2,565 Matching Annotations
  1. Jun 2020
  2. May 2020
    1. If your hosting provider does not support HTTPS, the following options are available: You can contact your web hosting provider: tell them you want a free HTTPS certificate through Let’s Encrypt. You’re probably not the only one using your web hosting provider service who wants HTTPS. You can request that your web hosting provider offer Let’s Encrypt HTTPS certificates as a free part of their hosting package. An effective way to make this ask is through email, their help desk system, or by contacting the web hosting provider through social media. You can switch to a different web hosting provider. Find a web hosting provider who offers full HTTPS support as part of their web hosting package by checking our list. You might be able to use Certbot. If you have SSH access to the server your website is hosted on, you might be able to use Certbot. You will need to know the software and system your server is running on. After you confirm the software and system information, you can use the dropdown menus above to generate specific instructions for running Certbot on your server through the command line.
    1. ABSTRACTLet’s Encrypt is a free, open, and automated HTTPS certificate au-thority (CA) created to advance HTTPS adoption to the entire Web.Since its launch in late 2015, Let’s Encrypt has grown to become theworld’s largest HTTPS CA, accounting for more currently valid cer-tificates than all other browser-trusted CAs combined. By January2019, it had issued over 538 million certificates for 223 million do-main names. We describe how we built Let’s Encrypt, including thearchitecture of the CA software system (Boulder) and the structureof the organization that operates it (ISRG), and we discuss lessonslearned from the experience. We also describe the design of ACME,the IETF-standard protocol we created to automate CA–server inter-actions and certificate issuance, and survey the diverse ecosystemof ACME clients, including Certbot, a software agent we created toautomate HTTPS deployment. Finally, we measure Let’s Encrypt’simpact on the Web and the CA ecosystem. We hope that the successof Let’s Encrypt can provide a model for further enhancements tothe Web PKI and for future Internet security infrastructure.
    1. public-benefit digital infrastructure projects, the first of which was the Let's Encrypt certificate authority. ISRG's founding directors were Josh Aas and Eric Rescorla. The group's founding sponsors and partners were Mozilla, the Electronic Frontier Foundation, the University of Michigan, Cisco, and Akamai.
    1. Certbot is part of EFF’s larger effort to encrypt the entire Internet. Websites need to use HTTPS to secure the web. Along with HTTPS Everywhere, Certbot aims to build a network that is more structurally private, safe, and protected against censorship. Certbot is the work of many authors, including a team of EFF staff and numerous open source contributors.
    2. What’s Certbot? Certbot is a free, open source software tool for automatically using Let’s Encrypt certificates on manually-administrated websites to enable HTTPS. Certbot is made by the Electronic Frontier Foundation (EFF), a 501(c)3 nonprofit based in San Francisco, CA, that defends digital privacy, free speech, and innovation.
    1. The objective of Let’s Encrypt and the ACME protocol is to make it possible to set up an HTTPS server and have it automatically obtain a browser-trusted certificate, without any human intervention. This is accomplished by running a certificate management agent on the web server. To understand how the technology works, let’s walk through the process of setting up https://example.com/ with a certificate management agent that supports Let’s Encrypt. There are two steps to this process. First, the agent proves to the CA that the web server controls a domain. Then, the agent can request, renew, and revoke certificates for that domain. Domain Validation Let’s Encrypt identifies the server administrator by public key. The first time the agent software interacts with Let’s Encrypt, it generates a new key pair and proves to the Let’s Encrypt CA that the server controls one or more domains. This is similar to the traditional CA process of creating an account and adding domains to that account. To kick off the process, the agent asks the Let’s Encrypt CA what it needs to do in order to prove that it controls example.com. The Let’s Encrypt CA will look at the domain name being requested and issue one or more sets of challenges. These are different ways that the agent can prove control of the domain. For example, the CA might give the agent a choice of either: Provisioning a DNS record under example.com, or Provisioning an HTTP resource under a well-known URI on http://example.com/ Along with the challenges, the Let’s Encrypt CA also provides a nonce that the agent must sign with its private key pair to prove that it controls the key pair. The agent software completes one of the provided sets of challenges. Let’s say it is able to accomplish the second task above: it creates a file on a specified path on the http://example.com site. The agent also signs the provided nonce with its private key. Once the agent has completed these steps, it notifies the CA that it’s ready to complete validation. Then, it’s the CA’s job to check that the challenges have been satisfied. The CA verifies the signature on the nonce, and it attempts to download the file from the web server and make sure it has the expected content. If the signature over the nonce is valid, and the challenges check out, then the agent identified by the public key is authorized to do certificate management for example.com. We call the key pair the agent used an “authorized key pair” for example.com. Certificate Issuance and Revocation Once the agent has an authorized key pair, requesting, renewing, and revoking certificates is simple—just send certificate management messages and sign them with the authorized key pair. To obtain a certificate for the domain, the agent constructs a PKCS#10 Certificate Signing Request that asks the Let’s Encrypt CA to issue a certificate for example.com with a specified public key. As usual, the CSR includes a signature by the private key corresponding to the public key in the CSR. The agent also signs the whole CSR with the authorized key for example.com so that the Let’s Encrypt CA knows it’s authorized. When the Let’s Encrypt CA receives the request, it verifies both signatures. If everything looks good, it issues a certificate for example.com with the public key from the CSR and returns it to the agent. Revocation works in a similar manner. The agent signs a revocation request with the key pair authorized for example.com, and the Let’s Encrypt CA verifies that the request is authorized. If so, it publishes revocation information into the normal revocation channels (i.e. OCSP), so that relying parties such as browsers can know that they shouldn’t accept the revoked certificate.
    1. Let’s Encrypt is a free, automated, and open certificate authority (CA), run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG). We give people the digital certificates they need in order to enable HTTPS (SSL/TLS) for websites, for free, in the most user-friendly way we can. We do this because we want to create a more secure and privacy-respecting Web. You can read about our most recent year in review by downloading our annual report (Desktop, Mobile). The key principles behind Let’s Encrypt are: Free: Anyone who owns a domain name can use Let’s Encrypt to obtain a trusted certificate at zero cost. Automatic: Software running on a web server can interact with Let’s Encrypt to painlessly obtain a certificate, securely configure it for use, and automatically take care of renewal. Secure: Let’s Encrypt will serve as a platform for advancing TLS security best practices, both on the CA side and by helping site operators properly secure their servers. Transparent: All certificates issued or revoked will be publicly recorded and available for anyone to inspect. Open: The automatic issuance and renewal protocol will be published as an open standard that others can adopt. Cooperative: Much like the underlying Internet protocols themselves, Let’s Encrypt is a joint effort to benefit the community, beyond the control of any one organization. We have a page with more detailed information about how the Let’s Encrypt CA works.
    1. What's terrible and dangerous is a faceless organization deciding to arbitrarily and silently control what I can and can not do with my browser on my computer. Orwell is screaming in his grave right now. This is no different than Mozilla deciding I don't get to visit Tulsi Gabbard's webpage because they don't like her politics, or I don't get to order car parts off amazon because they don't like hyundai, or I don't get to download mods for minecraft, or talk to certain people on facebook.
  3. Apr 2020
    1. Abdulla, A., Wang, B., Qian, F., Kee, T., Blasiak, A., Ong, Y. H., Hooi, L., Parekh, F., Soriano, R., Olinger, G. G., Keppo, J., Hardesty, C. L., Chow, E. K., Ho, D., & Ding, X. (n.d.). Project IDentif.AI: Harnessing Artificial Intelligence to Rapidly Optimize Combination Therapy Development for Infectious Disease Intervention. Advanced Therapeutics, n/a(n/a), 2000034. https://doi.org/10.1002/adtp.202000034

