the current scientific co…
The Big Sort: Geographic Clustering
— Americans are living in increasingly partisan communities, partly through self-selection into differ…
The Block WPA Calculation:
— Pre-play: GSW 62% (expected make gives them lead) - Post-play: GSW 50% (still tied, Cavs ball) - WPA…
The boundaries:
— No creating after 9 PM - Analytics checked once per day (after lunch) - No comparing follower counts…
The brainstorm session
— Set a 10-minute timer, write as many ideas as possible without evaluating. Quantity over quality; fi…
The brand player's objectives:
— Stay as close to $1,500 as possible - Secure 90-day usage rights for all content - Get 60-day exclus…
The bridge from quantum to classical
— a coherent state with $\bar{n} \sim 10^{12}$ has relative fluctuations $\Delta n/\bar{n} \sim 10^{-6…
The bridge to physical design
— a preview of how the logical model maps to DB2 tablespaces, page sizes, compression, and denormaliza…
The bug is in step 6
— the grouping logic. > > Three checks instead of eight. For larger codebases, the savings are dramati…
The business logic has fundamentally changed
— the existing code implements rules that no longer apply 2. **The architecture prevents essential cap…
The Business of Machine Learning
— The ML project lifecycle · Framing business problems as ML problems · Success metrics vs. model metr…
The Business Rule Archaeology:
— The benefits calculation engine contained 2,847 distinct business rules (identified by systematic co…
The Calibration Verdict:
— Forecasters who gave Clinton 98-99% win probability experienced a roughly 50-70-sigma event (essenti…
The case against (aggregate costs):
— **Chilling effects on public expression.** If anyone can be identified from any photograph, particip…
The case against Aadhaar:
— **Surveillance infrastructure.** Aadhaar creates a comprehensive identification system that can be u…
The case AGAINST ethical concern:
— Every musician, advertiser, and storyteller throughout history has designed for memorability. Earwor…
The case against the ARC
— or rather, against the sufficiency of its approach — rests on what has not changed. The gap between …
The case against:
— Markets on identifiable individuals' deaths commodify human life and reduce persons to financial ins…
The case for Aadhaar:
— **Financial inclusion.** Aadhaar has enabled hundreds of millions of previously "unbanked" Indians t…
The case for death/health markets:
— Life insurance and annuity markets already involve betting on mortality. The life settlement industr…
The case FOR ethical concern:
— The earworm effect is involuntary. Viewers didn't consent to having Nia's audio loop in their brains…
The case studies
— documented evidence of internal knowledge, decision-making, and the gap between what platforms knew …
The caveats
— what should the reader be cautious about? "This analysis is based on observational data and cannot e…
The Central Limit Theorem
— this is the most important threshold concept in the entire course. It is the bridge from probability…
The centralized model's information flow:
— **Type:** Proximity data (who was near whom, when, for how long) — far more granular than traditiona…
The Challenge
— "I bet you can't watch this without smiling/crying/looking away."
The Chen-Williams household
— Priya Chen and Marcus Williams bought a 1963 ranch-style house specifically for its gut-renovation p…
The Choir & the Particle Accelerator
— A recurring structural comparison between choral resonance phenomena (vowel formants, choral blend, …
The Choir:
— The choir in the running example is always a mixed-voice (SATB) choir, not a children's choir or sin…
The circadian alerting signal
— driven by the SCN, this produces a predictable wave of alertness that rises in the morning, dips in …
The close-up advantage
— Vertical framing puts the face in the center of the frame, making subtle facial expressions (slow re…
The Coaches' Voice - Goalkeeper Masterclass
— Focus: Technical analysis with data context - Format: Video with expert commentary
The Coaches' Voice - Set Piece Masterclasses
— Focus: Expert coaching perspectives - Format: Video with tactical analysis
The Coaches' Voice Podcast
— Focus: Coaching perspectives on tactics - Defensive Content: System explanations from practitioners
The Coalition of Black Creators
— coalitionofblackcreators.com A coalition formed to represent Black creators' interests in negotiatio…
The Cold Open
— Start mid-sentence, mid-action, mid-story. No introduction, no greeting, no context.
The Collaboration
— Creating content WITH community members rather than ABOUT them. Duets, prompt responses, incorporati…
The collinearity problem
— Players appear in correlated patterns (starters with starters, bench with bench) - When players alwa…
The Color Pop
— One intensely saturated element in an otherwise desaturated or neutral frame. Draws the eye to exact…
The comment mine
— Read your last 50 comments, looking for questions, suggestions, and explicit "you should make a vide…
The company doctor
— typically a single physician assigned to a camp or rotating among several camps — provided the only …
The company's concerns:
— Ensuring that employees are working during stated hours - Maintaining productivity on projects with …
The Comparison
— "X vs. Y" or "[Expensive thing] vs. [cheap thing]." Comparisons create built-in narrative structure.
The complete pipeline
— generate a report, upload to S3, create a presigned URL, email the link — is a workflow you can impl…
The complications:
— When you sell your home, the lease transfers to the buyer — but buyers (and their lenders) must agre…
The composition copyright
— covers the song itself (melody, lyrics, structure). Owned by the songwriter/composer. 2. **The sound…
The concerns:
— **Consent complexity.** Customers must understand and manage which third parties have access to thei…
The Confession Tone
— "I need to tell you something" or "I've been keeping this a secret" — spoken with genuine vulnerabil…
The Confidence Code
— Katty Kay and Claire Shipman (2014) Examines why women often underestimate their own competence and …
The Confronting Gaze
— Look directly into the camera with an intense, specific emotion (not just "surprised face" — a genui…
The Consensus Enforcement Machine
— how social pressure maintains wrong answers.
The context
— two to three sentences establishing why this analysis was done. "Following the 2020-2021 decline in …
The Control Fallacy
— the naming of the underlying misbelief that allows you to examine and release it. You cannot determi…
The control variables:
— Same content (first 38 seconds identical across all versions) - Same hook (Verbal Hook #16, Save-You…
The convergence trajectory:
— **2020-2022**: Separate models for each modality (GPT-3 for text, DALL-E for images, Whisper for aud…
The conversion audit checklist:
— [ ] Map every step of your conversion path in writing - [ ] Record actual numbers at each step for t…
The correct comparison:
— Old furnace burned 788 gallons to deliver X BTUs of heat. - New 96% furnace delivers the same X BTUs…
The Cost of a Burst Pipe
— Pipe repair (if accessible): $200–$500 - Drywall and finish repair after pipe access: $500–$2,000 - …
The cost-based query optimizer
— an approach where the database automatically estimates the cost of different execution strategies an…
The Costs
— Long-term radon test (free from county): $0 - Radon mitigation system: $1,680 - Post-mitigation shor…
The Countdown
— A visible countdown (3, 2, 1...) creates temporal anticipation. Something is about to happen.
The counterfactual problem
— Great defenders prevent actions that never occur
The Counterintuitive Fact
— presents something that seems impossible. Emotion: cognitive conflict, curiosity ("How can that be?"…
The couple-to-other-relationships extrapolation
— which is central to this chapter's argument — involves a significant inferential step. The original …
The courtroom analogy:
— $H_0$ = presumption of innocence - Data = prosecution's evidence - p-value = how convincing the evid…
The creative/service distinction:
— Creative work: evaluated by artistic standards (does it express something genuine?) - Professional s…
The Creator Burnout Survey
— Published annually by multiple organizations, these surveys document the prevalence and patterns of …
The creator dispute structure
— community members deciding their relationship to work or communities they feel have become ideologic…
The creator's objectives:
— Get as close to your rate card as possible - Limit usage rights to 30 days - Limit exclusivity to 30…
The creator-as-infrastructure model
— building an audience first, then attaching a product business — is one of the most powerful patterns…
The critical variable is elaboration
— the degree to which the audience is motivated and able to think carefully about the message. When el…
The critique:
— Haystack problem: more irrelevant data (hay) doesn't make finding the needle easier; may make it har…
The cross-niche import
— Look at trending content in adjacent niches and adapt their format or topic to your niche. Many chal…
The Culture Map
— Erin Meyer (2014) Maps eight dimensions of cultural difference in communication, leadership, and con…
The current file's content
— the code above and below the cursor position, providing immediate context for what the developer is …
The current landscape (2025):
— *Closed frontier*: Models from Anthropic (Claude), OpenAI (GPT-4, o3), and Google (Gemini) remain th…
The daily feedback loop:
— Place bets according to your process. - Record results the same day. - Brief emotional check-in: How…
The dangerous archer is C
— precise but not accurate. Their consistency creates confidence. If you watched Archer C shoot, you w…
The dark pattern taxonomy
— techniques that are named, documented, and therefore nameable by users and regulators.
The dartboard analogy:
— High bias, low variance: tight cluster, far from bullseye - Low bias, high variance: scattered aroun…
The DARVO Recognition Checklist:
— Did the conversation begin with you raising a specific concern or complaint? - Did the other person …
The Data Scientist Path
— You have strong programming and statistics skills and want to focus on modeling and forecasting. Ski…
The data type is the same
— continuous numerical, ratio level — but the **operational definition** changes what the numbers mean…
The data:
— WHO COVID-19 Vaccination Data (194 countries, 2021-2023) - World Bank Development Indicators (GDP pe…
The Dead Code Problem:
— 1,847 programs (38%) were dead — never executed in production, or executed but producing output nobo…
The dead stare / deadpan hold
— After a punchline, hold the shot with the creator staring expressionless at the camera for 2-3 secon…
The decentralized model's information flow:
— **Type:** Anonymous rotating Bluetooth identifiers - **Subject:** All app users — but anonymously - …
The Decision Rule:
— Symmetric data → report mean + standard deviation - Skewed or outlier-heavy data → report median + I…
The Dependency Web:
— The benefits calculation engine (FBACALC, 47,000 LOC) was called by 347 other programs - 23 programs…
The Depletion Indicators:
— [ ] Creating content feels more like obligation than enjoyment - [ ] I find it hard to think of fres…
The developer's comment or function signature
— the most immediate instruction, which acts as the "instruction" component of the prompt. A comment l…
The diagnostic questions:
— How many genuinely distinct professional or social worlds do you have meaningful access to? (Not jus…
The Direct Address
— "If you [specific characteristic], watch this." Creates instant relevance for the target audience.
The Direct Point
— Point at the camera (at the viewer) and speak directly to them as if they're in the room.
The Disagreement
— "Everyone says [common belief]. They're wrong, and here's why."
The disciplined backtester asks:
— "What could be wrong with this result?" not "How good is this result?" - "How would this fail?" not …
The distinction in practice:
— *Creative work:* The content Zara makes from her own creative impulse — the videos that express her …
The distribution was extremely skewed:
— The top 1% of creators (by sales) earned a median of $170,000+ annually on the platform - The top 10…
The DL/I Call Interface:
— COBOL programs communicate with IMS through `CALL 'CBLTDLI'` -- the DL/I call interface. - Every cal…
The Double Pivot
— Soccer analytics discussion - Industry guest interviews - Metric explanations
The Double Take
— Notice something, look away, then whip back to it. The reaction is the hook.
The Draft Network
— Prospect evaluations - Scouting reports - https://thedraftnetwork.com/
The DSA's systemic risk approach
— requiring risk assessments and mitigation measures rather than content removal mandates — represents…
The EDA workflow itself
— load, clean, compute baselines, test hypotheses, check significance, visualize, and report --- is a …
The Education Realignment
— College-educated white voters have moved toward Democrats; non-college white voters have moved towar…
The Effortful Educator
— theeffortfuleducator.com Blake Harvard's blog applying cognitive science to teaching. Particularly s…
The eight parts in one sentence each:
— **Part I (Foundations):** The same patterns -- feedback loops, emergence, power laws, phase transiti…
The Einstellung Effect
— when expertise becomes a prison.
The emergency stash:
— Three "evergreen" videos filmed and edited but not posted - Used only for sick days, exam weeks, or …
The Empty Frame
— Start with an empty frame or surface, then enter it or place something in it. The emptiness creates …
The ending:
— What was ending (role, identity, relationship, chapter)? - What was the grief component — even if th…
The Endogeneity Debate
— Is party ID prior to and causative of issue positions, or do issue positions also shape party ID? - …
The entire process
— from page load to ad display — happens in under 200 milliseconds.
The entity-relationship diagram
— a wall-sized printout with all 32 entities and their relationships in Crow's foot notation. 2. **The…
The Environment Mismatch
— A person in a setting where they clearly don't belong. Formal wear in a messy kitchen. Beachwear in …
The ethical spectrum (most → least ethical):
— Inspiring action → Modeling behavior → Community celebration → Surprise kindness (known person) → Su…
The EU Digital Services Act (2022)
— includes provisions requiring platforms to protect minors, drawing on AADC principles. - **Australia…
The evidence is promising:
— Google's "prebunking" campaign, tested in collaboration with researchers at Cambridge and Bristol un…
the exact rules vary by compiler:
— **IBM Enterprise COBOL:** Uses a well-documented algorithm for intermediate result sizing. The ARITH…
The experiences of the smallest immigrant groups
— a single Greek family in a coal camp, a Romanian couple far from any compatriots — are the hardest t…
The experimental format:
— Variable being tested: What am I changing? - Hypothesis: What do I predict, and why? - Measurement: …
The explore/exploit balance
— developing skills through deliberate exploration, then building capital through exploitation 3. **We…
The Extraction Pattern (Chapters 15-21, 41)
— Do your interviewees describe the extraction of wealth from their community by outside interests? Ho…
The Extreme Close-Up
— Open on something so zoomed-in it's unrecognizable, then reveal it. Works for cooking, art, science,…
The facade
— a stateless, observable, reversible routing layer that sits in front of both legacy and modern servi…
The Facebook News Feed Arc
— A real case thread documenting the evolution of Facebook's News Feed from 2012 to 2022, grounding th…
The failure modes
— pre-echo, high-frequency smearing, singer's formant degradation, fine spectral structure loss — reve…
The Failure Reel
— Open with a compilation of your failed attempts at something, then transition to the success. Builds…
The False Start
— Begin as if filming one type of video, then pivot. "So today I was going to — actually, no. We need …
The families who refused to sell
— who held out against land agents, kept their farms, and watched the world change around them. What h…
The Feature
— Showcasing community members' work, achievements, or stories. Luna's version: monthly "Community Gal…
The feed is saturated with aggressive hooks
— when every video opens with high energy, silence becomes the pattern interrupt 2. **The content dema…
The Female Lead
— thefemaleleadbusiness.com A UK-based organization with global reach that supports women in business,…
The field has a significant diversity deficit
— disproportionately white, disproportionately male, disproportionately from elite institutions. This …
The final sort
— If we could arrange for TRANSACTIONS to be accessed in TRANS_DATE DESC order, we could eliminate the…
The Financial Analysis
— For each option, estimate: - Capital expenditure (hardware, software licenses, infrastructure) - Ope…
The finding
— what happened 2. **The magnitude** — how big (effect size) 3. **The uncertainty** — how confident (C…
The first few seconds matter more than ever
— not because attention spans are shorter, but because alternatives are more abundant. You have to ear…
The five common problems
— tablespace scans, lock contention, thread reuse, commit frequency, and data skew — account for 90% o…
The five-layer defense strategy provides depth:
— Layer 1: Parameter markers for all values - Layer 2: Input validation (format, range, whitelist) - L…
The Flash Forward
— Start with the most dramatic moment from later in the video, freeze-frame, then "rewind" to the begi…
The Foreign Intelligence Surveillance Court (FISC)
— a secret court composed of 11 federal judges, appointed by the Chief Justice of the Supreme Court, a…
The four characters' gaps:
— **Zara — Format gap:** Everyone did scripted skits OR reactions; nobody did observational comedy tol…
The four domains of ethical concern
— privacy, manipulation, representation, and accountability — provide a systematic structure for analy…
The Four Factors:
— Dean Oliver's Four Factors (eFG%, TOV%, OREB%, FT Rate) explain over 90% of the variance in NBA team…
the Four Horsemen
— Gottman's term for four interaction patterns strongly predictive of relationship dissolution: critic…
The Four Layers of the Electorate
— Citizen voting-age population (CVAP) → registered voters → likely voters → actual voters - Each filt…
The four metrics computed here:
— **Demographic Parity Difference**: The difference between the highest and lowest group positive pred…
The four types of luck:
— **Aleatory** — pure randomness (coin flips, quantum events) - **Epistemic** — lucky in what you know…
The four-category framework applies universally
— whether you're on YouTube, TikTok, Instagram, a podcast, or a newsletter. The specific metrics withi…
The four-stage anatomy of scapegoating
— Identification, Attribution, Dehumanization, Legitimization of exclusion or violence.
The Full-Stack ML Team Model
— Cross-functional teams that include a data scientist, an ML engineer, a data engineer, and a product…
the gaze
— developed by Laura Mulvey in her 1975 essay "Visual Pleasure and Narrative Cinema." Mulvey argued th…
The Gender Gap
— Women vote approximately 10-15 points more Democratic than men in recent presidential elections - Th…
The governance gap
— the distance between AI deployment and AI oversight — is one of the most significant organizational …
The Grade Calculator
— Your first real program. Starts as simple averaging and evolves into a weighted grade system with le…
The Gradient
— Research summaries - Modern NLP developments
The gray zone
— tasks that can go either way depending on your skill level, experience, and tools — is where most of…
The Green Screen Background
— Use an unusual, relevant, or surprising background image/video via green screen.
The Grey Zone:
— Political elections - Geopolitical events (wars, coups, sanctions) - Social outcomes (pandemic sever…
The Hacker Playbook 3
— Peter Kim. Red team edition covering practical attack techniques with a focus on Active Directory en…
The hallucination problem
— LLMs generating fluent, confident text that is factually incorrect — is a fundamental limitation for…
The halo effect
— the tendency for a positive (or negative) overall impression to color perceptions of specific traits…
The Hands-Only Open
— Start with just hands doing something (crafting, cooking, unboxing) before revealing the face. Creat…
The Hard Questions
— How do you feel about the way Appalachia is portrayed in the media? - What do people from outside ge…
The headline
— one sentence that captures the key finding. "Mobile clinics are the most cost-effective way to incre…
The healthy frequency:
— **Weekly analytics review** (30-45 minutes): Look at overall trends, identify high/low performers, a…
The Hierarchical Data Model:
— IMS stores data in tree structures (hierarchies) where each segment has one parent and may have mult…
The hippocampus
— the seahorse-shaped structure that is central to the formation of new long-term memories. Damage to …
The home inventory video
— a narrated phone walkthrough of every room — takes 30 minutes and may be worth tens of thousands of …
The Houston rally context
— the followers who attended the "Stop Islamization of Texas" rally organized by "Heart of Texas" did …
The Howey Test
— An investment contract exists when there is: 1. An **investment of money** 2. In a **common enterpri…
The human analysts' disagreement:
— Sam Harding: "The speech is using people-centric vocabulary, but there's no anti-elite critique. The…
The hybrid approach
— external subprograms for shared business logic, nested programs for internal plumbing — combines the…
The hybrid cache pattern
— using an RRDS as a fast lookup cache in front of a KSDS master file — gives the best of both worlds …
The hybrid model typically works as follows:
— **Central function responsibilities:** Policy development, standard setting, model registry maintena…
The Hydrogen Atom
— the single most important quantum system, revisited with increasing sophistication from Chapters 2 t…
The hype cycle
— overpromise, underdeliver, overcorrect — has repeated in every era. Recognizing this pattern is itse…
The Hype-Reality Gap
— How has your ability to distinguish hype from reality evolved? Provide a specific example. 2. **Huma…
The hypothalamus
— a small but critical structure that regulates the body's homeostatic systems: temperature, hunger, t…
The Hypothetical
— "What would happen if..." or "Imagine if..." Activates the viewer's imagination.
The Idea Bank:
— Created a Notes folder with categories: Outfits, Style Tips, Trends, Thrift Finds, Community - Seede…
The Idea Vault
— Part 5 (Chapters 25-31) includes 100 ideas per genre = 700 total ideas across seven genres. Many can…
The IF statement
— the workhorse of decision-making, supporting simple, nested, and compound conditions 2. **The EVALUA…
The inauthenticity of the "community"
— the followers were real Texans engaging with each other in genuine ways, but the organizer who had a…
The Inconsistency Problem
— Different developers using different tools, prompts, and styles produce code that looks like it was …
The indoor unit types:
— **High-wall unit:** The most common type, mounted on the upper portion of a wall. Slim profile, quie…
The informal accountability ecosystem
— researchers, civil society organizations, international bodies — fills a genuine gap but is not a su…
The Integration Landscape
— Understanding the categories of external services and common integration patterns (direct calls, SDK…
The intent-impact gap
— the gap between what you meant to communicate and what the other person experienced. Identified by S…
The Intention Statement
— a declaration of what you commit to being and doing in the conversation, regardless of their respons…
The International Ombudsman Association (IOA)
— ombudsassociation.org — Professional association for organizational ombudspersons. Maintains a pract…
The Interrupted Action
— Start doing something normal, then stop abruptly. "Wait. Did you see that?"
The Intersection Test
— For items that pass both checks, ask: "What's my specific angle? What's the version of this that onl…
The Java rewrite argument (must include):
— Risk 1: 1,400 programs x 2,000 average LOC = 2.8 million lines. Industry data suggests COBOL-to-Java…
The Java Rewrite Question:
— Provide a structured argument for why a full rewrite is or is not appropriate for this system. Your …
The Johari Window
— a model of the relationship between self-knowledge and others' knowledge that makes visible the spec…
The Kalosverse
— An MCU fan community network spanning Reddit, Tumblr, Discord, and AO3, used to explore transmedia s…
The key findings
— three to five bullet points, each stating an insight (not a finding). Use plain language. Avoid jarg…
The key space is dense
— most slots between 1 and the maximum RRN are occupied 3. **Maximum performance for random access** i…
The key space is sparse
— if your keys range from 1 to 10,000,000 but only 50,000 slots are occupied, 99.5% of the file is emp…
The Klein paradox
— a Klein-Gordon particle encountering a step potential $V_0 > 2mc^2$ shows a transmission probability…
The Knowledge Project
— Deep interviews on expertise - **Masters of Scale** - Business scaling lessons
The Krumhansl-Kessler tonal probe task
— Several interactive demonstrations of this psychological experiment are available online. Search "to…
The land
— geology, geography, natural resources 2. **The original inhabitants** — Indigenous history and prese…
The Learning Agency
— the-learning-agency.com An organization focused on making learning science research more accessible …
The Learning Intervention Study
— Design and conduct a mini-experiment testing a learning strategy on yourself or peers 2. **The Learn…
The Learning Scientists
— learningscientists.org Founded by Yana Weinstein and Megan Sumeracki, this site translates cognitive…
The legal framework
— US SAR (Bank Secrecy Act), UK SAR (POCA 2002), EU STR (AMLD5) — creates a mandatory reporting obliga…
The legal/constitutional framework
— Is your proposal content-based (constitutionally vulnerable under the First Amendment) or conduct-ba…
The Legitimacy Question
— Who counts as a "real" fan, and who decides? 2. **Fan Labor and Unwaged Value** — The cultural and e…
The Legitimate Concerns:
— "Unreasonable requirements" → Documentation burden for residents is genuinely high. His concern may …
The length fields pattern
— passing an actual count alongside a table or buffer — prevents the called program from accessing uni…
The lesson:
— In 2–3 sentences, what can you take from this video and apply to your own content?
The limitations:
— Savings are smaller than rooftop ownership — 5–15% of your electricity costs rather than 70–100% - A…
The logic is inverted
— if the condition is TRUE, the step is **bypassed** (not executed).
the losses are much larger than the wins.
— Average win: +$14.40 - Average loss: -$166.67 - Loss-to-win ratio: 11.6x
The Lowe Post
— ESPN's Zach Lowe with analytical perspective
The Lowe Post Draft Shows
— Zach Lowe's interviews with evaluators - Industry perspective on draft process
The magnetic moment
— the relationship between angular momentum and magnetic moment requires additional physical input ($g…
The Markup (themarkup.org)
— investigative journalism organization that publishes technically rigorous investigations of AI syste…
The math:
— 20,000 subscribers in personal finance with 60% view rate = 12,000 views per video × $60 CPM = $720/…
The Mathematical Argument Against:
— Expected value analysis assumed normal distribution - Game 7 psychology may affect shooting percenta…
The Mathematical Argument For:
— 15.9% was 2+ standard deviations below expected - Over 27 missed threes, expected value still: 0.159…
The Matthew effect
— "The rich get richer." Sociologist Robert Merton coined this term for the phenomenon where initial a…
The MCP Server Registry
— A curated directory of community servers with descriptions and quality ratings. 2. **GitHub** — Sear…
The mean
— virtues lie between extremes. Courage is between cowardice and recklessness. Transparency is between…
The memory itself is not neutral
— it has been doing work for Jordan, organizing his sense of where his anxiety comes from and what it …
The menu bar
— File, Edit, View, Insert, Runtime, Tools, Help - **The toolbar** — buttons for common actions - **Ce…
The mere exposure effect revisited
— From Chapter 6: repeated exposure increases liking. Triggers (section 9.7) essentially create involu…
The Meridian Bank complete logical model
— 30+ entities across customer, account, transaction, loan, product, branch/employee, regulatory, and …
The Meridian Collective
— Destiny, Theo, Priya, and Alejandro — has YouTube subscribers and Twitch followers and a Discord ser…
The Meridian National Bank database
— a complete schema with 8 tables, realistic sample data, proper tablespace separation, and appropriat…
The Mess
— Something going dramatically wrong in the first frame. A spill, a break, a collapse. The viewer's br…
The Message and the Medium
— delivery shapes meaning as much as content 2. **Truth, Deception, and the Spectrum Between** — ethic…
The Milestone Celebration
— Framing achievements as community accomplishments ("WE hit 10K") rather than personal ones ("I hit 1…
The minimum every scheduled job should log:
— Job start (timestamp + job name) - Key milestones (data loaded, report generated, email sent — with …
The Minimum Viable MCU school
— primarily addressed to new viewers rather than existing fans — argued that specific curated lists of…
The minimum viable setup:
— Camera: phone propped on a stable surface - Audio: phone microphone in a quiet room (cover windows t…
The ML Engineer Bridge Model
— ML engineers sit between data scientists and operations, translating models into production systems …
The ML Platform Model
— A central ML platform team builds shared infrastructure (pipelines, feature store, monitoring, model…
The model's accuracy
— that it produces reliable outputs. - **The model's fairness** — that it does not systematically disa…
The Modernization Spectrum
— manifests in string handling because modern data interchange formats (CSV, XML, JSON, pipe-delimited…
The modifier-fan
— Someone whose primary relationship is creative transformation of the game — writing mods, creating f…
The monthly feedback loop:
— Conduct the monthly review (Section 37.2.2). - Run the full performance dashboard. - Run the bias au…
The moratorium model
— banning a technology until governance is in place (as several cities have done with facial recogniti…
The more nuanced view
— and the one that the evidence best supports — is that the ARC has been effective at what it was desi…
The Moving Camera
— Start with the camera in motion — walking toward something, spinning, falling. Movement triggers the…
The MRR milestone map:
— $500/month MRR: Part-time income supplement — meaningful progress - $2,000/month MRR: Near or at min…
The Mystery
— "What is this?" or "Can you guess what happens?" Curiosity gap in its purest form.
The Naive Technicist
— Believes data is neutral, technology is progress, and the right technical solution will resolve any …
The Negation
— "DON'T do this" or "STOP making this mistake." Negative commands are more attention-grabbing than po…
The Neutral Zone
— the in-between period when the old is gone and the new has not yet been established. This is disorie…
The neutral zone:
— Was there a period of disorientation, uncertainty, or "who am I now?" - What was the hardest aspect …
The New Beginning
— the emergence of a new identity, orientation, or way of being. This cannot be forced or scheduled; i…
The new beginning:
— If you've reached it: how did it emerge? Was it forced or did it develop? - If you haven't reached i…
The New Jim Crow
— Michelle Alexander's analytical framework describing the War on Drugs-driven mass incarceration syst…
The NFL Data Ecosystem
— where data comes from, how it's structured, and how to access it programmatically. Understanding the…
The Noise Filter
— [ ] Write your personal filter criteria: what types of AI coverage you will and won't spend time on …
The normal distribution as a model
— real data is never perfectly normal, but the model is useful. This "all models are wrong, but some a…
The Number
— "3 things nobody tells you about..." Numbers promise structure and parseable content.
The numbers (Month 1-3):
— Average views: 340 - Completion rate: 38% - Followers gained: 67 - Top comment theme: "You seem real…
The Numbers:
— 25 frames/second x 90 minutes x 60 seconds = 135,000 frames per match - 22 players x 2 coordinates =…
The Oconaluftee Citizen Indians
— a group of Cherokee living along the Oconaluftee River had separated from the Cherokee Nation before…
The Odds API (the-odds-api.com)
— Real-time and pre-match odds from 40+ bookmakers via REST API. Covers major US and international spo…
The OECD AI Principles
— inclusive growth, human-centered values, transparency, robustness, and accountability — provide the …
The Okafor-Reyes Study
— Dr. Adaeze Okafor and Dr. Carlos Reyes are running a 5-year, 12-country cross-cultural attraction st…
The one habit I'm establishing:
— What it is: - When I'll do it: - How long it takes: - How I'll track it:
The only justified punts from opponent territory:
— 4th & 10+ with no FG opportunity - Leading in final 3 minutes and pinning deep is strategically valu…
The Opening (Nike)
— Elite camp series - Verified testing
The opportunity
— Why AI matters for this organization, now 2. **The current state** — Maturity assessment summary (on…
The optimization workflow
— capture, analyze, identify, hypothesize, test, verify — is a disciplined process that produces relia…
The Options
— What are the alternatives? Include the "do nothing" option with its consequences. Include at least t…
The orienting response
— the brain automatically redirects attention to process new visual information 2. **Cognitive refresh…
The original research firm's press release page
— when a report is cited, research firms often publish press releases summarizing key findings. These …
The ORM framework
— RCSA, loss data collection, scenario analysis, and KRI monitoring — provides the management infrastr…
The Outcome Matrix:
— High threat + High efficacy = *Danger control*: the person accepts the message, believes the action …
The Outsider Problem
— why correct dissenters are punished before they're celebrated.
The overcorrection concerns:
— **Lending standards.** Post-crisis lending standards became dramatically more restrictive. This prev…
The overcorrection warning
— every tool carries its own risk of swinging too far
The overfitting mechanism:
— Human perception is biased toward detecting streaks. We notice runs of success and forget the equall…
The overround
— the sportsbook's built-in profit margin. Understanding how much you are being "taxed" on each bet, a…
The p-value
— one of the most misunderstood concepts in all of science. Getting this right transforms statistical …
The page's Russian origin
— communicated to no follower at any point in the page's operation.
The page's strategic purpose
— not the celebration of Texas identity but the promotion of social division and institutional distrus…
The pairing rule:
— Symmetric data: **mean + standard deviation** - Skewed data: **median + IQR**
The Parallel Track
— Run established content alongside new content, giving the audience time to adjust. Never take away w…
the partial-revision trap
— new options added without old constraints removed. Women can now initiate and still are expected to …
The Passion Audit
— List everything you genuinely care about, based on real behavior (what tabs are always open, what yo…
The pause
— Hold the shot 0.5-1 second longer than feels natural before the punchline cut. This extra beat build…
The peak
— the most intense emotional moment 2. **The end** — the final moment
The peak-end rule
— Daniel Kahneman's finding that people judge experiences primarily by their peak moment and their end…
The peak-end rule in your life
— think of three significant experiences (a trip, a relationship, a job). Does how they ended dispropo…
The people who designed the programs
— the policy makers, economists, and social scientists who created the War on Poverty from their offic…
The periodic table
— its periods, groups, and chemical trends --- emerges directly from quantum mechanics.
The perspective shift technique
— cycling through multiple stakeholder perspectives and synthesizing the common ground and tensions — …
The Physical Demonstration
— Start with a physical action that demonstrates the video's topic. Don't talk about it — show it.
The physiology of elevation:
— Increased oxytocin production (the "bonding" hormone) - Activation of the vagus nerve (the parasympa…
The Pile
— Description: An 800GB curated dataset combining 22 high-quality sub-datasets (academic papers, books…
The Pinned Comment Setup
— Reference a specific comment from a previous video. Creates continuity and community engagement.
The planning fallacy and curiosity
— People consistently underestimate how long tasks will take. Similarly, viewers underestimate how lon…
The Platform Builder Path
— You are a software engineer who wants to build or contribute to prediction market platforms. Read Ch…
The Plausible Story Problem
— when narrative coherence substitutes for evidence.
The player-fan
— Someone whose primary relationship with the game is through direct play. Their fandom is rooted in p…
The Podfather (Fantasy Football Analytics)
— Projection methodology articles - R code examples - https://fantasyfootballanalytics.net/
The pointer build pattern
— maintaining a position variable and appending pieces via reference modification — is the standard CO…
The Polarization Dataset
— A longitudinal synthetic public opinion dataset tracking ideological sorting, issue positions, and m…
The Power Asymmetry
— Who collects data, who is collected upon, and who decides? 2. **The Consent Fiction** — When is cons…
The Pragmatic Insider
— Works within institutions to push them toward better practices, accepting incremental progress over …
The Pragmatic Programmer
— Andrew Hunt and David Thomas (Addison-Wesley) The book that coined "DRY" (Don't Repeat Yourself) and…
The pragmatists
— and this is where most experienced developers ultimately landed — recognized that vibe coding was a …
The predicate is not indexable
— for example, a function applied to the indexed column (`WHERE YEAR(TRANS_DATE) = 2025`), a LIKE patt…
The Predictable Ways Knowledge Goes Wrong
— > *Why every field believes it's uniquely rational while making the same mistakes as every other fie…
The prefrontal cortex (PFC)
— though technically part of the cortex rather than the "limbic system" in the classical sense, the pr…
The Pressure Indicators:
— [ ] I feel anxious when I haven't posted in more than 2–3 days - [ ] I check analytics multiple time…
The pressure switch and controls
— An electrical device that monitors system pressure and turns the pump on when pressure drops (typica…
The pressure tank
— A tank in the house (or pump house) that stores a pressurized supply of water and maintains system p…
The principal-agent problem
— In economics, this describes situations where one party (the agent) acts on behalf of another (the p…
The Principled Practitioner
— Brings ethical analysis to technical work, building governance considerations into design from the b…
The Problem Definition
— What specific behaviors does your framework target? (Be precise: not "disinformation" but specific c…
The problem of collective action
— why individuals with shared interests often fail to organize collectively — was formalized by econom…
The Problem Statement
— What business problem does this initiative solve? Frame it in business terms, not technical terms. N…
The problems multiply:
— The platform's `robots.txt` explicitly disallows scraping user profiles. - The Terms of Service proh…
The project context
— What are you building? What is the tech stack? 2. **Key constraints** --- What rules must the AI fol…
The project lacks immediate external structure
— no deadline, no assigned obligation, no accountability. In the absence of internal motivation strong…
The promises:
— Increased competition and innovation in financial services - Better products for consumers (e.g., ap…
The Prop
— Hold up an unusual object. The visual question "what is that?" creates instant engagement.
