1,705 Matching Annotations
  1. Last 7 days
    1. max_objects = max(order_objects(slub_max_order, size), 1U); min_objects = min(min_objects, max_objects); min_order = max_t(unsigned int, slub_min_order, get_order(min_objects * size)); if (order_objects(min_order, size) > MAX_OBJS_PER_PAGE) return get_order(size * MAX_OBJS_PER_PAGE) - 1;

      Policy calculation

    2. s->flags & __OBJECT_POISON

      apply policy

    3. s->flags & SLAB_RED_ZONE)

      debug plicy

    4. if (s->flags & __CMPXCHG_DOUBLE) {

      Config fastpath?

    5. if (s->flags & __CMPXCHG_DOUBLE) {

      Fast path config

    6. set the number of slabs per cpu

    1. If a student either “never attended” or “stopped attending,” faculty should assign an “F” grade in Goldmine. For students that “stopped attending,” faculty should also provide the date of the last known active participation by the student in an instructional activity such as a response to discussion boards, study group, assignments, class lecture, lab, tests, etc. This does not include a student simply logging into the class as this is not considered “active participation.”

      unearned F -

    2. Faculty who suspect a student of plagiarism or some form of academic dishonesty must report the suspicion to the Dean of Students via The Office of Student Conduct and Conduct Resolution (OSCCR). OSCCR will investigate the allegation and determine the course of action. It is against Regents’ Rules and Regulations for faculty to make a determination independent of OSCCR. According to UTEP’s Handbook of Operating Procedures Section 4.14, “such action is a disciplinary penalty that violates the student’s right to due process and leaves the faculty member vulnerable to a student grievance petition, a civil lawsuit, and possible disciplinary action by the University.” More information is available in the HOOP.

      Faculty deciding themselves on academic dishonesty 1. violates student's right to due process 1. leaves faculty vulnerable to a student grievance petition, civil lawsuit....

    1. Proper Citation

      Citation styles - for web published citations

    2. Technology, Education and Copyright Harmonization (TEACH) Act. Signed into law by President Bush on November 2, the TEACH Act loosens the restraints created by the DMCA insofar as education is concerned

      TEACH Act - loosens DMCA in favor of fair use

    3. More importantly, the idea of Fair Use was effectively removed from Web-based education because of the DMCA

      Fair Use revoked b/c of DMCA

    4. Digital Millennium Copyright Act (DMCA) was passed in Oct. 1998 "to implement United States treaty obligations and to move the nation's copyright law into the digital age.

      Digital Millennium Copyright Act

    1. Resources for using video in online education

      Video resources for educaton

    2. Place the video in the context of the course, explaining why it was chosen and what it was intended to illustrate. Recontextualize the video when appropriate through the addition of background readings, study questions, commentary, criticism, annotation, and student reactions.

      Context for use with video is key

    1. Resources for using images in online education

      Image sources

    2. If copying an image, use the lowest image resolution possible to achieve your purpose.

      Interesting to consider resolution of images

    1. Note: Professor Meghani is making too much work for herself by scanning the text. Instead, she could direct her students to Project Gutenberg, which contains public domain titles available for download in multiple formats. In this case, the Marxists Internet Archive would also be a good sourc

      Project Gutenberg - has public domain titles for download.

    1. It is not necessary to prevailon each of the four factors for asuccessful fair use claim.

      You don't have to prove fair use in all 4 factors

    2. Fair use is a flexible standard andall four statutory factors areconsidered together.

      Fair use flexibility

    3. The US Constitution clearlystates that the purpose of theintellectual property system is to“promote the progress of science andthe useful arts

      Purpose of Intellectual property system

    4. ir use is a right explicitly recognizedby the Copyright Act.1 The SupremeCourt has recognized this right as a“First Amendment safeguard” becausecopyright law might otherwiseconstrict freedom of speech

      Fair Use is a right - I really don't understand this but Ok

    1. The Copyright Clearance Center can grant permission to digitize, display and transmit print works

      getting permission to digitize, display and transmit print works

    1. Using the Four Factors

      Four Factors Test for Fair Use

      Read about each factor (character of the use, nature of the work, amount used, effect upon the market)

      Answer each factor's question about your use See how the balance tips with each answer

      Make a judgment about the final balance: overall, does the balance tip in favor of fair use or in favor of getting permission?

    1. The TEACH Act checklist, summarizes the 22 (!) prerequisites. Nevertheless, we may be optimistic that, together with fair use, this statute will achieve Congress' goal of facilitating online education.

      TEACH Act checklist

    2. are a small subset of the uses of online resources educators may wish to make. It only covers in class performances and displays, not, for example, supplemental online reading, viewing, or listening materials. For those activities, as well as many others, we'll need to continue to rely on fair use. Remember, however, when relying on fair use, the fair use test is sensitive to harm to markets. This means that in general, where there is an established market for permissions, there will often be a narrower scope for fair use, and our reliance on fair use should be limited.
    3. The TEACH Act authorizes us to digitize works for use in online education, but only to the extent we are authorized to use those works in Section 110(2), and so long as they are not available digitally in a format free from technological protection.

      right to make digital copies

    4. The statute's complexity provides a new context within which to think about fair use: compared to the many conditions and limits contained in Section 110(2), the four factor fair use test seems simple and elegant.

      four factor fair use test

    5. The audiovisual works and dramatic musical works may only be shown as clips -- "reasonable and limited portions".

      reasonable and limited portions are allowed online

    6. The TEACH Act of 2002, expanded the scope of online educators' rights to perform and display works and to make copies integral to such performances and displays, making the rights closer to those we have in face-to-face teaching. But there is still a considerable gap between what the statute authorizes for face-to-face teaching and for online education.

      TEACH Act definition

    7. Copyright law provides educators with a separate set of rights in addition to fair use, to display (show) and perform (show or play) others' works in the classroom. These rights are in Section 110(1) of the Copyright Act and apply to any work, regardless of the medium.

      The TEACH Act

    1. Because your institution is likely to be liable, along with an accused individual, for the infringements of faculty, students and staff, most institutions advise such individuals not to use works for which required permission cannot be obtained.

      copyright infrindgement

    2. There truly may be no one who cares about what you do with a particular work, but the bottom line is that no amount of unsuccessful effort eliminates liability for copyright infringement. Copyright protects materials whether the owner cares about protection or not.

      unavailable authors

    3. If you are preparing a commercial product, you will need assurances of authority to grant permission because your publisher will expect those assurances from you.

      Creating commercial products

    4. question them about whether they retained copyright or whether they assigned it to their publisher.

      The author may not have the copyright

    5. If you know who the author and the publisher are, you can contact them directly. If you do not know who the publisher is, The Literary Marketplace (for books) or Ulrich's Web (for journals - requires login) may help you.  Once you know whom to ask, writing a letter, calling or emailing are all appropriate ways to initiate contact.