    1. un ensemble hétérogène mais cohérent

      en effet, cette harmonisation technique est nécessaire pour penser la filiation entre l'écriture et la production: écrire dans MS Word peut être aussi éloigné de l'objet de publication que le manuscrit rédigé à la main (pas de cohérence), alors que l'écriture en Markdown ou LaTeX s'inscrit dans la logique fluide d'un système de publication nativement numérique comme la chaîne de Quire ou de Stylo (cohérent du premier jet à la publication finale).

    2. Nous pouvons constater qu’il y a un lien entre les formes produites et les moyens mis en œuvre pour les produire.

      dans une perspective nativement numérique, écrire et produire sont alors intrinsèquement liés.

      par exemple: dans le modèle du manuscrit rédigé à la main ou tapé à la dactylo, le processus de production est au mieux analogue (consistant à reproduire des lettres que l'auteur a posées sur papier), au pire complètement hétérogène à l'acte d'écriture (il faut prendre le processus du début pour en faire un livre publiable).

    1. Duygusal Pazarlama Süreci Duygusal pazarlama, kitleleri markalarla kişisel ve insani bir şekilde bağlayan bir hikaye anlatır. Yeni medya kanalları, cihazları ve platformları ortaya çıktıkça, insanların marka öykülerine bolca erişebilmelerini sağlıyorlar. Dahası, şirketlerin duygusal kimliklerini daha basit hale getirerek kimliklerini ve vizyonlarını aktarmaları için birçok yol var.
    1. Dijital Pazarlama ve Empati Dijital pazarlamadaki hedef kitlenizin tıpkı sizin gibi insanlar tarafından oluştuğunu düşünürseniz sizden ne bekleyeceklerini, ne isteyeceklerini ve nasıl harekete geçeceklerini anlayabilirsiniz. Bu yüzden bu yazımızda pazarlama stratejinize empatiyi nasıl yerleştirmeniz gerektiğini ele alıyoruz.
    1. By retracing how one body is chained to another in precarity, it shows the thickness of desire and potential inside these digital bonds.

      i'm still not sold on the idea that there is desire or love for the work that is performed (see annotation about digital worker above).

    2. this ten-year span of digital work exemplified the precarity of digital labor before precarity became a term to describe the uncertain and stressful conditions of work for digital workers.

      Are they digital workers though? Maybe they need to define digital. I was reading this case study as a proceeding whatever digital was. Is it digital because they made equipment for electronics?

    3. A digital worker is not necessarily alien-ated from the commodity she doesn’t own; she finds an unrequited desire and love for the digital work she performs. A feminist methodology shows how being chained is not determined by digital rules and technologies that enable oppression. It is not a result of the material infrastructures and technologies that enable communication, connectivity, and networks.