The proposal is intrinsically interesting to him
— he does genuinely care about the strategic content. But the *act of writing* may be associated with …
The proposed intervention
— What specific legal or regulatory action would you propose? A new disclosure requirement? A platform…
The ProPublica methodology
— showing how to analyze AI bias using outcome data matched to algorithmic predictions, establishing a…
The proving ground for quantum electrodynamics
— the Lamb shift discrepancy between Dirac theory and experiment drove the development of QED - **The …
The psychoacoustic model
— masking thresholds, critical bands, temporal masking, the absolute threshold of hearing — provides t…
The pump
— The device that lifts water from the aquifer to the house. Most modern residential wells use a subme…
The Python 2 to 3 migration was the hardest part
— not because of syntax differences, but because of subtle encoding issues in data that had been store…
The QB School
— Film analysis with statistics - Understanding context behind numbers - Quarterback-specific analysis
The Quadriceps Injury:
— Initially injured in January 2017 (right quadriceps) - Played only 9 games in 2017-18 season - Diagn…
The quarterly/seasonal feedback loop:
— Review the entire season or quarter. - Evaluate whether your edge has grown, shrunk, or remained sta…
The ratio shifts over time:
— Early career: low competence, low blindness → high potential for novelty, low ability to execute - M…
The Reaction Tease
— Show your reaction to something the viewer hasn't seen yet. Your expression creates curiosity about …
The realistic timeline:
— 0–10K subscribers: Minimal to no income; most viable: affiliate - 10K–50K: AdSense begins; first sma…
The Rebrand
— Honest communication about a fundamental shift. Make a video explaining what's changing and why. Acc…
The recognition that Indigenous knowledge systems
— including oral histories, ecological knowledge, and cultural practices — constitute data that requir…
The Recommendation
— Your recommended option with clear rationale tied to business objectives.
The recurring themes in action:
— **Tools built by humans:** Vision systems trained on biased data reproduce and amplify those biases.…
The registry gap
— uneven global coverage, inconsistent public access, varying data quality — means that comprehensive …
The relational intention
— how you intend to be in the conversation. "I intend to listen genuinely to their perspective, not ju…
The relationship recession
— declining rates of sex, partnership, and marriage among young adults — reflects multiple mechanisms …
The relationships between clusters matter
— for example, understanding that customer Segment A is more similar to Segment B than to Segment C - …
The remix
— Take your best-performing videos and find new angles: "Part 2," "the advanced version," "why this ha…
The Replication Problem
— what happens when nobody checks the homework.
The representation debate structure
— a community confronting changes in who it is for — is common in fan communities. The IronHeartDebate…
The Resistance Tradition (Chapter 26)
— Do your interviewees describe acts of resistance — strikes, protests, legal challenges, community or…
The response confirms the host is alive
— and provides the MAC address, which can reveal the virtualization platform (VirtualBox, VMware) or h…
THE REVEAL (1-3 seconds)
— Same framing as the before for maximum contrast. The brain computes the delta and fires the reward r…
The reveal format
— Vertical framing naturally hides most of the scene, letting creators control what's visible and time…
The Revision Myth
— how fields rewrite history to make corrections look inevitable, sanitizing the messy process describ…
The rhythm break
— Establish a consistent cutting rhythm (same pace, same format) then break it — hold one shot longer,…
The Righteous Critic
— Identifies every flaw, challenges every system, distrusts every institution. This was Eli at the beg…
The Ringer Draft Coverage
— Kevin O'Connor's prospect analysis - Draft guides and big boards - Methodology discussions
The Risk Assessment
— What could go wrong with each option? What is the probability and impact of each risk? What mitigati…
The Risk Numbers:
— EPA action level: 4 pCi/L (picocuries per liter) - Average U.S. indoor radon level: approximately 1.…
The risks are real:
— **Data leakage:** Employees paste proprietary data, customer information, or trade secrets into cons…
The risks:
— Tyler may become defensive and difficult. - Webb may not support Sam's approach if Tyler escalates t…
The Rodriguez family
— Isabel and Miguel Rodriguez own a 1982 townhouse in an urban neighborhood. Isabel is an architect (s…
The role of vacuum fluctuations
— spontaneous emission (driven by vacuum fluctuations) seeds the laser, sets the random phase, and ult…
The RoPA is the foundation of all GDPR compliance
— without an accurate data map, all other compliance measures rest on incomplete foundations.
The rules:
— **Complement:** P(not A) = 1 - P(A) - **Addition (OR):** P(A or B) = P(A) + P(B) - P(A and B) - **Mu…
The Running Start
— Already in motion when the video begins — walking, building, cooking. No setup phase.
The saga pattern handles long-running processes
— break multi-day workflows into committed steps with compensating transactions.
The salary cap
— $224.8M in 2023, creating hard constraints - **The draft** - Primary source of cost-controlled talen…
The salary cap is a hard constraint
— Elite roster construction works within ~$225M limit 2. **Draft picks have calculable surplus value**…
the same mathematical theorem
— the Fourier uncertainty theorem — applied to two different physical domains. This is the strongest n…
The scale problem
— The gap between what effective media literacy requires and what reaching a democratic public demands…
The Scale Trick
— Hold something next to an unexpected size reference. A tiny object next to your hand. A massive obje…
The Science of Well-Being
— Coursera (Laurie Santos, Yale) Not directly about learning science, but highly relevant to the motiv…
The scope of psychology
— a multi-domain discipline that studies everything from neurons to culture 2. **Scientific method in …
The Scouted Football Podcast
— In-depth tactical and analytical football discussion.
The serendipitous encounter:
— Reading Chernow's biography — the specific book, the specific moment, the specific configuration of …
The setup (simplified):
— **Lab 1:** Alice (inner observer) measures a quantum coin. If heads, she prepares a spin-1/2 particl…
The Shellcoder's Handbook
— Chris Anley et al. Binary exploitation and shellcode development. Complements Chapter 27.
The Shout-Out
— Thanking specific community members by name for specific contributions 2. **The Feature** — Showcasi…
The signal-and-noise problem
— small samples and high variance—is the fundamental challenge of football analysis.
The skill that exploited the luck:
— Design instinct that made the user experience trustworthy - Persistence through the extended period …
The Slow Reveal
— Peel back, unwrap, uncover, or open something slowly. Anticipation builds automatically.
The Social Proof
— "100K people asked me to make this video" or "The video that got me banned from [place]."
The Sound Effect Punctuation
— A single, crisp sound effect at second 0 — a snap, click, or ding.
The Sound Then Silence
— A brief, attention-getting sound followed by a beat of silence, then your voice. The silence creates…
The specific problem
— Not "disinformation" in general, but a specific mechanism: dark money political advertising, algorit…
The spectator-fan
— Someone whose primary relationship is watching others play, whether in esports arenas, on Twitch, or…
The spectral envelope
— the overall pattern of which harmonics are present and in what proportions 2. **The attack transient…
The speed cut
— Cut to the punchline faster than expected. The viewer barely registers the setup before the payoff a…
The Speed of Truth
— a synthesis of Part III, building a predictive model for how long correction takes and what can acce…
The Split Frame
— Two contrasting images side by side in the first frame. Before/after. Two options. You vs. what peop…
The Spotify Dataset:
— The dataset consists of ~10,000 tracks across 12 genres — this number must remain consistent - The 1…
The Spotify Spectral Dataset
— Real-world audio spectral data used in Python chapters to analyze timbre, valence, energy, and frequ…
The spotlight effect
— the tendency to believe that others are paying more attention to us than they actually are — makes a…
The stakes feel high
— which produces performance pressure that can convert autonomous motivation into controlled motivatio…
The Stepien
— https://www.thestepien.com/ - Draft analysis and projections - Historical draft data
The Steve Fund
— stevefund.org Focused specifically on the mental health of young people of color, the Steve Fund pro…
The Stitch/Duet Response
— React to another video's content, starting with the most provocative moment of their clip.
The stories I tell about my childhood
— the standard narrative you produce when someone asks about your early life. How confident are you th…
The story you haven't told
— is there a part of your history that doesn't fit the narrative you typically tell? What would happen…
The Strategic Advocate
— Combines systemic critique with strategic action, building coalitions, designing alternatives, and a…
The Strategy:
— The trader identifies binary contracts where their estimated true probability q exceeds the market p…
The Streetlight Effect
— why fields study what's measurable instead of what matters. Introduces Goodhart's Law and the McNama…
The structural view
— which both Eli and Sofia found most persuasive — holds that the total number of jobs matters less th…
The Studies:
— **Study A:** Fisher, Aron, Mashek, Li & Brown (2005). "Defining the Brain Systems of Lust, Romantic …
The substantive intention
— what you intend to communicate or accomplish in terms of content. "I intend to be direct about the i…
The sweet spot is "curated casual"
— a background that looks natural but has been considered. Every visible object either supports the cr…
The Swipe Right Dataset
— A synthetic 50,000-profile dating app dataset used in Python chapters and exercises to explore real …
The Synchronized Duo
— Two people doing something in perfect sync. Coordination is inherently attention-grabbing.
The Talent Gap by the Numbers
— Average age of a COBOL developer: approximately 55–60 years - Estimated retirements per year: 5,000–…
The TCO Comparison Trap
— Vendors selling cloud migration will compare their annual cloud cost to the mainframe's annual cost …
The team:
— **Yuki Nakamura** — DevOps lead. Brought Jenkins, Git, Zowe, and VS Code to the mainframe team. Form…
The testing effect
— Memory is strengthened more by *recalling* information than by *reviewing* it. Quizzes, questions, a…
The Testing Protocol
— [ ] Define your standard evaluation battery for new tools in your domain (like Raj's six-task batter…
The Text-First Frame
— No person, no image — just bold text on a colored background with a provocative statement. Strips aw…
The things you can tell yourself:
— "This conversation is happening because I care about this relationship / this outcome. That's a good…
The three assumptions:
— **(Q)** Quantum mechanics applies universally — to coins, particles, observers, and laboratories. - …
The Three Listening Levels
— **Level 1 — Listening to yourself:** Your own thoughts, reactions, and what you'll say next. The def…
The three metric tiers:
— **Tier 1 (Growth Signals):** Share rate, save rate, return viewer rate — predict whether channel wil…
The Three Modes:
— **Recommendation** systems suggest items, content, or actions based on user preferences and behavior…
The Three Structures:
— `if`: Do something only when a condition is true - `if-else`: Choose between two paths - `if-elif-el…
The three traps:
— *Optimization trap:* Narrowing content toward what pays best; antidote: define creative core that is…
The Three Types of Polarization
— **Ideological polarization**: actual movement of policy opinions toward extremes (mixed evidence amo…
The three types of regulation
— prudential, conduct, and market integrity — address different problems and impose different obligati…
The three-factor framework
— customer risk, geographic risk, and product/service risk — provides the structure for most risk rati…
The Time Stamp
— "Things I learned in my first year of [activity]." Time creates a narrative arc expectation.
The topic
— What is this video about? (Clear subject) 2. **The emotion** — How will I feel watching this? (Facia…
The topic filled a gap
— there was no other comprehensive, well-produced video on this specific topic. Sasha wasn't competing…
The traceback
— showing the chain of function calls that led to the error 2. **The location** — file names and line …
The trade:
— Buy YES on Polymarket at $0.15. Fee = 1% of $0.15 = $0.0015. Cost per contract = $0.1515. - Buy NO o…
the tradeoff is inescapable
— states that no detection system can simultaneously minimize false positives and false negatives. Imp…
The Trader Path
— You have trading experience in other markets and want to apply it to prediction markets. Read Chapte…
The Traditional Siloed Model (Anti-Pattern)
— Data scientists build models → hand off to engineers → engineers deploy → operations monitors - Each…
The training objective
— what the system is instructed to maximize 2. **The feature set** — what information the system has a…
The transfer problem
— the difficulty of getting classroom-learned skills to transfer to real-world media behavior — is one…
The Transformation Preview
— Show the "after" first (beautiful cake, finished art, organized room), then snap to the "before." Cr…
The transition was painful:
— His existing audience — trained to expect callouts — pushed back: "This is boring," "Go back to expo…
The Trending Sound Subversion
— Use a trending sound but in an unexpected context or with an unexpected visual pairing.
The true probability
— the actual likelihood of the event occurring, which no one knows with certainty. 2. **The implied pr…
The Tutorial Tease
— Show the finished result of what you're about to teach in one gorgeous frame, then cut to the starti…
The two-day creation model:
— **Saturday morning:** Monthly planning session (first Saturday only) — 45 min - **Saturday afternoon…
The two-layer design solution:
— **The surface layer** (accessible to anyone): The content works, is engaging, and makes sense withou…
The type distinction matters:
— **Ionization:** Fast to detect fast-flaming fires. Slower on smoldering fires (up to 50 minutes slow…
The Unpopular Opinion
— "Unpopular opinion:" followed by a genuinely debatable stance. Creates immediate agreement or disagr…
The Unusual Angle
— Film from above, below, behind, or through something. Any perspective that's different from the stan…
The upper Midwest industrial cities
— Detroit (auto industry), Chicago (steel, meatpacking), and Cleveland/Akron (steel, rubber), connecte…
The values intention
— what you intend to remain true to. "I intend to stay honest without being cruel."
The verbal system
— processes language, whether spoken or written. It handles words, sentences, and linguistic meaning. …
The video:
— "Everything is fine": Mia sits at a clean desk, textbook open, pen in hand. Face: completely neutral…
The visible problems:
— Green color cast made her skin look unhealthy - Overhead shadows under eyes, nose, and chin - Flat l…
The Vocal Fry Drop
— Start speaking at a normal pitch, then drop to an unexpected low register for emphasis.
The voices of Appalachian women
— who ran households, organized communities, and bore the daily burden of poverty while also serving a…
The weekly feedback loop:
— Conduct the weekly review (Section 37.2.1). - Identify one process improvement to implement next wee…
The well itself
— A cased hole drilled or driven into the ground to reach a water-bearing geological layer (aquifer). …
The Whisper
— Open at a whisper. In a feed of loud, it's the quiet that stands out.
The xenharmonic community
— a loose network of microtonalists working online — has produced substantial bodies of music in 19-TE…
The Zombie Idea
— Part II's finale: why some wrong ideas cannot be killed.
Their specifications:
— **U-factor:** 0.27 or better (better than energy code minimum of 0.30) - **SHGC:** South-facing wind…
thematic coding
— identifying recurring themes and patterns across multiple accounts.
Thematic Connections
— Does the history connect to the textbook's recurring themes — the extraction pattern, the resistance…
Theme 1: Safety First / Know When to Stop
— Every chapter should include at least one 🔴 (call a pro) and one 🔵 (DIY-friendly) callout - Do not u…
Theme 2: Consent as Fiction
— Ch.1 (introduced briefly), Ch.3 (historical: no consent mechanisms), Ch.12 (cookie consent theater) …
Theme 2: The Cost of Neglect
— "The $50 repair you delayed is now a $5,000 job" - Quantify deferred maintenance costs wherever poss…
Theme 3: Don't Get Overcharged
— Help readers understand enough to ask intelligent questions - Include "questions to ask your contrac…
Theme 3: Normalization of Monitoring
— Ch.2 (panopticism as normalization), Ch.4 (industrial era), Ch.20 (self-surveillance) - Must appear …
Theme 4: DIY vs. Professional
— Every chapter should have an explicit ⚖️ DIY vs. Pro section - Framework: Skill level, Tool requirem…
Theme 4: Structural vs. Individual Explanations
— Ch.5 (theoretical), throughout - Must appear in: Ch.10, Ch.14, Ch.28, Ch.34, Ch.36, Ch.39
Theme 5: Energy Efficiency and Long-Term Savings
— Include cost/efficiency numbers where relevant - Link to utility rebates and tax credits where appli…
THEME: Knowledge is retiring
— Marcus Whitfield has 30 years of IMS recovery experience that exists nowhere in documentation. The p…
THEME: The best architects understand both worlds
— Carlos's initial assumption ("the backend handles recovery") is common among distributed-systems arc…
Then narrow:
— "Why does paragraph 4700 exist? What special case does it handle?" - "This EVALUATE has 47 WHEN clau…
Then the Google SRE book
— for the concrete blameless postmortem implementation 4. **Then Simpkin and Schwartzstein** (2016) — …
Theory of Mind
— The capacity to attribute mental states (beliefs, desires, intentions) to others and understand that…
therapeutic transference
— the process by which clients develop intense feelings toward therapists that are rooted in the thera…
Therapy for Black Girls
— therapyforblackgirls.com - Provider directory + podcast
Therapy for Black Men
— therapyforblackmen.org A directory of therapists with experience supporting Black men, including the…
There is a system of interconnected elements
— nations in an alliance network, individuals in a contact network, people in an economic network. 2. …
Thermal noise
— air molecules at any temperature above absolute zero are in constant random motion, producing random…
Thermostat location(s)
— **Return air grilles** (the larger grilles that pull air back into the system) - **Supply registers*…
Thermostat Type
— Thermostat brand/model: _______________________________________________ - Type (manual / programmabl…
They don't ask journals to be more fair
— they make fairness structural. When reviewers evaluate the question and method without seeing result…
They don't ask researchers to be more honest
— they make honesty the easiest path. When the publication decision is made before results exist, ther…
They don't ask the field to value replication
— they make replication valuable. When null results are published alongside positive results, the lite…
They don't feel safe
— Patterson's key insight is that silence in difficult conversations is usually protective rather than…
They tend to agree when:
— Sample sizes are moderate to large ($n \geq 20$ per group) - The data are approximately normal or at…
They tend to disagree when:
— Sample sizes are small ($n < 15$) and the data are skewed - Heavy outliers are present (these inflat…
Thin ideology
— A concept developed by political theorist Michael Freeden to describe ideologies (like populism) tha…
thin order books
— buy and sell orders sit unmatched for hours or days. This creates three serious problems:
Thin slices of behavior
— brief exposures to behavioral information — can generate surprisingly accurate impressions of some t…
Thin-file problem
— The situation of individuals with insufficient credit history for major scoring models to generate a…
Thin-slicing
— Ambady and Rosenthal's research showing that people can make accurate judgments from very thin "slic…
Things AI accelerates:
— Writing code from specifications - Generating unit tests, integration tests, and test fixtures - Cre…
Things AI can make worse if not managed:
— Code quality consistency across a large codebase - Architectural coherence when multiple developers …
Things AI does not meaningfully accelerate:
— Understanding user needs and business requirements - Making architectural trade-off decisions - Buil…
Things to Avoid:
— Do not share confidential client information (even anonymized, the risk is not worth it) - Do not pu…
Think about:
— Is the pressure drop you're experiencing consistent with elevation alone? - Or is it greater than ex…
Thinking Basketball
— https://www.youtube.com/c/ThinkingBasketball - Video analysis combining stats and film
Thinking Basketball (Ben Taylor)
— https://www.youtube.com/c/ThinkingBasketball - Video analysis demonstrating integration of statistic…
Thinking Basketball Draft Episodes
— Ben Taylor's analytical approach to prospects - Integration of statistical and film analysis
Thinking Basketball Podcast
— In-depth analytical discussions
Thinking in odds
— the shift from probability to odds/log-odds is a genuine conceptual leap. Students who can move flui…
thinking in vectors rather than loops
— is the mental shift that unlocks pandas. When you catch yourself reaching for a `for` loop to proces…
Thinking Like a Data Scientist
— The data science mindset · Structured vs. unstructured data · The CRISP-DM framework · Hypothesis-dr…
thinner seams
— coal deposits that required cutting through the rock above and below the coal to create passages lar…
Third Down Packages
— New formations to create confusion - Better pre-snap motion - More misdirection
Third Line (Internal Audit):
— How does audit validate the pentest program? - What should audit independently test? - How does audi…
Third place
— Ray Oldenburg's sociological concept of environments outside home (first place) and work (second pla…
Third places
— sociologist Ray Oldenburg's term for environments that are neither home (first place) nor workplace …
Third Quarter Summary:
— Score: CLE 33, GSW 27 - End Q3: Tied 76-76 - Q3 End WP: GSW 52%
Third Quarter:
— Heavy accumulation on field - Crews couldn't clear yard lines - Both offenses stalled - Defensive pl…
Third-party consumer data
— Data about individuals' purchasing behavior, lifestyle, and demographic characteristics purchased fr…
Third-party cookie
— A cookie set by a server other than the website the user is visiting, enabling cross-site behavioral…
Third-party cookies
— tracking across sites - **Browser fingerprinting** — identifying your device through its unique conf…
Third-Party Data Services
— Consuming data APIs with caching for efficiency.
Third-party doctrine
— A US legal doctrine, derived from Smith v. Maryland (1979), holding that information voluntarily sha…
Third-Party Integrations:
— Stripe for payment processing - Shippo for shipping label generation - SendGrid for transactional em…
Third-Party Testing:
— Testing of critical ICT third-party service providers - Pooled testing arrangements for shared infra…
This chapter
— conceptual foundation and architectural perspective 2. **ABCs of z/OS System Programming Vol. 10** —…
This conversation (genuine agreement pattern):
— Sam opened with explicit framing of the goal: not a sentiment, a specific agreement - Interest-surfa…
This is a fair bet
— expected value of net outcome is exactly zero. You should be indifferent (in expected value terms) b…
This is a genuine professional tool
— variations of this are used in data pipeline validation everywhere.
This is a Python chapter
— Parts B and C include programming tasks using the `DataQualityAuditor` class. Estimated completion t…
This is the meta-question
— it asks whether the field has the structural capacity to detect its own errors. A field where errors…
This Month
— [ ] Run your first monthly prompt retrospective - [ ] Identify one capability from the "developing" …
This project is worth 20% of your final grade.
— ## Submission Guidelines
This Quarter
— [ ] Complete your first quarterly AI practice review using the framework above - [ ] Set three concr…
This simulates the MQ request/reply pattern:
— Request file = request queue - Response file = reply queue - Correlation ID = message correlation
This textbook
— every chapter, every example, every exercise - **Python's official documentation** — `docs.python.or…
This Year
— [ ] Conduct all four quarterly reviews - [ ] Assess your position on the beginner-to-integrated arc …
Thomas Legion
— and he spent his later years in declining mental health, eventually dying in a state hospital in 189…
Thomas precession
— which reduces the spin-orbit coupling by exactly a factor of 2. The correct expression is:
Thompson's 11 Interceptions:
— 2 in red zone - 4 on third down - 3 on first down - 2 on Hail Mary attempts (minimal cost)
Thought Control
— [ ] Does the organization have a specialized vocabulary that makes it difficult to discuss doubts in…
Thought Experiment
— Imagine preparing a particle in a "position eigenstate" $|x_0\rangle$. Its momentum-space wave funct…
Thought record
— Beck's three-column technique for externalizing and examining automatic thoughts (Situation → Automa…
Thought Reform
— Robert Jay Lifton's term for the cluster of environmental and ideological conditions that produce pr…
Thread management considerations:
— No non-DB2 work between first SQL and SYNCPOINT - Pseudo-conversational design (cursor cannot span R…
Thread Management:
— **CTHREAD** (Connected Threads): The maximum number of allied threads. This is your connection limit…
THREADLIMIT
— maximum number of active threads for a transaction type. Too low means thread wait; too high means D…
Threadsafe Considerations for CICS (SG24-6351)
— Dedicated Redbook on converting CICS programs to THREADSAFE. Covers prerequisites, testing methodolo…
Threat assessment
— Identify relevant threat actors and TTPs 2. **Red team exercise** -- Test detection and response aga…
Threat intelligence
— strategic, tactical, operational, and technical — transforms raw data about threats into actionable …
Three access modes
— SEQUENTIAL for batch processing, RANDOM for direct access, and DYNAMIC for mixed operations. - **I/O…
Three canonical channels
— dephasing, amplitude damping, and depolarizing --- capture the essential physics of decoherence for …
Three content categories to handle differently:
— Criticism → read, consider, engage if useful - Abuse → delete immediately without engagement - Spam …
Three distinct privacy categories:
— *Your privacy:* You control what you share; selective sharing is a right, not deception - *Others' p…
Three failure modes:
— **Under-moderation:** Most aggressive members set tone; valuable members leave - **Inconsistent mode…
three fatal errors
— errors that every student of probability should understand.
Three governance strategies
— the precautionary principle, adaptive governance, and regulatory sandboxes — offer complementary app…
Three immediate policies:
— **Data inventory and access control:** Document what data the company collects, where it is stored, …
Three key scripts
— the specific words a student should say in three situations: - When asking an administrator what dat…
Three Levels of Temporal Organization
— **Tempo** (BPM): the rate of the basic pulse — how fast - **Meter**: the hierarchical grouping of be…
Three levels:
— **Contemplative:** Journaling, reflection, values review, narrative examination - **Relational:** Pr…
Three misaligned incentives:
— Outrage maximizes engagement (angry content drives more comments, shares, return visits) - Anxiety d…
Three pictures
— Schrödinger, Heisenberg, and interaction — describe the same physics with different bookkeeping. The…
Three root causes:
— **Unsustainable pace** — posting more than your system supports - **Passion misalignment** — creatin…
Three Sisters
— corn (or maize), beans, and squash — grown together in an intercropping system that modern agricultu…
Three temporal models serve three purposes:
— System-time: automatic audit trail (when the database changed) - Business-time: application-managed …
Three things the project does well
— be specific. "Good charts" is less helpful than "The chart comparing vaccination rates by income gro…
Three types of missing data:
— **MCAR (Missing Completely at Random):** No pattern to the missingness. Least problematic. - **MAR (…
Three types of questions:
— **Descriptive:** What happened? What does the data look like? (Start here.) - **Predictive:** What i…
Three viable organizational models exist
— embedded (within football ops), centralized (independent unit), and multi-club (group level) --- and…
Three years of probation
— **90 days of community service** - **$15,000-$20,000 in restitution** to MySpace - **Forbidden from …
three-column technique
— sometimes called the thought record — is the workhorse of cognitive restructuring. It is simple, por…
Three-month results:
— Reduction in "pattern violation" comments in human code review: approximately 40% (engineers caught …
Three-year impact:
— CBNC4500 has been restarted 9 times. Average recovery: 4 minutes. Zero downstream impact. - The CNB …
Threshold
— A critical value beyond which a system undergoes qualitative change; synonymous with tipping point i…
Threshold Alerts:
— 3-game cumulative distance >9 miles: Consider rest - Sprint count >150 in 3 games: Reduce practice -…
THRESHOLD CONCEPT
— CICS is a transaction manager, not an application server. Once you internalize this distinction, eve…
Threshold Concept — Final Statement
— Dirac notation unifies all representations of quantum mechanics. The wave function $\psi(x)$ is not …
threshold theorem
— the most important result in the theory of quantum computation after Shor's factoring algorithm.
Thresholds:
— PSI < 0.10: No significant drift. The distributions are essentially the same. - 0.10 <= PSI < 0.25: …
Throughout the Course:
— Follow 2-3 analysts on Twitter - Read one Football Outsiders or Athletic article per week
Thumbnail
— The static image representing a video before it is clicked, visible in feeds, search results, and re…
Thumbnails, Titles, and Packaging
— the art of the click. We'll look at the design principles behind thumbnails that stop the scroll, ti…
Thursday (publication day):
— Publish pillar content - Cross-post distribution content (already batched Sunday) - Post community c…
Thursday 09:15 UTC
— The bot is operating normally with these risk limits: - Max position per market: 100 contracts - Max…
thyroarytenoid and cricothyroid muscles
— the antagonist pair that controls vocal fold tension. At 5–7 Hz, these muscles undergo rhythmic tens…
Tick formatter
— A function or format string that controls how axis tick labels are displayed (e.g., `$42,000` instea…
Tie Game:
— Balanced approach - Last-shot capability - Defensive stops equally important
Tier 1 (15% drawdown, bankroll at $12,750):
— Reduce to 1/6th Kelly (from quarter-Kelly). - Review last 50 bets for process errors. - Continue bet…
Tier 1 (Strong Translation):
— EuroLeague (top teams) - Spanish ACB - Turkish BSL
Tier 1 (Weekly, ~45 minutes):
— Source 1: [Name, why you chose it, how long it typically takes] - Source 2: [Name, why you chose it]…
Tier 1 (Zero Risk — Instant Operations)
— Adding four nullable columns to TRANSACTION - Adding one nullable column to MERCHANT - Creating the …
Tier 1 - Highest Impact (3+ points):
— Quarterback - Left Tackle (protecting QB blind side)
Tier 1 --- Raw Metrics (updated every frame):
— Player positions $(x, y)$ - Player speeds and accelerations - Ball position and status - Inter-playe…
Tier 1 Critical (37 jobs):
— Account posting chain: ACCTEXTRT, ACCTVALID, ACCTPOST, ACCTAUDIT - GL chain: GLEXTRACT, GLTRANSF, GL…
Tier 1 — Critical (Immediate Response Required):
— Any abend in a Tier-1 job (defined list of ~40 critical jobs) - Batch window SLA milestone missed or…
Tier 1 — Daily (11 PM to 1 AM)
— RUNSTATS on high-churn tables (TRANSACTIONS, DAILY_BALANCES) - Incremental image copy / incremental …
Tier 1 — Glance indicators (red/yellow/green):
— Database status (up/down) - Buffer pool hit ratio - Log utilization - Active connections vs. limit -…
Tier 1 — Immediate (within 4 hours):
— GP utilization exceeds 90% for any 1-hour period - R4HA exceeds planned Aggressive scenario for the …
Tier 1 — Infrastructure Monitoring:
— RMF (Resource Measurement Facility) for z/OS resource utilization - CICS Statistics for region perfo…
Tier 1: AI for Everyone
— **Audience:** All employees - **Format:** Online, self-paced, 4 to 8 hours - **Learning objectives:*…
Tier 1: Always Include (50-100 tokens)
— Project name and purpose - Language, framework, and key technology choices - Architecture style (mic…
Tier 1: Core Banking (On-Premises z/OS)
— DB2 for z/OS v13 remains the authoritative system for: - Account master data - Transaction processin…
Tier 1: Essential for every business professional.
— **AI literacy.** Understanding what AI can and cannot do, at a level sufficient to evaluate proposal…
Tier 1: Executive Data Governance Council
— **Composition:** CDO (chair), CIO, CISO, CFO, heads of major business units, Chief Privacy Officer, …
Tier 1: High Acceleration
— 3x-10x faster. Examples: CRUD endpoints, data models, test generation, boilerplate, documentation. 2…
Tier 1: High-volume A items
— Use exponential smoothing or seasonal decomposition where you have sufficient data (at least 6-12 mo…
Tier 1: Prevention
— Stop attacks before they reach the model - Input validation and preprocessing - Rate limiting and ac…
Tier 1: Studio ($4/month)
— Monthly playlist: the music she actually listened to while making each video that month, collected i…
Tier 1: Verified Sources
— These are claims backed by specific, published sources that have been independently verified. They a…
Tier 2 (25% drawdown, bankroll at $11,250):
— Reduce to 1/8th Kelly. - Full model audit: check data inputs, coefficient stability, and out-of-samp…
Tier 2 (Low Risk — REORG Required)
— Advisory REORG cleanup after Tier 1 changes
Tier 2 (Moderate Translation):
— Italian Serie A - French Pro A - German BBL - EuroLeague (lower-tier teams)
Tier 2 (Monthly, ~90 minutes):
— What kind of deeper reading will you do? - How will you find it?
Tier 2 - High Impact (1-2 points):
— Edge Rusher (premier pass rushers) - Cornerback #1 - Wide Receiver #1 - Running Back (elite three-do…
Tier 2 Important (58 jobs):
— Loan processing: LOANPOST, LOANINTCL, LOANAGING - Customer analytics: CUSTPROF, CUSTSEGM - Internal …
Tier 2 — Application Monitoring:
— Transaction response time tracking (per program, per transaction type) - Batch job duration and thro…
Tier 2 — Same Business Day:
— GP utilization exceeds 85% for any 4-hour period - R4HA exceeds planned Expected scenario by more th…
Tier 2 — Weekly (Sunday 1 AM to 5 AM)
— REORG with inline statistics on critical OLTP tables - Full image copy / full database backup - Inde…
Tier 2: AI for Managers
— **Audience:** Managers and senior leaders - **Format:** Workshop, 1 to 2 days (instructor-led) - **L…
Tier 2: Attributed Claims
— These are claims attributed to specific thinkers, traditions, or bodies of research, but where the s…
Tier 2: Data Governance Working Committee
— **Composition:** Data governance program manager (chair), domain data stewards, representatives from…
Tier 2: Major institutional data
— WHO disease reports, IMF economic data, major academic studies - Generally reliable but may have met…
Tier 2: Medium-volume B items
— Use simple moving averages with a 4-8 week window. The added complexity of more sophisticated models…
Tier 2: Process ($10/month)
— Everything in Tier 1 - Extended cut: one video per month with the full session footage — including s…
Tier 2: Robustness
— Make the model resilient to attacks - Adversarial training - Certified defenses with provable guaran…
Tier 2: Session-Level (200-500 tokens)
— Module or service being worked on - Repository map of the relevant section - Key conventions for thi…
Tier 3 (32% drawdown, bankroll at $10,200):
— Pause all live betting for one week. - Complete model rebuild using last 200 bets. - Run a 50-bet pa…
Tier 3 (Medium Risk — Downtime Possible)
— INTEGER to BIGINT on TRANSACTION_DETAIL.DETAIL_ID
Tier 3 (Quarterly, ~2-3 hours):
— What does your quarterly capability exploration session look like? - When specifically will you sche…
Tier 3 (Weaker Translation):
— Other European leagues - Australian NBL - Chinese CBA
Tier 3 - Moderate Impact (0.5-1 point):
— Interior Defensive Line - Linebacker (coverage specialists) - Safety - Interior Offensive Line
Tier 3 illustrative examples
— composite fictions based on common industry patterns. They are not real companies. But every archite…
Tier 3 Routine (89 jobs):
— Data extracts for downstream systems - Housekeeping and cleanup jobs - Non-time-critical reporting -…
Tier 3 — Business Monitoring:
— Payment volume dashboards (real-time, by type, by status) - Settlement position monitoring (net posi…
Tier 3 — Detail panels (expandable):
— Top 10 active SQL statements by elapsed time - Lock waits — who is waiting for whom - Buffer pool de…
Tier 3 — Informational (Review Next Business Day):
— Any job elapsed time exceeds baseline by 25% - Condition code non-zero but within acceptable range -…
Tier 3 — Monthly (First Sunday 12 AM to 6 AM)
— REORG all tablespaces (including reference and archive) - Full statistics collection with histograms…
Tier 3 — Weekly Review:
— Monthly R4HA trend deviating from forecast by more than 3% - Any workload category growing faster th…
Tier 3: AI Builder
— **Audience:** Power users — analysts, engineers, and domain experts who will work hands-on with AI t…
Tier 3: Community ($22/month)
— Everything in Tiers 1 and 2 - Monthly 45-minute live session: Luna working on something new while pa…
Tier 3: Detection and Response
— Identify attacks in progress and respond - Anomaly detection on model inputs and outputs - Query pat…
Tier 3: Differentiating for leadership roles.