      Getting permission from authors - where to look

    1. Where fair use may be questioned, implied rights may be broader, but an express right to use is best - it's clear and reassuring. It's possible today to search Creative Commons licensed works by license type, or limit your search to be sure that your results include only materials intended for use by educators and students.

      Best way to find usable things with Creative Commons

    2. You can easily give your works an express license by attaching a Creative Commons license to the materials you post online. It's easy and it sends the message that you want your materials to be part of the flow of creativity. No one creates in a vacuum. Just as you build on others' works, others will build on yours.

      Great explanation of what "Creative Commons" is

    3. So, just by posting online, an author implies a limited license to use their work in this manner.

      This seems to be opposite of what the paragraph above states.

    4. Simply putting the fingers to the save key creates a copyrighted work. Once expression is committed to a tangible medium, copyright protection is automatic. So, postings of all kinds are protected the same as published printed works.

      Interesting. This is very helpful.

  2. Jun 2024
    1. A gyrotron uses high-power, linear-beam vacuum tubes to generate millimeter-length electromagnetic waves. Invented by Soviet scientists in the 1960s, gyrotrons are used in nuclear fusion research experiments to heat and control plasma. Quaise has raised $95 million from investors, including Japan’s Mitsubishi, to develop technology that would enable it to quickly and efficiently drill up to 20 km deep, closer to the Earth’s core than ever before

      Fusion power tech adapted to ease geothermal power. IMO a good example of remixing knowledge from one domain to another. And, for example, if you think fusion isn't worth pursuing, then we might not get this cross-cutting adaptation that's valuable for advancing renewable energy.

    1. o the creator or originator of that record in order to verify authenticity without the student’s permis

      You can verify authenticity of records wo permission

    2. Example Scenarios

      Great example cases

    1. provide a letter of recommendation for a student that includes grades unless you have received written consent from the student to release this information for this explicit purpose.

      Can't put grades in a Letter of Recommendation without written consent

    2. provide anyone outside the college with lists of students enrolled in classes;

      Class rosters are protected

    1. If you teach several sections of the same course but the students do not interact with each other in a physical classroom or online, the courses cannot be merged in Carmen.

      if they are not combined in Colleague - they can't be in Canvas - good to know. It's not just an integration issue - its FERPA

    1. The teacher who saw the incident in-person can speak about it because FERPA is not a confidentiality law. It only protects what’s in a student’s education record.

      Interesting - only what is in records is protected.

    2. If a school denies access to student records to a parent of a student under the age of 18, that’s a FERPA violation

      this is good to know parents of kids under 18 must have access to records

    3. One is that, generally, higher education institutions can choose to release a students’ education records to both parents, provided that at least one parent claims the student as a dependent for tax purposes.

      INteresting - Baylor won't do this.

    4. “It should be clear that [the data] belongs to the school, not to the vendor, and that the vendor’s responsibility is to process it for the benefit of the school and its students, and not for the vendor’s own benefit,” McDonald says.

      FERPA and 3rd party Vendors

    1. “Law enforcement unit records” (i.e., records created by the law enforcement unit, created for a law enforcement purpose, and maintained by the law enforcement unit) are not “education records” subject to the privacy protections of FERPA. As such, the law enforcement unit may refuse to provide a parent or eligible student with an opportunity to inspect and review law enforcement unit records, and it may disclose law enforcement unit records to third parties without the parent or eligible student’s prior written consent

      Law enforcement records is not FERPA protectd

    1. Schools may disclose, without consent, "directory" information such as a student's name, address, telephone number, date and place of birth, honors and awards, and dates of attendance. However, schools must tell parents and eligible students about directory information and allow parents and eligible students a reasonable amount of time to request that the school not disclose directory information about them.

      Definition of Directory Information : name address phone date & place of birth honors and awards dates of attendance.

      Students can "opt out" of directory information.

    2. schools must have written permission from the parent or eligible student in order to release any information from a student's education record. However, FERPA allows schools to disclose those records, without consent, to the following parties or under the following conditions (34 CFR § 99.31): School officials with legitimate educational interest; Other schools to which a student is transferring; Specified officials for audit or evaluation purposes; Appropriate parties in connection with financial aid to a student; Organizations conducting certain studies for or on behalf of the school; Accrediting organizations; To comply with a judicial order or lawfully issued subpoena; Appropriate officials in cases of health and safety emergencies; and State and local authorities, within a juvenile justice system, pursuant to specific State law.

      Who you can release information to without student consent.

    3. The Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. § 1232g; 34 CFR Part 99) is a Federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education.

      FERPA definitions

    4. These rights transfer to the student when he or she reaches the age of 18 or attends a school beyond the high school level.

      Parent's rights end with 18 and / or college and transfers to students

    1. For students and educators alike, it's important to think about academic integrity as a learned concept.

      Academic integrity is a learned concept

    2. Whether in history, social studies, science, or literature, most East Asian students are discouraged from producing original work in an academic setting and instead advised to remember and repeat the ideas of the masters in those subject areas as a form of respect.

      Interesting that individual work is not the goal....

    3. nursing students, for example, are focused on the concept of caring for others and illustrate collectivist culture, in both academic study and clinical practice. It is often natural for nursing students to project caring for patients to helping at-risk cohorts in the form of academic collusion.

      Interesting take on nursing students

    4. Students that grow up with this perspective may not understand why citations at the end of a research paper are important; furthermore, citations might even make them feel uncomfortable, as they recognize individual authors above the community as a whole.

      This is a different view of authorship - elevating 1 above the many

    5. A collectivist culture is one that prioritizes the goals and desires of the whole over the needs of the individual. Often in East Asian countries like South Korea, Japan, and China, ideas that are beneficial to and shared by the community are not individually attributed, but rather recognized as universal knowledge.

      Interesting take on east asian culture. it really makes sense if the collective owns the information - you don't have to cite authorship.

    1. But that practice fails to recognize that students are responsible for their own computer access and stable internet connection.  Although the District-sponsored Learning Manage System will, from time to time, have problems, students need to accept responsibility for their own actions, actions that might be conveniently blamed on an impersonal component of technology.

      This really holds students responsible for being proactive and not waiting until the last minute with work.

    2. It is a violation of the academic honesty and intellectual integrity policies of SBVC to log in to someone else's account and pretend to be that person.

      I like that it holds both students in bad standing. The one doing the work and the one not doing the work

    1. heating includes giving information, materials, or work to another person in or

      I really explaining that giving information to another student makes the "giver" dishonest as well as the reciever

    1. it learned of the possibility that one student admitted to Georgetown may have engaged in inappropriate transfer of online credits.

      pay for credit scandal - where identity was not confirmed.

    1. State Issued Driver’s License, State Identification Card, Military Identification Card, Passport/Visa, Permanent Residence Card

      Valid Ids shown and compared to student school ids - you ight could fake this but it would take effort

    2. Method: Instructors use check-ins and/or office hours to discuss content, previous assignments, and progress on existing assignments.   Process: Instructors ask for identification and/or confirm student identity via official UConn photo in StudentAdmin.