      What? I need to come back to this.

  4. Mar 2020
    1. GDPR introduces a list of data subjects’ rights that should be obeyed by both data processors and data collectors. The list includes: Right of access by the data subject (Section 2, Article 15). Right to rectification (Section 3, Art 16). Right to object to processing (Section 4, Art 21). Right to erasure, also known as ‘right to be forgotten’ (Section 3, Art 17). Right to restrict processing (Section 3, Art 18). Right to data portability (Section 3, Art 20).
    1. Resources for Closing the Digital Divide

      This website hosts numerous resources to aid educators in their attempt to close the digital divide that alienates a certain socio-economic demographic of students and limits their ability to succeed in school. The website first lists hyperlinked articles to help educators understand the state of the digital divide, then lists hyperlinked articles and resources to help take action to improve the digital divide and close digital learning gaps before supplying links to articles and resources that can help instructors develop media and digital literacy within their respective classrooms. This would be an incredibly helpful website for any instructor who is looking for background information on and resources by which to close the digital divide. Rating: 9/10

    1. Right now, if you want to know what data Facebook has about you, you don’t have the right to ask them to give you all of the data they have on you, and the right to know what they’ve done with it. You should have that right. You should have the right to know and have access to your data.
  5. Feb 2020
    1. Do learners seek out texts that consider multiple perspectives and broaden their understanding of the world? Do learners critically analyze a variety of information and ideas from a variety of sources? Do learners choose texts and tools to consume, create, and share ideas that match their need and audience? Do learners create new ideas using knowledge and insights gained? Do learners analyze the credibility of information, authorial intent, and its appropriateness in meeting their needs? Do learners use information and the ideas of others to solve problems and make decisions as informed citizens? Do learners strive to see limitations and overlaps between multiple streams of information? Do learners gain new perspectives because of the texts they interact with? Do learners use tools to deepen understandings, to share ideas, and to build on others’ thinking? Do learners develop new skills strategies to meet the challenge of new texts and tools?

      These are the goals of digital literacy.

    1. The results of the questionnaire indicated that West Town students had greater access to the Internet at home and were required to use the Internet more in school. These results suggest that a separate and independent achievement gap existed for online reading, based on income inequality.

      The achievement gap is multifaceted, so as educators, we need to attack it in more ways. Getting children library cards (internet access) and technology experiences from a younger age can help close this gap, but only if it is in a equitable way.

    1. The rise of big data and social media has resulted in particular transformations of academia. Deborah Lupton (2015) has, in this context, coined the notion of digital soci-ology. She argues that digital sociology consists of (a) professional digital practice so that sociologists employ ‘digital tools as part of sociological practice – to build networks, construct an online profile, publicize and share research and instruct students’ (p. 15); (b) the investigation of the use of digital technology; (c) digital data analysis, which has also been characterized as the rise of digital methods (Rogers, 2013); and (d) critical digital sociology, the fourth aspect of digital sociology. Lupton (2015) defines critical digital sociology as the ‘reflexive analysis of digital technologies informed by social and cul-tural theory’ (p. 16).All forms of social analysis reflect society in complex ways. Critical digital sociology is a particular reflexion of and on digital technologies’ role in society. It is a theoretical approach grounded in critical and Marxist theory that tries to understand capitalism and domination as well as their possible alternatives. But one should note that there is a con-tradiction between critical sociology as digital sociology’s fourth dimension and big data analytics that is part of Lupton’s third dimension of digital sociology.
    2. Jürgen Habermas (1971), we can say that there is a danger that digital positivism advances an ‘absolutism of pure [digital, quantitative] methodology’ (p. 5), forgets about academia’s educational role, falls short of fully understanding ‘the meaning of knowledge’ (p. 69) in the information society at large and is an ‘immunization of the [Internet] sciences against philosophy’ (p. 67).
  6. Jan 2020
    1. "It's not interactive, ... there's one screen, and you just have to read it," he explained. "It's the same as reading a [paper] page."

      sometimes tech isn't much of an improvement >> we need to channel to the special abilities of growing tech -hashtags, hyperlinks, interactive games and level checks, etc.

    2. That makes digital writing a potentially powerful lever for social good, allowing students to "actively participate in civic society and contribute to a vibrant, informed, and engaged community," as the ALA notes. It also makes digital writing a potentially dangerous tool—decisions about when and what to share online can have repercussions for a student's safety, privacy, and reputation.

      I love how digital literacy allows so many to have access to so much and to communicate easily with others. But there is a definite dark side to sharing in any digital format and many don't think about that.

  7. Dec 2019
    1. ya sea permitiendo publicidad en las bibliotecas, o colaborando con Microsoft

      Esto tiene una vuelta de tuerca. Al final los impulsos de Microsoft en bibliotecas terminaron en manos de IFLA pero eso no quiere decir que el desarrollo de habilidades en el uso de tecnologías haya quedado enfocado en las herramientas de esta empresa y ahora la suit de Google frente a otras alternativas al margen de estas corporaciones. Un mejor servicio o una tecnología fácil de usar se entiende como un don por el que nadie luchó para obtenerlo ¿entonces qué es lo que ha costado y cómo se ha pagado? ignorar el entendimiento de algunas tecnologías es ignorar la manera que tenemos para pensar y hacer desde una perspectiva de ciudadanía digital ¿cómo se puede ejercer los derechos en el siglo XXI si la única ruta que se conoce es la que muestran las corporaciones?