— **AI strategy.** Connecting AI capabilities to business strategy and competitive advantage (Chapter …
Tier 3: Domain Data Stewardship Teams
— **Composition:** Subject matter experts within specific data domains (customer data, financial data,…
Tier 3: Institutional Wellness Insights (optional)
— Covers: contributing aggregated, de-identified mood and engagement data to Ashbrook's Student Succes…
Tier 3: Low-volume C items
— Use the annual average or simply set fixed min/max levels. C items often lack sufficient history for…
Tier 3: Reputable media organizations
— Reuters, AP, major newspapers - Good for event-based resolution but subject to correction and retrac…
Tier 3: Synthesized Claims
— These are original syntheses, interpretations, and connections generated in the process of writing t…
Tier 3: Task-Level (Variable)
— Specific files being modified - Interfaces of direct dependencies - Relevant test files
Tier 4 - Lower Impact (<0.5 points):
— Wide Receiver #2-3 - Tight End (depending on scheme) - Depth positions - Special teams (except kicke…
Tier 4 — Diagnostic (Logged Only):
— All job start/stop events - All step completion codes - Resource utilization readings - Scheduler de…
Tier 4: Domain-specific specialized sources
— Box Office Mojo for film revenue, Transfermarkt for sports transfers, GitHub for software releases -…
Tier 4: On-Demand (Variable)
— Additional files requested by the AI or revealed by errors - Historical context (why a decision was …
Tier 4: Research Participation (optional)
— Covers: sharing de-identified data with named research partners for approved studies. - Data practic…
Tier 5: Platform or community determination
— Market creator judgment, community vote, arbitration panel - Use only as last resort; subject to bia…
Tier guidelines:
— Your tier (similar size): Highest probability, most balanced benefit - One tier above (2-5×): Lower …
tier list
— A ranking of characters, items, or strategies in a game from best (S-tier) to worst (D or F-tier); c…
Tier matching is math, not ego
— the collaboration must create sufficient value for both parties to justify the investment 2. **Value…
Tiered consent
— A consent protocol that builds multiple levels of protection for participants, responsive to the spe…
Tifo Football
— Animated explainers - Tactical analysis - Metric explanations - Link: youtube.com/tifofootball
Tifo Football IQ
— URL: theathletic.com/tifo - Focus: Video explanations of defensive concepts - Format: Visual learnin…
Tifo Football Podcast
— Tactical and analytical content - Accessible explanations - Wide topic coverage
Tifo Podcast
— Focus: Tactical analysis with analytics integration - Format: Accessible explanations
Tight coupling
— A system design in which components are closely interdependent with little slack, buffer, or redunda…
Tight End
— Massive dropoff after top 3-5 2. **Running Back** - Significant dropoff, especially for elite worklo…
Tight vs. loose cultures
— Gelfand's (2011) cultural dimension describing the strength of social norms and the degree to which …
Tight/loose cultures
— Gelfand: strength of social norms and severity of norm violation consequences
tightly coupled
— a change in one part immediately affects other parts. Tight coupling is efficient. It is also the st…
TikTok analysis:
— 180,000 views with 82% completion is strong performance - On TikTok's interest graph, this is largel…
TikTok BIPOC Creator Programs
— TikTok has run multiple initiatives providing direct grants, equipment, and production support to BI…
TikTok by the Numbers (2023):
— 150 million monthly active users in the United States - Average user time on app: 95 minutes per day…
TikTok Creator Academy
— Platform-published guidance on content strategy - **YouTube Creator Academy** — Courses on audience …
TikTok stats (at the start of this case study):
— Followers: 210,000 - Average views: 85,000-150,000 - Completion rate: 78% - Share rate: 3.9% - Save …
TikTok version (original):
— Title on screen: "The reason you can't stop buying things you don't need" - Length: 52 seconds - For…
TikTok version:
— 45-60 seconds - Single surprising insight from the concept - Cold open with the most intriguing part…
TikTok:
— Followers: 142,000 - Average reach per video: 28,000 - Average engagement rate: 4.1% - Average save …
timber baron
— a regional capitalist operating at the intersection of the old Appalachian economy (land, kinship, l…
Timber rights
— the feud coincided with the arrival of timber and railroad interests in the Tug Fork Valley. The Hat…
Timber workers
— the men who did the actual cutting, hauling, and milling — whose labor conditions were as dangerous …
Timbre
— The perceptual quality that distinguishes sounds of the same pitch and loudness but different sonic …
Time Allocation
— [ ] Set a weekly standing time for catching up on AI developments (30-45 minutes maximum) - [ ] Sche…
Time allocation suggestion:
— 0:00-0:30 — Narrative development (SCQA, audience-centered outline) - 0:30-1:30 — Slide content gene…
time blocking
— the practice of reserving specific blocks on your calendar for specific study tasks.
Time Comparison:
— Human social engineer: ~30 minutes per personalized email - AI pipeline: ~30 seconds per personalize…
Time Decay Features
— Modeling urgency - Late-game dynamics
Time evolution operator
— Ch 7.1 The unitary operator $\hat{U}(t) = e^{-i\hat{H}t/\hbar}$ (for time-independent $\hat{H}$) tha…
Time next Monday: 30 seconds
— just change the filename and re-run. When the manager asks for the age-group breakdown, Alex adds on…
time perspective
— the habitual cognitive framing that orients thinking and behavior toward past, present, or future — …
Time savings calculation:
— Content creation: 4 hours/week saved (team aggregate) - Research and analysis: 2 hours/week saved - …
Time Series Forecasting
— Time series components · ARIMA by intuition · Facebook Prophet · LSTM for sequences · Ensemble forec…
Time series models
— ARIMA, GARCH, and state space models — capture the temporal dynamics of prediction market prices. AR…
Time to Pressure Models
— Measuring first-step quickness - Predicting NFL translation - Resource: Next Gen Stats methodology
time value of money
— is the foundation of capital investment analysis.
Time yourself and aim for under 15 minutes.
— ### Exercise 39: Debugging Environment Issues
Time-Lapse/Compression
— Compress slow processes into visible change. Best for: growth, change over time, long processes; mak…
Time-on-Platform
— The total duration a user spends actively engaging with a platform in a given session or period. Rep…
Time-out
— A mutually agreed-upon pause in a conversation, taken when continued interaction is more likely to d…
Time-to-First-Dollar
— The period between a creator starting to build an audience and earning their first dollar from that …
time_tracking.csv
— The record from Chapter 9, with columns: `date, client, project_code, hours, billable, description`.
Timeline Reconstruction:
— When did the problem actually begin? (Not when it was detected — when did the underlying condition f…
Timeline:
— **6:00 PM** — Nightly batch cycle begins. Job ACCRPOST runs first, posting daily interest accruals t…
timerons
— an abstract unit that blends I/O and CPU cost. On LUW, the optimizer uses a similar blended cost met…
TIMESTAMPDIFF
— Calculate the difference between two timestamps in a specified unit:
Timing differences
— Early week information not fully priced - Game-time status creates opportunities
Timing implications by architecture:
— **Centralized**: Can resolve at informal result, but risks premature resolution if result is contest…
Timing luck
— The aspect of luck governed by when you enter a market, field, relationship, or platform. Timing is …
Timing-independent
— this was evergreen content. It performed well regardless of trends or cultural moments. The slow acc…
Tinder
— The industry standard; enormous literature; highly visible design logic; well-documented business mo…
Tiny Habits
— Fogg's methodology: start with the smallest possible version of the desired behavior, anchor it to a…
Tipping point
— The critical threshold at which a small additional input triggers a large, often irreversible change…
Tips for self-study:
— **Set a schedule and stick to it.** Consistency beats intensity. One hour a day, five days a week, i…
Tit for Tat
— A simple strategy for the iterated prisoner's dilemma: cooperate first, then mirror the opponent's p…
title
— **Axis labels** with units for both axes - **Appropriate scale** — bar charts must start at zero; li…
Title and axis labels
— mandatory for every chart. 2. **One key finding** in the title or subtitle — the reader should know …
Title page
— Collection title, your name, date, course information 2. **Table of contents** 3. **Introduction** (…
Title Race:
— Matchweek 10: Correct champion identified in 3/5 seasons (60%). - Matchweek 20: Correct champion ide…
TK5 MVS Turnkey System
— Community-maintained pre-configured MVS system for Hercules. Search for current distribution sites a…
TLS Attacks:
— **SSL Stripping:** Intercepting an HTTP-to-HTTPS redirect and keeping the connection on HTTP, enabli…
TLS mutual authentication
— The API gateway presents a client certificate to CICS. CICS validates it against the RACF keyring. T…
To build positive expectation:
— Before a social situation you're anxious about, identify one realistic positive outcome that could h…
To develop intuition:
— Start a simple decisions journal. When you make a choice, note what your gut said. Track outcomes ov…
To increase opportunity sensitivity:
— For one week, arrive five minutes early to every event, class, or meeting. Use the time to look arou…
TO path
— Specifies the backup destination. Can be a local directory, a network path, or a storage manager (TS…
To strengthen resilience:
— After the next setback you experience, write three honest answers to: "What actually did I learn fro…
To the creators
— the millions of teenagers and young adults who have built an entirely new art form in the space of a…
Tobacco:
— Nicotine replacement (patches, gum, lozenges, inhaler): doubles quit rates compared to unaided attem…
TOCOPY
— Recovers to the point of a specific image copy. No log records are applied after the copy. This is t…
Toilet Water Usage at a Glance
— Pre-1994 toilets: 3.5–7 gallons per flush (gpf) - Standard modern toilet (post-1994): 1.6 gpf - High…
Toilet:
— Standard toilet rough-in: 12" from the finished wall to the center of the drain flange (12" rough-in…
Token
— The fundamental unit of text that AI models process. A token might be a complete word, a word fragme…
Token pruning/merging
— reduce sequence length by removing or combining less important tokens. (4) **Linear attention** — ap…
Token Validation Flaws:
— Token not validated at all (remove the parameter) - Token validated only if present (remove the para…
Tokenization
— The process of splitting text into individual units (tokens), typically words or sub-word units, as …
tokenizer
— the algorithm that converts raw text into the subword units the model processes. Unlike traditional …
tolerance
— the phenomenon in which a given dose of the drug produces less effect over time, requiring larger do…
tolerances
— specified ranges of acceptable variation. A tolerance is, by definition, a statement of satisficing.…
TOLOGPOINT
— Recovers to a specific log sequence number (LRSN in data sharing, RBA otherwise). This provides prec…
Tom Whitfield for Senate:
— Total raised (cycle): $21.3 million - Cash on hand: $2.8 million - Total spent: $18.5 million - Burn…
Tomahawk claim
— An informal frontier land claim made by blazing a mark on a tree, reflecting a labor-based property …
Tomás Rivera
— Database Administrator Tomás manages MedClaim's DB2 databases and is the go-to person for anything r…
tonal ambiguity
— they don't clearly point toward one pitch as a tonal center, because their symmetry means that multi…
tonal center strength
— a measure of how clearly a tonal center is established. This can be operationalized in several ways:…
Tonal music
— Music organized around a tonal center (tonic) and governed by the hierarchical relationships between…
Tonal Symmetry Breaking (TSB) framework
— a formal argument that the structure of Western tonality is not merely *analogous to* spontaneous sy…
Tone
— the emotional register of your communication. Are you warm or cool? Authoritative or exploratory? Ir…
Tone adjectives
— typically three to five words that describe your tone. Maya's might be: warm, curious, practical, a …
Tone languages
— in which the fundamental frequency (pitch) of a syllable carries lexical meaning — include about 70%…
tone row
— an ordering of all 12 chromatic pitch classes, each appearing exactly once. The four transformations…
tonic
— and its degree of distance from or tension toward that home gives it its functional role. The chord …
Tonic function
— chords that feel stable, like "home" (I, III, VI in major) 2. **Predominant function** — chords that…
tonnage rate
— a set payment for each ton of coal they loaded into mine cars). His income depended entirely on forc…
Tonotopic map
— The spatial organization of frequency-selective neurons along a sensory structure, such that neurons…
Too big:
— "I'm going to build a real-time stock price prediction system with a streaming data pipeline." - "I …
Too conservative on 4th down
— Most teams punt too often 2. **Under-passing early** - 1st down pass rates often too low 3. **Over-r…
Too small:
— "I loaded a dataset and made a bar chart." - "I calculated the mean and standard deviation of this c…
Too vague
— "interesting" isn't specific enough to guide analysis. 2. **Good for EDA** — specific column, specif…
Tool use
— the ability to invoke external functions: search the web, query a database, execute code, send an em…
Tool-specific configuration:
— **ChatGPT:** Custom instructions available in Settings > Personalization. Also consider creating Cus…
Tools
— Functions that the AI can invoke to perform actions. Tools have defined input schemas, execute opera…
Tools Built by Humans
— AI systems carry human biases, incentives, and blind spots 2. **Capability vs. Understanding** — Wha…
Tools for monitoring paste sites:
— **PasteHunter**: Automated monitoring of multiple paste sites for keywords - **Dumpster Diver**: Sea…
Tools for Phishing Campaigns:
— **GoPhish**: Open-source phishing framework with campaign management, email templates, and tracking …
Tools required
— What equipment is needed? Do you own it, can you rent it, or would buying it only make sense if you'…
Tools that support cross-platform repurposing:
— **Opus Clip**: AI-powered tool that analyzes long-form video and automatically generates short clips…
Tools to bring:
— Headlamp and backup flashlight - Moisture meter (inexpensive ones run $20–$40; useful for checking w…
Tools:
— Pacu: AWS exploitation framework - ROADtools: Azure AD enumeration - ScoutSuite: Multi-cloud securit…
Top 4:
— Matchweek 10: Average of 2.8/4 top-4 teams correctly identified. - Matchweek 20: Average of 3.4/4 to…
Top pairings over time
— The most-written pairings on AO3 in the 2010s and early 2020s include Destiel (Dean Winchester/Casti…
Top performers — psychological hooks:
— 9 of 10 opened with a scroll-stopping hook in the first 2 seconds - 8 of 10 had a curiosity gap ("Wa…
Top performers — share triggers:
— 8 of 10 had a clear, specific identity signal ("this is SO me" content) - 7 of 10 included practical…
top to bottom
— stops at the first `True` condition. - `elif` and `else` are optional. You can have just `if`. - You…
Top-down design
— Start with a high-level main paragraph and decompose into progressively more detailed subordinate pa…
Top-of-Funnel
— The earliest stage of the audience journey, where awareness is being generated. Top-of-funnel conten…
Topic Coverage:
— SQL injection (all variations) - Cross-site scripting (reflected, stored, DOM-based) - Cross-site re…
Topic Features:
— `topic_k_weight`: Weight of topic $k$ in recent articles (one feature per topic). - `topic_shift`: C…
Topic focus:
— Do my last 20 pieces all fall within a clearly defined topic area? - Would a new viewer be able to p…
Topic Modeling
— Discovering the latent topics that appear across a collection of documents, without knowing those to…
Topic-Focused Reading
— For Fourier analysis and signal processing: Chapters 7, 22, 32, 33 - For tuning and scale theory: Ch…
Topics covered in this book:
— The structure and anatomy of a residential building - Plumbing systems — supply, drain, fixtures, an…
Topics with some personal stake but not too much
— the zone between trivial (favorite movies) and searingly intimate (childhood trauma) is where early …
Topics:
— The modern business skills gap: why Excel isn't enough anymore - What Python actually is (and what i…
Topline
— The summary document of a poll's results, presenting all questions and response distributions for th…
Topography:
— Mountain silhouettes visible in background - Terrain slope and orientation - River valley configurat…
topology
— its structure, the pattern of connections between its nodes.
TORBA
— Recovers to a specific Relative Byte Address in the log. Used in non-data-sharing environments. Func…
tornado chart
— a visualization that ranks variables by their impact on NPV. In Athena's churn prediction case, the …
total and disjoint
— every account has exactly one type. This is enforced by a discriminator attribute (ACCOUNT_TYPE_CODE…
Total cost of the fix: $289.
— ## Outcome: One Full Wet Season Later
Total distance covered
— **Distance covered in speed zones** (walking, jogging, running, high-speed running, sprinting) - **N…
Total elapsed time: 4 seconds
— from claim adjudication to HSA debit confirmed.
Total Estimated Investment:
— Urgent: $___________ - Fix Soon: $___________ - Fix Within 2 Years: $___________ - **Grand Total:** …
Total estimated: ~1,813 kWh
— close to the billed amount, which gives confidence that nothing unusual is happening.
Total Football Analysis
— Tactical and data analysis - Player profiles with xA - European league coverage - Link: totalfootbal…
Total Football Analysis Podcast
— Focus: In-depth tactical breakdowns - Defensive Content: Team defensive system analysis
Total I/O estimate:
— Initial sort: Read 10 GB + Write 10 GB = 20 GB - Each merge pass: Read 10 GB + Write 10 GB = 20 GB -…
Total information control
— The extreme form of authoritarian information architecture, exemplified by North Korea, in which the…
Total planned: $41,800
— ## The Hidden Variables: What Demolition Revealed
Total Points: 40
— ## Part I: Multiple Choice (1 point each)
Total Points: 42
— ## Part I: Multiple Choice (1 point each)
TOTAL QUANTIFIABLE DEFERRED MAINTENANCE:
— Immediate: $_______ to $_______ - Near-term: $_______ to $_______ - Long-term: $_______ to $_______ …
Total Questions: 20 | Recommended Time: 45 minutes
— ## Part 1: Multiple Choice (8 questions, 2 points each)
Total Score Interpretation:
— 0–4: Low risk — standard confrontation principles apply - 5–9: Elevated risk — use de-personalized, …
Total time investment comparison:
— Prompt 1: 30 seconds to write, 52 minutes to edit - Prompt 2: 10 minutes to write, 28 minutes to edi…
Total Whitfield-aligned GRPs/week:
— Suburban Metro: 860 - Mid-State: 600 - Capital City: 160 - Rural Southern: 120
Total: 100 points
— *This project is not an exercise in self-criticism. It is an exercise in applied analysis. The goal …
Total: 32 entities.
— ## Week 4: Normalization Validation
Total: approximately 30 million parameters
— a manageable size for experimentation on a single GPU.
Touchback Analysis:
— Modern college football favors touchbacks - Touchback vs return break-even: ~22 yard line - Elite co…
Touches
— Touches per game - Time of possession - Dribbles per touch
Tournament football rewards variance
— being "lucky" is part of winning - **Player-level xG** helps identify key contributors and their sus…
Towards Data Science
— ML tutorials and articles - Sports analytics posts - https://towardsdatascience.com
Towards Data Science (Medium)
— Data cleaning articles - pandas tips and tricks - https://towardsdatascience.com/
Towards Data Science - Sports Analytics
— Tutorial articles - Code examples - https://towardsdatascience.com/
Toxic inclusivity
— The adoption of diversity rhetoric in fan communities without corresponding structural change; the p…
Toxic positivity
— the reassurance that individuals empowered with the right mindset can navigate any information envir…
toxic stress
— a chronic activation of the stress response that disrupts brain development (particularly in childre…
Toxicity
— Do prices move in the direction of recent trades? - **VPIN** — What fraction of volume is directiona…
Trace of the bug:
— For -150: `1 + 100/(-150)` = `1 - 0.6667` = `0.3333` (wrong; should be 1.6667) - For +200: `1 + 200/…
Trace the bias pipeline
— where in the system did the bias likely enter? 6. **Check for feedback loops** — does the system's o…
traceback
— a detailed report showing exactly what went wrong and where. New programmers often find tracebacks i…
Track A: The Complete Epistemic Audit
— Professional-grade assessment of a field or organization (20–40 pages) 2. **Track B: The Failure Mod…
Track one stress response
— one moment when you notice the sympathetic nervous system activating. Note what triggered it, what y…
Tracking Astroturfing in Your Community:
— **IRS Form 990 Search:** search.irs.gov/nonprofit — free database of nonprofit organization filings …
Tracking Data
— Positional coordinates for all 22 players and the ball at high frequency (typically 25 Hz), captured…
Tracking Data Analysis Workshop
— MIT Sloan Conference workshops - Advanced analysis techniques
Tracking Data Applications
— Pre-snap alignment analysis - Block quality from player movement - Next Gen Stats rushing metrics
Tracking Insights:
— Led league in defensive versatility (ability to guard multiple positions) - Elite at disrupting pass…
Tracking pixel
— An invisible one-pixel image embedded in emails or webpages that, when loaded, sends information abo…
Tracking poll
— A poll conducted continuously (daily or every few days) using a rolling sample that is averaged over…
Tracking-Based Defensive Metrics:
— Matchup statistics - Contest data (shot quality allowed) - Defensive distance metrics - Help defense…
Trade Candidates:
— Player A: Score-first guard averaging 18 PPG on a rebuilding team - Player B: Defensive wing averagi…
Trade during high liquidity periods:
— Spreads are tightest when many participants are active - On Polymarket, this typically coincides wit…
Trade early in a market's lifecycle:
— New markets often have temporarily wide spreads as market makers calibrate - However, early markets …
Trade finance compliance platform:
— EMIR reporting: previously required 2.5 days per reporting cycle, now 4 hours - DORA incident notifi…
Trade Offer:
— You give: RB (18 PPG), WR (14 PPG) - You receive: RB (15 PPG), WR (12 PPG), WR (11 PPG)
Trade Scenario:
— Team gives: Pick 18 - Team receives: Picks 35, 70
Trade-offs Exist
— Sweeper-keepers may sacrifice aerial dominance
Trade-offs:
— Requires strong CI/CD to catch broken code quickly. - Less forgiving of large, AI-generated changes …
Trademark
— A word, phrase, symbol, or design that identifies and distinguishes a source of goods or services fr…
Tradeoff analysis (8 points):
— Acknowledges that batch partitioning trades complexity for throughput - Discusses API gateway placem…
Trader profile:
— Total available capital: $50,000 - Trading capital (60%): $30,000 - Reserve capital (25%): $12,500 -…
Trader types:
— With probability $\alpha$, the next trader is **informed** and knows whether $E$ will occur. - With …
Trading capacity:
— Field 29: Capacity (DEAL/MTCH/AOTC) - Field 30: Quantity notation
trading houses
— firms that specialized in the China trade and that assembled mixed cargoes of American goods (ginsen…
trading zones
— by analogy with the places in human history where communities with different languages and cultures …
Traditional COBOL batch processing
— your mainline batch jobs run on general purpose (GP) processors - **CICS COBOL transactions** — CICS…
Traditional Defensive Metrics:
— Defensive Rating (points allowed per 100 possessions) - Steal and block rates - Defensive Rebound Pe…
Traditional Ecological Knowledge (TEK)
— was not written down (though it was sometimes encoded in stories, songs, and ceremonial practices). …
Traditional Sportsbook (-110):
— Decimal odds: 1.909 - Win: 0.52 x $909.09 = $472.73 - Lose: 0.48 x (-$1,000) = -$480.00 - EV = $472.…
Traditional Statistics:
— Per-game averages (points, rebounds, assists, steals, blocks) - Shooting splits (FG%, 3P%, FT%) - Mi…
Traditional stats can be misleading
— Patterson's higher completion percentage and passer rating masked his lower actual value production.
Tragedy of the commons
— Garrett Hardin's scenario in which individuals acting in rational self-interest deplete a shared res…
Trail of Tears (1838–1839)
— The forced removal of approximately sixteen thousand Cherokee people from their homeland to Indian T…
Train and tune deep learning models
— LSTMs, embeddings, and attention networks --- for sequential sports prediction tasks, knowing when t…
Training and Support
— [ ] Plan foundational orientation - [ ] Establish shared resource infrastructure (prompt library, di…
Training facility equality:
— All teams have modern facilities - Road team preparation improved - Video technology standardized
Trait vs. state self-esteem
— The distinction between one's stable, long-term self-regard (trait) and moment-to-moment fluctuation…
Trajectory model projection:
— Year 4: 19-21 PPG - Year 5: 21-24 PPG - Peak (Age 26-28): 24-28 PPG
TRANSACTION
— Every financial event that affects an account balance.
Transaction Counters
— Number of deposits and withdrawals in the current month. Maximum 9,999 transactions per counter.
Transaction files
— daily batches of deposits, withdrawals, and transfers - **Report output** -- printed statements, reg…
Transaction monitoring
— pattern detection for structuring, unusual velocity, geographic risk 4. **Currency Transaction Repor…
Transaction monitoring:
— Alert volume per week: reduced from 980 to 640 (partly better tuning, partly market conditions) - Fa…
Transaction Posting (currently 180 min serial):
— 4 partitions by account number range - Target: 45 minutes per partition - Key boundaries computed fr…
Transaction Statistics
— Per-transaction-type aggregates. Key fields: - Transaction count (number of completions) - Average, …
Transaction terms:
— Field 44: Transaction type - Field 45: Buy/sell indicator - Field 46: Price - Field 47: Price curren…
Transaction test data:
— Deposits of varying amounts including exactly $10,000 and $10,000.01 (to test the CTR threshold). - …
TRANSACTION_TYPE
— Lookup: classification of transactions.
Transactions ensure consistency
— a group of related operations either all succeed or all fail. A database that crashes mid-write will…
transcendental equations
— they have no closed-form solutions. We must solve them graphically or numerically. Define dimensionl…
transfer
— the ability to take what you've learned in one context and use it in a different context. Every stud…
Transfer Impact Assessment (TIA)
— an assessment by the data exporter of whether the legal framework of the destination country provide…
Transfer learning
— The application of knowledge gained in one context to a different but structurally similar context; …
Transfer Market Value
— An estimated monetary value of a player, influenced by performance, age, contract length, and market…
Transfer rates
— In two-round or preferential voting systems, the proportion of first-choice voters for an eliminated…
transfer-appropriate processing
— says that encoding is most effective when it matches the type of retrieval that will be required. Fo…
transferable strategies
— habits of lateral reading, source investigation, claim tracing, and uncertainty acknowledgment — tha…
Transfermarkt
— Player and match data - Market values and transfers - Extensive historical records - Link: transferm…
Transfermarkt:
— Market values and transfer history for players worldwide - Squad information including contract deta…
Transfers well:
— Problem decomposition and modular design - Debugging methodology (reproduce, isolate, fix, verify) -…
transform data through several stages
— The output of one step **fundamentally shapes** the input of the next - You are building a **pipelin…
transformation
— you changed something — and yet the snowflake appears unchanged. That unchangedness is what physicis…
Transformation and Before/After
— the content genre built on the brain's love of visible change. From makeovers to skill journeys to r…
Transformation content:
— Setup: Show the "before" state in detail — let the viewer form an expectation of modest improvement …
Transformation reward
— The canvas changes over time, providing the same before/after contrast satisfaction, but experienced…
Transformation satisfaction
— something dirty/rough/messy becomes clean/smooth/organized (power washing, room organizing); rewards…
Transformational creativity
— it involves changing the rules of the conceptual space itself, not just exploring it (exploratory) o…
Transformative use
— the key concept from *Campbell v. Acuff-Rose* (1994): a use that "adds something new, with a further…
transformer
— an architecture that would reshape the entire AI landscape within just a few years.
TRANSID
— Transaction Identifier. A four-character code that identifies a CICS transaction. When a user enters…
Transient
— A brief, non-periodic portion of a sound signal with rapid temporal change and broad spectral conten…
transient fatigue
— temporary performance decrements following intense passages of play. After a period of sustained hig…
Transit surveillance
— the cameras on the bus that generate a continuous record of who rides which routes at which times.
Transition (first 8 seconds):
— Frequency: 18% of possessions - Average EPV at start: 1.18 - Average points scored: 1.15
transition dipole moment
— the single most important quantity in atomic spectroscopy. The perturbation in the dipole approximat…
Transition Matrix
— A matrix describing the probability of the ball moving from one pitch zone to another through passes…
Transition Offense:
— Defense not set - Numerical advantages possible - Quick decision-making required - Higher efficiency…
Transition values
— the exact point where behavior changes
transitive dependencies
— packages that your packages need. pip resolves and installs the entire dependency tree automatically…
translation failures
— the moments when a courtship utterance from one cultural context, translated into another language, …
translation invariance
— the ability to recognize a pattern regardless of its exact position in the image. A cereal box shift…
Translation labor
— The cognitive and emotional work of making oneself legible to a community whose default assumptions …
Translation operator
— $\hat{T}(\mathbf{a}) = e^{-i\hat{\mathbf{p}}\cdot\mathbf{a}/\hbar}$, generated by momentum.
Translations
— Full or partial translations into other languages are encouraged under CC BY-SA 4.0 - Please note th…
Transmedia debt
— a related concept — refers to the accumulated obligation created by canonical content that audiences…
Transmission Security (164.312(e)):
— AT-TLS for all ePHI in transit - MQ channel encryption for inter-system ePHI transfers - VPN or dedi…
Transmission to the children
— the couple manages their anxiety by focusing on (and potentially transmitting their anxiety to) a ch…
Transparency
— In data governance, the principle that individuals should be able to know what information is collec…
Transparency about significant alterations
— when you use filters or heavy lighting that substantially changes your appearance, labeling it ("I'm…
Transparency and accountability:
— Does the platform publish data on enforcement patterns by content category? - Is the appeals process…
Transparency Notes
— Microsoft's version of model cards — provide standardized documentation for AI systems and capabilit…
transparency ratings
— how much of their methodology they disclose. A pollster who publishes full crosstabs, discloses thei…
Transparency test
— The three-part criterion for distinguishing legitimate governance communication from propaganda: (1)…
Transparent source
— audience knows who is communicating and why 2. **Accurate claims** — substantive assertions are accu…
Transposition
— The operation of shifting all pitches of a musical passage by the same interval, resulting in a melo…
Transtheoretical Model (TTM)
— Prochaska and DiClemente's stage model of behavior change: precontemplation, contemplation, preparat…
transversally
— by applying individual Hadamard gates to each of the 7 physical qubits:
Trauma
— Overwhelming experience that exceeds coping capacity, produces characteristic physiological and psyc…
Trauma vs. Conflict Reaction Comparison Table
— for distinguishing when a response has a trauma dimension - **Regulation Toolkit for Trauma Activati…
Travel and Fatigue:
— `away_travel_miles`: Approximate distance the away team traveled for this game, computed from team c…
Travel Impact
— Average travel increase: 340 miles per road game - Largest increase: Oregon/Washington to Big Ten (+…
Travel Impact:
— Chiefs: +5 hour time change - Dolphins: +6 hour time change - Slight advantage Chiefs (shorter adjus…
Travel improvements:
— Charter flights for all teams - Better hotel accommodations - Medical/recovery technology
treason against the state of West Virginia
— one of the very few times in American history that citizens have been charged with treason for actio…
Treat the secret as compromised immediately
— change the password or rotate the API key 2. Remove the file from tracking: ```bash git rm --cached …
Treating algae and moss:
— Zinc strips: Install a 4-inch-wide strip of zinc metal near the ridge. Rainwater picks up zinc oxide…
Treating the strategy as a sprint
— Luck strategies work over years, not weeks. 2. **Networking transactionally** — Giving before asking…
Treatment recommendation
— What should we do? Frames imply solutions. If poverty causes crime, the solution is economic; if ind…
Treaty of 1819
— these Cherokee had accepted individual land allotments and nominal state citizenship in exchange for…
Treaty of New Echota (1835)
— Fraudulent treaty signed by an unauthorized minority faction of the Cherokee Nation, ceding all Cher…
Treaty of Sycamore Shoals (1775)
— Illegal land purchase by the Transylvania Company, in which Cherokee leaders sold approximately twen…
Tree
— family relationships are hierarchical (parent-child), which is exactly what trees model.
treemap
— A plotly chart type that displays hierarchical data as nested rectangles where area represents magni…
Trend
— the long-term direction. Is demand growing, shrinking, or stable over months and years? 2. **Seasona…
Trend analysis:
— If you can find this creator's content over a multi-year period, identify any visible inflection poi…
Trend sound or visual marker
— Recognizable audio or visual element that makes the challenge instantly identifiable, discoverable, …
Trends:
— Compared to 2 years ago, are your social connections stronger, the same, or weaker? ___ - Is the cur…
Trial balance
— An accounting report that lists all general ledger accounts with their debit or credit balances, ver…
Triangulation
— Bowen family systems concept: the tendency for a third party to be drawn into a two-person system un…
Tribal epistemics
— a term used by philosophers and psychologists to describe the subordination of epistemic evaluation …
TRIGTYPE(DEPTH)
— MQ fires the trigger when the queue depth reaches a specified threshold. For example, TRIGDPTH(100) …
TRIGTYPE(EVERY)
— MQ fires a trigger for every single message that arrives. If 10,000 messages arrive in a burst, MQ g…
TRIGTYPE(FIRST)
— MQ fires the trigger only when the first message arrives on an empty queue. After the first trigger,…
TRIM
— Remove leading, trailing, or both whitespace (or specified characters):
triplet states
— exactly the states constructed in Chapter 11 by adding two spin-1/2 angular momenta.
Triumph of the Will
— Leni Riefenstahl's 1935 documentary of the Nuremberg Rally, considered the most technically sophisti…
TriviaQA
— Description: 650,000 question-answer-evidence triples gathered from trivia and quiz-league websites.…
trolley problem
— the thought experiment in which a runaway trolley is headed toward five people, and you can divert i…
Trolling
— You deploy harassment and coordinated inauthentic behavior to suppress credible voices and dominate …
trophic cascade
— a cascade that propagates through the levels of a food web, from top predators down through herbivor…
Troubleshoot yourself if:
— Single outlet not working (GFCI reset, breaker check) - Breaker tripped once with no smell or heat -…
Troubleshooting instincts
— when something goes wrong (and it will), you know where to look: the diagnostic log, the configurati…
True
— Deontological analysis holds that mass surveillance without consent violates dignity and autonomy ri…
True / False
— **10.** The Optum algorithm's primary error was that it predicted which patients had the highest hea…
True Arbitrage:
— Mathematically guaranteed profit - No possible outcome results in a loss - Both legs can be executed…
True cost comparison
— Factor in your time, tool costs, and the risk of mistakes. Sometimes DIY costs more than it saves.
true division
— it always gives you a float, even when the result is a whole number. - `//` is **floor division** — …
true positives
— also called **hits** in signal detection theory. - The test misses 10 real cancers (10 percent false…
True Probability Estimation:
— Model-based approaches (Elo, logistic regression, etc.) estimate probability from features - Market-…
True randomness
— what physicists call *intrinsic* or *ontological* randomness — means that even with complete informa…
True.
— This is a direct quote from the chapter's caution about AutoML risks.
truly anonymous stranger
— the driver who cut you off on the highway, a shopper you encountered once at a store — has no ongoin…
TRUNC(STD)
— Truncates binary values to the number of digits in the PIC clause. This generates extra instructions…
truncates
— it simply drops the excess digits. The ROUNDED phrase changes this behavior to perform standard roun…
Truncation
— Reclaims empty pages at the end of the table 2. **Compaction** — Moves rows from sparse pages to fil…
trust bankruptcy
— the condition in which an institution has exhausted its trust capital to the point where nothing it …
Trust Equity
— The accumulated credibility and goodwill a creator builds with their audience through consistent del…
trust gap
— the distance between what the code appears to do and what it actually does.
Trust in major American institutions
— Congress, media, government, science — has declined dramatically since the mid-20th century. Disting…
Trust Transfer
— The mechanism by which a creator's accumulated credibility with their audience extends to recommenda…
Truth sandwich
— Lakoff's structural recommendation to lead with the truth, briefly acknowledge the false claim, and …
truthiness
— some values are treated as if they were `True`, and others are treated as if they were `False`.
Truthy
— any non-zero number, any non-empty string or collection, any object that is not `None`.
Try one deliberate reappraisal
— when you notice a negative emotion arising, pause and consciously generate a genuinely credible alte…
try-with-resources
— Connections, statements, and result sets are `AutoCloseable`. Always use try-with-resources to preve…
Tsali
— Cherokee man whose surrender and execution reportedly helped secure permission for a remnant Cheroke…
TSO
— Time Sharing Option. A z/OS component that provides interactive command-line access to the mainframe…
TSO/E REXX Reference (SA32-0972)
— The definitive REXX language reference for z/OS. Essential for OUTTRAP, LISTDSI, SYSVAR, and all TSO…
TSO/ISPF:
— Interactive programs can use DISPLAY and ACCEPT - More commonly, panels are built with ISPF Dialog M…
TSQ
— Random access by item number is needed for paging forward and backward.