      This is an interesting way to verify student identity. Required check-ins. but it also makes the professor feel more "real"

    1. Instructors should check student identity by verifying IDs in a one-on-one online meeting prior to the presentation.

      I didn't realize that instructors had to verify student identity via ID.

    2. Federal Regulation §602.17: Application of Standards in Reaching Accreditation Decisions requires that all public universities have processes in place through which the institution establishes that a student who registers in any course offered via distance education or correspondence is the same student who academically engages in the course or program; and makes clear in writing that institutions must use processes that protect student privacy and notify students of any projected additional student charges associated with the verification of student identity at the time of registration or enrollment. Please see the Electronic Code Federal Regulations for more information.

      regulation about identify verification of students in Online courses

    1. The ethical standards outlined above apply throughout the academic community.  These guidelines apply to faculty and research assistants in their possible use of students’ and colleagues’ research and ideas, as well as to students’ use either of source materials and authorities or of other students’ ideas and work.

      Great statement to teach students how to refer to each other's work.

    2. others result from sloppy scholarship or failure to follow proper format for crediting sources.  For example:

      I like the "sloppy" description of non-intentional plagerism

    3. Plagiarism is taking credit for someone else’s ideas, work, or words.

      plain definition of plagerism

    4. All academic relationships ought to be governed by a sense of honor, fair play, trust, and a readiness to give appropriate credit to the intellectual endeavors of others where such credit is due. Since the academic community expects that the process of intellectual and creative endeavor is beneficial to a student, the student's original work, created in response to each assignment, is normally expected. The following rules and guidelines are intended not to replace an atmosphere of trust and cooperation in the pursuit of knowledge, but rather to assure due process and to provide guidelines for action in those instances where the proper relationships and attitudes have broken down.

      I like that the guidelines are not intended to replace atmosphere of trust .....

    1. If plagiarism is suspected, students might be asked to defend or verify their work as their own in one of the following ways: Present notes, drafts, or works cited Produce an on-demand work sample Present an oral defense of work in question

      Ways to verify work by students - I really like this.

    2. malpractice outlined by the IB Organization as behavior that results in, or may result in, the candidate or any other candidate gaining an unfair advantage in one or more assessment components. The following definitions are helpful in understanding our complete definition of malpractice: Plagiarism is taking credit for someone else’s words, work or ideas without giving them credit. Collusion is letting someone copy from you or letting someone turn in your work as theirs. Duplication of work is turning in the same assignment for two or more classes. Misconduct during an assessment is copying someone’s answers, letting someone copy your work, looking up answers, bringing answers into the test room, or using tools/material that the teacher has not approved. Confidentiality is not sharing assessment content, question, or answers with students who have not yet taken the assessment.

      Definition of dishonesty

    1. The author made an observation that it is possible to draw a link between plagiarism and the concept of "loyalty" (based on Sykes and Matza 1957) that can be exploited to explain students’ attitudes and improper academic practices. The author believes that the interviewed students commit plagiarism not because of their unethical or immoral intentions, but rather due to specific hierarchy of values that they follow.

      Hierarchy of values rather an unethical or immoral intentions is interesting

    1. t is the student’s responsibility to provide for supervision of his/her children while they are on campus for class, in a virtual class,

      Addressing children in virtual classroom is great!

    2. Disruptive behavior in the physical classroom or the virtual classroom is not permitted. Students will receive a warning and may be asked to leave the classroom if necessary.

      general statement about virtual classroom - disruptive behavior - but that's not defined

    1. Cheating, plagiarism Conduct that jeopardizes health and safety Tardiness Profanity Pornography Children or pets in class Private conversations or inappropriate displays of affection Uncooperativeness Continually leaving one’s seat Eating and drinking Reading unrelated materials Use of all unauthorized electronic devices, such as walkmans, phones, beepers, pagers, ipods, and music players. Soliciting of funds and/or signatures

      some of these seem mild - but it could be great if they were enforced. Students need to learn how to behave professionally.

    2. Disruptive behavior includes behavior that interferes with the legitimate instructional, administrative, or service functions of the college.  However, should any behavior threaten the personal safety of any student, faculty member, staff, or administrator, or be displayed with such emotional intensity that it causes fear or concern in others, at that point such behavior is classified as a CRISIS and will necessitate a call to Campus Safety (925) 424-1699.

      distinguishes between disruption and crisis

    1. If online class, faculty can moderate and/or temporarily disable LMS functions to prevent the student from further activity until a resolution is determined.

      disable LMS access....not sure how we could do that.

    2. Talking when the instructor or others are speaking

      while I agree, I don't see this enforced much

    1. The following behaviours do not constitute bullying.(a) A single incident of unreasonable behaviour. However, single or one-offincidents of unreasonable conduct can also cause a risk to health and safetyand may breach other University policies and should not be ignored.(b) Reasonable management practices.(c) Low-level conflict as defined in subclause 8(3).(2) Reasonable management practices include (but are not limited to):(a) a direction to carry out reasonable duties and instructions;(b) a direction to comply with University rules, protocols, policies andprocedures;(c) setting reasonable goals, standards and deadlines;

      Now this makes sense and defining "not bullying" is a great idea to protect people against false accusations.

    1. The public’s attitudes diverge in similarways on some of the more severe behaviors in the scenario. Most prominently, 85% of Americansthink that Julie experiences online harassment when she begins to receive vulgar messages abouther looks and sexual behavior. But substantially fewer (although still a majority at 66%) think thatthe social media platform has an obligation to step in and address that behavior.

      So this explains it more people see it as harassment, but not all think the platform should step in, but they should if the student asks them to.

      So should we have a policy stating students cannot copy discussion board entries outside of the LMS without student permissions

    2. The public has a higher threshold for behaviors thatconstitute “online harassment” than for behaviors that necessitate a responsefrom social media platforms

      Not sure I completely understand this, I think if a post is shared publicly without the original people in the incident being asked, there should be grounds for a Civil suit and much of this would stop.

    3. Again,majorities agree that the platforms should step in to address behaviors such as threateningmessages.

      platforms are responsible to police

    4. ave found that online harassment is a common phenomenon in thedigital lives of many Americans, and that a majority of Americans feel harassment online is amajor problem.

      prevalence of online harassment

    1. Project Teams serve several purposes:

      Could easily be translated to online environment

    2. the program provides a combination of traditional instruction and the enhancement of nontraditional instruction and learning that takes place within a Project Team.

      These policies could many times apply to online teams - most of this is outdated info since there are no inperson AGOS courses anymore

    3. The classrooms, student center, and project team locations are places to learn, to socialize and to grow. Each person must be recognized to have certain rights which do not conflict with the Community Expectations nor infringe upon the rights of others in the spirit of the University motto “to served, and not be served.”  These rights include the following: The right to study without distraction. The right to personal privacy. The right to study in a clean environment. The right to be treated with respect and dignity. The right to hold different values. The right to redress grievances. The right to serve the community.

      Online environments are not listed here but should be.