    1. Despite the successful resolution, it was still quite unsettling that a domain name could be transferred to another registrant and sinkholed for some perceived violation. I thought there would be more checks in place to confirm that a perceived violation was real before a domain could be transferred.

      This is highly unsettling. A person, organisation, country, or company should not be able to have a domain name transferred from its rightful owner this easily.

  8. Nov 2019
    1. Integrating Technology with Bloom’s Taxonomy

      This article was published by a team member of the ASU Online Instructional Design and New Media (IDNM) team at Arizona State University. This team shares instructional design methods and resources on the TeachOnline site for online learning. "Integrating Technology with Bloom's Taxonomy" describes practices for implementing 6 principles of Bloom's Digital Taxonomy in online learning. These principles include Creating, Evaluating, Analyzing, Applying, Understanding, and Remembering. The purpose of implementing this model is to create more meaningful and effective experiences for online learners. The author guides instructors in the selection of digital tools that drive higher-order thinking, active engagmenent, and relevancy. Rating 9/10

    1. Digital Literacy Initiatives

      This website outlines digital literacy initiatives provided by the Literacy Information and Communication System (LINCS). The U.S. Department of Education, Office of Career, Technical, and Adult Education (OCTAE) implements these intitatives to aid adult learners in the successful use of technology in their education and careers. Students have free access to learning material on different subjects under the "LINCS Learner Center" tab. Teachers and tutors also have access to resoruces on implementing educational technology for professional development and effective instruction. Rating 8/10

    1. it’s important to embrace pedagogies that leverage synchronous (live) instruction.

      It is mention in this article that Arizona State University is on the right track regarding superior online services. this article point of view is about the online challenges for colleges and universities, such as, doing live videos, online services and supplying tech devices. this website "EdTech" is a online magazine education technology resource for both K-12 and higher education.

  9. Oct 2019
    1. Even more troubling is the state of evaluation for digital scholarship, now an extensively used resource for scholars across the humanities: 40.8% of departments indoctorate-­granting institutions report no experience evaluating refereed articles in electronic format, and 65.7% report no experience evaluating monographs in electronic format.

      This is startling!

    1. No matter how well you design a system, humans will end up surprising you with how they use it. “We make it obvious that it’s a bot, a digital assistant, at the start. But sometimes customers overlook that. And they’ll say, ‘are you a bot? What’s going on here? Transfer me through!’ And they’ll get into it quite strongly,” explains David Grilli, AGL’s chatbot product owner

      Interesting to note response to chatbots

  10. Sep 2019
    1. Dependencia externa:grado en que un formato en particular depende de un hardware o software en específico:el sistema operativo o el software para la presentación o uso y la complejidad de hacer frente a esas dependencias en entornos técnicos futuros

      Esto impacta directamente con el apartado sobre "Fuera del alcance de la estrategia de preservación". No puedes preservar algo si no tienes las garantías para conservar o ejecutar a futuro. Esta barrera debería superarse con una excepción.

    2. Las aplicaciones y archivos ejecutables

      La BNC no se responsabiliza por la preservación de aplicaciones creadas en Colombia. Esto es un punto a favor para proyectos como el de Grafoscopio que, por su infraestructura, está pensado para perdurar en un ambiente de programación que posibilita su preservación en el tiempo, Pharo. Sin embargo es un hueco en la memoria de la producción de contenidos digitales del país, la economía naranja en contexto de gobierno (2018-2022) y las defensas de la Dirección Nacional de Derecho de Autor a las industrias creativas (que incluye software en el marco de su protección) pero por las dependencias no hay garantías de preservarlas en el tiempo. Básicamente o los productores de software se hacen un lugar en el mercado o están destinados a perecer en el olvido en la memoria de la nación.

    3. Las decisiones sobre la conservación, el acceso y la preservación de los materiales digitales en la adquisición o fase de creación, se tomarán enforma conjunta por el personal de la Biblioteca directamente involucrado en la gestión de las estrategias de preservación.

      ¿Quién debe estar involucrado en los procesos de preservación? ¿solo la área dedicada a este propósito o debe ser transversal a los flujos de información de la entidad o de los proyectos que se acogen en el marco de la preservación digital?

  11. Aug 2019
    1. The ‘Why’ of MultiliteraciesFirst, why literacy? Or even more fundamentally, why education (in which literacy is a ‘basic’)? On this front, not much has changed in ten years. The two sides of the political spectrum, characterised loosely as ‘left’ and ‘right’, remain poles apart in what they see as the appropriate role of literacy learning in society, and indeed, education in general.

      Well, I think there is a lot has changed since this article (2009) and the question is not "Why?" anymore. The real hard question is "How"? How are we going to keep up with the speed of changing technology and new digital literacies? How can we make sure that every child gets the opportunity to spend ample time on the computer, creating, building, constructing and not only consuming? How can we scaffold teachers so they are skilled and capable of using new digital literacies?