TTS:
— **Mean Opinion Score (MOS)**: Subjective human rating on a 1-5 scale - **Mel Cepstral Distortion (MC…
Tuesday (1–2 hours):
— Edit pillar content (first pass)
Tuesday 14:32 UTC
— The prediction market platform begins experiencing degraded API performance. Response times increase…
Tune hyperparameters
— Mistake: hand-tuning one parameter at a time instead of searching systematically, or searching too f…
Tune incrementally
— one change at a time, measure the impact, then proceed.
tuning symmetry
— all voices must agree on the same reference pitch, just as particles in an accelerator must agree on…
Tunneling
— Ch 3.5 The quantum phenomenon where a particle passes through a potential barrier that it could not …
tunneling-promoting vibration
— the protein breathes, occasionally bringing the donor and acceptor close enough for efficient tunnel…
tuple
— If position does NOT matter (you only care about presence or absence) → **set**
Tuples become lists
— the distinction is lost |
Turnout gap
— Differences in turnout rates between demographic groups. The most politically consequential turnout …
Turnout model
— A predictive model that estimates the probability that an individual registered voter will cast a ba…
Turnout propensity score
— A modeled 0–100 estimate of the probability that a given voter will cast a ballot in a given electio…
Turnover Context:
— 5.4 turnovers per game (led league) - 7.7 turnovers per 100 possessions - Turnover percentage: 15.8%
Turnovers are noisy
— treat extreme rates with skepticism 2. **Look at non-turnover performance** for true quality assessm…
Tutorial content:
— Setup: "Everyone does this step wrong, and it seems like it shouldn't matter..." [establish expectat…
Tutorials
— Learning-oriented, guided experiences for beginners > 2. **How-To Guides** — Task-oriented instructi…
Tutorials:
— pandas documentation tutorials - Real Python pandas tutorials - Kaggle Learn: Pandas course (free)
TWA
— Transaction Work Area. A CICS area allocated for the duration of a task, available to all programs w…
Twelve notes are available
— wish 3, nominally granted - **But:** the system doesn't close perfectly — the last "fifth" (between …
twenty-nine miners
— the deadliest mine disaster in the United States in forty years.
Twenty3 Sport
— https://www.twenty3.sport/ - Industry insights and visualization examples - xG communication best pr…
Twist
— they balance trend momentum with originality. Pure copies get lost in the flood. Elevations may be t…
Twitch chat
— The real-time chat alongside Twitch streams; Twitch chat has developed its own culture, vocabulary (…
Twitter API
— Real-time mentions - Fan sentiment - Rate limited
Twitter fandom
— The specific culture of fan community activity on Twitter, characterized by real-time collective res…
Twitter/X Analytics Community
— ## Conference Proceedings
Twitter/X Basketball Analytics Community
— Follow prominent analysts - Engage with analysis discussions
Twitter/X Sports Analytics
— Follow #sportsanalytics, #NFLanalytics, #CFBanalytics - **Reddit r/sportsanalytics** - Discussion fo…
Two biological regulators:
— Sleep pressure (adenosine accumulation — builds during waking) - Circadian rhythm (24-hour clock — s…
Two components (both required):
— **Exploration:** Seeking novelty; following unexpected threads; entering unfamiliar territory - **Ab…
Two components: OWS and DWS
— OWS: Offensive Win Shares from Points Produced - DWS: Defensive Win Shares from team defense allocat…
Two critical passive components:
— **P-traps:** Hold standing water beneath every drain fixture. That water is the physical barrier blo…
two discrete spots
— one deflected up, one deflected down. There was nothing in between.
Two distinct standards:
— *Factual claims:* Trace to primary sources, not summaries; apply heightened skepticism to claims tha…
two groups
— which is what Alex has been waiting for with her A/B test, and what Professor Washington needs for h…
Two memory traces are created
— one verbal (from reading), one auditory (from hearing). Two traces are more durable than one. 2. **C…
Two parts of the system do not work together
— you need interface specifications - **You keep correcting data types or formats** -- you need schema…
two payoffs
— a satisfying resolution to the conflict, plus a surprising element the viewer didn't expect:
Two Players at Same Position:
— Player X: 15.0 PPG, playoff opponents ranked #25, #28, #30 vs position - Player Y: 14.0 PPG, playoff…
Two Players:
— Player A: 60 receptions, 800 yards, 5 TDs - Player B: 35 receptions, 900 yards, 8 TDs
Two prospects with equal grades:
— QB: 78 composite score - RB: 78 composite score
Two QB Prospects:
— QB A: 3,800 yards, 32 TDs, 8 INTs at SEC school - QB B: 4,200 yards, 38 TDs, 6 INTs at AAC school
Two RB Prospects:
— RB A: 35 targets, 28 catches, 285 yards (power back) - RB B: 65 targets, 55 catches, 520 yards (scat…
Two Running Backs:
— RB X: 280 carries, 4.0 YPC, 10 TDs - RB Y: 180 carries, 5.2 YPC, 8 TDs
Two thresholds:
— **Venue cap (4%):** No single trading venue may execute more than 4% of total trading in a share und…
Two types of self-awareness
— internal (knowing yourself) and external (knowing how others experience you) — which are independent…
Two WR Prospects (2023 season):
— WR A: 1,100 yards on 480 routes run - WR B: 950 yards on 350 routes run
two-dimensional
— the simplest nontrivial quantum system possible.
TXN-PROC Profile:
— 210,000 READ operations on the transaction file (sequential, fast) - 210,000 READ operations on the …
TXN-VALID
— Validates each transaction and splits into valid/reject files 2. **TXN-POST** — Posts valid transact…
TXNVAL
— Validates transactions and writes valid records to an output file. 2. **TXNPOST** — Reads validated …
type
— a category that determines what kind of data it is and what operations you can perform on it. Python…
Type 1 (Transaction Performance)
— One record per transaction completion. Contains response time, CPU time, wait times (broken down by …
Type 1: Satire/Parody
— Not applicable. The video presents itself as a sincere documentary investigation.
Type 4 (JCC Type 4 / `db2jcc4.jar`)
— Pure Java — no native libraries required. - Communicates directly via DRDA over TCP/IP. - Works iden…
Type 4 vs. Type 2 Drivers:
— **Type 4 (pure Java):** Communicates directly with the Db2 server over TCP/IP. No local Db2 installa…
Type errors
— columns where the data type doesn't match what it should be. A column of numbers that pandas reads a…
Type Hints
— Python annotations that specify the expected types of function parameters, return values, and variab…
Type hints and mypy
— Python 3.10+ supports sophisticated type hints. Adding type hints to your functions makes code more …
type inference
— it examines the values and converts them to appropriate Python/NumPy types (int64, float64, object).…
Type mismatch
— comparing CHAR to VARCHAR, or INTEGER to DECIMAL, forces DB2 to apply a function, which kills index …
Type of Relationship:
— [ ] Is there a written contractor agreement? - [ ] Do you provide any benefits? - [ ] Is their work …
type safety
— you cannot accidentally add USD_AMOUNT to EUR_AMOUNT without an explicit cast:
TypeError
— you can't use `+` to combine a string (`"The average is: "`) with a number (`average`). Fix options:…
Types Covered in Chapter 19:
— SQL Injection - NoSQL Injection - Command Injection - LDAP Injection - Template Injection
Types of Arbitrage:
— **Within-platform**: Prices on a single platform that violate no-arbitrage conditions (YES + NO < $1…
Types of code signing:
— **Author signing:** The developer signs with their personal key - **Build system signing:** The CI/C…
Types of deals (ascending value):
— Affiliate only → 60-second integration → Dedicated video → Long-term partnership
Types of drift:
— **Data drift** (covariate shift): The distribution of input features changes. Example: a new league …
Types of missing data in sports:
— **Did Not Play (DNP):** A player was on the roster but did not enter the game. Their stats are legit…
Types of mitigation to consider:
— **Design mitigations:** Changes to how the system is built — different training data, different feat…
Types of phishing:
— **Spear phishing:** Targeted emails crafted for specific individuals, often using personal informati…
Types of self-exclusion:
— **Single-operator exclusion.** You exclude yourself from one specific sportsbook. This is useful if …
TypeScript
— A typed superset of JavaScript that compiles to plain JavaScript. Adds optional static typing, inter…
Typical age curves by position:
— Guards: Peak at 26-28, gradual decline - Wings: Peak at 27-29, slower decline - Centers: Peak at 25-…
Typical Constraints:
— Salary cap: $50,000 - Roster: 1 QB, 2 RB, 3 WR, 1 TE, 1 FLEX, 1 DEF - Ownership caps (sometimes)
Typical Costs:
— Star player game missed: $200-500K - Average player game missed: $50-100K - Significant injury (20+ …
Typical findings for BERT-like models:
— **Layer 0 (embeddings)**: Encodes surface features (word identity, position). POS tagging probes alr…
Typical Pattern:
— Pass EPA: mean +0.05, std 1.5 - Rush EPA: mean -0.03, std 0.9
Typical Regression: 1/3 toward mean
— ## Performance Benchmarks
Typical signs:
— Employees use ChatGPT on personal accounts for work tasks - Data is siloed in departmental spreadshe…
Typical values:
— Single-pane aluminum frame (1960s): U-1.2 to U-1.4 (R-0.7 to R-0.8) - Double-pane aluminum frame, no…
Typically Well-Priced:
— Star QB injuries - Known injury news (> 24 hours)
Typosquatting
— Registering domain names that differ by small typographical variations from legitimate domains, in o…
U
U.S. Department of Health and Human Services
— **Shell, British Airways, BBC, Boots** (via payroll provider Zellis) - **Johns Hopkins University an…
U.S. Government Accountability Office (GAO)
— Reports on federal legacy systems and modernization challenges. Search gao.gov for "legacy IT" and "…
U.S. Route 23
— a two-lane highway that ran from the coalfields of eastern Kentucky north through Ohio to the factor…
U.S. Treasury Department
— email systems compromised - **U.S. Department of Commerce (NTIA)** — email monitoring confirmed - **…
Uber Engineering Blog
— Real-time systems at scale, including geospatial streaming. - **Netflix Tech Blog** - Stream process…
Ubiquitous computing
— A paradigm in which computing devices are embedded throughout environments and everyday objects, mak…
UCF101
— https://www.crcv.ucf.edu/data/UCF101.php - 101 action categories from YouTube videos
UCI Machine Learning Repository
— URL: https://archive.ics.uci.edu - Description: A long-standing collection of 600+ datasets for mach…
UDHR Article 12
— one paragraph, foundational 2. **OECD Privacy Guidelines** -- the eight principles that started it a…
UEFA Technical Reports.
— Champions League analysis - European tactical trends - Possession statistics
UGC (User-Generated Content)
— Content created by a creator's audience or customers rather than the creator themselves. UGC can be …
UK Market Abuse Regulation (UK MAR)
— Onshored version of EU MAR Article 12, maintained as retained EU law post-Brexit - FCA's MAR Sourceb…
Ultradian rhythm / BRAC
— the Basic Rest-Activity Cycle; roughly 90-minute cycles of alertness and recovery during the waking …
UltraFeedback
— Description: 64,000 instructions with responses from multiple models, scored on helpfulness, honesty…
Ultralytics YOLOv8
— github.com/ultralytics/ultralytics The most widely used object detection library for sports applicat…
ultraviolet catastrophe
— "ultraviolet" because the divergence occurs at high (ultraviolet and beyond) frequencies.
Unabated
— https://unabated.com/ - Advanced betting market analysis tools and educational content
Unacceptable risk
— systems that pose such fundamental threats to human rights and democratic values that they are prohi…
unaccompanied
— a single voice, without instrumental backing, singing a melody that was often **modal** (using scale…
Unauthenticated (External) Scanning:
— Sees only what is exposed on the network - Identifies vulnerabilities in network-facing services - M…
Uncertain:
— Code generated by AI in response to detailed, creative prompts where the developer makes specific de…
Uncertainty
— The state of not knowing, which may be reducible (through more data) or irreducible (fundamental to …
Uncertainty avoidance
— Hofstede's cultural dimension describing the extent to which a society feels threatened by uncertain…
Uncertainty awareness
— Single-season standard errors typically 1.5-3.0 points - Low-minute players have much higher uncerta…
Uncertainty Communication
— Always report confidence levels
uncertainty is not failure
— it's information. Nonparametric methods embody a related principle: **real data is messy, and good s…
Uncertainty principle
— Ch 6.7 For any two observables $\hat{A}$ and $\hat{B}$: $\sigma_A \sigma_B \geq \frac{1}{2}|\langle[…
Uncertainty principle (acoustic)
— See *Gabor uncertainty principle.* The acoustic uncertainty principle states that time duration and …
Uncertainty:
— [ ] Is the margin of error reported? - [ ] Does the MOE appropriately account for the design effect …
Uncommitted Read (UR)
— Use for read-only queries where approximate data is acceptable: balance inquiries (the user will ver…
Uncommitted time
— How much of your week is genuinely open — not scheduled, not tasked, not obligated? (1 = almost no o…
Uncovering
— fully acknowledging the depth and reality of the pain (the opposite of bypassing) 2. **Decision** — …
Undecided voter
— A survey respondent who does not express a preference between candidates when asked the *ballot test…
Under Armour All-America Game
— Top prospect showcase - Measurables verification
under-confident
— 0.2-0.4: Expected ~30%, actual 35% - **under-confident** - 0.4-0.6: Expected ~50%, actual 51% - **we…
underdeveloped
— actively made poor by the very process that extracted its wealth.
underfitting
— occurs when a model is too simple to capture the true pattern, performing poorly on both training an…
underground injection
— pumping the slurry into abandoned mine voids beneath the surface. This practice had its own set of r…
Underground mining
— the method used in the late nineteenth and early twentieth centuries — involved relatively contained…
Underground Railroad
— the network of routes, safe houses, and allies through which enslaved people escaped to freedom in t…
Underlying Issue
— The real concern beneath the presenting complaint; often involves unmet needs, value violations, or …
underpowered
— they simply don't have enough participants to reliably detect the effects they're looking for. An un…
Underrated by BPM:
— Help defenders without box score statistics - Floor spacers who don't shoot often - Players whose im…
Underreaction to depth
— Multiple injuries not fully compounded - Practice squad usage not anticipated
Underrepresented communities generate less data
— fewer clicks, fewer searches, fewer digital transactions. 2. **Algorithms trained on incomplete data…
Understand the domain
— What do the raw features mean? What relationships might exist? 2. **Transform features** --- Apply m…
Understand the root cause
— Do not just apply the fix. Ask the AI to explain *why* the bug occurred. 2. **Identify the pattern**…
Understand your rounding requirements
— banker's rounding (NEAREST-EVEN) is often mandatory for financial applications.
Understanding BMS Attributes:
— **ASKIP**: Auto-skip — the cursor cannot be positioned in this field. Used for labels and display-on…
Understanding Business Context:
— What is the client's industry and regulatory environment? - What triggered this engagement (complian…
Understanding Composite Rankings
— How services combine ratings - Weighting methodologies - Historical changes
Understanding RBAC Components:
— **ServiceAccount** — Identity for pods - **Role / ClusterRole** — Defines permissions (verbs on reso…
Understanding sector differences
— not just in pay but in culture, professional norms, ethical environment, and career trajectory — is …
Understanding the Data Structure
— What columns exist in play-by-play data? - How are plays categorized? - What's missing or inconsiste…
Understanding the Interface:
— **Cells**: Notebooks are composed of cells, which can contain code or markdown text - **Code Cells**…
Understanding the Situation
— "Tell me what happened, from the beginning." - "What happened just before the moment that felt like …
Understanding What the Person Wants
— "What does a good resolution look like to you?" - "What would need to be different for this to feel …
Understanding your carrier's practices:
— Major carriers sell aggregated location data to third parties and have faced regulatory action for t…
Understanding Your Rate Structure:
— **Flat rate:** You pay the same per-kWh regardless of how much you use or when you use it. Simple, p…
Understanding your rights:
— In California and states with CCPA-equivalent laws, you have the right to request, delete, and opt o…
Understat
— Free xG data and shot maps. Good for learning about expected goals concepts.
Understat Goalkeeper Data
— Type: Free resource - Features: xG faced and basic distribution
undertrained
— they used too many parameters relative to the amount of training data. The key finding is that model…
Undervalued archetypes:
— Three-and-D wings (limited box score contribution) - Pure floor spacers - Help defenders without blo…
Unexpected kindness from strangers
— help given without expectation of reward to someone with no connection to the helper 2. **Self-sacri…
Unexpected total from these two appliances alone:
— Garage fridge: 4.8 × 30 = 144 kWh/month - Basement freezer: 3.1 × 30 = 93 kWh/month - **Combined: 23…
Unexpected value adds:
— **Onboarding unfamiliar codebases:** When he joined a project on a codebase he had not worked in bef…
unfalsifiable ideas
— claims structured so that no evidence could ever disprove them. If authority cascades are about *who…
Uniform Distribution
— $X \sim \text{Uniform}(a, b)$
Uniform settlement
— the whole building sinks together, more or less evenly — is tolerable and often goes unnoticed. The …
UNION
— Combines results from multiple inputs. UNION (with duplicate elimination) may include a SORT; UNION …
Union or professional organization support
— for those who are members of unions or professional associations that have dispute resolution mechan…
Unique Features:
— Pressure events tracked - Goalkeeper positioning data - Carry events (not just dribbles) - Shot free…
Unique Value Proposition (UVP)
— A clear statement of what a creator offers, to whom, and how it differs from alternatives. A strong …
Uniqueness issues:
— Patient `P003` (Carla Davis) appears twice — a duplicate record. This could lead to fragmented medic…
Unison
— The interval between two pitches of identical frequency, corresponding to a frequency ratio of 1:1. …
unit
— TRK, CYL, or block size in bytes - **primary** -- initial space allocation (required) - **secondary*…
Unit Test
— A test that verifies the behavior of a single, isolated unit of code (typically a function or method…
Unit Testing
— Testing individual COBOL programs or paragraphs in isolation, verifying that specific inputs produce…
Unitary operator
— Ch 7.1 An operator satisfying $\hat{U}^\dagger\hat{U} = \hat{U}\hat{U}^\dagger = \hat{I}$. Unitary o…
United Front Work Department (UFWD)
— Chinese Communist Party organization responsible for managing relationships with overseas Chinese co…
United Kingdom
— Financial Conduct Authority: fca.org.uk — Policy Statements, Consultation Papers, Supervisory Statem…
United Kingdom:
— GamCare: 0808-8020-133 - www.gamcare.org.uk - BeGambleAware: www.begambleaware.org
United Mine Workers of America
— traced in its economic dimensions in Chapter 32 — had political consequences that cannot be overstat…
United Muslims of America
— a page presenting itself as a Muslim American community that produced both genuine pro-Muslim commun…
United States
— Financial Crimes Enforcement Network: fincen.gov — AML/BSA regulations, guidance, SAR statistics - O…
United States creators:
— Creator income is self-employment income, which means you owe both the employee AND employer portion…
United States:
— The Computer Fraud and Abuse Act (CFAA) criminalizes unauthorized computer access - Bug bounty progr…
Unity
— the identity-based bond between the influencer and the influenced. Unlike liking (which is interpers…
Universal (or near-universal) rhythmic properties:
— **Discrete rhythmic categories.** All musical cultures use durations that belong to a small number o…
Universal annual tasks:
— Replace or clean the air filter (forced-air systems): monthly during heating season for 1" filters, …
Universal aspects:
— **The octave as a structural boundary.** Nearly every musical culture organizes pitch space in units…
universal gate set
— any quantum computation can be built from single-qubit rotations and CNOT.
universal needs
— and that effective communication requires identifying and naming the specific need beneath the feeli…
Universal requirements regardless of model:
— Shared on-call rotation with cross-platform capability - Joint architecture reviews for all cross-pl…
Universality
— The phenomenon in physics where different systems exhibit the same behavior near phase transitions, …
Universe (targeting)
— In campaign parlance, a defined list of voters who meet specified criteria and are the target of a p…
Universe segmentation
— The analytical process of dividing the electorate into distinct groups based on support, turnout pro…
University mental health survey:
— Population: All students at the university. - Sample: The 400 randomly selected students. - Paramete…
University of North Texas
— Mainframe programming course - **Sungkyunkwan University** (South Korea) — COBOL for financial syste…
University special collections
— Virginia Tech, East Tennessee State University, Berea College, Appalachian State University, and Mar…
Unlawful disclosure of inside information
— recommending that another person engage in insider dealing, or inducing another person to do so.
unled group improvisation
— one of the most striking demonstrations of self-organized criticality in musical practice.
UNLOAD
— Reads all rows from the tablespace and writes them to the SYSREC work dataset. During this phase, th…
Unlucky (that they overcome):
— Initial investor rejection was nearly universal — over a dozen rejections from prominent VCs who dou…
Unlucky group outcomes:
— 1 of 20 participants reported a concrete outcome from event contacts - Mean contacts made at the eve…
Unlucky person:
— Arrives on time or slightly late, minimizing exposure - Moves immediately to acquaintances; stays ne…
Unmarked default
— The implicit norm against which other identities are marked as different; in fan studies and fan com…
Unnecessary decoration
— colorful graphics, animations, and "fun facts" that look engaging but consume working memory without…
Unreproducible
— You cannot reliably recreate the same environment - **Undocumented** — The configuration lives in so…
unresolved/disorganized
— based not on *what* they describe about their childhoods but on *how* they describe it: the coherenc…
Unscented lotion
— Pregnant women in the second trimester often switch to unscented products as their skin becomes more…
unskilled-and-unaware problem
— sometimes informally called the Dunning-Kruger effect, though the research is broader and more nuanc…
UNSTRING
— A COBOL statement that splits a single data item into multiple receiving fields based on delimiter c…
UNSTRING statement
— A COBOL statement that splits a data item into multiple receiving fields based on delimiter characte…
Unsupervised as exploration
— Before building a churn model, cluster customers to understand the natural segments. The clusters mi…
Unsupervised as monitoring
— Use anomaly detection to monitor deployed models. If the distribution of incoming data shifts (more …
Unsupervised as preprocessing
— Use PCA to reduce dimensions before training a supervised classifier. Use clustering to create a "se…
Unsupervised Learning
— Clustering overview · K-means · Hierarchical clustering · DBSCAN · Dimensionality reduction (PCA) · …
Unsustainable pace
— posting more than capacity allows; starting at a pace that can't be maintained, then feeling guilty …
untracked
— Git knows it exists but isn't recording changes to it. We need to explicitly tell Git to start track…
Unusual scale
— Objects that are much larger or smaller than expected. A tiny person next to an enormous object. A m…
Unusual transaction chains
— money flowing through a sequence of accounts in a pattern consistent with laundering - **Account tak…
Unwitting asset
— A person who amplifies state-generated content while sincerely believing they are acting independent…
UPDATE
— The user can read and write to the dataset (update existing records, add records) but cannot delete …
UPDATE ALL
— Updates all statistics columns in the catalog, replacing previous values. The alternative UPDATE ACC…
Upgrade comparison:
— If you have an electric resistance water heater and are considering a heat pump water heater: estima…
Upper Confidence Bound (UCB)
— which gives bonus consideration to unexplored options, specifically because their true value is unce…
UPPERCASE
— COBOL reserved words (must appear as shown) - **lowercase-italic** — User-supplied names or values -…
Upsell
— An offer made to an existing customer for a higher-tier or additional product, typically presented a…
Upset, not flooded:
— Can engage with a question you ask, even briefly - Can shift topics when you shift - Can hear and re…
Upstream collection
— The NSA's tapping of undersea fiber optic cables to collect communications data in transit. This pro…
Uptalk
— ending declarative sentences with a rising intonation as if they were questions — signals either gen…
upvote / downvote
— Reddit's community-governed content sorting mechanism; controversial fan opinions often receive sign…
Upward counterfactual thinking
— Mental simulation of how things could have gone better. While motivating, upward counterfactuals can…
upward influence
— how people without formal authority shape the decisions of those above them — identifies specific ta…
Upward social comparison
— Comparison with a superior other; in the context of curated social media environments, tends to prod…
Upward toward Webb:
— Sam has less legitimate, coercive, and reward power than Webb - Sam has significant expert power in …
Urban Appalachians
— in Asheville, Pittsburgh, and university towns — voted quite differently from rural Appalachians. Th…
Urban-Rural-Suburban Geography
— Urban density is an independent predictor of Democratic voting (controlling for other demographics) …
URIMAP
— Maps the URL pattern to the COBOL program:
URL path versioning
— `/api/v1/accounts`, `/api/v2/accounts`. This is the clearest approach. Each version has its own Open…
US Department of Justice Spoofing Prosecutions
— *US v. Sarao* (NDIL 2015): Full docket available through PACER; plea agreement describes manipulatio…
USA PATRIOT Act
— A sweeping post-September 11 US federal law (2001) that dramatically expanded government surveillanc…
USAGE
— A COBOL clause that specifies the internal representation of a data item: DISPLAY (zoned decimal), C…
USAGE clause
— A DATA DIVISION clause that specifies the internal storage format of a data item: DISPLAY (character…
Usage patterns
— when the device is used, what commands are given, which features are activated - **Smart home device…
Usage rate: Very high (35%+)
— Production came with dominant ball usage - Unclear how skills translate to complementary role
USAGE RIGHTS
— [ ] **9. Usage rights scope is explicit.** The contract states exactly where, how, and for how long …
Usage rights pricing guidance:
— Organic creator posts only (standard): $0 additional - Brand reposts on their own social channels (o…
USAGE(SERVER)
— This URIMAP is for provider mode. USAGE(CLIENT) would be for requester mode. - **PATH** — The URI pa…
Usage-based insurance (UBI)
— Insurance pricing model that uses individual behavioral data (driving behavior, activity levels) rat…
Use a CLOB when:
— You expect high trading volume - You want to minimize operator subsidy costs - Traders are sophistic…
Use a decision tree when:
— Interpretability is the top priority — your audience needs to understand *why* the model makes each …
Use a held-out test set when:
— Your dataset is large enough that you can afford it - You want a final, honest evaluation after all …
Use a histogram when:
— You want to see exact counts per bin - Your audience is not statistically sophisticated (histograms …
Use a hybrid when:
— You want an AMM as a backstop but prefer peer-to-peer trading when available - The market starts thi…
Use a random forest when:
— Accuracy is the top priority and you can sacrifice some interpretability - You have a medium-to-larg…
Use a regular loop when:
— You need multiple steps per iteration - You need to handle errors or edge cases - The logic is compl…
Use a spreadsheet when:
— You're doing quick, one-off calculations on small data (under ~1,000 rows) - You need to manually en…
Use Accommodating when:
— You recognize you're wrong and changing your position is simply the honest thing to do - The issue m…
USE AFTER
— A COBOL declarative statement (coded in the DECLARATIVES section) that specifies a procedure to be i…
Use an AMM when:
— You expect thin trading volume - You need guaranteed liquidity from day one - You are running many m…
Use appropriate model sizes
— not every task requires the most powerful (and energy-intensive) model - **Cache and reuse** solutio…
Use Avoiding when:
— The issue is genuinely minor and not worth the relational energy - Emotions are too elevated for pro…
Use BERT/RoBERTa when:
— Your task has a fixed output format (classification, token labeling, span extraction). - You need fa…
Use both when
— and this is more common than you might think — your organization has mainframe systems of record *an…
Use both when:
— You want to check whether the formula-based and bootstrap results agree (they should for standard st…
Use BPM when:
— Analyzing historical players (pre-1997) - Quick assessments with limited time - Small sample sizes (…
Use Case Inventory
— [ ] List the 10 most common tasks your team performs - [ ] For each, assess: AI value potential (hig…
Use classical physics when:
— The de Broglie wavelength is much smaller than all relevant length scales. - You are describing macr…
Use Claude Projects when:
— The configured context is for your own ongoing use, not for sharing with others - You are working on…
Use closed models when:
— You need frontier-level capability (the most sophisticated reasoning, longest context windows, multi…
Use Collaborating when:
— The problem is complex and both parties hold important pieces of it - The relationship is significan…
Use comparable traffic sources
— if you ran a promotion in period A but not period B, the traffic quality differs 3. **Track conversi…
Use Competing when:
— Someone's health or safety is at risk and swift action is required - You have authority, expertise, …
Use comprehensions when:
— The transformation is simple (one expression, optionally one filter) - The result is a new list or d…
Use Compromising when:
— Time is short and a workable-if-imperfect solution beats no solution - Both parties have roughly equ…
Use CoT when:
— The task requires multiple sequential reasoning steps - Accuracy is more important than response spe…
Use cross-validation throughout
— never evaluate on the test set until the final submission. - **Ensemble diverse feature sets** (Chap…
Use cross-validation when:
— Your dataset is small (less than 10,000 examples) — you cannot afford to hold out 20% for testing - …
Use cursor-based when:
— Business logic requires COBOL procedural processing per row - You need commit checkpointing for rest…
Use Custom GPTs when:
— You want to share the configured tool with others - The tool should present as a standalone, clearly…
Use DFSDDLT0
— IBM's DL/I test program — to test DL/I calls interactively before coding them in COBOL.
Use Differential Privacy when:
— You need to publish aggregate statistics or train models on centralized data while providing provabl…
Use dynamic calls when:
— The subprogram may or may not be needed at runtime - You want to replace subprograms without re-link…
Use ECDF when:
— You want to compare distributions without the visual confusion of overlapping curves - You need to r…
Use Efficiency Ratings when:
— You have play-by-play data - You need offense/defense splits - You want maximum predictive power - C…
Use Elo when:
— You need cross-season comparisons - You want intuitive, interpretable ratings - You're building a pu…
Use ETags for caching
— hash the row's timestamp or version column. 6. **Version your API** in the URL path: `/api/v1/accoun…
Use Event-Driven (Pub/Sub) When:
— Multiple consumers need the same data - The producer doesn't need a response before continuing - You…
Use Excel directly when:
— The dataset is small (under 50,000 rows) and won't grow - The analysis is one-time and won't be repe…
Use EXECUTE WITH DATA cautiously
— capturing actual data values in audit logs creates a second copy of sensitive data. Ensure audit log…
Use Federated Learning when:
— Data cannot be centralized due to regulatory requirements, competitive concerns, or user trust oblig…
Use formula-based methods when:
— You're computing a CI or test for a mean or proportion - The sample is large enough for the CLT - Th…
Use GPT Builder (no-code) when:
— Non-technical team members will create or maintain the configured system - You want a fast setup wit…
Use Homomorphic Encryption when:
— Data must be processed by a third party (for cloud processing, SaaS computation) without the third p…
Use Indexed Files (VSAM KSDS) When:
— The key is alphanumeric (names, mixed codes) - The key space is sparse or unpredictable (e.g., Socia…
Use interactive visualizations when:
— The audience will explore the data themselves (not just receive a pre-constructed argument) - Multip…
Use iteration when:
— The problem is straightforward repetition or accumulation - Deep recursion would exceed Python's sta…
Use K-means when:
— You want to discover natural groupings in the data without imposing your assumptions - You are addin…
Use KDE when:
— You want to compare multiple distributions on the same axes (overlapping KDEs are clearer than overl…
Use logical deletes in production systems
— set a status field to 'closed' or 'deleted' rather than physically removing records. This preserves …
Use manual coding when:
— The report requires highly dynamic layout (e.g., variable column positions). - Output goes to a non-…
Use manual processing when:
— The report has irregular formatting that Report Writer cannot express - You need fine-grained contro…
Use MERGE when:
— Input files are already sorted on the merge keys - You want to combine multiple sorted sources into …
Use NOT LOGGED INITIALLY only for:
— Staging tables that can be easily repopulated - Initial data load into new tables - Situations where…
Use OOP when:
— You're modeling "things" with identity, state, and behavior (nouns: Student, Task, Room) - Multiple …
Use open models when:
— Data privacy is a hard requirement (regulated industries, sensitive data) - You need deep customizat…
Use public xG values when:
— Performing descriptive analysis - Writing articles or reports - The exact xG methodology isn't criti…
Use Python when:
— Your dataset has more than ~1,000 rows - You need to reproduce your analysis later (or share exact s…
Use Python → Excel when:
— The report is generated repeatedly (weekly, monthly) from fresh data - The data comes from a source …
Use PyTorch when:
— Building production systems - Experimenting with architectures - Training on GPUs - Using pre-built …
Use quantum mechanics when:
— The de Broglie wavelength is comparable to or larger than relevant length scales. - You are describi…
Use RAPM when:
— Most accurate current assessment needed - Multi-year sample available - Defensive evaluation is prim…
Use recursion when:
— The data is naturally recursive (directories, trees, nested structures) - The problem decomposes int…
Use regex when:
— You need to match a *pattern* rather than a fixed string ("any sequence of digits") - You need to *e…
Use Relative Files When:
— The key is numeric and falls within a predictable, bounded range - You need the fastest possible dir…
Use Report Writer when:
— The report has a regular structure with clear control breaks - Multiple control levels are needed - …
Use Request/Reply When:
— The sender needs a response before proceeding (authorization, balance inquiry) - There is exactly on…
Use rug when:
— You want to show individual observations alongside another distribution plot - Your dataset is small…
Use rule-based RFM when:
— You need to explain the segmentation to non-technical stakeholders ("Champions are customers with R,…
Use Secure Multi-Party Computation when:
— Multiple parties need to jointly compute a specific function over their combined data without reveal…
Use Sequential Files When:
— Records are always processed in order (beginning to end) - Batch processing reads every record (repo…
Use set-based when:
— The transformation is expressible in pure SQL (no procedural logic) - The affected row count is unde…
Use simple string methods when:
— You're doing case conversion (`.str.lower()`, `.str.upper()`) - You're stripping whitespace (`.str.s…
Use simulation-based methods when:
— You need inference for a non-standard statistic (median, ratio, correlation, etc.) - Your data are n…
Use something else when:
— You have a very large dataset (>100K samples) and need fast training — consider gradient boosting (X…
Use SORT when:
— Input data is unsorted or needs reordering - You need INPUT PROCEDURE to filter or transform records…
Use SRS when:
— You're analyzing a single season - You want pure point-spread predictions - Strength of schedule adj…
Use static calls when:
— The subprogram is always needed and will always be present - Maximum runtime performance is critical…
Use static visualizations when:
— The audience is receiving a presentation and won't be able to interact - The key message is specific…
Use Synthetic Data when:
— The primary use case is development and testing rather than production training. - You need to share…
Use T5 when:
— Your task requires generating variable-length text output (summarization, translation, open-ended QA…
USE tempspace
— Specifies a system temporary tablespace to use for the intermediate data. Without this, REORG uses t…
Use the Assistants API (code) when:
— The assistant will be embedded in your own application - You need programmatic control over thread c…
Use the emotion granularity exercise
— instead of "upset," "stressed," or "fine," practice the most precise label you can find for three em…
Use The Index, Luke
— Essential guide to database indexing at use-the-index-luke.com.
Use the mean when:
— Your data is roughly symmetric (similar mean and median) - You need an aggregate projection (total r…
Use the median when:
— Your data is skewed (e.g., revenue, deal sizes, salaries, customer LTV) - You want to represent the …
Use the mode when:
— Your data is categorical (e.g., most common product, most common issue type) - You want the single m…
Use the NumPy approach when:
— Learning the fundamentals (this chapter) - Debugging mysterious gradient behavior - Teaching or expl…
Use the ORM when:
— Building an application where you create, update, and delete individual records - You want Python ob…
Use the right tool
— Error messages, stack traces, logs, profiling output, and debugger sessions each have their role in …
Use with Caution:
— Social media analysis (verify methods) - Older blog posts (methods may be outdated) - Non-attributed…
Use with extreme caution
— if the application fails to maintain integrity, you will have corrupt data with no database-level pr…
Use with extreme caution in financial systems
— cascading deletes of accounts or transactions could cause data loss.
useEffect
— for side effects like data fetching, subscriptions, or DOM manipulation:
useful field of view
— the area of the visual field from which information can be extracted without moving the eyes. This i…
Useful field of view (UFOV)
— The area of the visual field from which information can be extracted without moving the eyes; wider …
Useful lessons:
— Building an audience before building a product is a real strategy, not just luck - Production qualit…
Useful sub-metrics:
— *New subscriber rate:* Where are new subscribers coming from? Organic social, a YouTube CTA, a lead …
User ABEND
— An ABEND initiated by a program through a z/OS or CICS call, using an application-defined code (0--4…
User catalogs
— contain the actual dataset-to-volume mappings for application datasets. Each HLQ (or group of HLQs) …
User classification:
— Content preferences (inferred from watch history, likes, follows) - Activity patterns (active times,…
User experience criteria:
— "Why was this recommended?" explanation available for 100% of recommendations - "Not for me" feedbac…
User Guide → 10 Minutes to pandas
— A concise, well-written introduction that complements what you have learned here. It shows more vari…
User Guide → Indexing and Selecting Data
— An exhaustive reference for `.loc[]`, `.iloc[]`, Boolean indexing, and related selection patterns. O…
User ID
— **Plan name** (for DB2) - **Stored procedure name** (for DB2) - **Scheduling environment** name - **…
User interaction signals (strongest weight):
— Which videos you watch to completion (completion rate is a critical metric) - Which videos you re-wa…
User Journey
— The sequence of touchpoints a person moves through from first encountering a creator's content to be…
User management
— Flask has no concept of user accounts, roles, or permissions. Flask-Login is the standard extension …
User presents credentials
— A TSO user ID and password, a CICS sign-on, or a DRDA connection with user ID and password. 2. **z/O…
user stories
— short, plain-language descriptions of what a user needs to accomplish. The standard format is:
useR! and PyCon
— R and Python conferences - Sports analytics tracks - Open source community
User-Agent
— An HTTP request header that identifies the software making the request; used by servers to customize…
User-Defined Function (UDF)
— A function registered in the DB2 catalog that extends SQL with custom logic. Can be used in SQL expr…
User-mode API hooking bypass:
— Explain how EDRs hook user-mode API calls - Describe direct system call techniques - Explain syscall…
users
— stores registered accounts: - `id` (primary key) - `username` (unique, 3-30 characters) - `email` (u…
Users and Roles:
— Loan Officers (25 users) — read/update loan application data - Underwriters (10 users) — read loan d…
Uses:
— Playoff probability - Division title odds - Draft position estimates - Schedule strength impact
useState
— for managing component state:
Using a browser-impersonating User-Agent
— dishonest and flagged by anti-bot systems. Use a descriptive, honest user agent.