      Right to be treated with respect and dignity

    4. Academic Misconduct/Honor Code violations are related to a student’s class work, the appropriate response is vested in the professor.

      Professor has to judge on academic misconduct / honor code violation

    5. All communication between students and other students, or between students and faculty, must be conducted in a manner that is respectful, using language that is professional.

      BU's 2 lines on student to student communication

    1. Degrees of Disciplinary Sanctions:

      8 levels before permeant dismissal

    2. The use of mobile devices (cellphones, beepers, tablets and other smart devices) in the classroom is determined by the faculty member’s mobile device use guidelines for that class. Adhere to the expectations communicated by the faculty member for that course.

      phone use can be against policy if faculty state it is

    3. . Computer and Network Abuse

      Interesting the tech conduct is in the general conduct policy now.

    4. any act that constitutes violent behavior and any other behavior that adversely affects the College or its educational programs or mission.  Attempts to commit acts prohibited by the Code may also be addressed through the conduct process. All members of the College community, students, faculty and staff, have the responsibility to report nonacademic misconduct.

      Everyone is a reporter

    5. If a disruptive student refuses to leave when told, the faculty member will contact SCF Public Safety to remove the student.

      explicit statement about having students removed by security

    1. Violation of Student Code of Conduct ReportStudent's Name: _______________________________________________________________Student Identification Number: __________________________Instructor’s Name: ________________________________ Office Phone #: ________________Instructor’s E-mail Address: ______________________________________________________Course Title: _________________________________________________________________Course Number: _________________________ Section Number: ________Description of Incident (use additional pages if necessary)__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________Describe the instructions that were given to the student:______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________Was the student asked to leave the class? Yes _____ No_____N/A_________Did the student leave voluntarily? Yes _____ No _____Were the police contacted? Yes ____ No ____If yes, officer’s name: _____________________ Officer’s Department: ____________________Action taken by Police (list report number and whether arrest occurred):______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________Faculty Member’s Signature_____________________________________Date: ____________Submit copy of form electronically to: student, department chair, and to Student Judicial Programs (who will sharewith Student Development Office) at tp-sheridan@wiu.edu or via fax to 309-298-1203

      form sample

  3. May 2024
    1. the United States was suppressing Democratic movements around the world because if an authoritarian if a communist can win an 00:13:59 election fairly one time that's the end of free and fair elections

      for - key insight - why US geopolitics installed dictatorships - progress trap- US foreign policy that shaped modernity

      key insight - why US geopolitics installed dictatorships - This was the US's rationale to justify the geopolitical mess it created this century: - If you allow democracy in the age of Communism - people might vote for communism, then - kill all the rich people, then - take their stuff, then - redistribute it - You can get a majority support for that in an impoverished country and that was perceived as a threat - So the United States was suppressing Democratic movements around the world - because if an authoritarian if a communist can win an election fairly one time, - that's the end of free and fair elections - So for decades, the US foreign policy agenda was to install dictators to suppress the threat that democracy could produce communism. - But after "communism was defeated" - all these installed dictators around the world that are the direct result of the pathological US foreign policy posed a new, unexpected quagmire - The decades of US foreign policy had created an enormous progress trap that we are all living through now - The US now had to normalize relations with the new world of dictators it had helped created out of its own fears<br /> - A new US foreign policy rule emerged to deal with this fiasco - Stay in your own country - If you want to kill, imprison, brutalize or subjegate your own people, it is fine with the US government as long as it is done within your own state borders - As long as a nation state abuses their own people, the US will continue to: - buy your oil - trade with you - show up at the UN - even have an occasional State event for you - However, Russia broke that rule

    1. mapsize = PAGE_ALIGN(mem_section_usage_size()) >> PAGE_SHIFT;

      Policy application: choosing map size for page usage?

    1. Der Guardian nennt die Stimmung der meisten von der Zeitung zu ihren Zukunfterwartungen befragten IPCC-Klimawissenschaftlerinnen düster; viele sind deprimiert. Viele der Forschenden, die die Zeitung als die am besten über die Zukunft Informierten bezeichnet, erwarten Hungersnöte, Massenmigration und Konflikte. https://www.theguardian.com/environment/ng-interactive/2024/may/08/hopeless-and-broken-why-the-worlds-top-climate-scientists-are-in-despair

  4. Apr 2024
    1. Die Wirtschaftsminister Deutschlands, Frankreich und Italiens, die sich an Montag in Brüssel getroffen haben, sind sich in der Forderung nach einer gemeinsamen europäischen Industriepolitik einig. Die Energiewende spielt darin eine entscheidende Rolle. Bei vielen damit verbundenen Fragen, z.B. nach der Subventionierung der Solarindustrie, besteht aber Uneinigkeit. In ihrem Bericht bezieht sich die Repubblica vor allem auf eine Analyse des Thinktanks Bruegel.

      Bruegel-Analyse: https://www.bruegel.org/first-glance/smart-solar-strategy-europe

  5. Mar 2024
    1. Georgia also instituted a policy of keeping the land “tail-male,”which meant that land descended to the eldest male child. This feudal rulebound men to their families. The tail-male provision protected heirs whosepoor fathers might otherwise feel pressure to sell their land.53
    2. History of the United States (1834)

      1834 was also interesting with respect to this thesis as Britain was working at the "principles of 1834" which Beatrice Webb focused on and debunked in English Poor Law Policy (1910).

      see: https://hypothes.is/a/NLJSJAe7Ee2xvIeHyTL7vQ

      Would this 1832 work in Britain have bleed over to a similar set of poverty principles in the United States in the same era? Could this have compounded issues in America leading to greater class divisions in the decades before the Civil War?

  6. Feb 2024
    1. Fachleute rechnen damit, dass ein Sieg Trumps bei den Präsidentschaftswahlen zu einem Rollback bei den Projekten für saubere Energie führen würde, die die Biden-Administration eingeleitet hat. Der Inflation Reduction Act hat bereits zu Investitionen von etwa 200 Milliarden Dollar in solche Projekte geführt. Wie weit der Rollback gelingen würde, ist unklar, zumal besonders republikanisch dominierte Regionen von den Projekten der aktuellen Administration profitieren. https://www.nytimes.com/2024/02/19/us/politics/inflation-reduction-act-republican-attacks.html

    1. Die New York Times analysiert den Auftritt von Sultan al-Jaber, Ölminister der Emirate und Präsident der COP28, beim „Peterberger Klimadialog“.Er unterscheidet zwischen Fossilen Brennstoffen und fossilen Emissionen. Viele Beobachter:innen interpretieren seine Statements optimistisch – sie sind aber deutlich auf eine Legitimation der Fossilindustrie ausgerichtet. https://www.nytimes.com/2023/05/03/climate/un-climate-oil-uae-al-jaber.html

    1. for - 2nd Trump term - 2nd Trump presidency - 2024 U.S. election - existential threat for climate crisis - Title:Trump 2.0: The climate cannot survive another Trump term - Author: Michael Mann - Date: Nov 5, 2023

      Summary - Michael Mann repeats a similiar warning he made before the 2020 U.S. elections. Now the urgency is even greater. - Trump's "Project 2025" fossil-fuel -friendly plan would be a victory for the fossil fuel industry. It would - defund renewable energy research and rollout - decimate the EPA, - encourage drilling and - defund the Loss and Damage Fund, so vital for bringing the rest of the world onboard for rapid decarbonization. - Whoever wins the next U.S. election will be leading the U.S. in the most critical period of the human history because our remaining carbon budget stands at 5 years and 172 days at the current rate we are burning fossil fuels. Most of this time window overlaps with the next term of the U.S. presidency. - While Mann points out that the Inflation Reduction Act only takes us to 40% rather than Paris Climate Agreement 60% less emissions by 2030, it is still a big step in the right direction. - Trump would most definitely take a giant step in the wrong direction. - So Trump could singlehandedly set human civilization on a course of irreversible global devastation.