    1. Video Games (Is School Enough? Series)

      I love the idea for my students coding and creating games. I bought a robot to start getting students to code and start engaging in other ideas.

      I love the view the student has on feedback. Knowing what constructive criticism is really helpful is great growth-mindset. Using peers to give constructive criticism is a great way to help students out.

  12. Jul 2019
    1. However, this does not nec-essarily mean they are skilled in the effective use of online information, perhaps the most important aspect of the Internet. Studies show that stu-dents lack critical evaluation skills when reading online (Bennet, Maton, & Kervin, 2008; Forzani & Maykel, 2013; Graham & Metaxas, 2003) and that they are not especially skilled with reading to locate information online (Kuiper & Volman, 2008

      I completely agree with this. They can use the internet but they lack the skills to sift through information in a timely manner that does not make them give up in 10 seconds.

    2. One might even suggest that, over a lifetime, learning how to learn New Literacies is more important than learning a specific literacy of reading or writing.

      This is learning how to learn. When we learn how to learn we can figure out new technologies and we can problem solve

    1. five phases:
      1. students collaborative with instructor to pick area of interest and work on a DQ to guide their research.
      2. students engage in OCI as the do research and use digital tools to make discoveries 3.Students use critical thinking to evaluate online info by analyzing credibility of their info. 4.Students synthesize what they learned/researched by combining info in multiple, multimodal sources.
      3. Students engage in online content construction by putting their research into their own words and choosing the best digital tool/text before sharing their answers.
    1. Not teaching digital literacy along with language or other literacy instruction does our students a disservice. Nowadays, applying for a job or even filling in an online form to reserve a picnic table at a local park requires digital literacy skills.

      We must also not assume that others are teaching out students digital literacy. It is everyone's responsibility.

    1. Approachable and accessible to diverse audiences and their needs. The map needs to be written in a language that is easy to understand, and relevant—why do web literacy skills matter to them. Applicable to interest and/or expertise. The map needs to connect to curriculum, credentials, professional development, and other resources to teach people the skills they need to engage online and offline.

      I'm having trouble with what the internet literacy map is. Can anyone define?

    1. Ares Digital

      This blog post pertains to version 3.0 of Ares Digital, which was unreleased as of 2 July 2019. The system's development, despite the numerical designation, has not been iterative. Each version was essentially created from scratch.

      Former Axanar CTO Terry Mcintosh disputes ownership of Ares Digital as a trademark, and claims to have applied to the U.S. Patent and Trademark Office for registration of the name as a trademark. As of 2 July 2019 the trademark does not appear in the USPTO database.

      The original Ares Digital, never fully completed, was created by McIntosh. Version 2.0 was coded by Bill Watters, who has since resigned as CTO. Version 3.0 was created in his spare time by developer Jerry Ablan.

  13. Jun 2019
    1. Simply put, a digital footprint is the record or trail left by the things you do online. Your social media activity, the info on your personal website, your browsing history, your online subscriptions, any photo galleries and videos you’ve uploaded — essentially, anything on the Internet with your name on it.
  14. educatorinnovator.org educatorinnovator.org
    1. the possibility and opportunities of using the connected learning framework in school settings

      I appreciate challenging the notion that "official" CL can only occur "across contexts and settings" rather than solely in a school. For me, a related issue is who can access these different contexts and settings. Digital redlining blocks or slows access for many students (and teachers), and I'd like to learn more about how CL addresses digital redlining.

  15. May 2019
    1. 7KHEDVHRIWKHJUDSKLFLVVLPSO\DOLQHFKDUW+RZHYHUGHVLJQHOHPHQWVKHOSWHOOWKHVWRU\EHWWHU/DEHOLQJDQGSRLQWHUVSURYLGHFRQWH[WDQGKHOS\RXVHHZK\WKHGDWDLVLQWHUHVWLQJDQGOLQHZLGWKDQGFRORUGLUHFW\RXUH\HVWRZKDW¶VLPSRUWDQW

      I really like this because I don't see it often and it actually does draw my eye to the data and capture my interest.

    1. Problematicrepresentationsandbiasesinclassificationsarenotnew

      Not only are these representations nothing new to our society but they probably never will be old. Opinions and representation are not only situational, those with voices and power will use that to their advantage, whether or not it will land us with other algorithms and stereotypes.

    2. nreality,informationmonopoliessuchasGooglehavetheabilitytoprioritizewebsearchresultsonthebasisofavarietyoftopics,suchaspromotingtheirownbusinessinterestsoverthoseofcompetitorsorsmallercompaniesthatarelessprofitableadvertisingclientsthanlargermultinationalcorporationsare.

      It's a good thing google was exposed to the issues at hand and took action. As several other people have already mentioned in their annotations google has seen and responded to the racist algorithms and improved the search results drastically. This will teach youth much better examples of equality and power.

    3. Figure1.7.GoogleImagesresultswhensearchingtheconcept“beautiful”(didnotincludetheword“women”),December4,2014

      You can even see that the pictures for "beautiful men" were images of young, Caucasian males with chiseled, "imperfect" bodies. When did people decide that other cultures, shapes, and ethnicities weren't beautiful? It's a tragedy that we're recovering from globally and that will have tainted the visions of beauty for many people.