Using Bridged Adapter for target VMs
— Exposes vulnerable systems to your physical network. 2. **Skipping BIOS virtualization settings** — …
Using EPA without sample size consideration
— Small samples are unreliable - Minimum ~100 dropbacks for stable metrics
Using inappropriate fundamentals
— historical correlations that no longer hold due to structural changes. 3. **Ignoring candidate-speci…
Usually Well-Priced:
— Extreme cold (obvious to all) - High-profile snow games - Forecasted precipitation
Utility function
— An economic representation of an individual's preferences, mapping outcomes to subjective value. Bec…
utility theory
— and it's the bridge between the math of expected value and the psychology of real human decision-mak…
V
V = $370,055/year
— the project needs to generate at least approximately $370,000 in annual value to break even over fiv…
V Lives
— live streams in which BTS members appear on camera in informal, unscripted settings, interact with f…
V1 processing happens within 40-80 milliseconds
— well before you consciously "see" anything (which takes about 200-300 milliseconds). Your brain has …
Vaccine hesitancy
— A delay in acceptance or refusal of vaccines despite availability of vaccine services. Recognized by…
vacuum energy problem
— one of the deepest unsolved issues in theoretical physics.
VADER
— Social media sentiment - Handles emoticons, slang
VAEP (Valuing Actions by Estimating Probabilities)
— An action valuation framework that assigns value to every on-ball action based on its impact on the …
Vague name
— `test_everything` gives no information about what's being verified. Good names describe the specific…
Valence
— the positive/negative dimension of emotion; in music, predicted by mode, melodic direction, tempo, a…
Valence (musical)
— The emotional dimension of a musical experience ranging from negative (unpleasant, sad) to positive …
Valid ranges:
— down: 1-4 - distance: 1-50 - quarter: 1-5 (including OT) - yards_gained: -20 to 100
Valid.
— **II. {3, 4}**: 3 AND 4 = 011 AND 100 = 0. 3 OR 4 = 111 = 7. **Valid.** - **III. {1, 6}**: 1 AND 6 =…
VALIDATE
— When to check authorization and table existence:
Validate data at the boundary
— enforce sign conventions, normalize categories, and check date formats when data enters the system -…
Validate every field
— reject empty questions, reject questions with fewer than 2 choices, ensure the correct answer matche…
Validate input parameters
— Non-null, positive amount, source != target 2. **Validate source account** — Exists, status is 'AC' …
Validate your extractions
— check that prices are numeric, titles are non-empty, URLs are valid 2. **Log when structure seems wr…
Validating Assumptions
— Is EPA normally distributed? - Do home teams really have an advantage? - Are there seasonal trends i…
Validating data quality:
— Is the data complete? - Are there obvious errors? - Is it consistent across sources? - Are there kno…
Validation
— Verify recovered credentials against target systems. Document access gained and potential impact.
Validation Dependence
— The psychological condition in which a creator's sense of self-worth and emotional wellbeing become …
Validation Dependence:
— Self-worth becomes coupled to metrics through variable reinforcement schedules (same mechanism as sl…
Validation functions
— TEST-DATE-YYYYMMDD and NUMVAL/NUMVAL-C -- should be used to validate data before processing, catchin…
Validation in INPUT PROCEDURE is not optional
— it is a production necessity 2. **Error thresholds prevent cascade failures** — better to stop early…
Validation Metrics
— [ ] Log loss (calibration) - [ ] Brier score (accuracy) - [ ] AUC-ROC (discrimination) - [ ] Calibra…
Validation Requirements:
— Email: valid format, not already registered (409 Conflict if exists) - Password: minimum 8 character…
Validation:
— Do results make sense? - Are they robust to different methodological choices? - Do they replicate on…
VALIDEMP
— Validates employee input data (checks for required fields, valid ranges) 2. **CALCGROS** - Calculate…
Validity
— The degree to which a survey measure actually captures the construct it is intended to measure. A me…
Validity and scientific foundation:
— What does your tool claim to measure? What is the peer-reviewed scientific basis for the claim that …
valley fills
— massive deposits of loose rock and dirt that bury the valleys, including the headwater streams that …
Valley towns
— sometimes called the Out towns — were located along the Valley River and Hiwassee River in what is n…
Valuable SNMP data:
— System description and hostname - Network interface information and IP addresses - Routing tables - …
Value can be estimated
— xG prevented and defensive xT provide value frameworks
VALUE clause
— A DATA DIVISION clause that specifies the initial value of a data item in WORKING-STORAGE or LOCAL-S…
Value Iteration
— An algorithm that iteratively updates zone values until convergence, propagating threat backward fro…
Value Ladder
— A strategic framework representing a progression of offers at increasing price points and value leve…
Value Metrics
— Metrics that measure genuine audience impact and business health, as opposed to vanity metrics. Exam…
Value opportunities
— the book has mispriced the event - **Stale lines** -- the book has not yet reacted to news or sharp …
Value Ratio
— A metric comparing player contribution (on-pitch value) to their cost (transfer fee amortization plu…
value-added processing technology
— a way of converting a low-value raw material into a high-value finished product. Every mountain farm…
Values
— Enduring beliefs about what is important; function as evaluative standards for behavior, attitudes, …
values clarification
— the process of explicitly identifying, examining, and prioritizing your values as a guide for decisi…
Values:
— Are the positions and values I express in my content consistent? - Have I said things in different p…
VAN platform costs
— State Democratic Party VAN access: $8,000-15,000 for the campaign cycle (varies by state and negotia…
VAN/VoteBuilder
— The Democratic Party's primary voter contact and data management system.
Vanity Metrics
— Numbers that look impressive but do not correlate reliably with business outcomes or genuine audienc…
Vantage Point
— a premium instant coffee brand positioning itself against Starbucks. The product itself is objective…
VaR limitations
— tail blindness, normal distribution assumptions, procyclicality, and model gaming — motivated the sh…
Variability:
— Standard deviation: Average distance from mean - Variance: Squared standard deviation - Range/IQR: S…
variable acoustic systems
— wall panels that can be rotated or repositioned to switch between absorptive and reflective surfaces…
Variable Components (7 games):
— 2 games vs teams with same divisional finish - 1 game vs AFC/NFC team (rotating)
Variable output
— `{{ variable_name }}` — renders the value of a variable:
Variable Power, High Interest:
— Academic researchers — limited power but high interest and some ability to shape public discourse an…
Variable ratio reinforcement schedule
— A behavioral reinforcement schedule in which rewards are delivered unpredictably after varying numbe…
variable ratio reinforcement schedules
— reward delivered unpredictably, after an unpredictable number of responses — produce the most persis…
variable ratio schedule
— the same reward structure that makes slot machines addictive, except the reward is guaranteed, makin…
Variable Reinforcement Schedule
— A reinforcement pattern in which rewards arrive unpredictably — sometimes frequent, sometimes rare. …
Variable reward schedules
— the unpredictable timing of likes, comments, and notifications — exploit the same neurological mecha…
Variable-length record
— A record whose length varies from record to record. Defined in COBOL with RECORD IS VARYING or RECOR…
Variable-ratio reinforcement
— A reinforcement schedule in which rewards are delivered after an unpredictable number of responses; …
Variables:
— `user_id` (anonymized), `age` (18-65), `gender` (M/F/NB/Other), `sexuality` (Het/Gay/Bi/Pan/Other) -…
variance
— the spread of outcomes around the expected value.
Variance in Shooting
— Three-point shooting has high variance - In Game 7 of the 2018 Western Conference Finals, the Rocket…
Variants of activation patching:
— **Resample ablation**: Replace the activation with a sample from its empirical distribution (rather …
Variants of SMOTE:
— **Borderline-SMOTE:** Only oversamples minority examples near the decision boundary. - **SMOTE-ENN:*…
Variants:
— **Momentum:** $\boldsymbol{v}^{(t+1)} = \gamma \boldsymbol{v}^{(t)} + \eta \nabla f$; $\boldsymbol{\…
variational parameters
— free parameters that you will adjust to minimize the energy. The variational procedure is:
Variational principle
— Ch 19.1 The theorem that for any trial state $|\psi_{\text{trial}}\rangle$, $\langle\hat{H}\rangle_{…
Variations by MATCHCOLS:
— MATCHCOLS = 0: Non-matching index scan — DB2 reads the entire index leaf chain. This happens when th…
Variations:
— **Delayed punchline:** Build tension before revealing. Works well in 30-60 second videos where the a…
Various researchers
— Start with Horton & Wohl (1956), then Rubin, Perse, & Powell (1985)
Vector Database
— A database optimized for storing and querying **embedding** vectors. Enables semantic search -- find…
vectorized operation
— the library applies the operation to the entire column at once, which is dramatically faster than an…
Vectorized operations
— Applying an operation to an entire column at once (`df["col"] * 2`) rather than looping through valu…
Vegetation:
— Trees that are identifiable to species can constrain latitude and climate zone - Olive trees (common…
veil of ignorance
— not knowing your own position in society. You don't know whether you'll be rich or poor, black or wh…
Veillance
— A portmanteau of "surveillance" and "sousveillance" coined by Steve Mann to describe the general fie…
Velocity
— Cycle time, throughput, time to first commit, code generation ratio. 2. **Quality** -- Defect rate, …
Velocity Media
— A fictional social media startup whose design decisions illustrate the institutional pressures and e…
Velocity Metrics
— **Cycle time.** How long does it take from starting a task to merging the code? Track whether AI too…
Velocity stabilized at ~60 points per sprint
— a 36% increase over the pre-AI average of 44, but well below the Month 1 peak of 71. This was sustai…
Vendor claims for the new platform:
— The ML-enhanced platform has reduced alert volumes by 55–65% at comparable institutions (reducing fa…
Vendor Proposal Summary:
— Phase 1 (Month 1-6): Automated analysis and conversion planning - Phase 2 (Month 7-18): Automated CO…
Vendor-Neutral Certifications
— *TOGAF Certified (The Open Group)*: The most widely recognized enterprise architecture certification…
Vendor/Third-Party
— "I'm calling from [known vendor]. We need to update your account information for the new billing cyc…
ventral tegmental area (VTA)
— a cluster of neurons deep in the midbrain — up through the **nucleus accumbens** in the forebrain, w…
Venture Capital (VC)
— Investment provided to startups and early-stage companies with high growth potential in exchange for…
Verbal reflection
— Direct address: "Six months ago, I would have..." Specific and detailed self-report is more credible…
Verbal Resistance Signals:
— Sentence fragments that trail off without completion - Increases in hedging language: "maybe," "sort…
Verdana City
— A synthetic American city used across chapters for voter file exercises, precinct mapping, and campa…
Verification
— independent check of the analytical and perturbative results 2. **Generalization** — the same numeri…
Verification Questions:
— Is this photograph, video, or image what it appears to be? - Has this image been cropped, edited, or…
Verification resources:
— Quote Investigator (quoteinvestigator.com) — traces earliest documented print occurrence - Wikiquote…
Verification tests:
— Reproduce the $\frac{1}{2} \otimes \frac{1}{2}$ table from Section 14.5 - Reproduce the $1 \otimes \…
verification toolkit
— a set of strategies you can apply to AI outputs to catch errors before they cause harm.
Verification:
— Scan a known safe target to verify your tools work - Confirm that your scanning traffic appears in t…
VERIFIED
— A clinical reviewer could not see billing amounts or payment status — **VERIFIED** - A billing speci…
Verify bathroom fans terminate outside
— if not, fix it 4. **Know your home's airtightness** — if below 5 ACH50, evaluate mechanical ventilat…
Verify insurance directly with the insurer
— not just from the contractor's certificate. Certificates can be forged; policies can lapse. - **Sole…
Verify with the compiler cross-reference
— do not rely solely on grep. The compiler's XREF listing is authoritative.
Versatility:
— Defended all 5 positions - Effective against PG-PF (positions 1-4)
Version A (closes early):
— 0-5s: "I just finished decorating my room and I'm obsessed with how it turned out." → Shows the fini…
Version A (Shallow):
— Front: "What is consolidation?" - Back: "The biological process of stabilizing new memories."
Version A: Fast
— Cut every 1-2 seconds. Remove everything except the key phrases. - **Version B: Medium** — Cut every…
Version A: Joy
— Fast cuts, bright moments, cuts landing on upbeat music - **Version B: Melancholy** — Slow cuts, lon…
Version B (Deep):
— Front: "You study hard for a biology exam, then pull an all-nighter to cram more. Using the concept …
Version B (stays open):
— 0-5s: "I've been decorating my room for three months and today I'm finally seeing it all come togeth…
Version C
— replace one good example with a deliberately atypical or edge-case example.
version coexistence
— members at different DB2 versions can run simultaneously in the same group during a migration. For e…
Version Control Tools
— `git_status()`: Check the status of the repository - `git_diff()`: View current changes - `git_commi…
version control with Git
— how to track your code's history, experiment fearlessly on branches, and collaborate with other deve…
Version Control:
— Maintain a clear version history in the document control section - Every revision gets a new version…
Version number
— Increment on every change - **Change log** — What changed and why - **Author** — Who made the change…
Versioning rules at SecureFirst:
— Additive changes (new optional fields) don't require a new version - Removing fields, changing types…
Vertical reading
— Reading deeply within a single source, examining its internal evidence; characteristic of non-expert…
Vertical scaling
— Increasing limits within a single region (raise MXT, raise EDSALIM, raise CMDT). Cheaper but has dim…
Vertical shoot (for TikTok/Reels):
— Overhead camera mounted above the cooking surface - Vertical orientation (9:16) - Focus on hands, in…
Vertical Video
— Video formatted for 9:16 aspect ratio (portrait orientation), designed for mobile viewing. The nativ…
Very Large Online Platforms (VLOPs)
— those with more than 45 million monthly active EU users — must additionally: - Conduct annual system…
Very low reliability domains:
— Cutting-edge research not yet widely published - Local or regional information - Non-English sources…
Vesper_of_Tuesday's position
— veteran fan, prolific writer, non-binary community elder — represents fan creative production as a s…
Veteran Kicker Profile:
— 6 seasons, 156/186 career (83.9%) - Last season: 23/27 (85.2%) - Made 4/6 from 50+ yards - 0 missed …
Veterans Crisis Line
— Call: 988, then press 1 - Text: 838255 - Chat: veteranscrisisline.net
Via negativa
— The practice of improving by removing (subtracting harmful inputs) rather than adding (introducing n…
VIBE Check
— not because it is casual, but because it gives you a systematic way to assess whether an output shou…
Vibe Coding
— A development approach where programmers express their intent in natural language and collaborate wi…
Vibrato
— A regular, periodic variation in the pitch (frequency vibrato) or amplitude (amplitude vibrato/tremo…
Vicarious emotional amplification
— Mirror neurons activate when watching someone else react, partially transferring their emotions to t…
Vicarious indulgence
— mukbang often features enormous quantities or indulgent foods viewers wouldn't eat themselves. Watch…
Vices that prediction markets may cultivate:
— **Avarice**: The financial incentive structure may promote excessive focus on profit at the expense …
victim
— one of the participants — and rolls back that participant's current unit of work. The victim receive…
Video 1:
— Creator name and video title/description: - Platform and length:
Video Analysis Platforms:
— **Hudl (formerly Wyscout Professional):** Leading platform for team video analysis, offering tagging…
Video Analyst (Sarah)
— Needs: matplotlib, opencv-python for frame analysis - "I spend hours each week extracting shot clock…
Video Call
— Visual information present but reduced (partial body, compressed screen) - Auditory information most…
Video classification:
— Content category (comedy, education, dance, cooking, etc.) - Audio features (trending sound, origina…
Video Clips (optional, 2--3 minutes):
— Pre-tagged clips illustrating key tactical observations - Maximum 4--5 clips, each under 30 seconds
Video Content:
— NFL Game Pass (full games and condensed games) - YouTube: NFL channel fundamentals - NFL Network pro…
Video Deepfakes:
— Real-time face swapping for video calls - Synthetic video of executives for authorization fraud - De…
Video Essay
— A long-form video format that develops a thesis or argument through scripted narration, visual evide…
Video Explanations:
— "Expected Value — Introduction" — Khan Academy (khanacademy.org): Clear, interactive treatment of ba…
Video information signals (moderate weight):
— Captions, hashtags, and sounds used - Content of the video itself (analyzed by computer vision and n…
Video pacing
— adjusting playback speed and using pause strategically — is the single biggest lever you have for le…
Video Privacy Protection Act (VPPA)
— A US federal law enacted in 1988 prohibiting video rental services from disclosing customers' rental…
Video scouting contradiction
— Fultz's shooting looked smooth on film - Led to cognitive dissonance between eye test and statistics
View from nowhere
— Jay Rosen's (1993) critique of journalistic pseudo-neutrality: presenting "both sides" as equivalent…
viewer satisfaction
— a composite of watch time, session time (how long the viewer stays on YouTube after watching), click…
Vig-removed probabilities (multiplicative method):
— Yankees: 57.45% / 102.90% = 55.83% - Red Sox: 45.45% / 102.90% = 44.17% - Check: 55.83% + 44.17% = 1…
Villain-Victim-Helpless Story
— The specific narrative structure identified by Patterson and colleagues in which we cast the other p…
Violence strategies:
— *Controlling:* Coercing others to your point of view. Cutting off opposing views, overstating facts,…
Violence-side verbal cues:
— Sarcasm ("Oh, great, now I'm being told how to do my job") - Labeling ("You always do this," "You're…
Viral
— Content that spreads rapidly and widely through sharing behavior, achieving reach far beyond a creat…
Viral coefficient
— In epidemiology and network theory, the average number of new people that each affected person passe…
Viral Coefficient (R₀)
— Borrowed from epidemiology: the average number of new viewers each existing viewer generates. R₀ > 1…
Viral coefficient at this stage: K ≈ 0.6
— sharing was contributing but not self-sustaining.
Viral coefficient at this stage: K ≈ 1.3
— the video had crossed the viral threshold. Each round of sharing was now generating *more* new viewe…
Viral coefficient: K ≈ 0.9
— approaching but not yet exceeding 1. The video was in the transition zone between "popular" and "vir…
Viral properties
— Features of a message that increase its likelihood of being shared, including novelty, emotional int…
Viral spread
— The process by which content achieves exponentially expanding reach through sequential sharing acros…
virgin soil epidemics
— epidemics that strike populations with no prior immunological exposure. In virgin soil conditions, d…
virtual environment
— an isolated Python installation with its own set of installed packages. This prevents "dependency he…
virtual environments
— isolated Python installations for each project. In real work, you'll create a virtual environment fo…
Virtual idol
— An AI-generated or AI-augmented performer in music or entertainment; raises questions about the natu…
virtual particles
— quantum fluctuations that mediate forces in quantum field theory. A virtual particle can "borrow" en…
virtual pitch
— is what makes telephones intelligible despite filtering out almost all energy below 300 Hz. The bass…
Virtual try-on data
— which products customers try on virtually, how long they spend, which they save — feeds back into th…
VirtualBox (Oracle)
— Free and open source - Available for Windows, macOS, and Linux - Active community and extensive docu…
Virtue ethics
— originating with Aristotle and experiencing significant philosophical revival in the twentieth centu…
Virtues that prediction markets may cultivate:
— **Intellectual humility**: Markets punish overconfidence. Traders who are well-calibrated — who assi…
Visa Practical Business Skills Grant Program
— An annual grant program administered through partnerships with the U.S. Chamber of Commerce Foundati…
Vishing Metrics:
— **Call completion rate**: How many targets answered and completed the call without hanging up - **In…
Visibility
— The failure must be visible to people *outside* the field 2. **Undeniability** — The failure must be…
Visibility asymmetry
— The condition in which surveillance arrangements make some actors highly visible to others while ren…
Visibility:
— What was visible to the Taylor-era foreman that was invisible to workers? - What is visible to the a…
Visible Hands
— visiblehands.vc An accelerator and early-stage fund specifically designed for underrepresented found…
visible intellectual engagement
— participation in public discourse that bridges professional communities through the demonstrated qua…
visible investment
— the audience needs to see that *you* care about the outcome. When the creator cares, the audience ca…
Visible Parameters:
— URL query parameters: `?search=laptop&category=electronics&page=2` - POST body parameters: `{"userna…
visible reputation
— a publicly legible signal of expertise and community standing.
Visible:
— He restructured his week to protect 25% of his time for the CJC development work, which he had been …
Vision Transformers
— Dosovitskiy, A., et al. (2021). "An Image is Worth 16x16 Words: Transformers for Image Recognition a…
VISTA volunteers
— the domestic equivalent of the Peace Corps — were deployed to mountain communities to conduct litera…
Visual and audio choices:
— What production elements serve the content? Which, if any, would you call unnecessary? - What is the…
Visual attributes:
— `FOREGROUND-COLOR n` -- sets the text color (0-7) - `BACKGROUND-COLOR n` -- sets the background colo…
visual branding through color
— and it works because color is processed pre-attentively (Ch. 2). The viewer recognizes the color pal…
Visual bugs
— Screenshot the UI and describe what is wrong, but also use browser DevTools - **Timing-sensitive bug…
Visual Crossing
— Historical weather data - Stadium-specific locations - Reasonable pricing - https://www.visualcrossi…
Visual Distinctiveness
— Unusual color palette (all black and white in a colorful feed) - Distinctive framing (first-person P…
Visual Explain
— detailed access plan visualization showing costs, cardinalities, and access methods at each operator…
Visual Features (from raw pixels):
— CNN features from individual frames - 3D CNN features from frame sequences (e.g., I3D, SlowFast netw…
Visual Question Answering (VQA)
— URL: https://visualqa.org - Description: 265,000 images with 760,000+ questions and 10 ground-truth …
Visual Studio Code (VS Code)
— a free, open-source editor made by Microsoft that's become the most popular editor among professiona…
Visualization
— [ ] Every graph has a title, axis labels, and legend (if needed) - [ ] I've used appropriate graph t…
Visualization Suite:
— League-wide scoring histogram - Team consistency comparison (box plots) - Correlation heatmap - ATS …
Visualization Tools
— Matplotlib for weather plots - Plotly for interactive displays
Visualization:
— `plot_growth_chart` — time-series line chart with inflection markers - `plot_revenue_forecast` — his…
visually cohesive
— Viewers started commenting that her content had a "specific feel" — warm, inviting, energetic - The …
visually satisfying
— smooth, rhythmic, process-oriented content that approaches ASMR-adjacent appeal.
vital complexity
— the web of relationships that made the natural forest function. The diverse understory that the admi…
VitraMed
— Health-tech startup founded by Mira's father, Vikram Chakravarti - Started as electronic health reco…
Vocabulary
— formal or casual? Technical or accessible? Slang or proper? - **Energy** — intense or measured? Fast…
Vocabulary Builder
— **Algorithmic bias:** Systematic and unfair differences in how an AI system treats individuals or gr…
Vocabulary Precision Matters
— A *partial* is any frequency component in a complex sound - A *harmonic* is a partial whose frequenc…
Vocal fry
— a low, crackling, creaky quality at the end of sentences — is associated in research with negative p…
vocal prosody
— the non-linguistic features of speech, including pitch, tempo, rhythm, loudness, and voice quality —…
Vocal tone
— The emotional quality of the voice — warmth, coldness, sarcasm, contempt, care — as distinct from pi…
vocal tract
— the shape of the lips, tongue, cheeks, and throat — to create resonances that strongly amplify a sin…
Voice
— delivery style, pace, energy, verbal tics | | Emotional/inspirational/therapeutic | **Music** — scor…
Voice (Creator)
— The distinctive combination of perspective, personality, tone, and manner of expression that makes a…
Voice Channels:
— General Hangout (permanent open voice channel) - Stream Watch Party (used during collaborative event…
Voice cloning
— The use of AI to produce a synthetic reproduction of an individual's voice from a sample of authenti…
Voice leading
— In music theory, the principles governing the movement of individual melodic lines (voices) within a…
Voice of Customer
— Research that captures the actual language, needs, frustrations, and desires of an audience in their…
Voice:
— Does my last 20 pieces of content all sound like the same person wrote them? - Would someone who kno…
Voiceover sentences shortened
— optimized for both listening and reading (shorter sentences read faster) 2. **Frame composition adju…
Volatile regime:
— Higher standard deviation (approximately 0.020-0.030). - Higher volume. - Possible positive autocorr…
Volatile Vic:
— More variable measures - Potentially bimodal (good games vs bad games) - Wide IQR spanning nearly th…
Volatility
— The degree of variation or unpredictability in a system over time; can be harmful (fragile systems) …
Volksempfänger
— ("People's receiver") The subsidized, technically limited radio set distributed throughout Germany u…
Volume
— A physical or logical unit of storage on z/OS (e.g., a DASD volume). Datasets are allocated on volum…
Volume 1, Chapters 2–4
— An excellent bridge between the Dirac equation and the full Standard Model. The treatment of Lorentz…
Volume commitments
— commit to a minimum annual spend in exchange for per-unit discounts - **Multi-year terms** — longer …
Volume Features:
— `article_count_1h`: Number of relevant articles in the past hour. - `article_count_24h`: Number of r…
Volume problem
— The structural challenge to fact-checking created by the far greater rate of false claim production …
Volume Scorer:
— PTS/100: 35, TS%: 0.590 - AST%: 15, TOV%: 10 - USG%: 34, 3PAr: 0.40
Voluntary response bias
— only people with strong feelings (very happy or very unhappy) bother filling out cards. The 85% like…
Volunteer Lawyers for the Arts (VLA)
— vlany.org VLA provides free and reduced-cost legal services to artists and creators who cannot affor…
Volunteers in Service to America (VISTA)
— a domestic version of the Peace Corps that sent young, mostly college-educated volunteers into impov…
Von Neumann entropy
— Ch 23.3 The quantum analogue of Shannon entropy: $S(\hat{\rho}) = -\text{Tr}(\hat{\rho}\ln\hat{\rho}…
VORP > Raw Points
— Positional scarcity determines true value 2. **PPR Favors Volume** - Reception points change player …
VORP converts rate to total value
— Formula: VORP = (BPM + 2.0) × (Minutes / 3936) - Measures cumulative value above replacement level -…
VORP methodology
— Understanding replacement level 2. **Regression to mean in sports** - Projection accuracy 3. **Kelly…
VORP to wins conversion
— Approximately 2.7 VORP ≈ 1 win - Based on ~2.7 points of differential per win relationship - Allows …
VORP-Based Valuation:
— Projected VORP over 4 years: ~14.5 - At $6M/VORP: $87M fair value - At $5M/VORP: $72.5M fair value
VORP/Replacement theory
— Foundation of value 2. **Scoring system analysis** - Know your league 3. **Basic projections** - Vol…
vos Savant was completely right.
— ## What Went Wrong: Dissecting the Error
Voter file
— A database of registered voters maintained by state election authorities, containing each voter's na…
Voter persuasion
— Campaign activities designed to change the preferences of persuadable voters who have not yet commit…
Voter suppression messaging
— Campaign or third-party messaging designed to discourage opposing voters from participating in elect…
Voting is habitual
— past behavior is the strongest predictor of future behavior, which means campaigns' mobilization dec…
Vowel formant
— See *Formant.* The characteristic resonant frequencies of the vocal tract that define vowel quality.…
vowel space diagram
— a map of acoustic vowel geography. In this diagram, high F1 corresponds to low tongue position (open…
VoxCeleb / VoxCeleb2
— Description: Speaker recognition datasets containing speech from thousands of celebrities. VoxCeleb2…
VP of Basketball Analytics
— Strategic leadership of department - Integration with GM, coaching staff, and ownership - Budget man…
VPN (Virtual Private Network)
— A technology that encrypts internet traffic and routes it through a server in another location, obsc…
VS Code (Visual Studio Code)
— A popular, extensible code editor by Microsoft. The foundation for **Cursor** and **Windsurf** (both…
VS Code COBOL Extensions:
— Broadcom COBOL Language Support (VS Code Marketplace) - IBM Z Open Editor (VS Code Marketplace)
VSAM
— Virtual Storage Access Method. An IBM z/OS file management system that provides three organizations:…
VSAM coordination:
— On restart, the VSAM account master may have partial updates. Since HAPOSTING updates account balanc…
VSAM file sharing:
— RLS mode: Yes / No: _______________ - VSAM RLS server LPAR(s): _______________
VSAM KSDS Files:
— **CUSTFILE** -- Customer master file. Primary key: CUST-NUMBER (10 bytes). Record length: 500 bytes.…
VSAM multi-volume
— specified in the DEFINE: ``` DEFINE CLUSTER ( - NAME(FBA.VSAM.BENEFITS.HISTORY) - INDEXED - KEYS(15 …
VSAM to DB2 migration
— Moving data from VSAM file structures (KSDS, ESDS, RRDS) to DB2 relational database tables. This ena…
VSAM Tutorial on IBM Developer
— Step-by-step tutorials covering VSAM cluster definition, loading, and access from COBOL programs.
VTOC
— a special area that describes all datasets residing on that volume. The VTOC contains:
Vulnerability (luck context)
— The quality of openness to uncertainty and the possibility of failure. In network and serendipity co…
Vulnerability Analysis
— You research the vulnerability to understand its nature, severity, and exploitability. What type of …
Vulnerability Correlation and Prioritization:
— Map vulnerabilities to potential attack chains. A medium-severity SQL injection combined with a low-…
Vulnerability Identification
— Through scanning, enumeration, or manual analysis, you discover a potential weakness. Perhaps Nmap r…
vulnerability points
— situations where you're most tempted to use AI as a replacement rather than a tool. For each one, de…
vulnerability SLAs
— defined timeframes for patching based on severity - Increased investment in **software composition a…
Vulnerable Applications for Lab Practice:
— Log4Shell vulnerable app: `ghcr.io/christophetd/log4shell-vulnerable-app` - SSRF Lab: `jeroenwillems…
Vulnerable configurations:
— CNAME pointing to unregistered S3 bucket - CNAME pointing to deprovisioned Azure resource - CNAME po…
W
Waiting for better equipment before posting
— the most common early-stage error; iteration count matters more than production quality at this stag…
waitress touch studies
— examined in Case Study 2 — provide an interesting test case. Researchers found that brief, incidenta…
Waiver Target:
— RB3: 11.5 PPG projected
Wake word
— A specific phrase (e.g., "Alexa," "Hey Google") that triggers recording and cloud processing on a vo…
Waking Up
— wakingup.com Sam Harris's app; more philosophically rigorous than most; includes guided meditations …
Wald's problem
— The World War II problem solved by Abraham Wald in which survivorship bias was applied to bullet-hol…
walk-forward validation
— and it is fundamentally different from the random k-fold cross-validation used in standard machine l…
Walk-Forward:
— Predict one week at a time - Use only prior data for training - Realistic evaluation
Walker (2017)
— *Why We Sleep* — for the accessible, comprehensive overview of sleep science 2. Then read **Ratey (2…
Walkthrough:
— **Lines 1-5:** Print a visual banner with a horizontal rule made from `=` signs. - **Lines 7-9:** Th…
Walter Lippmann
— *Public Opinion* (1922): the pseudo-environment - **Philip Converse** — "The Nature of Belief System…
Walter Mischel's marshmallow studies
— one of the most famous paradigms in developmental psychology — illustrated this architecture in chil…
Warmup strategies:
— **Linear warmup** (most common): The learning rate increases linearly from 0 to the target - **Expon…
Warning
— Position eigenkets $|x\rangle$ are not normalizable in the usual sense: $\langle x | x \rangle = \de…
Warning signals:
— "We'll fix it later" is heard frequently but rarely acted upon - Pre-commit hooks are routinely skip…
Warning signs for anxiety escalation:
— Increasing avoidance of previously manageable situations - Sleep disruption (difficulty falling asle…
Warning signs for depression development:
— Progressive loss of interest in previously enjoyable activities - Social withdrawal and reduced enga…
Warning signs that symmetry is about to break:
— Increased fluctuations (critical slowing down, from Ch. 5) - Growing sensitivity to small perturbati…
Warrant (general)
— See *Geofence warrant* and *Third-party doctrine.*
Warrant canary
— A periodic statement by a service provider that it has not received secret government orders compell…
Wartime information management
— The practice of democratic governments controlling, managing, or shaping public information about mi…
Washing machines
— even the basic wringer models of the 1930s and 1940s — eliminated hours of backbreaking weekly labor…
Wasted Movement Indicators:
— Running into occupied space - Moving away from optimal spacing positions - Late cuts with no passing…
wastewater epidemiology
— was not new. Researchers had been using wastewater analysis to monitor polio, norovirus, illicit dru…
Watch completion
— did the viewer watch the whole Reel? 2. **Replays** — did the viewer watch again? 3. **Shares** — di…
Watch For:
— False precision (more sims ≠ better model) - Assumption sensitivity - Over-interpretation
Watch list
— A database of individuals flagged for enhanced scrutiny, restriction, or interdiction, maintained by…
Watch Time
— The total amount of time viewers spend watching a creator's video content. A primary ranking signal …
Watch time barely changed
— his pacing was already good. The emotional redesign didn't make people watch *longer*; it made them …
Water Conservation Math
— Replacing a 3.5 GPF pre-1994 toilet with a 1.28 GPF HET: - Savings: 2.22 gallons per flush - At 5 fl…
Water:
— His well pump required generator power — a critical dependency he had identified years earlier - He …
Watermark
— A semi-transparent logo or identifier overlaid on video or image content to establish authorship. Co…
Watermarking by AI generators
— including OpenAI's watermarking of DALL-E outputs and Google DeepMind's SynthID — embeds signals in …
Wave 1 (Week 1-2): Critical path programs
— The file conversion utility and the six programs that must populate or validate the new regulatory f…
Wave 2 (Week 3-4): High-frequency programs
— The twenty programs that process the account file daily. These are recompiled with V5.0 but do not y…
Wave 3 (Week 5-6): Remaining programs
— The twenty-seven programs that run weekly, monthly, or on-demand. These are the lowest risk and are …
Wave function
— Ch 2.1 The complex-valued function $\psi(x, t)$ (or $\Psi(\mathbf{r}, t)$ in 3D) that encodes the co…
wave packet
— a superposition of plane waves that localizes the particle:
Wave-particle duality
— Ch 1.6 The observation that all quantum objects exhibit both wave-like behavior (interference, diffr…
Waveform
— The shape of a wave as a function of time — the graph of amplitude versus time for a sound signal. C…
Wavelength
— The spatial period of a wave — the distance between two successive points of identical phase (e.g., …
Wayne Winston
— Statistical analysis of pace evolution - **Neil Paine (FiveThirtyEight)** - Historical pace reconstr…
We added context
— the reference temperatures help the user interpret the result. Is 22°C hot or cold? The reference ta…
We identified four major types of bias:
— **Historical bias:** The training data accurately reflects an unequal world - **Representation bias:…
Weak Correlation:
— Corners and goals (r ≈ 0.15): Corners rarely lead to goals - Fouls committed and goals conceded (r ≈…
Weak ties
— Loose, infrequent connections between individuals (acquaintances, contacts); Mark Granovetter showed…
weak ties produced the most referrals
— and the hires that came through weak ties were, on average, in higher-paying positions than those th…
Weaker case for variable-speed:
— Dry climate where humidity control isn't a pressing concern - You're replacing a system and plan to …
Weaknesses:
— Lack of legal enforceability creates uncertainty about actual protections - Fragmented across multip…
Wearable technology
— Consumer electronics worn on the body that continuously monitor physiological signals, movement, loc…
weasyprint
— A Python library for converting HTML and CSS to PDF, producing print-ready report documents.