    2. The GOP has threatened to weaponize a potential second Trump term

      for - 2nd Trump term - regressive climate policy

  7. Jan 2024
    1. Nach der Invasion der ganzen Ukraine durch Russland wurde russisches Gas in Europa vor allem durch LNG-Importe aus den USA ersetzt. Damit tauscht man eine Abhängigkeit durch eine andere ein, statt die Erneuerbaren entschiedener auszubauen. Ausführlicher Bericht von Bloomberg über die damit verbundenen Risiken. Als erstes Zeichen für Schwierigkeiten wird die Verzögerung der Genehmigung von CP2 gewertet. https://www.energyconnects.com/news/gas-lng/2024/january/gas-addicted-europe-trades-one-energy-risk-for-another/

  8. Dec 2023
    1. you can see it all the time it's 00:41:37 unbelievably it's unbelievably painful we look at all the our institutions
      • for: polycrisis - entrenched institutional bias, examples - entrenched institutional bias - bank macro economic policy - lobbyist

      • paraphrase

        • James provides two examples of major institutional bias that has to be rapidly overcome if we are to stand a chance at facilitating rapid system change:
          • Bank of England controls macroeconomic policies that favour elites and not ordinary people and
            • these policies are beyond political contestation
          • In the normal political system, lobbyists through the revolving door between the top levels of the Civil Service and the corporate sector bias policies for elites and not ordinary citizens
    1. Warning: Do not accept plain user IDs, such as those you can get with the GoogleUser.getId() method, on your backend server. A modified client application can send arbitrary user IDs to your server to impersonate users, so you must instead use verifiable ID tokens to securely get the user IDs of signed-in users on the server side.
  9. Nov 2023
    1. The fact that most free software is privacy-respecting is due to cultural circumstances and the personal views of its developers
    1. Der Critical Raw Materials Actt wird von Industrie-Lobbies benutzt, um Einschränkungen beim Zugang zu Rohmaterialien abzubauen, und zwar auch dann, wenn es nicht um die Energieversorgung geht. IT-, Rüstungs- und Raumfahrtindustrie versuchen von der Krisensituation bei den neuen Energien zu profitieren. Die Libéation berichtet über einen neuen Report von Lobbying-Warchdogs. Die Liste der kritischen Rohmaterialien wurde bereits von 15 auf 34 Stoffe erweitert. https://www.liberation.fr/international/europe/ue-le-critical-raw-materials-act-un-open-bar-pour-lindustrie-miniere-20231112_HZUR6376QJCZVBM5IGIUR6V2QE/

  10. Oct 2023
    1. I assumed, unreflectively, that he had made up the whole thing, simply because for a long time that’s what I would have done.

      Is it possible that many on the far right don't believe science or facts about how people live because they've got a fabulist streak in themselves? They're so used to lying about basic facts about themselves that their first thought is that "everyone else is doing it".

      Now compound this with their utter lack of context as well as their privilege and you've got a terrific cocktail for bad decisions.

    1. Datafiles can be published with a suitable embargo period, forinstance to allow completion of publications or research basedon the dataset, or to respect contracts made by the depositorwith third parties concerning intellectual property rights.DANS encourages embargo periods of 6 months or less.

      Expectations

    2. If a published dataset is improved by amendments to thedata files of the dataset, a major version increment iscreated with a record of changes. In cases where it isnecessary to disable access to earlier versions, these can bedeaccessioned

      Expectations

  11. Sep 2023
  12. Aug 2023
    1. Do science, technology, industrialization, and specializa-tion render the Great Conversation irrelevant?
    2. The revolt against the classical dissectors and drillmasterswas justified. So was the new interest in experimental science.The revolt against liberal education was not justified. Neitherwas the belief that the method of experimental science couldreplace the methods of history, philosophy, and the arts.

      These various shifts in culture and perspective were concurrent with the shift in education from the formal to the progressive.

      See also Education: A Short Introduction

    3. Why did this education disappear? It was the education ofthe Founding Fathers. It held sway until fifty years ago. Nowit is almost gone. I attribute this phenomenon to two factors,internal decay and external confusion.

      Hutchins attributes the loss of classical education to both internal decay and external confusion, but I would suggest that some of the shift was also the need for industrialization and expanded access.

    1. Four billion people are now connected to the same infrastructure, the internet, that we the science and technology community put in place just decades ago. This is creating the conditions for an explosion of open creativity and innovation never seen before. A huge wave of labs of all kinds (living labs, fablabs, social labs, edulabs, innovation spaces, even policy labs) is emerging as the new kind of groups and communities of the digital era. We are moving from the net to the lab. On the 2030 horizon, many of these labs will gather and agree in generating the first universal innovation ecosystems in regions and countries.
      • for: quote, quote - Artur Serra, quote - labs, quote - innovation, quote - internet labs
      • quote
        • Four billion people are now connected to the same infrastructure, the internet, that we the science and technology community put in place just decades ago.
        • This is creating the conditions for an explosion of open creativity and innovation never seen before.
        • A huge wave of labs of all kinds,
          • living labs,
          • fablabs,
          • social labs,
          • edulabs,
          • innovation spaces and
          • policy labs
          • citizen labs
        • is emerging as the new kind of groups and communities of the digital era.
        • We are moving from the net to the lab.
        • On the 2030 horizon, many of these labs will gather and agree in generating the first universal innovation ecosystems in regions and countries.
        • https://www.ecsite.eu/activities-and-services/news-and-publications/digital-spokes/issue-45
      • author: Artur Serra
        • deputy director of I2CQT Foundation
        • research director, Citilab, Catalonia, Spain
    1. Recently we recommended that OCLC declare OCLC Control Numbers (OCN) as dedicated to the public domain. We wanted to make it clear to the community of users that they could share and use the number for any purpose and without any restrictions. Making that declaration would be consistent with our application of an open license for our own releases of data for re-use and would end the needless elimination of the number from bibliographic datasets that are at the foundation of the library and community interactions. I’m pleased to say that this recommendation got unanimous support and my colleague Richard Wallis spoke about this declaration during his linked data session during the recent IFLA conference. The declaration now appears on the WCRR web page and from the page describing OCNs and their use.