    4. Whileservingasanimportantanddisturbingcritiqueofsexistattitudes,thecampaignfailstoimplicatethealgorithmsorsearchenginesthatdrivecertainresultstothetop.Thischaptermovesthelensontothesearcharchitectureitselfinordertoshedlightonthemanyfactorsthatkeepsexistandracistideasonthefirstpage.

      I think that this is incredibly important because while in the past years these campaigns and societal viewpoints have changed and come so far, for the better, there is still the ugly truth that there are and have been these algorithms and thoughts in the past that people were so unaware of. Many people, even people who may be very aware of what's happening in the world, need to be reminded and educated on these issues. Myself included, of course.

    1. humanities scholars have collaborated with computer scientists to build tools to facilitate these essential functions of the humanities in new ways.

      I believe that the collaboration between subjects is necessary to understand ideas and theories in a more holistic way. To successfully write a scientific journal on a new medical accomplishment one must understand how to use language, grammar, and vocabulary. To paint a world renowned artwork masterpiece, one must understand the mathematics of symmetry, spacing, and measurements. It seems only natural to me that the humanities partner with all disciplines to convey its topics and research, and computer science is one such discipline that makes the humanities more applicable and accessible by researchers and public alike.

    2. Image processing involves taking a two-dimensional image that has been con-verted into digital format, making enhancements such as sharpening, changing color balances, saturation and exposure, cropping or straight-ening; annotating by adding metadata for location, date, content and so forth; and setting parameters such as color mode, compression format and size.

      This has recovered so many almost unrecognizable images from the past it's amazing. All these old, damaged documents that have been digitally revitalized is so wonderful, considering all the information we have obtained from said articles and photos.

    3. More sophisticated tools can per-form high-end linguistic 'analysis, such as tagging parts of speech (POS), creating concordances, collating versions, analyzing sentiments and keyword density/prominence, visualizing patterns, exploring intertex-tual parallels and modeling topics

      I like how this method is relatable because the analysis is what we've been familiar with through high school and university. For example in Literary Studies we learnt how to dissect poetry and pieces of literature. With the text analysis we can use the tactics we're already familiar with.

    4. Video and Audio Processing Tools: These control the alteration of digital acoustic and video files and can include enhancement, clean-ing, mixing and cutting, annotation and compression.

      Anyone who has bee to a live concert after listening to the same songs on a cd or itunes can appreciate audio processing tools, as some artists sound far different without some digital "tweaking". The same goes for video, editing tools can create a entirely different product than the one shot live.

    5. digital text annotation is simply adding notes or glosses to a document, for instance, putting sticky-note comments on a PDF file for personal use.

      A more environmentally friendly way to make notes and organize thoughts, rather that printing off 80 pages of print, times 50 students, to preform comparative analysis on.

    6. The tools that have been developed since that time have helped scholars to collect material, encode it, study it with text mining and data analysis, map it using anything from Google Maps to geographic information systems (GIS), visualize it-sometimes using video, 3D or virtual reality recreations -create digital archives, incor-porate and analyze sound -anything from speech to music to noise

      The sheer depth to which we are now able to study particular things with these tools is mind-boggling. Instead of being satisfied with your local library or towns collective Library resources, you can search for information across the globe, while not leaving your home. To be able to share and collaborate and display your work in an online forum is equally as amazing, considering how quickly this has come about.

    7. This process creates a three-dimensional solid object based on computer-generated models

      This allows researchers and students to manipulate objects in their hands and explore different textures on the surface that 3D modeling just does not offer. It most definitely was a great invention!

    8. Their effectiveness for reading manuscript books has evolved greatly over the past decade, but they still require much direct intervention or "instruction" on the part of a researcher or other investigator.

      I wonder what can be done to help increase the effectiveness of these apps? Handwritten letters can be hard to read depending on the persons neatness, maybe a larger database with a wider range of handwriting samples could be used to increase the independence of the app?

    9. digital text annotation is simply adding notes or glosses to a document, for instance, putting sticky-note comments on a PDF file for personal use.

      This really does help determine where your thoughts come from while writing a paper so that credit can be given where it is due to help minimize plagiarism.

    1. A searchable map of the addresses contained in the 1956 Negro Travelers’ Green Book, which the user can filter by state or establishment type.

      As someone interested in geography and history, this application of the digital humanities is particularly intriguing. While I still do not fully grasp everything that digital humanities is and aims to do, I appreciate that the platform it gives can reach a far wider audience, myself included. There are so many things I would never have had the privilege of viewing if not for people participating in this discipline.

    2. Many  students tell me that in order to get started with digital humanities, they’d like to have some idea of what they might do and what technical skills they might need in order to do it.

      This is definitely me. I had no idea what to expect from digital humanities and still don't. I'm enjoying learning as we go and these articles definitely help.

    1. how would our education system change to take advantage of this new external symbol-manipulation capability of students and teachers (and administrators)?