Weather data sources
— Learn where to get data 2. **Basic meteorology** - Understand conditions 3. **NFL weather research**…
Weather Markets:
— Average spreads: 3-7 cents - Spreads narrow as the forecast date approaches (weather models converge…
Web Application (shopstack-staging.local):
— jQuery 3.3.1 (CVE-2020-11022, CVSS 6.1) - Express.js 4.17.1 (CVE-2022-24999, CVSS 7.5) - GraphQL int…
Web Application Fingerprinting:
— Identify web server versions, frameworks, and CMS platforms. - Enumerate directories and files using…
Web Archives (Wayback Machine):
— Historical snapshots of prediction market pages - Useful for platforms that no longer exist or for d…
Web beacon
— Another term for a tracking pixel.
Web Development:
— VS Code with extensions for HTML, CSS, JavaScript - Node.js runtime alongside Python - Browser devel…
Web framework
— A library that handles the mechanics of HTTP request/response cycles so you can focus on application…
Web Hacking 101
— Peter Yaworski (free). Collection of real-world vulnerability reports with analysis.
Web Infrastructure
— **Patient Portal:** `portal.medsecure.example.com` — A custom web application built on Python/Django…
Web scraping
— extracting data from websites programmatically - **Surveys and experiments** that you design and con…
Web3
— A conceptual vision of a decentralized internet built on blockchain technology, in which users own t…
Webhook
— A mechanism where one service sends an HTTP request to another service when a specific event occurs.…
Webhook Handling
— Receiving, verifying, and processing webhook events idempotently.
Website Priority Checklist:
— [ ] Custom domain name (not yourname.wixsite.com — yourname.com) - [ ] Email opt-in above the fold o…
WebSocket
— A protocol that provides full-duplex communication channels over a single TCP connection. Used for r…
WebSocket Chat App
— Build a simple chat application to learn WebSocket fundamentals.
WebSocket protocol specification (RFC 6455)
— For platforms that offer WebSocket-based data feeds, understanding the protocol helps debug connecti…
Wednesday (1 hour):
— Finalize pillar content edits - Add captions, thumbnail, description/SEO for pillar content
Week 1 -- Chapters 1 and 2
— Read Chapter 1 (Your Brain Is Not Broken) and complete the Learning Autobiography - Read Chapter 2 (…
Week 1 --- Reduced Operations:
— Stake at 50% of normal size (1% of bankroll instead of 2%) - Maximum 3 bets per day (instead of norm…
Week 1 data:
— **Total daily screen time:** 4 hours 47 minutes (average) - **Breakdown:** Social / entertainment — …
Week 1 — Baseline Documentation:
— Keep a daily log of all the chance encounters, unexpected information, and opportunities you experie…
Week 1 — Baseline:
— Track your expectation before each significant action or decision (social interaction, academic subm…
Week 1-2: Data Foundation
— Build college stats database - Implement conference adjustments - Create production metrics (YPRR, D…
Week 1-2: EPA Foundation
— Load play-by-play data - Calculate expected points by field position - Implement basic EPA
Week 1-2: Foundation
— Set up data pipeline for historical games (2018-present) - Implement basic Elo rating system - Calcu…
Week 1-2: Market Data
— Build odds tracking database - Implement probability conversions - Track line movements
Week 1-2: Projections
— Build player projection model - Implement regression to mean - Create efficiency and volume forecast…
Week 1-2: Team Profile
— Calculate team power ratings - Build offensive/defensive efficiency analysis - Create personnel valu…
Week 10 -- Chapters 19 and 20
— Read Chapter 19 (Reading to Learn) and apply reading strategies to your hardest current text - Read …
Week 11 -- Chapters 21 and 22
— Read Chapter 21 (Learning by Doing) and design a deliberate practice routine - Read Chapter 22 (Lear…
Week 12 -- Chapters 23 and 24 (Phase 3 Checkpoint)
— Read Chapter 23 (Test-Taking as a Skill) and create an exam preparation plan for a real upcoming ass…
Week 13 -- Chapters 25 and 26
— Read Chapter 25 (From Novice to Expert) and map your position on the novice-to-expert continuum for …
Week 14 -- Chapter 27
— Read Chapter 27 (Lifelong Learning) and design your Learning Operating System v1.0 - Self-test: What…
Week 15 -- Chapter 28 (Phase 4 Checkpoint)
— Read Chapter 28 (Your Learning Operating System) and complete the final deliverable - Re-take the MA…
Week 16 -- Review and Capstone (Optional)
— Review the entire book using spaced retrieval practice: write down everything you remember from each…
Week 18: Playoff implications
— Team A (home): Clinched playoff spot, likely to rest starters - Team B (away): Must win for playoffs…
Week 1: Analytics Staff
— Full system training (8 hours) - API documentation walkthrough - Custom query development
Week 1: Drawing data structures.
— Lists became rows of numbered boxes - Dictionaries became two-column lookup tables - Sets became cir…
Week 1: Foundation
— [ ] Set up Custom Instructions with your full professional context - [ ] Review and configure Memory…
Week 1: Initial Access
— Day 1–2: Launch phishing campaign (staggered sends to avoid bulk detection). - Day 3–5: Monitor for …
Week 1: Supervised Practice
— Complete a small feature using the team's AI workflow - Submit code for review with explicit feedbac…
Week 2 -- Chapters 3 and 4
— Read Chapter 3 (The Forgetting Curve) and create your spaced repetition schedule - Read Chapter 4 (A…
Week 2 --- Gradual Escalation:
— Stake at 75% of normal size - Maximum 5 bets per day - Full pre-bet checklist continues - If week 1 …
Week 2 — Analysis and Planning:
— Review your Week 1 data. Count: How many chance encounters led to something useful? - Identify your …
Week 2 — Intervention:
— Identify your two most consistently pessimistic domains (the areas where your pre-action expectation…
Week 2-3: Feature Exploration
— [ ] Try Advanced Data Analysis on a real dataset from your work - [ ] Try DALL·E for one visual crea…
Week 2-4: Gradual Independence
— Take on increasingly complex tasks - Contribute at least one prompt improvement to the shared librar…
Week 2: Coaching Staff
— Dashboard overview (2 hours) - Fourth-down bot training (1 hour) - Tablet usage on sideline
Week 2: Drawing operations.
— Appending to a list became an animation: a new box appears at the end of the row - Looking up a dict…
Week 3 -- Chapters 5 and 6
— Read Chapter 5 (Cognitive Load) and complete the cognitive load analysis - Read Chapter 6 (Sleep, Ex…
Week 3 --- Full Operations:
— Return to normal staking if weeks 1-2 were process-compliant - All discipline systems fully active -…
Week 3-4: Adjustments
— Add home field advantage (static and dynamic) - Implement schedule factors (bye weeks, rest) - Add w…
Week 3-4: Athletic Profiles
— Process combine data - Calculate Speed Score, RAS equivalents - Build athletic comparison system
Week 3-4: Deep Analysis
— Evaluate coaching decisions - Analyze play-calling tendencies - Study situational performance
Week 3-4: Model Comparison
— Integrate prediction model - Calculate edge vs market - Implement CLV tracking
Week 3-4: Rankings
— Calculate replacement levels - Implement VORP rankings - Create position scarcity analysis
Week 3-4: Success Rate
— Define success thresholds by down/distance - Calculate success rate by team/player - Build explosive…
Week 3: Lateral Movement and Privilege Escalation
— Move laterally toward high-value targets (domain controllers, cloud admin accounts, financial system…
Week 3: Recruiting Staff
— Recruiting dashboard training (2 hours) - Search and filtering - Board management
Week 4 -- Chapter 7 (Phase 1 Checkpoint)
— Read Chapter 7 (The Learning Strategies That Work) -- this is the most important chapter in the book…
Week 4: Executive Staff
— Report interpretation (1 hour) - Dashboard navigation
Week 4: Objective Actions
— Access crown jewel systems: executive email, transaction processing, customer database. - Demonstrat…
Week 5 -- Chapters 8 and 9
— Read Chapter 8 (The Learning Myths That Won't Die) and complete the myth audit - Read Chapter 9 (Dua…
Week 5-6: Decision Tools
— Build DFS optimizer - Create start/sit recommender - Implement waiver analyzer
Week 5-6: Injuries and Context
— Build injury impact model by position - Add playoff/rivalry adjustments - Integrate market data for …
Week 5-6: Models
— Build QB, WR, RB projection models - Implement comparable identification - Create draft range predic…
Week 5-6: Performance
— Build betting log system - Calculate ROI metrics - Analyze by market/bet type
Week 5-6: Player Analysis
— Attribute EPA to players (QB, RB, WR) - Create CPOE calculations - Build receiver efficiency metrics
Week 5-6: Season Context
— Analyze schedule strength - Project remaining games - Simulate playoff scenarios
Week 5: Cleanup and Reporting
— Remove all persistence mechanisms, implants, and artifacts. - Verify cleanup completeness. - Compile…
Week 5: Revision
— Read the report as if you are the decision-maker receiving it. Is it clear? Is it actionable? - Ask …
Week 6 -- Chapters 10, 11, and 12
— Read Chapter 10 (Desirable Difficulties) and design a study session incorporating 3 desirable diffic…
Week 6: Polish and Submit
— Proofread for clarity, consistency, and citation accuracy. - Format the document professionally — nu…
Week 7 -- Chapters 13 and 14
— Read Chapter 13 (Metacognitive Monitoring) and practice delayed JOLs - Read Chapter 14 (Planning You…
Week 7-8: Automation and Evaluation
— Build weekly update pipeline - Create performance tracking dashboard - Document calibration and accu…
Week 7-8: Integration
— Build unified platform - Create export/visualization features - Test with live data
Week 7-8: Optimization
— Implement Kelly Criterion - Create bankroll projections - Build reporting dashboard
Week 7-8: Report Creation
— Compile executive summary - Create visualizations - Document methodology
Week 7-8: Validation
— Backtest against historical classes - Calculate accuracy metrics - Document strengths/weaknesses
Week 7-8: Visualization
— Create team dashboards - Build player comparison tools - Implement situation analysis
Week 8 -- Chapters 15 and 16 (Phase 2 Checkpoint)
— Read Chapter 15 (Calibration) and run the calibration exercise -- predict your score on 20 questions…
Week 9 -- Chapters 17 and 18
— Read Chapter 17 (Motivation and Procrastination) and complete the motivation diagnosis - Read Chapte…
Week one — safety and emergency preparedness:
— **Find and test the main water shutoff.** Make sure it operates freely. Label it clearly. Show every…
Weekly (15--30 minutes):
— Skim one or two data science newsletters. Recommended: *Data Science Weekly*, *The Batch* (by Andrew…
Weekly (30-60 minutes):
— Read one long-form article or research summary. Harvard Business Review, MIT Sloan Management Review…
Weekly (60–90 minutes total):
— Deep review: one significant relationship, one work challenge, one recurring emotional pattern — exa…
Weekly (approximately 45 minutes total):
— One marketing-specific AI newsletter (20 minutes) - One productivity/measurement newsletter (15 minu…
Weekly (max 90 minutes total):
— Deep review (one domain, one relationship, one pattern): - Connection investment (who, when, what ki…
Weekly Practices
— [ ] Complete a journal entry for each significant AI interaction - [ ] Calculate weekly time savings…
weekly review
— deserves special attention. The weekly review is the habit that prevents your plan from becoming a d…
Weeks 1-2: Foundation and Strategy
— Week 1: Complete the assessment (done). Set up practice journal. Create weekly goal sheets. - Week 2…
Weeks 1-3: Core Language Reinforcement
— 2 hours/day, 5 days/week - Week 1: Review COBOL fundamentals (Chapters 1-10). Write 3 small programs…
Weeks 10-12: Portfolio and Interview Prep
— 3 hours/day, 5 days/week (increased intensity) - Week 10: Build a portfolio project: a small but com…
Weeks 11-12: Performance Preparation
— Week 12 (recital week): Final run-throughs only. Light practice. Mental rehearsal. Rest. - Week 11: …
Weeks 1–2: Inventory and Outline
— Gather all 21 progressive project components. - Identify gaps — which sections need the most new res…
Weeks 3-5: Deep Technical Work
— Focus on all passages rated 3 or 4 in the assessment. - Slow practice, rhythmic variations, and the …
Weeks 3–4 before launch (Waitlist):
— Write the exact text for your waitlist announcement (social post + email versions). - What is the in…
Weeks 3–4: Drafting
— Write new sections; revise existing material to fit the report's voice and structure. - Ensure every…
Weeks 4-6: Platform Technologies
— 2 hours/day, 5 days/week - Week 4: DB2 embedded SQL (Chapter 22-23). Practice cursor processing, sin…
Weeks 5–6 before launch (Pre-launch Seeding):
— What question will you ask your audience to gauge interest and gather intelligence? - What poll will…
Weeks 6-8: Refinement
— Connect individual passages into complete movements and complete pieces. - Work on musical interpret…
Weeks 7-9: Domain Knowledge and Integration
— 2 hours/day, 5 days/week - Week 7: Financial calculations (Chapters 33-35). Practice interest comput…
Weeks 9-10: Integration
— Week 10: Full program run-throughs with professor coaching. Focus on transitions between pieces, pac…
weight decay
— weights literally decay toward zero at each step.
weight sharing
— directly into the architecture. These biases dramatically reduce parameter count while making networ…
weighted mean effect size
— an estimate of the effect in the population that weights studies by their precision (which is relate…
Weighted projection (Years 4-8 average):
— Points: 18-22 PPG - Win Shares: 5-9 per season - Peak probability: 35% chance of 10+ WS season
Weighting
— The statistical adjustment of survey data to correct for imbalances between the sample and the targe…
Weighting transparency (weight: 20% of grade):
— Met: Variables used for weighting are disclosed (e.g., age, gender, race/ethnicity, education, geogr…
Weighting:
— [ ] Are the weighting variables and targets described? - [ ] Is the weighting target population appr…
WEIRD
— Western, Educated, Industrialized, Rich, Democratic; Henrich, Hein, and Norenzayan's (2010) acronym …
WEIRD bias
— The overrepresentation of Western, Educated, Industrialized, Rich, and Democratic populations in psy…
Welcome Screen
— Display the bank branding, current date and time, and prompt the customer to insert their card (simu…
Welcome Sequence
— The automated series of emails sent to new subscribers immediately upon joining a creator's email li…
welfare metrics
— what constitutes the good society. For example: maximize GDP per capita plus a health index minus a …
welfare-based account of manipulation
— The view that manipulation is wrong when it produces outcomes contrary to the target's genuine inter…
Well temperament
— A family of tuning systems popular in the Baroque and Classical periods (including Werckmeister III,…
Well-Priced:
— Extreme cold in December/January - High-profile weather games (snow bowls) - Obvious conditions (for…
Wellhead inspection:
— Locate the wellhead outside (the capped pipe or structure at ground level above the well). Check tha…
Wellington House
— Britain's War Propaganda Bureau, established August 1914 under Charles Masterman; specialized in cov…
West Virginia Division of Culture and History
— Extensive oral history collections from McDowell County and other coalfield communities - **Appalach…
West Virginia was born from this division
— the only state in American history created by splitting from an existing state during wartime. Its c…
Western funeral silence / moment of silence
— a ritual communal withdrawal from ordinary noise as a form of respect for the dead. This silence is …
western Virginia
— the counties that would become West Virginia in 1863 — the picture was more varied. The Kanawha Vall…
Weverse
— A fan community platform operated by HYBE (BTS's entertainment company) that provides direct communi…
whale effects
— a small number of very large traders disproportionately moving the price.
What "95% confidence" really means
— it's about the process, not the specific interval. This interpretation issue is the most commonly te…
What "waiting until ready" costs:
— **Feedback delay:** You can't learn what works and what doesn't until you've published and seen real…
What A and B taught her:
— Opening A taught her that accusatory openings close the other party before the conversation begins. …
What a model registry tracks:
— Model artifacts (serialized model files) - Model metadata (algorithm, hyperparameters, training data…
What a monitoring plan must include:
— **Metrics:** What will be measured? Metrics should be linked to specific potential harms identified …
What a niche is NOT:
— A single topic you must discuss forever - A permanent commitment you can't change - The most "market…
What a niche IS:
— A focused starting point that helps people find you - An intersection of your genuine interest and a…
What a p-value is NOT:
— It is NOT the probability that the null hypothesis is true - It is NOT the probability that the resu…
What a strong answer includes:
— Acknowledgment of the legitimate critique: the proliferation of AI ethics frameworks, principles, an…
What affects posting time effectiveness:
— Your audience's demographics (age, geography, working hours) - Platform algorithm freshness windows …
What agents can do reliably:
— Research and information synthesis (gathering information from multiple sources, summarizing, and pr…
What agents struggle with:
— Tasks requiring genuine judgment about ambiguous situations - High-stakes decisions where errors hav…
What AI contributed:
— The 9-slide structure: organizing by decision rather than analysis is an obvious idea in retrospect,…
What AI does not do well:
— **Estimating effort for novel work.** AI can suggest task durations based on averages from its train…
What AI does poorly with COBOL:
— Understanding system-level context (JCL dependencies, CICS transaction flow, DB2 plan binds) - Handl…
What AI does well in project planning:
— **Generating structure from chaos.** When you have a fuzzy project concept, AI is excellent at sugge…
What AI does well with COBOL:
— Summarizing what a program or paragraph does in plain English - Generating documentation from code s…
What Alex did not have:
— Campaign concept or creative territory - Key message or brand positioning for the product - Tagline …
What Alex had:
— Product: Premium hydration system (bottle + filter) - Target audience: Active day hikers, 28-45, val…
What an LPR captures:
— License plate number - Date, time, and GPS location of capture - Photograph of the vehicle and surro…
What AP would have helped with:
— Improvisation at the keyboard, where knowing the absolute positions of notes on the instrument is di…
What AP would not have helped with:
— The harmonic logic and formal architecture of a piece — these are fundamentally relational. A sonata…
What are all possible outcomes of each choice?
— Corporate: Probably stable job for 2–3 years, modest promotions, safe skill development. Low varianc…
What are the non-financial values?
— Learning velocity at the startup is probably higher. - Creative autonomy has genuine utility value t…
What are the time constraints?
— Collaboration is time-intensive; emergencies call for faster modes. This determines whether the most…
What belongs in a short-form bio:
— Who you are, in one clear sentence (not adjectives — specific nouns and verbs) - Who you make conten…
What boxes missed:
— On-ball pressure that exhausted opposing ball-handlers - Denial defense that limited catch-and-shoot…
What boxes showed:
— Combined 3.3 steals per game - Reasonable defensive foul rates
What builds it:
— Responding to bad news with curiosity: "Tell me more about this" rather than "Why did this happen?" …
What businesses know that residents do not:
— Businesses choose to install cameras and consent to the partnership. Residents of the neighborhood —…
What can stay on spinning disk:
— Cold archival partitions. - Backup copies and archive logs. - LOB data that is infrequently accessed…
What can you A/B test?
— **Model variations.** Does adding a new feature to your model improve performance? Run both versions…
What causes S0C7:
— Uninitialized COMP-3 (packed decimal) fields - Alphabetic data moved to a numeric field - File recor…
What CFBD Provides:
— Play-by-play data from 2001 to present - Game results and box scores - Team and player statistics - …
What changed structurally:
— **Setup** now includes a character (Kai with 3 years of experience), a situation (testing a claim), …
What changed:
— GDPS/HyperSwap manager deployed on the GDPS controlling system - Metro Mirror configuration updated …
What changed?
— Have any AI capabilities changed significantly? - Have your verification habits changed? - Has your …
What CNB had to solve:
— Data replication: Nightly extract from mainframe DB2, convert from EBCDIC, load to cloud database (P…
What context is missing
— baselines, denominators, comparisons?
What creator communities provide:
— Mutual promotion, knowledge sharing, accountability, emotional support, skill development - Often th…
What critics note:
— **Limited scope.** Model cards are published for selected services, not all AI products. The most co…
What dedicated tools add:
— Automation (pull data without manual entry) - Historical data beyond what platforms store - Cross-pl…
What destroys it:
— Punishing or marginalizing people who raise concerns - Responding to errors with blame rather than i…
What Diane provides:
— A model of adult learning in action - Occasional questions that force Kenji to explain concepts (act…
What did not change
— deliberately: the basic satellite model structure remained the same. Rafael's view on this was firm:…
What did NOT transfer:
— Specific disease knowledge (COPD pathophysiology, spirometry interpretation, asbestosis imaging find…
What did not work:
— **Over-relying on Claude for debugging:** Raj initially tried pasting error tracebacks into Claude e…
What DID transfer:
— The diagnostic reasoning schema (gather-generate-prioritize-test-update) - The heuristic of prioriti…
What didn't change:
— The underlying structural mechanism — multicultural budget separation — has not been reformed at mos…
What didn't go well?
— Story 4 almost got dropped because of underestimation on Story 1 - The integration bug (promo code a…
What didn't work as well:
— Coordinating payment schedules across four contractors with four different milestone definitions cre…
What didn't work:
— Underestimated severity - Point estimate too high - Spread analysis missed
What didn't work?
— List 2-3 AI use cases or approaches that didn't deliver expected value - Why didn't they work? - Wha…
What documentation includes:
— Screenshot of each step of the reverse image search with dates - Annotated comparison images showing…
What does NOT work on LinkedIn:
— Generic inspiration without specific content ("Work hard and believe in yourself!") - Transparent se…
What does survive from the depletion research?
— The phenomenology is real: self-regulation often feels effortful, and the effort is experienced as d…
What does the expected-value comparison say?
— Even if the startup fails 60% of the time, the positive outcomes (both financial and experiential) m…
What Does This Person Need Right Now?
— [ ] To be heard before they can listen - [ ] To be given specific information (certainty) - [ ] To b…
What Does This Resistance Signal Mean?
— [ ] Frustration with my approach (pivot) - [ ] Emotional overwhelm (slow down, create space) - [ ] G…
What doesn't translate:
— The capital requirements. MrBeast's early videos were funded by personal debt and reinvested revenue…
What doesn't work for transmission reduction:
— Acoustic foam panels (absorbs room echo, not transmission) - Spray foam in wall cavities
What doesn't work:
— **Mentoring programs alone.** Adding more mentoring doesn't address the sponsorship gap; it may rein…
What each row tells you:
— **count:** How many non-null values exist. If this is less than your total row count, you have missi…
What Elena adds:
— Opening paragraph: adds a specific reference to "the conversation on Wednesday" and thanks them for …
What Elena brought:
— The $2.4M productivity calculation: this required her own research and anchored the entire business …
What failure modes it addresses:
— **Consensus enforcement (Ch.14):** Forces genuine engagement with opposing views rather than dismiss…
What fairness metrics do not tell you:
— Whether the disparity is caused by the model or reflects real-world inequality (and whether that dis…
What genuine contribution looks like in practice:
— Sharing information that is relevant to the other person's current work, without expectation of retu…
What goes on each axis
— **Any grouping or color coding** - **The title you want**
What Google's model cards do well:
— **Disaggregated performance reporting.** Google's face detection model card reports performance sepa…
What governmental actors can legitimately do:
— **Attribution:** Publicly identifying state-sponsored disinformation campaigns and their origins. Th…
What happened in the comment section:
— The "wow pretty" comments didn't disappear, but they were now joined by much longer comments from pe…
What happened:
— **Spread exploded**: From $0.01 to $0.04 (9:10 PM) - **Ask side thinned dramatically**: From 1,600 c…
What has accumulated:
— Weeks of small messes that Tariq absorbed without comment - Multiple instances of Tariq cleaning up …
What has been demonstrated:
— Quantum algorithms for specific linear algebra operations (like solving linear systems via the HHL a…
What has complicated the model:
— Not every niche can realistically generate $100/fan/year. A children's education creator and a luxur…
What has genuinely changed in the digital era:
— Scale: billions of users vs. regional populations - Speed: millisecond processing vs. days/weeks - P…
What has not been demonstrated:
— Any quantum machine learning algorithm outperforming classical methods on a practically useful probl…
What he used:
— Spotify Web API audio features (tempo, energy, danceability, valence, acousticness, instrumentalness…
What he was spending the most time on:
— Strategy and analytical work: time-intensive, high engagement (4–5 on the meaning scale) - People ma…
What HIPAA does well:
— Requires patient authorization for most uses of PHI - Grants patients access to their medical record…
What I will assess at that check-in:
— Retake Luck Audit: Yes / No - Record three luck-relevant events from the past month: Yes / No - Comp…
What I'm working on:
— Analyzing global vaccination rate disparities using WHO data - Building interactive dashboards with …
What improved:
— The collection name and concept are present - Individual candle names appear - There is an attempt a…
What individual action can do:
— First-generation professionals who deliberately identify and cultivate cross-class bridging connecti…
What individual action cannot fully do:
— The cumulative advantage of a well-positioned starting network — built over decades through family c…
What individuals can do:
— **Build referent power deliberately.** Research shows that individuals who have established trust, c…
What intrinsically motivates you
— the activities, problems, or domains where you experience genuine intrinsic engagement 2. **Your dom…
What Is AI Ethics? Framing the Challenge
— **Instructions:** Exercises are organized by difficulty level. Star ratings indicate cognitive deman…
What is available:
— American Community Survey (ACS): demographic, income, housing, education, employment data by geograp…
What is continuous across all historical periods:
— Information serves power (surveillance makes populations legible to those who govern) - Surveillance…
What Is Converging:
— **Security testing requirements:** Nearly all modern frameworks now require or recommend regular sec…
What is limited or ineffective:
— Simple information provision without identity threat reduction, for identity-laden topics - Correcti…
What is more uncertain:
— Whether social media is a primary cause of the documented rises in adolescent depression and anxiety…
What Is My Next Move?
— [ ] Continue (push through — stay the course) - [ ] Pivot (different approach, same message) - [ ] P…
What is NOT safe (or not allowed):
— Narrowing a VARCHAR from VARCHAR(200) to VARCHAR(100) — not allowed if existing data exceeds the new…
What is reasonably established:
— Passive social media use (scrolling, viewing others' content) is more consistently associated with n…
What is safe to widen:
— VARCHAR(n) to VARCHAR(m) where m > n — always safe, instant. - CHAR(n) to CHAR(m) where m > n — safe…
What is the power dynamic?
— Power imbalances shape what's possible. Competing with someone who has far more power may be both in…
What is the required circuit depth?
— If it exceeds what current hardware can execute within coherence time, the application must wait for…
What is the utility value of each outcome?
— For Priya, whose student loans are not crushing but present, and who has parents who'd let her move …
What is your emotional state — and theirs?