      OCLC Control Numbers are in the public domain

      An updated link for the "page describing OCNs and their use" says:

      The OCLC Control Number is a unique, sequentially assigned number associated with a record in WorldCat. The number is included in a WorldCat record when the record is created. The OCLC Control Number enables successful implementation and use of many OCLC products and services, including WorldCat Discovery and WorldCat Navigator. OCLC encourages the use of the OCLC Control Number in any appropriate library application, where it can be treated as if it is in the public domain.

  13. Jul 2023
      • for: inequality, wealth tax, climate justice, earth system justice
      • policy paper
      • title
        • Survival of the Richest
      • source
        • Oxfam
      • date

        • Jan 2023
      • Executive Summary

        • Since 2020, the richest 1% have captured almost two-thirds of all new wealth
          • nearly twice as much money as the bottom 99% of the world’s population.
        • Billionaire fortunes are increasing by $2.7bn a day,
          • even as inflation outpaces the wages of at least 1.7 billion workers, more than the population of India.7
        • Food and energy companies more than doubled their profits in 2022,
          • paying out $257bn to wealthy shareholders,
          • while over 800 million people went to bed hungry
        • Only 4 cents in every dollar of tax revenue comes from wealth taxes and
          • half the world’s billionaires live in countries with no inheritance tax on money they give to their children.
        • A tax of up to 5% on the world’s multi-millionaires and billionaires could raise $1.7 trillion a year,
          • enough to lift 2 billion people out of poverty, and fund a global plan to end hunger.
    1. Paper that introduced the PPO algorithm. PPO is, in a way, a response to the TRPO algorithm, trying to use the core idea but implement a more efficient and simpler algorithm.

      TRPO defines the problem as a straight optimization problem, no learning is actually involved.

  14. Jun 2023
    1. How might humanists adopt STEM-oriented norms around data sharing

      This seems to be a fairly packed sentence. Why should they?

    2. the “Nelson memo” requires all publications and supporting data produced with federal funds be made freely and publicly available without an embargo period and points towards future mandates that would require all data generated with federal funds (not just data associated with publications) to be made public.

      This is the first problem: what does it mean. If I write a book on Middlemarch, what is my data? My notes? The quotations I use (note the non-exemption of publications only).

    1. Writing json_populate_record in the FROM clause is good practice, since all of the extracted columns are available for use without duplicate function calls.
    1. Unlike many developed countries, the United States lacks a national curriculum or teacher-training standards. Local policies change constantly, as governors, school boards, mayors and superintendents flow in and out of jobs.

      Many developed countries have national curricula and specific teacher-training standards, but the United States does not. Instead decisions on curricular and standards are created and enforced at the state and local levels, often by politically elected figures including governors, mayors, superintendents, and school boards.

      This leaves early education in the United States open to a much greater sway of political influence. This can be seen in examples of Texas attempting to legislate the display the ten commandments in school classrooms in 2023, reading science being neglected in the adoption of Culkins' Units of Study curriculum, and other footballs like the supposed suppression of critical race theory in right leaning states.

  15. May 2023
    1. Since using case insensitivity is so widespread, take their sign up email address and make it lower case. Whenever they try to log in, convert that to lowercase as well, for comparison purposes, when you go to see if the user exists. As far as sign up and sign in go, do a case insensitive comparison. If the person signs up as Steve@example.com, you'll still want to allow them to sign in later with steve@example.com or sTeVE@example.com.
    2. But you should also keep track of the email address that they signed up with in a case sensitive fashion. Any time you send an email to them, be sure to send it with that original casing. This allows the email server to handle it however it feels like it needs to. So even though the person may always be signing in to your site with steve@example.com, if they signed up as Steve@example.com, you'll always send email to Steve@example.com, just to be safe.
  16. Apr 2023
    1. Bericht von Bloomberg Green über grüne Investitionen von Venture-Kapitalisten. Im Vordergrund stehen - oft mit öffentlicher Beteiligung - nicht mehr die schon eingeführten Technologien zur Energieerzeugung sondern Elektrifizierung neuer Bereiche und auch das Speichern von CO2. 2022 würden ca. 70 Milliarden USD venture Capital und insgesamt 652 Milliarden in Climate Tech investiert. Der International Renewable Energy Agency zufolge müssen sich die Investitionen jährlich vervierfachen. https://www.bloomberg.com/graphics/2023-climate-tech-startups-where-to-invest/?srnd=green&leadSource=uverify%20wall

    1. In our minds, there can be no more urgent task for a society than to ensure the health of its system of higher education.

      Really?! A conservative saying we should worry about the health of education as his fellows choke off funding to all levels of education in general?

      "Why are you turning blue and gasping for breath?" the Republican asks as he stands on the throat of education.

    1. Aristotle, who had said, many centuries before in Politics (BookVIII): ‘No one would dispute the fact that it is a lawgiver’s prime duty to arrangefor the education of the young. In states where this is not done the quality of theconstitution suffers.’

      Current American climate indicates that Republicans take this quote of Aristotle's to heart, but they're not closely thinking about how they define "education". They're definitely not defining it with respect to John Locke's views in Some Thoughts Concerning Education which encourages political systems that move away from an electorate that is subservient to authority.

      see: https://hypothes.is/a/upfxCtSiEe2wrdd3cOo-Lg for John Locke

  17. Mar 2023
    1. While policies limiting the high emitters are thus unavoidable, such as progressive taxes on emissions, they are hampered by three consecutive barriers.

      Three obstacles to policies limiting elite carbon emissions - First is the realization of connection between wealth and carbon emissions - Second is polarized politics making it difficult to pass or implement policies to limit dangerous consumption - Third is focused policy on the oversized contributions of elites

    1. we remove language that incites or facilitates serious violence

      Believing in "government" REQUIRES hypocrisy, schizophrenia and delusion. One illustration of this is the bizarre and contradictory way in which social media platforms PRETEND to be against people advocating violence.

      https://youtu.be/7OyNHgTSBiQ

    1. Nor does the cycles thesis have much to say about what social scientists call policy entrenchment—the way new policies outlast the coalition that created them.

      Policy entrenchment is when policies outlast the people, movements, or coalitions that created those policies.

  18. Feb 2023
  19. drive.google.com drive.google.com
    1. 〈 This section includes wording to provide greater certainty and clarity on how thiscontract should be interpreted and used. We are happy at any time to explainwhat they mean in more detail. 〉

      <span style="color: blue;">Policy Consideration: Governing Terms</span>

      Amendment of these terms is much more involved legally, so instead we opt to make them as clear and legible as possible and to offer to explain them for anyone who would like to unpack these terms.

    2. We reserve the right to suspend you with pay for no longer than is necessary to investigateany allegation of misconduct against you or so long as is otherwise reasonable while anydisciplinary procedure against you is outstanding.