      Let's say it's been twenty years since PDAs have been widely available. I returned to higher education less than ten years ago. K-12 seems to have embraced learning technologies, and their affordances, to improve primary and secondary education. In my experience, few educators with terminal degrees have made the effort while younger and more precarious teachers are slowly adopting educational technologies. Administrators are leading the way with their digital management systems and students are using proprietary social media platforms. Our institutions are doing what they were designed to do: resist change and reproduce the social order. Research paid for with public monies is as quickly privatized as that produced in corporations. Open education practices are just beginning to be explored.

      The first PDA, the Organizer, was released in 1984 by Psion, followed by Psion's Series 3, in 1991. The latter began to resemble the more familiar PDA style, including a full keyboard.[4][5] The term PDA was first used on January 7, 1992 by Apple Computer CEO John Sculley at the Consumer Electronics Show in Las Vegas, Nevada, referring to the Apple Newton.[6] In 1994, IBM introduced the first PDA with full telephone functionality, the IBM Simon, which can also be considered the first smartphone. Then in 1996, Nokia introduced a PDA with telephone functionality, the 9000 Communicator, which became the world's best-selling PDA. Another early entrant in this market was Palm, with a line of PDA products which began in March 1996. https://en.wikipedia.org/wiki/Personal_digital_assistant

    1. Humanities scholars can also use a project site to publicize what I call their intellectual bank.

      Sharing research on a digital platform creates the ability to reach many more people. A Ted talk, for example, can be viewed live by say, a couple thousand people; throw it up on the world wide web and your audience just grew exponentially.

    2. but it’s much easier than you think

      I beg to differ. I am currently taking three courses, a psych and a geography in addition to this one. I have spent the most time on this one, with the least results. However, that just means the rewards will be greater when I figure it all out, right? As well, everything I learn in this course could be applied to many other subjects, which is an exciting prospect. I found the black on grey extremely hard to read, something I will keep in mind when creating my own blog.

    3. One thing humanities scholars are really great at doing is reading, connecting ideas and writing about it. We know stuff! However, that work (and it is intellectual labor) is invisible and largely undervalued.  Yet it forms the foundation of all good scholarship. All people see is the footnote on an article or a note in a chapter in a book. Humanities faculty, unlike their STEM counterparts, do not have labs. We do not have a place for our work and no one sees our process. While there are bibliographic managers that help scholars manage their sources, actually writing about the things you read and how they speak to each other in a way that people can access makes it more likely that humanities scholars will have conversations with others who share your research interests.

      Sharing research encourages communication and the development of ideas and theories which is what research is all about so blog spaces and web spaces are a great way to achieve this successfully and across the web.

    1. using powerful technologies and vast stores of digitized materials that previous humanities scholars did not have.

      Libraries will never go out of style, and there is nothing quite like curling up in your favourite cozy spot, be it the beach or a recliner by the fireplace, and escaping into a good book. However, having access to a multitude of peer reviewed research articles at the tips of your fingers makes a world of difference, especially to students. As a working single Mom, having the ability to tuck my kid in at night and sit down to look up resources has made education much more accessible. For young students juggling jobs and school, I am sure this is an invaluable tool as well.

    2. No one person could digest the work’s enormous amount of material, and no single printing could render it accurately, so Mr. Foys created a prize-winning digital version with commentary that scholars could scroll through.

      It is absolutely INSANE that they were able to digitally map a 224 feet long, 11th century tapestry so that scholars could scroll through it and study it. I cannot wrap my brain around this, it's just something I never thought people would do or even could do. This fact has opened my eyes quite a bit.

    3. He offered the human genome project as an example of how an area of study can be transformed: “Technology hasn’t just made astronomy, biology and physics more efficient. It has let scientists do research they simply couldn’t do before.”

      These advanced have progressed medicine and sciences so far it's incredible. Think of all of the treatments and research data we never would've had without these advancements and technologies. Hundreds of thousands of lives have been saved or qualities of life improved due to technology and it's only going to keep going.

    1. At the ICCH conference in Columbia, South Carolina, in spring 1987 a group of people mostly working in support roles in humanities computing got together and agreed that they needed to find a way of keeping in touch on a regular basis.

      To think that we use online chats so casually, with family, friends and colleagues from all over the world, and it was only thirty short years ago that the first "electronic seminar" was introduced.

    2. Now that the Internet is such a dominant feature of everyday life, the opportunity exists for humanities computing to reach out much further than has hitherto been possible.

      I was just finishing high school when the internet became mainstream. In the following twenty-three years, we have seen an explosion of new developments as well as greater access to technology that is still relatively new. The implications for how knowledge can be shared and expanded upon is incredible.

    3. The TEI's adoption as a model in digital library projects raised some interesting issues about the whole philosophy of the TEI, which had been designed mostly by scholars who wanted to be as flexible as possible. Any TEI tag can be redefined and tags can be added where appropriate

      Question - What were some of the issues that arose with the TEI's adoption as a model in digital library projects?

      The ability to add tags where needed throughout the texts seems to be a positive aspect due to the added ease of searching key words and it being included in said search.

    4. An additional dimension was added to humanities electronic resources in the early 1990s, when it became possible to provide multimedia information in the form of images, audio, and video.

      This addition to the media made internet education and research even more advanced and helpful. And it also added a whole new level to entertainment that is very wonderful!