— Very high arousal compromises reasoning capacity. Avoidance as cooling-off is neurologically sound, …
What it did not show:
— That women would choose these men as actual partners in real life - That the detected chemical cues …
What it does neurologically:
— Activates social bonding and grooming brain regions - Lowers heart rate (parasympathetic activation)…
What it does not require:
— Suppression of doubt, fear, or realistic assessment of difficulty - Attribution of all failures to i…
What it doesn't tell us:
— Whether the participants had durable civic engagement beyond this action - Whether this represents a…
What it entails:
— Every outlet and switch in the home must be replaced with a CO/ALR rated device - Standard CO/ALR ou…
What it looks like in video:
— "I'm terrified to post this, but here goes" - "I've been procrastinating on this for weeks. Today I'…
What it looks like:
— **In research:** Rapid replication of important findings; pre-prints that enable early critique; con…
What it requires:
— A genuine, calibrated belief that your efforts can affect your outcomes (not that they guarantee spe…
What it tells us:
— Fan organizational infrastructure can be repurposed for civic action in hours - Decentralized self-o…
What It Took:
— 3 months of data pipeline development - 2 months of model development and validation - 6 months of p…
What Jade needs before next time:
— Recognition of her own freeze signature so she can notice it earlier - Physiological preparation bef…
What Jordan does not have:
— Access to Diego's full performance records (to establish differential treatment) - Documentation tha…
What Jordan observed that has legal significance:
— The injury itself and the circumstances - Diego's subsequent performance and the apparent increase i…
What Kelly got right:
— The fundamental insight that depth of relationship beats breadth of audience - The viability of nich…
What Kenji provides:
— Technical knowledge that often exceeds his mother's (he's further along in the curriculum) - The exp…
What LinPEAS Checks:
— System information and kernel version - Available exploits for the kernel - Sudo permissions and sud…
What made it work:
— Elite spacing (multiple shooters) - Switchable defense - Fast pace advantage - Mismatch creation
What makes a good Capstone 1:
— A clearly defined intervention (not just "be more open" but "attend three events outside my usual do…
What makes a good Capstone 2:
— A genuine network map (not a curated version, but an honest one) - An analysis organized around the …
What makes a good Capstone 3:
— A genuine diagnosis of the organization's current serendipity deficit — specific, not generic - At l…
What makes a good target community:
— A group you know well enough to describe specifically — not "young people" or "Americans" but "first…
What makes a prediction model
— Components, inputs, and outputs - **Evaluation metrics** - How to measure if your model actually wor…
What makes creator communities work well:
— **Small size:** Communities of 5-15 creators maintain genuine relationships; larger groups become di…
What makes this book different:
— **Conversational tone** — like learning from a friend who happens to be great at explaining things -…
What Many-Worlds does NOT say:
— It does not say that there is another universe where you made different choices at breakfast. Person…
What Many-Worlds does say:
— The wavefunction is a complete description of physical reality, not just a calculational tool. - The…
What Marcus does not lose:
— His 31,000 subscribers (they're still there, their subscriptions are intact) - His content archive (…
What Marcus has:
— **Metacognitive skills.** Fifteen years of teaching gave Marcus exceptional monitoring ability — he …
What Marcus intended:
— To open a professional conversation about something that was worrying him - To signal that he was a …
What Marcus lacks:
— **A community of practice.** His coursework cohort has dispersed. His work colleagues are friendly b…
What Marcus loses immediately:
— Ad revenue from any new videos (demonetized videos don't generate ad income) - The ability to use ce…
What markets got right:
— By late January 2020, Metaculus community forecasts assigned a 60–70% probability that COVID-19 woul…
What markets got wrong:
— Almost all forecasters — market participants included — underestimated the eventual scale of the pan…
What Metasploitable 2 provides:
— Vulnerable versions of vsftpd, Samba, Apache, MySQL, PostgreSQL, and many other services - Multiple …
What Models Can Assess:
— Population-level risk factors - Workload patterns associated with injury - Biomechanical warning sig…
What Models Cannot Do:
— Predict the specific moment of injury - Eliminate stochastic (random) injury risk - Account for all …
What not to do:
— Do not try to learn every new framework that appears on Hacker News. Most will be irrelevant to your…
What not to put in a disposal:
— Fibrous vegetables (celery, artichokes, asparagus) — the fibers wrap around the impeller and jam it …
What paper trading does not validate:
— Market impact (your orders are not hitting the real book) - Fill probability (real fills depend on q…
What paper trading validates:
— Data pipeline correctness - Signal generation logic - Risk check behavior - Order management lifecyc…
What PFF Provides:
— Play-by-play grades for every player - Detailed charting (coverage assignments, pressure, etc.) - Sn…
What platforms tend to bury or omit:
— Organic reach rate (what percentage of followers see each post) - Detailed demographic breakdowns be…
What platforms tend to show prominently:
— Total followers/subscribers (always front and center) - Total views / impressions (big number, top o…
What prebunking can do:
— Build broad-spectrum resistance to specific technique categories - Reach audiences before they have …
What prebunking cannot do:
— Reverse deeply held identity-embedded beliefs formed through years of exposure - Substitute for stru…
What predicts higher response rates:
— Specificity: demonstrating that you have read or engaged with the recipient's work - Brevity: shorte…
What private companies do with it:
— License the public data (free from NOAA) - Apply proprietary forecasting models - Provide user-frien…
What Priya deliberately excludes:
— Future-dated features (anything measured after the snapshot date) - Features with more than 30% miss…
What Priya doesn't know:
— What is the base rate for response rate in her field? (For reference: the average response rate to c…
What python-docx can do well:
— Read all text content from a document - Create documents from scratch with headings, paragraphs, tab…
What python-docx cannot do well:
— Preserve complex layouts from existing documents exactly - Work with `.doc` (pre-2007 Word format) f…
What RAPM coefficients mean
— Points per 100 possessions above/below baseline - Baseline typically league average (0) or replaceme…
What Remains Different:
— **Scope definitions:** Each framework defines its scope differently (CDE for PCI, ePHI for HIPAA, cr…
What remains open:
— How to incorporate model uncertainty that changes over time (your model may be better calibrated in …
What remains uncertain:
— **Causation vs. correlation.** Most studies are correlational. It is possible that the causal arrow …
What requires disclosure:
— Any paid post, video, or content (obviously) - Products sent to you for free — even if you weren't p…
What research tells us:
— A 2012 study in *Pediatrics* found that parents who received false-positive newborn screening result…
What Section 230 explicitly does NOT protect:
— Federal criminal law - Intellectual property claims - Electronic Communications Privacy Act violatio…
What she actually needed:
— Deliverables completed by the agreed deadline, or - If that wasn't possible: flag raised as soon as …
What she added in month 3:
— A **Jasper.ai trial** for a high-volume content project (product description writing for 150 product…
What she cut completely:
— General AI news from non-specialist sources - "Will AI replace marketing?" and similar thinkpiece co…
What she did poorly or inadequately:
— Allowed self-referential empathy to activate in session with three clients more than once, requiring…
What she did well:
— Established genuine therapeutic alliances with eight of nine clients maintained through the full yea…
What she doesn't yet understand:
— TikTok's Creator Fund, which she's not yet eligible for, will pay her almost nothing when she gets t…
What she found:
— Census tract-level demographic data from the American Community Survey (ACS), including median house…
What she missed that she shouldn't have:
— Dara's job opportunity DM (4 days delayed) - Professor Sato's research assistant offer (3 weeks dela…
What she received (estimated):
— ~312 social media notifications - ~85 news article headlines - ~20 DMs/LinkedIn messages - ~40 work …
What she should do:
— Measure the plate's thickness at multiple points and compare to target graduation curves. - Selectiv…
What she understands:
— Consistency matters more than any individual video's quality. She posts three times a week regardles…
What she was told about options:
— Heat exchanger replacement was not available for this furnace model — the part was no longer manufac…
What she would change:
— The county map as a scatter plot was functional but looked amateurish compared to a real choropleth …
What Shodan reveals:
— Open ports and running services - Software versions and configurations - Default credentials pages -…
What shows more promise:
— **Formal sponsorship programs** where senior leaders are explicitly assigned to sponsor specific hig…
What shows promise:
— Deliberate engagement of System 2 before sharing or accepting information (accuracy nudges, slowing …
What Slows Things Down:
— Incomplete applications (missing required documents) - Multiple plan review correction cycles (usual…
What Speeds Things Up:
— Complete, well-documented applications submitted the first time - Pre-application meetings that surf…
What Sports Reference Provides:
— Team and player statistics back to 1869 - Game logs and box scores - Historical records and mileston…
What stretch assignment
— a task or project at the edge of their current capability — would most accelerate their growth in th…
What success looks like at day 30:
— ### Exercise 5: The 90-Day Development Plan
What the algorithm knows about Maya:
— She is an iPhone user accessing via the TikTok app - Her account location is Austin, TX; her system …
What the algorithm predicts:
— The late-night session context suggests Maya may be in an anxious or reflective emotional state (lat…
What the algorithm recommends:
— Art process videos (high predicted completion rate based on consistent history) - Content about mana…
What the creator provides for their 50%:
— All content production (hours, equipment, editing, research) - All audience building (years of work)…
What the data actually tells her:
— Response rate: 4/47 = 8.5% - "Positive" outcome rate (advancing past first contact): 1/47 = 2.1%
What the data doesn't tell her:
— Whether her resume is the problem (no negative control — she doesn't have a version of herself with …
What the evidence says:
— The hierarchical ordering is not well supported empirically. People pursue love and meaning even in …
What the evidence shows:
— Fact-check labels reduce the likelihood of sharing labeled content by approximately 10-25% (Clayton …
What the evidence supports:
— Beliefs about intelligence do influence behavior and engagement. This is well-replicated. - Interven…
What the first week is NOT for:
— Buying equipment - Perfecting your concept - Waiting for a better idea - Researching what other crea…
What the government provides:
— NEXRAD Doppler radar data: 159 stations, continuous, publicly available in real time - GOES satellit…
What the headline obscures:
— **Specificity.** The AI did not achieve superhuman performance in "medical diagnosis" broadly. It ac…
What the library did NOT disclose:
— Specific demographic or interest targeting parameters used to show specific ad versions - Which ads …
What the loop produces:
— *Technical improvement:* Understanding of pacing, audio, lighting, editing from direct experience ra…
What the matrix tells you:
— Use high-reach platforms (TikTok, YouTube, Instagram) to acquire new audience members - Use owned ch…
What the numbers show:
— Routes serving downtown offices are carrying about half the riders they did in 2019 - Routes serving…
What the O-line controls:
— Initial hole creation - Yards before contact - Stuff rate (runs for 0 or loss)
What the police know that the public does not:
— The full extent of facial recognition use, including how often it is deployed, what databases are se…
What the program successfully detects:
— Concentrated cash equity buying temporally correlated with option accumulation in the same underlyin…
What the public knows:
— That cameras exist (the green light makes this visible) - The general claim that the program reduces…
What the RB controls:
— Vision (finding and hitting the hole) - Yards after contact - Breakaway speed
What the repair prompts did right:
— Repair 1 was a context reload with the full few-shot reference. It didn't try to describe the voice …
What the research says:
— Exposure to idealized images on social media is consistently associated with body dissatisfaction — …
What the Research Shows
— Meaningful confrontation skill requires 1–3 years of consistent practice to become integrated and du…
What the shared environment provides:
— Social accountability for both (they show up because the other person is counting on it) - A reduced…
What these tools do well:
— Trigger chains based on external events (a new email arrives, a form is submitted, a file appears in…
What they did themselves:
— Cabinet installation (with help from Priya's father, an experienced woodworker) - Countertop templat…
What they do well:
— Annual third-party penetration test (compliance-driven) - Endpoint detection and response (CrowdStri…
What they failed to anticipate:
— The platform's architectural limitations made audience portability difficult — when users migrated t…
What they got right:
— Early artists who built MySpace followings before mainstream label infrastructure was on the platfor…
What they hired out:
— Electrical rough-in (new panel circuits for refrigerator, dishwasher, microwave, small appliance cir…
What they would do differently:
— "We let the moderation team become Destiny's and Theo's friend group instead of recruiting across th…
What this accomplishes:
— Tyler now knows there is a problem. This alone is significant. - Sam has discharged his managerial r…
What this appendix covers:
— Setting up a Python environment for fairness analysis - Loading and exploring datasets with known de…
What this disincentivizes:
— Controversial, niche, or politically sensitive content (even if high quality) - Short-form content (…
What this does NOT mean:
— It does NOT mean that losses will be "corrected" by future wins (gambler's fallacy). - It does NOT g…
What this enables:
— Checking plates against hot lists of stolen vehicles, vehicles with outstanding warrants, or vehicle…
What this incentivizes:
— High watch time (longer time on platform = more ad impressions) - High video count (more videos = mo…
What this includes:
— Research into genetic associations with thousands of diseases (heart disease, cancer, Alzheimer's, d…
What this means for bettors:
— A +EV bettor will be profitable in the long run with near certainty. - A -EV bettor will lose money …
What this means for business leaders:
— Focus your risk management on the near-term, concrete risks that affect your organization and stakeh…
What this means in practice:
— RecruitSmart's developer must implement a **risk management system** — a continuous process of ident…
What this model suggests:
— Provide explicit context before making requests - Specify the audience, purpose, constraints, and hi…
What this tells creators:
— **Satisfying creators** should track completion rate and replay rate — these are the true success me…
What to ask in an audience interview:
— "Tell me about yourself — what are you working on right now?" - "When did you first find my channel …
What to ask in an initial consultation:
— Have you worked with content creators specifically? How many creator clients? - Are you familiar wit…
What to automate:
— Subdomain enumeration and monitoring - Content discovery and fuzzing - Technology fingerprinting - K…
What to Avoid
— Leading with legal rights, HR policy, or formal complaints as an opening move - Accusatory framing (…
What to AVOID:
— Pointing (reads as accusatory) - Standing when the other person is seated (dominant positioning) - L…
What to change:
— **Higher delivery resolution:** 24-bit for playback (the additional dynamic range has no cost in a s…
What to do about multicollinearity:
— **For prediction:** Often nothing. Multicollinearity doesn't affect prediction accuracy much — it af…
What to do manually:
— Business logic testing - Authentication and authorization testing - Complex injection testing - Vuln…
What to do more of:
— Deliberate referral cultivation: reaching out to past clients quarterly, not just when she needed wo…
What to do:
— Enable screen time reporting on your device (iOS: Settings > Screen Time; Android: Digital Wellbeing…
What to Document
— One photo of each full roof plane - Close-up photos of any shingles that look different from surroun…
What to document:
— The seed value you used - Any library-specific seeding (some libraries have their own random number …
What to focus on:
— Safety hazards (these are not optional; they must be addressed before occupancy or very shortly afte…
What to keep:
— 44.1 kHz (or 48 kHz for film/broadcast) sample rate: The Nyquist frequency of 22,050 Hz is adequate …
What to Look For
— **General condition of the cladding** — is the siding intact, secure, and properly lapped? For wood …
What to look for in content discovery:
— `/admin/`, `/administrator/`, `/manage/` — Administrative interfaces - `/api/`, `/api/v1/`, `/api/v2…
What to look for in SMB enumeration:
— Anonymous/guest access to shares - Readable shares containing sensitive files (scripts with credenti…
What to look for in your own answer:
— A definition that specifies the *function* of propaganda (interest-serving, bypasses critical reason…
What to look for:
— **Activation means** should be near zero (for zero-centered activations like tanh) or near 0.5 times…
What to not over-index on:
— Long lists of maintenance items that are inherent to any used house (caulking maintenance, minor tri…
What to notice:
— The sine wave has a single spike at 440 Hz -- it is the definition of a "pure" tone. - The square wa…
What to put on flash/SSD:
— Active transaction log data sets (z/OS) or log files (LUW). - Hot tablespace partitions (current mon…
What to read:
— History and biography (rich in stories of problem-solving across domains) - Popular science in field…
What to recommend
— product selections ranked by affinity score, filtered by inventory availability and margin targets -…
What to save:
— **Effective prompts.** When a prompt works well — produces the quality of output you needed with min…
What to showcase:
— The input data format and where it comes from - The transformations applied - The output format and …
What to stop doing:
— LinkedIn paid advertising (immediately) - Cold outreach (gradually, redirecting that time to referra…
What to test in subject lines:
— Question vs. statement ("How to save $1,000 this month" vs. "I saved $1,000 this month") - With vs. …
What to test in thumbnails:
— Face vs. no face: For most personal brand channels, faces showing strong emotion outperform text-onl…
What to test in TikTok hooks (first 3 seconds):
— Narrated statement vs. on-screen text vs. action/demonstration - Starting with the outcome ("I gaine…
What to Test:
— Are login failures logged? - Are access control failures logged? - Do logs include sufficient contex…
What to track going forward:
— Track the source of every new client inquiry, even informally - Track which clients refer others — a…
What to watch for in month 1:
— **Audience Retention graph:** Where does your biggest viewership drop happen? What were you doing at…
What to write about:
— Take one of your portfolio projects and write it up as a narrative blog post. Not a tutorial ("how t…
What topology does not protect:
— Against perturbations that exceed the topological gap (breaking the topology) - Against global pertu…
What topology protects:
— Quantum information encoded in non-local (topological) degrees of freedom - Against local perturbati…
What Twitch provides for its 50%:
— Server infrastructure for streaming (significant cost) - Payment processing - Discovery and recommen…
What U.S. regulations, if any, might apply?
— **What governance mechanisms would you recommend to ensure the system is used fairly and transparent…
What UART Access Provides:
— Boot log messages (revealing OS version, partition layout, boot arguments) - Login prompt (try defau…
What was difficult:
— Amazon's scale of anti-union spending and organization - The mandatory captive audience meetings, wh…
What was ethically questionable:
— The research was placed without providing the reporter with the known explanation (the witness issue…
What was good:
— RACF was active with PROTECTALL(FAILURES) — no unprotected datasets - CICS transaction security was …
What was not good:
— No encryption — neither dataset encryption nor DB2 column encryption for ePHI - No AT-TLS — EDI tran…
What we CAN'T measure from PBP:
— Who was supposed to cover whom - Pass rush wins vs losses - Positioning and angles - Assignment corr…
What went well?
— Code review caught two bugs before they reached users - Splitting the promo code story was the right…
What went wrong:
— **The SQL injection vulnerability** was caught by luck during a rehearsal, not by systematic testing…
What went wrong?
— **Small sample sizes.** Many studies used 20–30 participants, which is too few to reliably detect re…
What will we change?
— Add integration testing to the Definition of Done for every story, not just at the end of the sprint…
What WinPEAS Checks:
— System information and patch level - User and group enumeration - Token privileges - Service configu…
What worked well:
— The RADIO framework ensured the AI had enough context to make useful recommendations - Iterative str…
What worked:
— The game-specific channels created immediate value because they solved a real problem (finding desti…
What worked?
— List 3-5 AI use cases or approaches that generated real value - What made them work? - Have you capt…
What works:
— Mass (more drywall) adds 3–5 STC points per added layer when direct-screwed - Resilient channels (de…
What would have caught:
— The dietary fat hypothesis was sustained partly by food industry funding of research that favored su…
What would increase confidence:
— Out-of-sample testing on data the strategy was not optimized on - Simplicity (fewer parameters = les…
What you always find:
— Frameworks derived entirely from success - Narrative arcs that flow from vision to obstacle to break…
What you can do at Tier 1:
— Upload a CSV, Excel file, or Google Sheet and ask for a basic exploration - Request specific statist…
What you can do at Tier 2:
— Ask AI to write data loading and cleaning code - Request specific analyses with code - Iterate on vi…
What you may not sell
— Official licensed merchandise (even if purchased wholesale) - Mass-produced items manufactured by th…
What you need:
— Non-contact voltage tester (mandatory) - Flathead and Phillips screwdrivers - Needle-nose pliers - A…
What you rarely find:
— Systematic analysis of which strategies failed and why, across a large sample of companies that trie…
What you should be able to do:
— Write SELECT queries with filtering, sorting, and aliasing. - Join two or more tables using inner, o…
What you will need:
— Firsthand experience with the app, or documented accounts from users. You do not need to be actively…
What you'll do:
— Combine and refine all the work you've done across chapters 1-34 - Fill any analytical gaps (section…
What you'll learn in this chapter:
— How computers turn images into numbers they can process - How convolutional neural networks learn to…
What you're looking for:
— **Healthy rod:** Still has significant magnesium or aluminum metal on it. Probably rough and pitted,…
What your score means:
— **20-40:** You're at the beginning of your metacognitive journey. That's not a problem — it's an opp…
What's Available:
— Official NCAA statistics and records - ESPN's Team and Player pages - Real-time game updates - QBR a…
What's needed:
— Play-by-play film review - Individual assignment tracking - Grade each player per play
What's new in v0.2:
— Variables to store data (`user_name`, `task_name`, `task_created`) - Type awareness — `datetime.now(…
What's perfectly fine:
— Soft food scraps - Ice cubes (cleans the grinding ring) - Most vegetable peels (except the fibers li…
Whataboutism
— The rhetorical technique of responding to documentation of one's own wrongdoing by pointing to compa…
WhatsApp group networks
— the connective tissue of Brazilian ARMY coordination. While Twitter is the public-facing platform, W…
When accommodating causes harm:
— When it is reflexive rather than chosen — when you accommodate and resent it - When it allows proble…
When accommodating serves you well:
— When you recognize you were wrong and changing your position is simply correct - When the issue genu…
When appropriate:
— When the data spans several orders of magnitude - When the standard deviation is proportional to the…
When are they leaving?
— Tenure-at-separation analysis reveals whether the problem is early (onboarding) or late (career ceil…
When avoiding causes harm:
— When the issue is significant and avoiding allows damage to accumulate - When it communicates to the…
When avoiding serves you well:
— When emotions are too hot for productive conversation and a cooling-off period is genuinely needed -…
When chosen:
— No suitable index exists - Filter factors estimate a large fraction of rows will be returned (typica…
When collaborating causes harm or fails:
— When one party isn't genuinely willing to engage — collaborating unilaterally becomes naivety - When…
When collaborating serves you well:
— When both parties have important, legitimate concerns that deserve to be addressed - When the relati…
When competing causes harm:
— In long-term relationships where resentment accumulates quietly under the surface of repeated "wins"…
When competing serves you well:
— In genuine emergencies where swift, decisive action matters more than consensus - When you have expe…
When compromising causes harm:
— When important values or principles are treated as things to split the difference on - When one part…
When compromising serves you well:
— When both parties have roughly equal power and equal stakes - When time is limited and a "good enoug…
When Correction Overcorrects
— the pendulum problem. What happens when a field traumatized by being wrong swings too far in the oth…
When deletion is appropriate:
— The missing values are a small percentage of your data (often cited as less than 5%) - The data is *…
When deletion is dangerous:
— The missingness is *not* random. If low-income patients are more likely to have missing insurance in…
When DIY permitting makes sense:
— You have verifiable skills in the trade involved - The project is straightforward (adding a circuit,…
When event sourcing makes sense on the mainframe:
— Regulatory environments that require immutable audit trails (banking, healthcare) - Systems where un…
When follower count doesn't matter:
— As a measure of how much you'll earn from a product launch - As a measure of how much influence you …
When follower count matters:
— Brand deal thresholds. Most brands have minimum follower count requirements (10K, 25K, 100K) as gate…
When functions are faster than manual code:
— Date arithmetic: INTEGER-OF-DATE/DATE-OF-INTEGER is faster and more reliable than manual leap-year c…
When hash join is disabled or unavailable:
— zparm OPTIQP is not set to YES - zparm MAXTEMPS too small for hash table materialization - Non-equi-…
When HR involvement is appropriate:
— When the behavior in question involves legally protected characteristics (race, sex, age, disability…
When HR involvement may not be appropriate:
— When the conflict is a work-style or interpersonal dispute that hasn't risen to a legal threshold - …
When it doesn't make sense:
— High-volume transaction processing where reading the current state must be sub-millisecond (replayin…
When it fails:
— *Any* application that depends on CICS transaction management, IMS, or Parallel Sysplex capabilities…
When it works:
— Simple batch programs with minimal z/OS dependencies (no CICS, no IMS, limited DB2 usage or DB2 repl…
When manual code may be faster:
— Simple operations like absolute value, where `IF X < 0 COMPUTE X = X * -1` may be marginally faster …
When normality DOES matter:
— Small sample sizes ($n < 30$): With small samples, the CLT hasn't kicked in, so the shape of the dat…
When normality DOESN'T matter much:
— Large sample sizes ($n > 30$ or so): The CLT rescues you - Mild skewness: A little skewness usually …
When NOT appropriate for sports scoring data:
— Individual game scoring rarely spans orders of magnitude (typically 5-50 points, not 1-1000) - Addit…
When not to comment:
— Don't state the obvious: `# Add 1 to count` on `count += 1` - Don't leave old code commented out in …
When NOT to use it:
— During actual training (far too slow---requires 2 forward passes per parameter) - In production code…
When NOT to use MongoDB:
— When your data has complex relationships (use a relational database) - When you need ACID transactio…
When PDF text extraction works well:
— Simple, consistently-formatted documents (pay stubs, bank statements, invoices from modern billing s…
WHEN phrase
— A clause used in the EVALUATE statement to specify a condition and the actions to take when that con…
When pie charts fail:
— You have more than 5-6 categories (the slices become impossible to compare) - Categories have simila…
When pie charts work:
— You have a small number of categories (3-5) - You want to show parts of a whole (must sum to 100%) -…
When portable ACs are the right choice:
— Where window type or HOA rules prohibit window units - For short-term or temporary use where install…
When priors barely matter:
— Late in the season (large $n$) - For well-established quantities (league-average scoring) - When evi…
When priors matter a lot:
— Early in the season (small $n$) - When teams have limited track records (expansion teams, major rost…
When professional care is needed:
— When self-care strategies are insufficient to prevent functional impairment - When the distress has …
When Solar Doesn't Make Financial Sense
— **Low electricity rates:** In states where electricity costs $0.09–0.10/kWh, payback periods stretch…
When sorts become critical path items:
— File sizes exceeding 50 GB - Inadequate MAINSIZE (forces more sort passes) - Work datasets on the sa…
When STMM works well:
— Workloads that change throughout the day (heavy sorts in the morning, heavy OLTP in the afternoon) -…
When the line barely moves:
— The market's initial assessment was well-calibrated. - The opening line was already close to the con…
When the line moves significantly:
— The market received substantial new information between opening and closing. - The opening line was …
When Things Are Escalating
— "Let me start over — I said that badly." - "I think I'm getting defensive. Can we slow down?" - "I'm…
When to be cautious with STMM:
— Critical OLTP pools where you need a guaranteed minimum. STMM might shrink a pool during a low-activ…
When to branch:
— New feature or analysis - Experimental work - Bug fixes - Each team member's parallel work
When to break the rule of thirds:
— You want to signal authority or directness - The content is intensely personal (confessionals, emoti…
When to Call 911
— Water is near your electrical panel or main breaker and you cannot safely access it from the outside…
When to Call a Time-Out
— Your heart rate is above 100 bpm and rising - You are thinking in extremes ("always," "never," "ever…
When to choose asynchronous:
— The caller does not need an immediate answer (notifications, reporting) - The target system may be t…
When to choose synchronous:
— The caller needs an immediate answer (balance inquiry, eligibility check) - The operation is idempot…
When to comment:
— Explain *why*, not *what*. The code says what it does. Comments say why. - Flag non-obvious business…
When to conduct one:
— Before deploying any AI system that makes or influences decisions affecting people (hiring, lending,…
When to consider a whole-house dehumidifier:
— You live in a hot-humid climate (CFA, CFA, or CFA climate zone — much of the South and Southeast) - …
When to consult this matrix:
— When launching a new creative venture and choosing your primary platform - When deciding whether to …
When to do this audit:
— Once at the beginning of using this book (baseline) - Once at the end of the book (progress assessme…
When to go for it instead of FG:
— 4th & goal from inside the 5-yard line - 4th & 1-3 from opponent's 25-35 (outside comfortable FG ran…
When to kick field goals:
— Inside opponent's 25-yard line when distance is 4th & 5+ - When FG wins or ties the game in final mi…
When to let your contractor pull the permit:
— The work involves multiple trades with complex code interactions - The scope is large enough that co…
When to loosen limits (cautiously):
— When your bankroll has grown substantially and your percentage-based limits translate to dollar amou…
When to prime:
— New drywall or plaster: always - Repaired areas: always (they'll flash — look different — without pr…
When to recommend each format:
— **CSV** when simplicity and compatibility matter, and the data is a single flat table. - **Excel** w…
When to Reframe
— When the conversation is stuck in a fixed interpretation - When escalation is happening around a spe…
When to seek professional support:
— Symptoms have persisted for two weeks or more - Functional impairment is significant (work, relation…
When to Target High Variance:
— Underdog in weekly matchup - Need to differentiate in DFS tournaments - Streaming in bad matchups
When to Target Low Variance:
— Favorite in weekly matchup - Building floor for playoffs - Cash games in DFS
When to tighten limits:
— During prolonged drawdowns (when your bankroll is significantly below its peak) - When your model's …
When to use `.map()` vs `.replace()`:
— Use `.map()` when you want to recode every value and need strict control — any unmapped value become…
When to use batch prediction:
— The business does not need real-time answers (daily customer churn scores, weekly demand forecasts) …
When to use BY CONTENT:
— When you want to protect the caller's data from modification - When passing literals or expressions …
When to use BY REFERENCE:
— When the subprogram needs to return data to the caller through the parameter - When you want maximum…
When to use DELETE:
— Removing specific rows (WHERE clause) - When triggers must fire (audit logging, cascade logic) - Whe…
When to use each:
— **Two-tailed:** Default choice. Use when you don't have a strong directional prediction, or when an …
When to use edge deployment:
— Network connectivity is unreliable or unavailable - Latency requirements are extreme (autonomous veh…
When to use histograms in sports:
— Examining the distribution of final scores - Checking whether margins of victory follow a normal dis…
When to use IS INITIAL:
— When the subprogram must have no "memory" of previous calls - When persistent state would cause bugs…
When to use isotonic regression:
— You have a large amount of calibration data (500+ forecasts). - The miscalibration pattern is comple…
When to use it for sports prediction:
— **Use it** when training on a GPU (CUDA device). The speedup is most noticeable when data loading is…
When to use it:
— Audit logging - Event notifications - Data feeds where the sender doesn't need confirmation - Any ca…
When to use Jupyter vs. VS Code:
— **Jupyter:** Exploratory analysis, building charts, presenting findings interactively, learning - **…
When to use KDE vs. histograms:
— Use histograms when you want to see the exact count in each bin and when your audience is less techn…
When to use listwise deletion:
— The data is MCAR (so the remaining rows are still representative) - A small percentage of rows are a…
When to Use Parquet:
— Play-by-play data across multiple seasons - Any dataset with 100K+ rows - Data you'll read repeatedl…
When to Use PCA:
— **Preprocessing for supervised learning**: Reduce feature dimensionality before training a classifie…
When to use Platt scaling:
— You have a modest amount of calibration data (50-500 forecasts). - The miscalibration pattern is app…
When to use QuTiP directly:
— Master equation solvers (`qutip.mesolve`) for open quantum systems (Chapter 33) - Lindblad dynamics …
When to use real-time inference:
— The prediction must be made at the moment of interaction (product recommendations during a browsing …
When to use serverless inference:
— Traffic is sporadic or unpredictable (infrequent but time-sensitive predictions) - The model is smal…
When to Use SOS:
— Comparing teams with similar records - Building prediction models - Projecting playoff races - Evalu…
When to use the median in sports:
— **Home run totals:** The distribution of home runs per player is heavily right-skewed. A handful of …
When to use the toolkit:
— Learning exercises where you want to see the math explicitly - Custom visualizations tuned to the te…
When to use this command:
— When investigating lock contention — identify who holds locks - When connection limits are approache…
When to use TRUNCATE:
— Clearing staging tables between ETL loads - Resetting test data - Any time you need to remove all ro…
When to use which:
— **Mean:** When data is approximately normally distributed and MCAR. - **Median:** When data is skewe…
When to Use:
— When the goal is proportional representation in outcomes - Anti-discrimination law contexts where eq…
When to write checkpoints:
— At regular intervals (every N records, such as every 100,000 records) - At natural break points (aft…
When utility is concave:
— A guaranteed $50 may be preferred to a 50% chance of $100, even though both have the same EV. - Payi…
When window replacement makes sense:
— Windows are functionally failed — broken seals in double-pane windows (visible as fogging between pa…
When you finish, you should be able to:
— Explain why the Appalachian Mountains' age and geology shaped everything that followed - Describe Ch…
When you get it wrong:
— Correct clearly and promptly — don't bury the correction in a later video or in a pinned comment tha…
When You Want to Find Common Ground
— "I think we actually want the same thing here." - "Can we agree on at least this part?" - "What woul…
When You Want to Signal Safety
— "I'm on your side here, even if it doesn't feel like it." - "I love you. I also need to say this." -…
When you're writing a sort exit or utility
— these bypass COBOL's file handling entirely.
When You've Said Something Hurtful
— "That came out wrong. What I actually meant was..." - "I didn't mean to attack you. I'm sorry." - "I…
Where AI struggles:
— Generating code that meets strict memory budgets without manual optimization - Understanding hardwar…
Where AI works well today:
— Generating boilerplate configuration code for common microcontroller platforms (STM32, ESP32, Arduin…
Where Are We?
— [ ] Is the other person still engaged, even if uncomfortable? - [ ] Are we still talking about the r…
Where Containerized COBOL Makes Sense
— COBOL programs compiled with GnuCOBOL running on Linux - Batch processing jobs that need elastic sca…
Where DB2 leads:
— Mainframe integration. Oracle has no mainframe offering. If you run z/OS, DB2 is the relational data…
Where electric heat makes sense:
— Areas with very low electricity rates (parts of the Pacific Northwest with hydropower, for example) …
Where flashing is used:
— **Chimney flashing:** Step flashing up the sides, counter-flashing where the flashing tucks into mor…
Where human judgment mattered most:
— Round 1: Selecting the territories worth exploring (Alex's call) - Round 3: Recognizing that the tag…
Where it could become problematic:
— If he scaled it to check prices every 30 seconds — that's aggressive and could trigger IP blocks. - …
Where it falls short:
— CICS emulation does not cover the full CICS API surface. Missing or limited: EXEC CICS SIGNAL EVENT,…
Where it's strong:
— The most mature COBOL-to-x86 rehosting platform, with 30+ years of development - Broad Enterprise CO…
Where light tubes work well:
— Interior bathrooms with no exterior wall access - Hallways and closets that never see daylight - Kit…
Where micro-CHP makes sense:
— Homes with existing hydronic (hot water) heating systems, which can accept the recovered heat direct…
Where Oracle leads:
— Market share on distributed platforms (UNIX/Linux). Oracle has a larger installed base and more thir…
Where PostgreSQL leads:
— Cost. PostgreSQL is free and open source. For many workloads, this alone is decisive. - Community in…
Where smart bulbs work best:
— Lamps that are rarely turned off at the wall (left plugged in, controlled by app or voice) - Multi-c…
Where smart switches work best:
— Overhead fixtures, recessed lighting, and any situation with multiple bulbs on one circuit - Rooms w…
Where SQL Server leads:
— Windows integration and the Microsoft stack (.NET, Azure, Power BI, Visual Studio). - Ease of use fo…
Where the analogy breaks down:
— A virus does not require belief or acceptance to transmit; a rumor does. People filter rumors throug…
Where the analogy holds (structural similarities):
— Both spread through contact (physical or social) between "infected" and "susceptible" individuals. -…
Where the coating goes matters for climate:
— In cold climates, you want to admit solar heat gain and reject heat loss. Low-e coating on Surface 2…
Where the debate gets complicated:
— The effect sizes in many growth mindset studies are smaller than early publications suggested. Growt…
Where they are roughly equal:
— Core ACID reliability. Both are battle-tested in mission-critical environments. - Performance. On eq…
Where to blog:
— **Medium** (and specifically its data science publications like *Towards Data Science*) has the larg…
Where to find study group partners:
— Professional organizations and meetup groups - Interdisciplinary graduate programs - Online forums d…
Where to find things
— Fic archive: [community AO3 collection link] - Art tag: #kalosverse-fanart - Discussion threads: org…
Where to set seeds:
— At the top of every notebook or script - In every function that uses randomness - As the `random_sta…
Where to use caulk:
— Inside corners of the shower (floor-to-wall and wall-to-wall inside corners) - The joint between the…
Where to use grout:
— Everything else — the field tile joints, any joints that don't fall at a change in plane or material
Where:
— Commission Per Sale = Average Order Value × Commission Rate
which type of error is more costly?
— In **medical screening**, missing a sick person (false negative) could be fatal. *Prioritize recall.…
Whiskey
— specifically, corn whiskey distilled from the surplus grain that every mountain farm produced — was …
Whiskey as currency
— in the cash-poor frontier economy, distilled spirits functioned as a medium of exchange and store of…
Whiskey Rebellion Records:
— Pennsylvania Historical and Museum Commission — maintains records related to the rebellion - Nationa…
Whistle Register
— The highest register, occurring above typical falsetto range in some voices - Mechanism is debated: …
Whistleblowing
— The disclosure of information about illegal, dangerous, or unethical practices by an insider to an e…
White text with black outline (or shadow)
— readable on virtually any background. The black outline creates contrast against bright backgrounds,…
Whiteboard/Drawing
— Draw the explanation live as you speak. Best for: abstract concepts, processes with steps, anything …
Whitelisting
— A practice in influencer marketing where a creator grants a brand access to run paid advertising thr…
Whitfield Campaign:
— Suburban Metro: 520 GRPs/week (crime contrast) - Mid-State: 380 GRPs/week (economic anxiety/positive…
Who benefits from RateCalc:
— The insurance company benefits from more granular risk assessment, which can improve profitability. …
Who benefits?
— Who gains from this particular simplification? 2. **What is absent?** — What causes and contexts hav…
Who Gets Counted, Who Gets Heard
— because demographic analysis is never politically neutral. The decision about which groups to count,…
Who her followers were:
— 89% identified as interested in streetwear/sneakers (based on follow behavior and engagement pattern…
Who may be harmed:
— Customers from lower-income communities, who are more likely to have lower credit scores, may pay hi…
Who Owns Your Data?
— moves from history to one of the most contested questions in the contemporary data landscape: the qu…
Who would care about these answers
— a specific person, organization, or decision-maker
WHOIS
— A protocol that returns publicly available registration information about a domain name, including r…
WhoScored
— Event data and ratings - Pass statistics - Match reports - Link: whoscored.com
WhoScored:
— Aggregated player ratings and statistics powered by Opta data - Requires web scraping for data extra…
whose voice counts
— Likely voter polls vs. all-adult polls produce different results with different political implicatio…
Why action is needed now
— what makes this urgent? - **Your recommendation** in one to two sentences - **Key supporting evidenc…
Why before you need it:
— Ethical clarity is reduced by emotional pressure; pre-established values function when in-the-moment…
Why callbacks work:
— They reward attentive viewers (encouraging rewatching — Ch. 6, layers principle) - They create the p…
Why CLV matters:
— Results are noisy (luck) - CLV is signal (skill) - Positive CLV → long-term profit
Why cross-validation over a single split:
— A single train/test split gives one estimate, which can be lucky or unlucky - 5-fold CV gives five e…
Why Detection Took So Long:
— The modified script continued to function normally (coverage reports were still uploaded) - The exfi…
Why did it fail?
— *A well-funded competitor entered the market six months after my launch and outspent me on marketing…
Why Does This Work?
— Goes beneath the surface to explain the mechanism or logic behind a pattern. These boxes answer the …
Why Google Sheets?
— Free with university account - Coaches could add notes directly - Built-in collaboration features - …
Why Include Positive Observations:
— They demonstrate that the assessment was thorough (you tested these areas and found them effective) …
Why it achieves both goals:
— **Rewatch:** The specific time claim ("4 minutes") makes viewers want to rewatch to verify — "Was it…
Why it exploded:
— **Verbal:** Combined The Number (#5) with The Dare (#6) — specific amount plus implicit challenge - …
Why It Fails:
— The client cannot distinguish critical issues from noise - No validation means the report contains f…
Why it hurts content:
— **Flattens emotion.** A monotone voice eliminates the vocal dynamics that create emotional engagemen…
Why it is disastrous:
— **Type safety is gone.** Every value is a string. DATE_OF_BIRTH and BALANCE are stored as VARCHAR. N…
Why it is problematic:
— **Foreign keys cannot validate.** You cannot create a FK from ACCOUNT.ACCOUNT_TYPE to CODES where CO…
Why It Worked (Analogy Quality Test):
— *Elements:* Pilot corresponds to surgeon. Copilot corresponds to surgical assistant. Aircraft corres…
Why it worked:
— The subject line was relevant to multiple departments (HR, management, administration) - The email w…
Why logical design matters
— the cost of getting it wrong, measured in data anomalies, performance degradation, and maintenance b…
Why migrate away from segmented tablespaces?
— No partition-level utility support (REORG affects the entire tablespace). - Single VSAM data set lim…
Why more musically informative:
— Music is deeply sequential — notes make sense in context, not in isolation - Tonal grammar, voice-le…
Why most outreach fails:
— Generic (could be sent to anyone) - Sender-centric ("it would help me grow") - Assumes too much (maj…
Why Nuclei is Gaining Popularity:
— Over 8,000 community-contributed templates - Extremely fast (written in Go) - Easy to write custom t…
Why OLS fails for basketball data
— Near-collinearity inflates variance enormously - Extreme, unstable coefficient estimates (+50, -50) …
why people share
— the psychology behind the tap, the forward, the DM — is one of the most powerful things a creator ca…
Why shared-nothing is mandatory:
— **Coupling creates fragility.** If your cloud microservices query DB2 on z/OS directly, a network hi…
Why the asymmetry?
— Circadian rhythms favor "gaining" hours - 1:00 PM EST game is 10:00 AM body time for west coast team…
Why the page-turning worked:
— **ASMR trigger activation:** Page-turning falls into the "crinkling/paper" trigger category. The sof…
Why the sigmoid works:
— When $b_0 + b_1 x$ is a large positive number (say, +10), $e^{-10}$ is tiny, so $P \approx \frac{1}{…
Why these choices?
— **React with TypeScript** for the frontend because AI assistants generate excellent TypeScript and R…
Why this pattern works at scale:
— The cursor uses `WITH HOLD`, so it survives the COMMIT without requiring repositioning. - The restar…
Why this works:
— The cue (morning, getting dressed) is already in the daily routine - The friction reduction (clothes…
Why token price?
— Continuously observable on-chain. - Hard to manipulate (would require buying/selling the actual toke…
Why UDP Matters to Hackers:
— **UDP Scanning is Slow and Unreliable:** Because UDP does not use a handshake, there is no definitiv…
Why vs. What/How
— The distinction between questions that request justification (why) and questions that invite descrip…
Why We Fight series
— Seven documentary films (1942–1945) directed primarily by Frank Capra under U.S. Army commission, re…
Why would a non-developer want API access?
— **Automation tools.** Platforms like Zapier, Make (formerly Integromat), and n8n can use AI APIs to …
Wicked problem
— A problem that is difficult or impossible to solve because of incomplete, contradictory, and changin…
Wide Format
— A data shape with one row per entity and multiple columns representing different time periods or cat…
Wide Receiver
— Market inefficient, draft preferred 6. **Defensive Tackle** - Important but replaceable 7. **Linebac…
Wide Receiver's Previous Season:
— Targets: 140 - Receptions: 100 - Yards: 1,400 - TDs: 14 (10% TD rate vs 4% league average)
Widen spreads
— The most direct response. Wider spreads reduce the market maker's loss per informed trade. 2. **Redu…
widget
— a visual element that can be drawn on screen. Buttons, text fields, labels, checkboxes, panels — the…
Widget Pro
— premium product, $85/unit, higher margin - **Widget Lite** — volume product, $52/unit, broad distrib…
Wigner's theorem
— The mathematical result that any symmetry transformation must be implemented by a unitary or antiuni…
Wiki labor
— The unpaid editorial work of fan volunteers who maintain media franchise wikis, generating significa…
wildcard pattern
— it matches anything that wasn't caught by a previous case. It's like the `else` in an `if-elif-else`…
wildcat strike
— an unauthorized work stoppage not sanctioned by the UMWA leadership — that shut down virtually the e…
Wilderness Road
— The trail cut through the Cumberland Gap by Daniel Boone in 1775, which became the primary migration…
Wildfire Hardening Investment:
— Ember-resistant vents (full house): $500–$1,500 - Class A roofing replacement: $8,000–$20,000+ (coin…
William Creech Sr.