      <span style="color: blue;">Policy Consideration: Suspension with Pay</span>

      This has been maintained in the contract to prioritise safety of the team, and enabling the Company to take measures that may be needed in extreme circumstances to do this. However, this would be a last resort and other methods would be explored before a suspension.

    3. Clean Feedback Porta

      <span style="color: blue;">Policy Consideration: Clean Feedback Portal</span>

      This is a portal of information dedicated to resources, training options, guidance, processes and support for providing feedback between colleagues in healthy, clean ways. This can be particularly important when the responsibility for feedback is distributed rather than centralised. Active training in relationships, feedback and power can be an important compliment to working in less centralised structures.

    4. Resolution Infrastructure and Process

      <span style="color: blue;">Policy Consideration: Resolution Infrastructure and Process</span>

      This replaces the term 'Conflict Resolution' because it seeks to emphasise that actions should start much before a tension escalates into conflict. Rather than waiting for Conflict, the aim is to address tensions early and support resolutions with strong infrastructure of training, support and clear processes that are agreed upon by the whole.

    5. 〈 We consider ongoing learning and training as critical to our work and theongoing development of the team. During your onboarding we will introduceyou to a range of training options – some of which will be highly recommendedfor your role; others will be optional. We will also explain any Learning andPersonal Development budgets available at the time in line with the Benefitsinfrastructure, including the processes to use them. 〉

      <span style="color: blue;">Policy Consideration: Training Policy</span>

      The specific training budget is not included in the contract here, in order to enable iteration over time.

    6. Details of how our absence reporting works, and the level of sick pay you may be entitledto, are set out on the Sick Leave Overview page.

      <span style="color: blue;">Policy Consideration: Sick Leave</span>

      In this example, the provision for Sick Leave is extensive and partially dependent on an Employment Income Protection insurance scheme. There is risk that the insurance might not longer be possible, thus likely changing the nature of what can be provided. As such, the extended leave policy here is included in the policy page rather than embedded into the contract itself to enable more flexibility for change.

    7. If you are unable to perform your duties due to incapacity (e.g. illness or injury) you mustcontact someone from within the People Circle or one of your immediate team members.Where possible and not confidential, we encourage you to contact everyone who will beaffected by your absence.

      <span style="color: blue;">Policy Consideration: Considering Privacy</span>

      We include flexibility in the process of who to notify and how, understanding that some may be comfortable and happy to openly explain illness, others may very much not. Whilst open working is encouraged, confidentiality is an option whenever it is needed, without pressure.

    8. We operate a flexible benefits system in accordance with rules in place from time to time.Further details of these benefits are available in our Benefits Portal.

      <span style="color: blue;">Policy Consideration: Benefits Policy</span>

      We have intentionally left the Benefits policies out of the core contract in order to mitigate (high) financial risk in offering generous provision as a contractual obligation.

    9. We will comply with any duties it has under part 1 of the Pensions Act 2008, and wecurrently use the Thriving Ecology pension scheme in respect of these duties. Membershipof the scheme is strictly subject to the rules of the scheme.

      <span style="color: blue;">Policy Consideration: Pension Plan</span>

      Actively encouraging team members to opt into ethical, green funds and providing proactive support for team members to select these options may form part of the onboarding process.

    10. ThePeople Circle may vary or withdraw the Additional Leave scheme at any time in accordancewith applicable governance processes.

      <span style="color: blue;">Policy Consideration: Iteration of Holiday Policy</span>

      This is included to ensure that there are means by which this process can evolve and iterate over time with appropriate consent from the team.

    11. Your Holiday Leave

      <span style="color: blue;">Policy Consideration: Unlimited Holiday Policy</span>

      The incorporation of a minimum holiday period, rather than a maximum, is to ensure that all team members are actively encouraged to take sufficient rest, particularly those who tend to prioritise the collective over their wellbeing (and thus are more likely to take too little holiday within an unlimited holiday structure). This clause can reinforced throughout other policy materials to help ensure that everyone rests to at least a minimum statutory standard.

    12. 〈 Your base salary is calculated based on our pay formula, which is the same foreveryone who works at the Company. For an overview of the pay formula and tounderstand the thinking and process behind our pay structure see here.We periodically review base salaries through a deliberative Pay Iteration Processthat everyone in the team is invited to take part in; changes are decided byconsent from all. There is no guarantee or obligation on us to award an increaseas part of these reviews.In the event of financial difficulties arising from this procedure please contactthe People Holder(s). 〉

      <span style="color: blue;">Policy Consideration: Reimagining Pay</span>

      For more approaches and options relating to pay structures, please see this Reimagining Pay Portal.

    13. Your Working Hours

      <span style="color: blue;">Policy Consideration: Working Hours</span>

      In this example Working Hours are not set, with some restrictions. This isn't always possible with public-facing work, but we include this here as an example of how employee autonomy can be centered, enabling employees wherever possible to do their work in the spaces and times that work for them, as long as collective needs are also met.

      Other examples we see are in structuring a 4 day working week as part of the wider 4 day work week movement. Alternatively, for example, Huddlecraft uses a 9-day work fortnight:

      “We are trialling a 9 day fortnight. This means that our hours are reduced from 40 to 36, and specifically that the whole team will take every other Friday off. So, in effect, alternating between a 40 hour week and a 32 hour week, to average a 36 hour week overall.

      These hours are flexible, and you should arrange them in a way that works for you, and for the team. The team will generally work for eight hours each working day Monday to Friday, within the hours of 9.00 am and 6.00 pm. You will be required to be available for significant periods during these hours in order to attend meetings and work together.”

    14. a. You are free to determine work locations that are best suited to help you achieve yourwork.b. Our registered address is 217 Mycelium Street, Newcastle and you are welcome to workfrom the office at this address; please contact the #NewcastleOffice for details on anyprotocols of use.

      <span style="color: blue;">Policy Consideration: Remote-first Workplace</span>

      This is an example from an organisation operating a remote-first set-up, where there are no core hours that are public-facing and no critical in-person team hours.

    15. You agree to declare any business opportunities that come to your attention which mayreasonably fall within the Company’s remit.

      <span style="color: blue;">Policy Consideration: Declaring Opportunities</span>

      This wording has been included to ensure there is fairness in relation to opportunities such as paid speaking events - see the purple box below for more information. It is not intended to stop individuals from working for other employers etc, which is why we have included reference to our Pathways Circle.

    16. We do not operate a line management system and you therefore do not have a ‘linemanager

      <span style="color: blue;">Policy Consideration: Support Contact vs Line Manager</span>

      In this example, the company has tried to remove the fixed hierarchy that comes with a Line Management system and enable a more dynamic and fluid method of hierarchy via role cards.

      There are also functions that Line Managers play outside of the content of the work, including holding review processes, supporting personal development, helping to resolve conflict, communicating company policies etc. These functions, in this example, have been distributed in different ways across roles in the systems in ways that aren't linked to promotion or concentrated in one person.