    5. At this time much attention was paid to the limitations of the technology. Data to be analyzed were either texts or numbers. They were input laboriously by hand either on punched cards, with each card holding up to eighty characters or one line of text (uppercase letters only), or on paper tape, where lower-case letters were perhaps possible but which could not be read in any way at all by a human being. Father Busa has stories of truckloads of punched cards being transported from one center to another in Italy. All computing was carried out as batch processing, where the user could not see the results at all until printout appeared when the job had run. Character-set representation was soon recognized as a substantial problem and one that has only just begun to be solved now with the advent of Unicode, although not for every kind of humanities material. Various methods were devised to represent upper- and lower-case letters on punched cards, most often by inserting an asterisk or similar character before a true upper-case letter. Accents and other non-standard characters had to be treated in a similar way and non-Roman alphabets were represented entirely in transliteration.

      I find it very interesting how materials made by human beings were put into a machine and rendered virtually unintelligible until man came through again by creating a code. It's fascinating to read how much work "creating the internet" was and it makes me very appreciative that I wasn't the one who had to do it.

      • 0:37 - need to recognize the networked nature of today's media
      • 0:37 - need to recognize the networked nature of today's media
      • 0:48 - work within traditional media literacy and build on things that have worked for decades, but recognize what has changed and use the strengths of networked media
      • 1:05 - how do children check sources on the internet
      • 1:20 - one of the simplest ways is to follow the links back to the source
      • 1:34 - when it's a photo, you can do a reverse image search
      • 1:50 can do a news search and sort by date to see if the news story is current
      • 2:45 - misinformation campaigns happening - mixing genuine content with misinformation
      • 3:25 - some create alternate identities or fake accounts
      • 4:25 - important to get a sense of how reliable a source is
      • 4:35 - what is the purpose of the source and what is their business model? - is there accuracy and reliability in this, then likely will trust it as a source
      • 5:10 - impact that we don't get our news from a limited number of sources
      • 5:45 - some of these sources are from friends on social media, others are algorithmically determined
      • 6:08 - some advantages and disadvantages - the old model was news curated in a newspaper; new model has the potential of getting news we may not have gotten in the old model
      • 6:20 but in the old system you had gatekeeping and 'provenance'; in online news it's sometimes an effort to see where the information originates; gate keeping falls to us now
      • 7:05 we need to train young people to do this
      • 7:30 how should we teach this?
      • 7:35 - with the concept approach you don't need to feel like an expert
      • 7:40 - success teaching media literacy from the key concepts for three decades; begin from these
      • 7:52 - media are constructed;
      • 7:55 - they have commercial considerations;
      • 7:58 they have social and political implications;
      • 8:00 that audiences negotiate meaning;
      • 8:05 that each medium has a unique form and the form influences the content
      • 8:20 these can be applied to any form of media and adapted to any grade from K-12
      • 8:30 so the key concepts of digital literacy are paralleled and are in addition to those, they don't replace the original five concepts
      • 8:40 now have implications of digital literacies in that they are networked so we need to understand the idea of the network
      • 8:50 understand that content now is shareable, that this is the default rather than the exception
      • 8:55 - the ways the tools we use influence not just the content but the ways we use them
      • 9:05 - this has an impact, an ethical dimension
      • 9:10 - these can be applied in any context and to any grade level
      • 9:20 - we have a full digital literacy curriculum that we offer (speaking about Media Smarts Canada); it has lessons on seven different aspects that a teacher or school board can use
      • 9:45 - the value of the key concepts is teachers can modify these resources to their contexts
      • 9:50 - teachers have in those key concepts what is essentially a GUIDING STAR to understand what they are supposed to be achieving with these lessons
  16. dhibeirut.wordpress.com dhibeirut.wordpress.com
  17. Apr 2019
    1. (iii) Information we collect from other sources: From time to time, we may obtain information about you or your Contacts from third-party sources, such as public databases, social media platforms, third-party data providers and our joint marketing partners. We take steps to ensure that such third parties are legally or contractually permitted to disclose such information to us.

      So while this is a free site, they can mine your data including your social media account. All of this in the name of providing you better service.

    1. Página 564 (62 del PDF): Aquí las bibliotecas pueden jugar un rol importante brindando infraestructura como desarrollando capacidades informacionales. Particularmente en Acelerar la inclusión digital puede hacer muchísimo el sector bibliotecario.

      (Página 68 del PDF) Allí se menciona a Mintic, suponfría que mediante Puntos Vive Digital, pero la Red Nacional de Bibliotecas Públicas del Ministerio de CUltura puede participar también. Tiene la infraestructura para hacerlo.

      Se podría fortalecer no sólo el programa Computadores para Educar, sino otros programas bibliotecarios que también ofrecen infraestructura, en colaboración con el programa aquí mencionado.

      Página 571 (69 del PDF): El promover el acceso y uso de TIC para ciudadanos con discapacidad suena muy abstracto: un plan con entidades como INCI, INSOR y el sector bibliotecario podrían concretarse en acciones puntuales.

      Pare C. Empoderar a ciudadanos y hogares en el entorno digital, las bibliotecas pueden ayudar con talleres, servicios de información local y referencia, que hagan de este un plan con acciones y servicios concretos.

      Podría pedirse algo sobre software libre para el fortalecimiento de la economía naranja.