— a local farmer who donated the land — and **Katherine Pettit** (who had moved on from Hindman) along…
William Goodell Frost
— the same man whose "Our Contemporary Ancestors" essay had done so much to shape the outsider image o…
William H. Turner
— Co-editor of *Blacks in Appalachia* (1985), one of the first major scholarly collections focused on …
William Holland Thomas
— one of the most unusual figures in Appalachian history.
William Spearman, "Beyond Expected Goals"
— MIT SSAC 2017. Spearman's presentation of the physics-based pitch control model. Available on YouTub…
Win Probability (WP)
— Chance of winning from current game state - Depends on: score, time, field position, down/distance
Win Probability Added (WPA)
— Change in WP from one play - Measures clutch performance
Win Probability API
— Deploy a win probability model as a REST API with caching.
Win Probability Model
— [ ] Build or acquire WP model - [ ] Calculate real-time WP - [ ] Track WP changes (WPA) - [ ] Compar…
Win Shares allocates team wins to individuals
— Total player Win Shares ≈ Team wins - Based on marginal (above replacement) contributions - Combines…
Win Shares is a counting statistic
— Accumulates with playing time - Higher minutes = more Win Shares opportunity - Use WS/48 for rate-ba…
Wind matters most
— Direct effect on ball flight 2. **55°F threshold** - Cold effects begin below this 3. **Snow = high …
Window 1 (Week 1):
— Add the three new columns (MASTER_CUSTOMER_ID, IDENTITY_VERIFIED_FLAG, IDENTITY_VERIFIED_DATE) - Add…
Window 2 (Week 2):
— Modify EMAIL_ADDRESS from CHAR(50) to VARCHAR(254) - Drop LEGACY_SYSTEM_CODE - Prerequisite: the 4 p…
Window of tolerance
— Siegel's term for the range of arousal within which we can process emotional experience and communic…
Windows are true single-pane
— particularly in homes with aluminum single-pane, the jump to low-e double-pane does provide meaningf…
Windows Event ID 4742
— Computer account changed (the machine password reset) > - **Windows Event ID 5829** — Netlogon allow…
Windows have failing seals (fogged)
— but the correct response is IGU replacement, not full window replacement, if the frames are structur…
Windows-Specific Considerations:
— Db2 on Windows runs as a Windows service. Use `db2start` and `db2stop` or the Windows Services panel…
Windows:
— Download the installer from [https://git-scm.com/downloads](https://git-scm.com/downloads) - Run the…
Windsurf
— An AI-native IDE by Codeium (VS Code fork) featuring "Cascade" for multi-step agentic coding flows. …
Windsurf (Codeium)
— Documentation: https://docs.codeium.com - Download: https://codeium.com/windsurf - Cascade Documenta…
Winger metrics add:
— **Successful dribbles per 90 and dribble success rate** - **Crosses and cross accuracy** - **Touches…
Wings:
— More balanced offensive/defensive contributions - Switching ability affects defensive versatility
Winner-take-all market
— A market structure in which a small number of participants capture an outsized majority of total rew…
Winning trades (24):
— Average edge captured: 7.2 cents per contract - Average profit per trade: 200 x $0.072 = $14.40 - To…
Winter:
— Know where the main water shutoff is and confirm it operates - Keep heat at minimum 55°F in unoccupi…
Wiseman, R. (2003).
— See Core Luck Science Books section above. Wiseman's four luck principles (especially creating and n…
WITH 4 BUFFERS / BUFFER 4096
— Controls I/O buffering. More buffers and larger buffer sizes improve throughput for large databases.
With COLCARDF = 1095 (inflated):
— FF for `TRAN_DATE = :WS-PROCESS-DATE`: 1/1095 = 0.000913 - FF for `ACCT_STATUS IN ('A', 'P', 'H')`: …
With COLCARDF = 365 (correct):
— FF for `TRAN_DATE = :WS-PROCESS-DATE`: 1/365 = 0.00274 - FF for `ACCT_STATUS IN ('A', 'P', 'H')`: 3/…
With corrected positions (on $10,000 bankroll):
— Buy $180 of Bracket 4 at 0.13 = 138 contracts - Buy $520 of Bracket 5 at 0.18 = 289 contracts - Buy …
With CRAFT:
— **Context:** We are a sustainable packaging startup. Our new product is a compostable shipping envel…
WITH DISTRIBUTION
— Collects distribution statistics (histograms) for all columns. This is the LUW equivalent of z/OS HI…
WITH DUPLICATES
— A phrase on the ALTERNATE KEY clause that allows an alternate index to have duplicate key values.
With the role review:
— 90-minute investment in role assignment sessions - 6-hour revision day - Report delivers clean, all …
Withdrawal
— Offer quick-amount buttons ($20, $40, $60, $100, $200) and a custom amount option. Validate that the…
Withdrawal signals:
— Decreased eye contact (not the baseline for this person, but a noticeable drop) - Physical angling a…
Within-Game Correlation:
— Physical games lead to more injuries - Defensive injuries may cluster - Offensive line injuries casc…
within-group variability
— the natural, unexplained noise within each group.
Without continuous involvement
— The key word is "continuous." You may be deeply involved in building and marketing the product. But …
Without fans:
— Home win rate: 51% - Home margin: +0.7 pts - Penalty differential: ~0
Without normalization:
— The policy gradient would have very high variance, requiring many more episodes to converge. - The l…
WITHOUT PROMPTING
— Suppresses interactive prompts, required for scripted/scheduled execution.
Without the role review:
— Report delivered as originally drafted - CFO catches the WACC error in the presentation room - COO r…
witness of the Spirit
— an internal assurance of salvation that was emotionally real and personally transformative.
Witness testimony
— Someone else describes the change they've observed. Third-party testimony carries extra credibility …
witness:
— Creates a second account of what was said and agreed to - Signals to the institution that you are ta…
WKB approximation
— Ch 20.1 A semiclassical approximation valid when the potential varies slowly compared to the de Brog…
WKB tunneling
— $T \approx e^{-2\gamma}$ where $\gamma = \hbar^{-1}\int\sqrt{2m(V-E)}\,dx$ — an exponentially accura…
WKB wavefunctions
— approximate solutions valid when the potential varies slowly compared to the local de Broglie wavele…
WLM affects CICS
— A CICS region in a high-priority WLM service class gets more CPU dispatching priority. If the region…
WLM Application Environment
— Defined in the WLM ISPF panels or policy. Specifies the JCL procedure to start the address space. 2.…
WLM ENVIRONMENT WLMENV1
— The WLM application environment where this procedure runs. The DBA and sysprog must create this envi…
WLM-Managed Stored Procedure Address Space
— A z/OS address space started and managed by Workload Manager specifically for executing stored proce…
Woebot
— CBT-based conversational app; not a therapist replacement; useful between sessions for cognitive res…
Wolf note/fifth
— In meantone temperament, the "wolf fifth" is the highly dissonant fifth that arises when the circle …
Wolfram MathWorld: Airy Functions
— [mathworld.wolfram.com/AiryFunctions.html](https://mathworld.wolfram.com/AiryFunctions.html) Compreh…
Wolfsberg Group
— Consortium of global banks publishing guidance on financial crime compliance best practice. wolfsber…
Wolfsberg Group Principles
— wolfsberg-principles.com — Industry consortium guidance specifically on financial crime compliance i…
Women and Leadership
— Julia Gillard and Ngozi Okonjo-Iweala (2020) Examines how gender shapes leadership and communication…
Women in Podcasting
— womeninpodcasting.org A community and directory for women podcasters, providing resources, mentorshi…
Women's digital media
— the mommy blogger economy, the personal essay writers, the domestic-life YouTubers — built the first…
Wood stove placement considerations:
— Requires a proper masonry or factory-built metal chimney — not a standard B-vent - Clearances to com…
WOOP
— Gabriele Oettingen's evidence-based goal visualization and implementation strategy: Wish, Outcome, O…
Worcester v. Georgia (1832)
— Supreme Court decision affirming Cherokee sovereignty and ruling Georgia's extension of jurisdiction…
word boundary
— the position between a word character (`\w`) and a non-word character. It matches a *position*, not …
Word embedding
— A computational technique in natural language processing (NLP) in which words or phrases are represe…
Word embeddings
— Dense vector representations of words that capture semantic similarity and contextual relationships,…
Work and Economy
— Can you walk me through a typical day at [work/school/home]? - How has the economy of this area chan…
Work and purpose prompts:
— Is the work I'm doing consistent with what I actually care about? - What am I not doing that I would…
Work enters the system
— a CICS transaction, a batch job, a DB2 stored procedure call, an MQ message 2. **WLM classifies the …
Work for Hire
— A legal doctrine in which the creator of a work (an employee or contractor) transfers all copyright …
Work function
— Ch 1.3 The minimum energy $\phi$ needed to remove an electron from a metal surface. Appears in Einst…
Work immediately
— insight precedes change, but insight alone is rarely sufficient; change requires practice
Work-Life Integration
— An approach to managing creative and personal demands that frames the two as intertwined rather than…
Worker Node Components:
— **kubelet** — Agent running on each node that manages pods. The kubelet API (port 10250) is a freque…
Working code
— a complete, documented, runnable Python implementation. 2. **A 5-page technical report** explaining …
Working Directory
— your actual files on disk, in the state you can see and edit 2. **Staging Area** — a selection of ch…
Working memory
— The cognitive system that temporarily holds and manipulates information for use in complex cognitive…
Working model (attachment)
— Bowlby's concept of the internal representation of self, others, and relationships developed through…
working self-concept
— the subset of self-knowledge that is salient given current context.
Working storage > 500 MB → LP(64)
— don't wait for the 80A - **CICS working storage: multiply by concurrent tasks** — the batch programm…
Working storage requirements:
— Transaction validation reference table: How large? (Hint: estimate the number of accounts and the by…
Working with Libraries
— Importing and using packages - Understanding documentation - Basic NumPy arrays - Basic Pandas DataF…
Working-Storage Group Copybooks
— Centralize common working-storage fields (dates, counters, flags, constants) shared across programs.
Working-Storage Section
— The section of the COBOL Data Division that defines data items whose values persist for the life of …
Workload Manager (WLM)
— the z/OS component that decides how much system resource your COBOL programs receive. If this chapte…
Workload Monitoring
— The systematic tracking of physical demands placed on players during training and matches, using met…
Works Cited and Referenced
— Darley, J. M., & Latané, B. (1968). Bystander intervention in emergencies: Diffusion of responsibili…
Works for ANY shape
— uniform, skewed, bimodal, anything 2. **n >= 30 is usually enough** (more for heavily skewed data) 3…
Workshop Format (1 day):
— Morning: Chapters 3, 7, 10 (Mental models + prompting) - Afternoon: Chapters 29, 33 + Appendix D (Ve…
World Congress of Science and Football
— Focus: Scientific approaches to football - Relevance: Biomechanics of set pieces
world state
— a mapping from addresses to account states. Every transaction modifies this world state, and the sta…
World Values Survey (worldvaluessurvey.org)
— Free access to decades of comparative attitudinal data across 90+ countries. Essential for grounding…
worldfootballR (R)
— GitHub: JaseZiv/worldfootballR - Use: Accessing multiple data sources
Worth having:
— Non-contact voltage tester ($15–$25) — Chapter 12 and 14 exercises - Digital thermometer ($10–$20) —…
Worthy/unworthy victims
— Chomsky and Herman's empirical methodology for testing the Propaganda Model, comparing media coverag…
WPA for Historical Analysis:
— The Block and Irving's shot are quantifiably historic - Enables comparison across eras and games
WR Checklist:
— [ ] Project target share - [ ] Apply moderate efficiency regression - [ ] Account for QB changes - […
WR Model:
— Production: 40% - Athleticism: 30% - Profile: 30%
WR Prospect Stats:
— Player receiving: 1,200 yards, 12 TDs - Team total receiving: 3,200 yards, 28 TDs
Write a 300-word reflection:
— Does this audit change your view of any of your tracking practices? - Is there anything on the list …
Write a 400-word analysis:
— What does the opt-out process (or its absence) reveal about whether these companies treat privacy as…
Write a one-paragraph forecast that includes:
— Current best estimate (with confidence interval) - Win probability estimate - Key uncertainties and …
Write about your experiences
— blog posts about COBOL techniques, lessons learned, or career transitions attract attention. 4. **Me…
Write an initial profile (200–300 words):
— What is the system called? - What company or organization created it? - What task does it perform? -…
Write and run code cells
— use `print()`, do arithmetic, understand cell output - [ ] **Write and run Markdown cells** — create…
WRITE statement
— A COBOL statement that outputs a record to a file. For sequential files, records are written at the …
Write tests after fixes
— As Chapter 21 emphasizes, a bug fix without a regression test is an invitation for the bug to return…
Write the core logic
— the function that does the actual work 2. **Add error handling** — every job catches its own excepti…
Write your own sort algorithm
— bubble sort for small tables, quicksort for larger ones 3. **Use SORT with an INPUT/OUTPUT PROCEDURE…
Writers Guild of America (WGA)
— wga.org The WGA's 2023 strike resulted in new provisions around AI use and residual payments for str…
Writing (Substack, Medium, Ghost, Beehiiv)
— Revenue model: Substack takes 10% of paid subscriptions; Medium has a partner program; Ghost is self…
Writing clear join conditions
— ambiguous or overly complex ON clauses can confuse the optimizer.
Writing for Security Professionals
— Various SANS whitepapers. Technical writing guidance for pentest reports. Complements Chapter 39.
Writing insights:
— The decision tree was more useful for storytelling than the random forest. The tree's simple rules (…
Writing principles for policy briefs:
— Lead with the conclusion, not the methodology - Use plain language (no jargon, no formulas, no p-val…
Written analysis:
— Blog posts explaining methods in accessible language - Deep dives on specific questions (e.g., "How …
Written communication
— pentest reports are your primary deliverable, and a poorly written report undermines excellent techn…
Written for 3 AM execution
— clear, unambiguous, numbered steps 2. **Verification after every major action** — "Start DB2. Verify…
Written for learners, not teachers
— direct, conversational, empowering - **Evidence-based** — every claim backed by cognitive science re…
Wrong
— there is a sharp threshold frequency. - Classical prediction: brighter light should produce faster e…
WS-DAILY-RATE has 9 decimal places
— far more than needed for the final result, but essential for intermediate precision 2. **WS-DAILY-IN…
WS-Security (OASIS)
— The standard for SOAP message-level security. Covers XML digital signatures, encryption, and securit…
WSDL 1.1 Specification (W3C)
— The specification for Web Services Description Language. Understanding WSDL structure helps you inte…
WSGI
— Web Server Gateway Interface. The standard interface between Python web applications and web servers…
WTO
— Write To Operator. A z/OS system service that sends a message to the operator console, commonly used…
WTO messages
— captured by the z/OS automation product (IBM System Automation) for immediate operator notification …
wu wei
— action through non-action, the art of accomplishing by not forcing. In medicine, it is *primum non n…
wumao dang
— the "50-cent party" or "50-cent army" — so named for the rumored payment of 50 Chinese yuan cents pe…
Wyscout
— Pitch dimensions: 100 x 100 (percentage-based) - Origin: top-left (similar to screen coordinates) - …
Wyscout Academy
— Professional scouting integration - Video and data combination - Industry applications - Link: wysco…
Wyscout Data
— Commercial provider - Extensive coverage - Industry standard
Wyscout Open Data
— Event data samples - European leagues - Research purposes - Link: figshare.com (search Wyscout)
Wyscout Research
— Scouting platform insights - Player evaluation methods - Video and data integration - Link: wyscout.…
X
xA
— See **Expected Assists**.
XCTL
— The menu program has completed its work and should free its storage. Control transfers to the detail…
xG
— See **Expected Goals**.
xG Chain
— The total xG of all possessions in which a player was involved, measuring their contribution to shot…
xG of the shot: 0.42
— ## Post-Match Analytical Summary
xG timeline
— a cumulative plot of each team's xG throughout the match. These visualizations have become ubiquitou…
xGA
— See **Expected Goals Against**.
XGBoost
— https://xgboost.readthedocs.io - Gradient boosting implementation - Competition-winning models - Eff…
XGBoost Documentation
— Parameter tuning guide - Python API - https://xgboost.readthedocs.io/
XGBoost paper
— Chen & Guestrin, 2016 2. **Random Forests** - Breiman, 2001 3. **SHAP values** - Lundberg & Lee, 201…
XGBoost/LightGBM
— Gradient boosting - High performance
XGBoost:
— `learning_rate`: shrinkage (0.01-0.3) - `max_depth`: tree depth (3-10) - `n_estimators`: boosting ro…
XKeyscore
— A search system that allowed NSA analysts to search through vast databases of collected emails, chat…
xlwings
— xlwings documentation: https://docs.xlwings.org/ Comprehensive docs covering the Excel object model,…
XML
— Extensible Markup Language. A data interchange format supported natively in COBOL 2014 through the X…
XML 1.0 (W3C Recommendation)
— The XML specification. Relevant for XML GENERATE and XML PARSE behavior.
XML GENERATE
— A COBOL statement (Enterprise COBOL 4.2+) that converts a COBOL data structure into XML text. Used f…
XML PARSE
— A COBOL statement that parses XML text and invokes a processing procedure for each XML event (start-…
xPts
— See **Expected Points**.
XSS (Cross-Site Scripting)
— A security vulnerability where malicious scripts are injected into web pages viewed by other users. …
XSum (Extreme Summarization)
— Description: 227,000 BBC news articles with single-sentence summaries. Tests models' ability to gene…
xT
— See **Expected Threat**.
Y
y(t) = g(t) + s(t) + h(t) + error
— **g(t)** is the trend — either linear or logistic growth, with automatic detection of changepoints w…
YAML (YAML Ain't Markup Language)
— A human-readable data serialization format commonly used for configuration files. Used by Docker Com…
Yards/play allowed
— should be high (the "bend") 2. **Red zone TD rate** - should be low (the "don't break") 3. **3rd dow…
Year 1 (move-in year):
— Professional HVAC services: $280 - Roof inspection: $150 - Gutter cleaning: $240 (professional — the…
Year 1 — API Enablement:
— Deploy z/OS Connect EE for RESTful API access to all payment services - Implement API gateway with O…
Year 1 — Cross-Training Foundation:
— Send 3 experienced Java developers through IBM's Enterprise COBOL and CICS training program (12-week…
Year 2 — Event-Driven Architecture:
— Implement event streaming (Kafka on z/OS or MQ Streaming Queue) for real-time payment events - Build…
Year 2 — Specialization and Depth:
— The cross-trained developers take ownership of the z/OS Connect API layer — they understand both sid…
Year 2:
— Professional HVAC services: $295 - Roof inspection: $155 - Gutter cleaning: $240 - Drain repair (sel…
Year 3 — Selective Decomposition:
— Extract read-heavy services (payment status, history queries) to cloud-native microservices backed b…
Year 3 — Self-Sufficiency:
— The team can independently design, develop, test, deploy, and operate PinnaclePay without relying on…
Year 3:
— Professional HVAC services (including flue joint repair): $460 - Roof inspection: $150 - Gutter clea…
YEAR, MONTH, DAY
— Extract components from a date:
Years of engagement
— typically five to ten or more years of active practice in complex domains - **High-quality feedback*…
yellow journalism
— rewarded reporters who could deliver stories that were dramatic, shocking, and irresistibly readable…
Yellow zone
— The pre-flood state in which arousal is elevated and tracking toward flooding but has not yet fully …
Yellowbrick
— https://www.scikit-yb.org - ML visualization toolkit - Diagnostic plots - scikit-learn compatible
Yes
— > Probably not churning. But check further. - Have they made more than 3 purchases this year? - **Ye…
Yes.
— Is momentum in the $z$-direction conserved? Compute $[\hat{H}, \hat{p}_z] = [mg\hat{z}, \hat{p}_z] =…
You are probably in defensive inquiry when:
— Every answer the other person gives confirms what you already believed - You are mainly waiting for …
You are probably in humble inquiry when:
— You are surprised by what you hear — it's new information, not confirmation of what you expected - T…
You can scrape:
— Static HTML pages where content is present in the initial HTTP response - Public data pages that `ro…
You cannot easily scrape:
— JavaScript-rendered pages (React, Vue, Angular SPAs) — content is not in the initial HTML - Pages be…
You develop what researchers call self-efficacy
— the belief, grounded in evidence, that you are capable of taking action and producing outcomes. Band…
You know what questions to ask
— and you know when the answer "it's probably fine" is not acceptable
YOU MAY NOT:
— Sell or commercially distribute our photographs in any form - Remove our watermark from any photogra…
YOU MAY:
— Save our photographs for personal use (phone wallpaper, desktop background, personal folder) - Share…
You must be comfortable with:
— The imaginary unit i, where i² = -1 - Complex arithmetic: addition, multiplication, division - The c…
You recalibrate your fear-to-reality ratio
— when the feared outcome doesn't materialize (or materializes in smaller form than feared), your brai…
You should be able to:
— Define and distinguish the six foundation patterns (feedback loops, emergence, power laws, phase tra…
You should be comfortable with:
— How operating systems work at a high level (processes, file systems, permissions, services) - The di…
You should know:
— What a vector is and how to add and scalar-multiply vectors - Dot products (inner products) and what…
You want to protect input data
— the called program cannot accidentally modify data the caller depends on. 2. **You're passing litera…
You write the tests
— defining expected behavior precisely 2. **AI writes the implementation** -- generating code to pass …
Young Appalachians
— particularly those with college education — showed different political patterns than their parents a…
Youngstown
— cities that were close enough to the coalfields that the cultural transition was somewhat less jarri…
Your assessment:
— What is the most likely truth based on available evidence? - How should teams use clutch data in dec…
Your brain's probability bugs:
— Gambler's fallacy (thinking past outcomes affect future independent events) - Base rate neglect (ign…
Your business question must:
— Be specific enough to guide analysis but broad enough to require multiple techniques - Have clear im…
Your current challenge
— the biopsychosocial factor (biological, psychological, or social) that most significantly limits you…
Your current distress tolerance pattern:
— When you feel anxious or depressed, what do you typically do in the first 5 minutes? - What is the s…
Your Emotional State
— [ ] You can articulate what you want from this conversation (resolution, information, change — not p…
your first sound is part of the scroll-stop moment
— it's evaluated simultaneously with the first frame through multisensory integration (Chapter 2).
Your implementation plan
— what specifically, when, where, and with what support structure?
Your intervention logic
— given the priority cascade and the evidence, what one change would have the greatest downstream impa…
Your investigation question must:
— Involve a clear comparison between groups defined by a protected or socially relevant characteristic…
Your league settings:
— 12 teams - 1 QB, 2 RB, 2 WR, 1 TE, 1 FLEX - Half-PPR scoring
Your noise filter:
— List five types of AI coverage you will consciously skip
Your own field's core consensus
— the claim that most practitioners accept without question 2. **A current controversy** — a claim tha…
Your own pattern atlas
— a visual map of how the patterns relate to each other, customized by your own experience and emphasi…
Your Players:
— QB (18.0 base) vs Team A - RB (14.0 base) vs Team B - WR (15.0 base) vs Team A - TE (10.0 base) vs T…
Your program must demonstrate:
— IPT pattern in main paragraph - Hierarchical numbered paragraphs with verb-noun naming - 88-level co…
Your research question must:
— Be specific and answerable with the data you have - Involve at least one numerical variable and at l…
Your service policies:
— ### Deliverable 4: Workload Groups
Your system context (from prior checkpoints):
— Parallel Sysplex with 4 LPARs, DB2 data sharing - CICS OLTP: account inquiry, fund transfer, ATM/POS…
Your tasks:
— Name the specific failure - Identify the root cause(s) - Write a complete repair prompt using the ap…
Your Team Situation:
— Current QB: Aging veteran, 0.02 EPA/play (league average) - Offensive Line: Top 10 in pass protectio…
Your triggers
— what activates a disproportionate threat response in you, and why 2. **Your patterns** — how you hab…
Your workload groups:
— ### Deliverable 5: Design Justification
YouTube analysis:
— 15,000 views seems low but needs context - 55% of 10 minutes = 5.5 minutes average view duration — t…
YouTube Black Voices Fund
— Provides funding and mentorship to Black creators and artists. Check YouTube's creator pages for cur…
YouTube Channels:
— Tifo Football — Tactical explanations - The Coaches' Voice — Professional insights - HITC Sevens — T…
YouTube Creator Academy
— Courses on building audience relationships - **TikTok Creator Portal** — Audience engagement guidanc…
YouTube Partner Program
— Requires 1,000 subscribers and 4,000 watch hours. Apply through YouTube Studio. Revenue from AdSense…
YouTube Partner Program (YPP)
— YouTube's monetization program that allows eligible creators to earn revenue from ads served on thei…
YouTube Shorts
— YouTube's short-form vertical video feature, launched in 2021. Operates with a separate algorithm an…
YouTube stats (before deliberate expansion):
— Subscribers: 2,300 (from occasional cross-posting) - Average views: 800-1,500 - Average view duratio…
YouTube version (direct expansion):
— Title: "Why You Can't Stop Buying Things You Don't Need" - Thumbnail: Nadia holding shopping bags wi…
YouTube version:
— 10-15 minutes - Deep exploration of the concept + related concepts + real-world applications - Thumb…
YouTube's borderline content policy
— reducing algorithmic recommendation for content approaching but not clearly violating guidelines — i…
YouTube:
— Subscribers: 8,400 - Average views per video: 3,200 - Average watch-to-end: 58% - Engagement rate: 7…
YouTuber Mental Health Alliance
— A community and resource hub specifically addressing the psychological challenges of YouTube creator…
Z
Z-score method
— Calculate the mean and standard deviation of each feature. Points more than 2 or 3 standard deviatio…
Z-Score Method:
— z = (x - mean) / standard deviation - |z| > 2: unusual - |z| > 3: very unusual - Less robust — based…
z-score transformation
— the exact same z-score formula from Chapter 6! Now we see its deeper purpose: it converts any normal…
z-scores
— each observation's distance from the mean, measured in standard deviations. So the correlation coeff…
z/Architecture
— The 64-bit instruction set architecture used by IBM Z series mainframes. Provides hardware support f…
z/OS
— Check the PLAN_TABLE after EXPLAIN: ```sql EXPLAIN PLAN SET QUERYNO = 100 FOR SELECT * FROM MERIDIAN…
z/OS Connect
— An IBM product that enables z/OS-based assets (COBOL programs, CICS transactions, IMS transactions, …
z/OS Connect EE
— receives REST requests, transforms JSON to the format expected by the backend service, invokes the s…
z/OS Connect EE API Toolkit
— Eclipse-based tooling for creating REST APIs from COBOL copybooks. Includes a graphical data mapping…
z/OS Connect EE Documentation
— IBM Knowledge Center: Complete reference for z/OS Connect Enterprise Edition including API Toolkit u…
z/OS Connect EE V3.0 Documentation
— IBM Knowledge Center. The definitive reference for exposing COBOL programs as REST APIs. Pay particu…
z/OS Connect Enterprise Edition Documentation
— Covers installation, configuration, API creation, and management of z/OS Connect EE. The "Creating A…
z/OS Debugger
— The current name for IBM's interactive debugging tool for z/OS (formerly Debug Tool). Supports COBOL…
z/OS DFSMS Access Method Services for Catalogs
— IDCAMS documentation for DEFINE GDG, including LIMIT, EMPTY/NOEMPTY, and SCRATCH/NOSCRATCH parameter…
z/OS DFSMS Macro Instructions for Data Sets
— Low-level detail on VSAM macros and return codes, useful for understanding extended status codes.
z/OS DFSMS Using Data Sets
— Buffer management, block size optimization, and I/O tuning for sequential and VSAM files in multi-fi…
z/OS DFSMS Using the New Functions
— Coverage of VSAM performance enhancements including System-Managed Buffering (SMB) and data striping…
z/OS DFSORT Application Programming Guide
— https://www.ibm.com/docs/en/zos/latest?topic=dfsort — Understanding SORT integration with batch COBO…
z/OS Implementation:
— z/OS Communications Server IP packet filtering (IPSec policies) - VLAN segmentation isolating the Ca…
z/OS Infrastructure (Part I):
— [ ] LPAR configuration specification - [ ] WLM policy definition with service classes and goals - [ …
z/OS Language Environment Programming Reference
— Coverage of pointer interoperability between COBOL, C/C++, and Assembler. Essential reading for inte…
z/OS Language Environment Runtime Messages
— Reference for runtime errors related to parameter passing, including CEE3207S (parameter list mismat…
z/OS MVS JCL Reference (SA23-1385)
— The definitive reference for JCL syntax, including EXEC PGM parameters, DD statement options, and CO…
z/OS MVS JCL User's Guide
— https://www.ibm.com/docs/en/zos/latest?topic=mvs-jcl-users-guide — Tutorial-style JCL documentation …
z/OS MVS Planning: Workload Management (SA38-0689)
— The z/OS WLM reference, relevant to Section 17.7's discussion of WLM and CICS interaction. Chapters …
z/OS MVS Setting Up a Sysplex (SA38-0680)
— Covers ARM policy definition, restart element registration, cross-system restart, and restart group …
z/OS PKI Services: A Practical Guide
— IBM Redbook SG24-7603 Covers certificate management on z/OS, including RACF keyrings, digital certif…
z/OS row overhead:
— Row header: 6 bytes (standard) or 8 bytes (with ROWID). - NULL indicator byte: 1 byte per 8 nullable…
z/OS security architecture
— The layered approach of SAF, ESMs (RACF, ACF2, Top Secret), and how they interact with COBOL program…
z/OS System Logger Best Practices
— IBM's guidance on configuring z/OS Logger for CICS system logs, including coupling facility structur…
z/OS:
— LOB data is stored in a dedicated LOB tablespace, separate from the base table. - Each LOB value is …
Zara's redesign:
— Setup: "I have a job interview in 2 hours and NOTHING to wear" [3 seconds] — now there's a *problem*…
Zebra Technologies (NFL)
— Official NFL tracking provider - RFID-based player tracking - Next Gen Stats data source
Zeek logs provide:
— Connection metadata (duration, bytes, protocol) - HTTP details (URIs, user agents, referrers) - DNS …
Zeeman effect
— Ch 18.4 The splitting of atomic energy levels in an external magnetic field. The normal Zeeman effec…
Zeigarnik effect
— The cognitive tendency for incomplete or unresolved tasks/situations to remain more accessible in me…
ZERO
— A figurative constant representing the value zero. ZEROS and ZEROES are synonyms. When moved to a nu…
ZERO / ZEROS / ZEROES
— Represents numeric zero for numeric fields, character "0" for alphanumeric fields. Used to initializ…
Zero API endpoints
— the entire system was accessible only via CICS 3270 terminals and batch file interfaces
zero breaks symmetry
— all neurons compute identical gradients and never differentiate. - Biases are almost always initiali…
Zero data corruption
— no orders were lost or incorrectly charged - **Customer support** handled 11 tickets related to the …
Zero downtime is required
— no planned or unplanned outages - **Read/write scalability is needed** — multiple active members ser…
Zero RB Philosophy:
— Targets elite WRs/TEs early - Banks on RB variance and waiver pickups - Works when: WR scarcity high…
Zero-Click Content
— Content designed to deliver its full value within a platform's native feed — a Twitter thread that i…
Zero-day vulnerability
— A software flaw unknown to the software developer that can be exploited by attackers before a patch …
Zero-downtime patterns
— blue-green deployment, rolling data sharing migration, HADR-based migration — make it possible to ev…
zero-energy resonance
— the potential is on the verge of binding a new state. The scattering cross section $\sigma = 4\pi a_…
Zero-knowledge proof
— A cryptographic method by which one party can prove to another that they know a value without convey…
Zero-point energy
— In quantum mechanics, the lowest possible energy of a quantum system, which is not zero but equals ℏ…
Zero-shot classification
— The application of a pre-trained language model to classify text into categories without explicit tr…
Zero-Shot Prompting
— Asking the AI to perform a task without providing examples, relying on the model's training to under…
Zero-Sum
— A situation in which one creator's gain necessarily comes at another's expense. The creator economy …
Zero-sum thinking
— The cognitive error of assuming that another person's gain necessarily comes at one's own expense. Z…
Zero-sum thinking (relational)
— The assumption that another person's gain in the relationship market comes at one's own expense; fue…
zIIP Eligibility
— Work that runs on IBM Specialty Engines (zIIPs) does not count toward MLC pricing. Architects who ca…
Zimmerman's self-regulated learning (SRL) model
— the most widely used framework in the academic study of how learners manage their own learning.
Zine libraries
— also known as "zine distros" — maintained collections of zines and made them available by mail or in…
Zipf's law
— The empirical observation that in many datasets (word frequencies, city sizes, website visits), the …
Zonal Marking
— A defensive system where players are responsible for areas of the pitch rather than specific opponen…
Zone 1
— Reformatting is a structural transformation task with no factual claims at risk. Errors are immediat…
Zone 1 tasks include:
— **Formatting and restructuring.** Asking AI to convert bullet points to prose, reorganize a document…
Zone 1: Living/Dining/Kitchen
— Used from about 7 AM to 10 PM on weekdays, all day on weekends. This is the "always occupied when ho…
Zone 2 tasks include:
— **Factual claims in your professional domain.** If you are a marketing professional asking about mar…
Zone 2: Children's Bedrooms
— Used primarily for homework (4–8 PM) and sleeping (8 PM–7 AM). During the school day (8 AM–4 PM on w…
Zone 3
— Specific statistics and recent research citations. High risk of hallucinated or outdated statistics.…
Zone 3 tasks include:
— **Recent events and current information.** AI tools have training data cutoff dates. Events after th…
Zone 3: Primary Bedroom Suite
— Occupied primarily for sleeping (10 PM–7 AM). During the day, the door is kept closed and the room d…
Zone 4
— Medical guidance for a specific clinical situation. Errors can cause serious harm and AI tools are u…
Zone 4 tasks include:
— **Medical guidance for specific clinical situations.** AI can explain how diseases work, describe ty…
Zone 4: Basement Office
— Marcus works from home Tuesdays, Thursdays, and Fridays, 8 AM–6 PM. Mondays and Wednesdays he's at h…
Zone 5 tasks include:
— **Legal documents you will sign.** Contracts, wills, non-disclosure agreements, filings — these need…
Zone Blocking Metrics
— Movement and displacement measurement - Zone vs. gap scheme efficiency - Resource: Football Outsider…
Zone Definitions:
— Prime: 18-22m, central - Good: 22-28m, central - Moderate: 18-25m, wide - Marginal: 28-35m, any angl…
Zoned Decimal
— The *DISPLAY* (default) numeric representation in COBOL, where each digit occupies one byte. The sig…
Zoning cost ranges:
— Single-zone damper added to existing system: $400–$900 (simple) - Two-zone system with control board…
Zowe CLI
— Open-source CLI for z/OS interactions. The CICS plugin allows you to manage web service resources fr…
Zowe Documentation: API Mediation Layer
— Official documentation for Zowe API ML, including the API Gateway, Discovery Service, and API Catalo…
Z₁₂
— the cyclic group of order 12. This group contains all transpositions of the twelve-tone chromatic sc…