      Providing Support during the initial stages is one of these functions and is structured here through a nominated Support Contact (normally someone in the direct team) who is a primary point of contact for that person to navigate the system as they settle in.

    17. Role Card

      <span style="color: blue;">Policy Consideration: Role Cards</span>

      For more information about the Role Cards system see the annotation on page 7.

      As an alternative example, Civic Square structures their role relationships as follows:

      We think about relationships within the ecology of our team as first, second and third order connections. We are moving towards becoming teams of teams, so your everyday may involve a smaller focused team; week-to-week some others, and further month-to-month connections with the wider team. In this particular role we foresee you working with these key people initially:

      (a) Primary Connections [Primary connections]<br/> (b) Secondary Connections [Secondary connections]

      The job description is co-developed over an initial period, which looks to define responsibilities individually and collectively, with the understanding that it is not a static process, and they hope to revisit this together regularly.

    18. Mutual Trial Period

      <span style="color: blue;">Policy Consideration: Mutual Trial Period</span>

      This is included in the example in order to still recognise the importance of the first months of employment for both sides in terms of mutually seeing whether there is a strong relational fit. Rather than a Trial Period for the individual, it is structured here as a mutual period of exploration, and the employee is encouraged during this time to review whether the company is a good it for them, as much as vice versa. In this example, there is a proactive decision made before the end of this period to continue in relationship longer-term, and to celebrate that milestone. This example suggests 6 months for this period, as any less than this has often been found to be insufficient.

    19. Roles Board.

      <span style="color: blue;">Policy Consideration: Elements of a Roles Card system</span>

      This requires the Roles Board to include details of how roles can be picked up and passed on (consents required, processes), any time restrictions that apply. In this system, legally it is advised to have a system in place to track the various cards employees use throughout their time with the organisation.

    20. Your Role Card(s)

      <span style="color: blue;">Policy Consideration: Role Cards</span>

      In this example Roles are set in a way that is designed to enable a higher degree of fluidity in the system, based on an example from Dark Matter Labs. Instead of a static job role with a static/fixed ‘line manager’, Dark Matter Labs lays out roles within a system called ‘role cards’, where each person has a set of cards in their hand at any time, but there are processes through which people can pick and pass on role cards in the system. Each role card lays out the resonposnibilities, accountabilities, key activites, skills, connections/dependencies, and evaluation of the role.

      Note: this system particularly makes sense in relation to their accompanying approach for pay.

      In this example, this is needed due to the type of work involved (heavily structured around projects), the emergent nature of the work (regularly moving in content and nature) and funding (shorter-term and less consistent funding). Using a role card system, they enable agency of people to self-navigate following a clear set of processes and protocols, and therefore to not be governed top-down by role 'allocators'. The role card system aims to incorporate the rigour and clarity of detail of a traditional system of roles and responsibilities, alongside more autonomous navigation of roles in moving circumstances. In incorporating this method in the contract example, our aim is not to recommend it as an approach to roles, but to exemplify how alternative methods like this can be incorporated into an employment contract.

    21. How to use these annotations

      Employment contracts, including this example, are ideally not be not one-size-fits-all, but designed to respond to a specific organisational, legal, and design context. We have created an annotated version of this example contract to explain our thought processes and reasons for why we have made the contract’s strategic decisions in this way.

      We strongly recommend you read this version of the contract with annotations first, before using the contract as a starting point for your own, to understand the context of how that contract was shaped, and reflect on how these constraints or considerations may or may not apply to your own circumstances.

      We have tagged these annotations under the key categories below:

      • <span style="color: blue;">Policy Considerations: how we have considered the organisation’s policy, i.e. how its members decide to work together and run their organisation. </span>
      • <span style="color: green;">Legal Considerations: how we have considered the legal frameworks in creating the contract, including how employment law, contract law, etc., has shaped how the contract works.</span>
      • <span style="color: red;">Design Considerations: how we have considered communications design questions, including information hierarchy, user experience, and how to ensure the nature of the agreement is communicated clearly.</span>

      We also invite you to look at our Reimagining Contract Terms table for our reflections on the typical terms that form an employment contract, and how they can be reimagined beyond their conventional approaches.

    22. cultureprinciples

      <span style="color: blue;">Policy Consideration: Linked Policies - Shared Culture Principles</span>

      In this example, it links to a set of basic principles that every person, and the organisational as a whole, commits to. It lays out the principle (e.g. work out loud' and then expected individual, collective and organisational behaviours that are essential to uphold that principle. It does not express 'all possible behaviours' but rather a minimum set of necessary behaviours considered essential to mutual thriving. The principles and behaviours were drawn up, in this example, through a participatory process and approved through by consensus (note: in this case study it is one of the only areas of organisational development that was agreed by consensus).

    23. Livable Planet

      <span style="color: blue;">Policy Consideration: Employer or Community?</span>

      In this introductory section we have tried to make it clear that we are speaking about 'Livable Planet' as a community rather than the legal entity / employing entity. Note we have done this by using the 'trading name' Livable Planet as short hand for the community and the legal name 'Livable Planet Ltd' as short hand for the employer.

    24. About Livable Planet and ourapproach to employment

      <span style="color: blue;">Policy Consideration: Introduction</span>

      In this example, we have taken inspiration from the employment contract draft of Civic Square and included an introductory section.

      It aims to acknowledge that there is a contradiction between the aim of common abundance with the format and history of employment law that an employment contract is part of. It also aims to acknowledge the rights fought and won through the history of employment law and the intent to value them. It seeks to lay out hopes and expectations with an aim to begin the employment relationship with a deep mutual understanding and appreciation of the relationship being formed. It seeks to invite the other party's input into this understanding so that we hold our new relationship with respect and intent.

    25. 1 of 31Employment Contract

      How to use these annotations

      Employment contracts, including this example, are ideally not be not one-size-fits-all, but designed to respond to a specific organisational, legal, and design context. We have created an annotated version of this example contract to explain our thought processes and reasons for why we have made the contract’s strategic decisions in this way.

      We strongly recommend you read this version of the contract with annotations first, before using the contract as a starting point for your own, to understand the context of how that contract was shaped, and reflect on how these constraints or considerations may or may not apply to your own circumstances.

      We have tagged these annotations under the key categories below:

      • <span style="color: blue;">Policy Considerations: how we have considered the organisation’s policy, i.e. how its members decide to work together and run their organisation. </span>
      • <span style="color: green;">Legal Considerations: how we have considered the legal frameworks in creating the contract, including how employment law, contract law, etc., has shaped how the contract works.</span>
      • <span style="color: red;">Design Considerations: how we have considered communications design questions, including information hierarchy, user experience, and how to ensure the nature of the agreement is communicated clearly.</span>

      We also invite you to look at our Reimagining Contract Terms table for our reflections on the typical terms that form an employment contract, and how they can be reimagined beyond their conventional approaches.

  20. Jan 2023
    1. It's usually undesirable to add a default scope. It will take more effort to work around and will cause more headaches. If you know you need a default scope, it's easy to add yourself .