1,206 Matching Annotations
  1. May 2020
    1. Early compilations involved various combinations of four crucial operations: storing, sorting, selecting, and summarizing, which I think of as the four S’s of text management. We too store, sort, select, and summarize information, but now we rely not only on human memory, manuscript, and print, as in earlier centuries, but also on computer chips, search functions, data mining, and Wikipedia, along with other electronic techniques.
    1. While tree-space has an abundance of context, leaf-space has an abundance of salience.

      I've contemplated before how to keep the wiki-like edit history of a live simultaneous multi-chat in a client like etherpad. Each speaker has a different color and can type at the same time, but how could one archive the date/timestamps along with the original as well as who each speaker was?

    1. The goal of the W3C Semantic Web Education and Outreach group's Linking Open Data community project is to extend the Web with a data commons by publishing various open datasets as RDF on the Web and by setting RDF links between data items from different data sources.
    1. Google encouraging site admins to put reCaptcha all over their sites, and then sharing the resulting risk scores with those admins is great for security, Perona thinks, because he says it “gives site owners more control and visibility over what’s going on” with potential scammer and bot attacks, and the system will give admins more accurate scores than if reCaptcha is only using data from a single webpage to analyze user behavior. But there’s the trade-off. “It makes sense and makes it more user-friendly, but it also gives Google more data,”
    2. For instance, Google’s reCaptcha cookie follows the same logic of the Facebook “like” button when it’s embedded in other websites—it gives that site some social media functionality, but it also lets Facebook know that you’re there.
    1. By itself the name John Smith may not always be personal data because there are many individuals with that name. However, where the name is combined with other information (such as an address, a place of work, or a telephone number) this will usually be sufficient to clearly identify one individual.
    2. Simply because you do not know the name of an individual does not mean you cannot identify that individual. Many of us do not know the names of all our neighbours, but we are still able to identify them.
    3. Perhaps the biggest implication of this is that, under certain circumstances, personal data includes online identifiers such as IP addresses and mobile device IDs
    4. an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person
    1. Under the scope of the CCPA, “personal information” is defined as “information that identifies, relates to, describes, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or household.”
  2. Apr 2020
    1. Before we get to passwords, surely you already have in mind that Google knows everything about you. It knows what websites you’ve visited, it knows where you’ve been in the real world thanks to Android and Google Maps, it knows who your friends are thanks to Google Photos. All of that information is readily available if you log in to your Google account. You already have good reason to treat the password for your Google account as if it’s a state secret.
    1. At the same time, we need to ensure that no information about other unsafe usernames or passwords leaks in the process, and that brute force guessing is not an option. Password Checkup addresses all of these requirements by using multiple rounds of hashing, k-anonymity, and private set intersection with blinding.
    1. Dorison, C., Lerner, J. S., Heller, B. H., Rothman, A., Kawachi, I. I., Wang, K., … Coles, N. A. (2020, April 16). A global test of message framing on behavioural intentions, policy support, information seeking, and experienced anxiety during the COVID-19 pandemic. https://doi.org/10.31234/osf.io/sevkf

    1. Daniel Markovits, author of “The Meritocracy Trap,” estimates there are about one million of these workers in America today. They work really hard, are really productive and earn a lot more. In the mid-1960s, profits per partner at elite law firms were less than five times a secretary’s salary. Now, Markovits notes, they are over 40 times.

      That latter statistic is fascinating. Are top partners 8x more more productive (relatively) than secretaries? Maybe but probably not. There's more going on that the crude info economy argument of simply greater marginal productivity. I would also look at concentration of income across law firms - i bet there has been concentration towards the top firms.

    2. But here’s the situation: The information economy rains money on highly trained professionals — doctors, lawyers, corporate managers, engineers and so on.

      But why does it rain money on them? And who else does that?

    1. For instance, if an IP address is sent with an ad request (which will be the case with almost any ad request as a consequence of internet protocols), that transmission will not breach any prohibition on sending PII to Google.
    2. Google interprets PII to exclude, for example: pseudonymous cookie IDs pseudonymous advertising IDs IP addresses
    3. data excluded from Google's interpretation of PII may still be considered personal data under the GDPR
  3. Mar 2020
    1. Article 4 of GPPR defines personal data as any information relating to an identified or identifiable natural person (‘data subject’). The definition not only covers all sorts of online identifiers (eg. networks’ IP address, device ID or cookie identifier) but also the combinations of browser characteristics that fingerprinting relies on (see: Recital 30). And since the information collected using fingerprinting allows you to identify users between sessions, it’s considered personal identifier. Hence, this technique doesn’t meet the data anonymization standards.
    1. the introduction of the EU’s General Data-Protection Regulation (GDPR) has significantly impacted the way websites and business collect, store and use both types of cookies. For one, the GDPR includes cookies in its definition of personal data, which refers to any piece of data or information that can identify a visitor.
    1. European Court of Justice (ECJ) has handed down a judgement that rules IP Addresses are Personally Identifiable Information (PII)
    2. The European Court of Justice recently ruled that dynamic IP address are now classed as PII.
    3. This was because the court felt he could not be identified based on just the IP address
    1. Comment puis-je être informé de l’évolution de la situation?Vous pouvez trouver les informations, régulièrement réactualisées,sur le site Internet de la circonscription, de l’école, l’environnement numérique de travail ou sur les affichages de l’école. Pour ce qui est plus général, reportez-vous aux grands sites institutionnels, notamment celui du ministère de l’éducation nationale et dela jeunesse: education.gouv.fr
    1. knowledge that is part of what it means to be a free person in the present historical context of the dawn of the information age

      definition - liberal as in free, as in free from control of "clever men"

    2. an extended notion of information literacy is essential to the future of democracy, if citizens are to be intelligent shapers of the information society rather than its pawns
    1. information literates.They have learned techniquesand skills for utilizing the wide range ofinformation tools as well asprimary sources in molding information solutions totheir problems

      initial definition

    2. Information has value indirect onortion to the control it rovides him overwhat he is and whathe can become

      Information has Value

    1. CIVIC will make no attempt to identify individual users. You should be aware, however, that access to web pages will generally create log entries in the systems of your ISP or network service provider. These entities may be in a position to identify the client computer equipment used to access a page.
    1. Oracle hashes the direct and indirect identifiers (such as IP address and cookie ID) in the Sample Dataset. ‘Hashing’ means the personal information cannot be associated with an individual without the use of additional information.
    1. Personally identifiable information (PII) is information that, when used alone or with other relevant data, can identify an individual. PII may contain direct identifiers (e.g., passport information) that can identify a person uniquely, or quasi-identifiers (e.g., race) that can be combined with other quasi-identifiers (e.g., date of birth) to successfully recognize an individual.
    1. Watch our REAL ID Video on YouTube!

      optional information video information

    1. Alert: New office locations are now accepting reservations for license and permit transactions at the Adam Clayton Powell Jr. State Office Building in Harlem, Empire State College in Selden, and Shirley A. Chisholm State Office Building in Brooklyn.

      General information types of products Location of service

  4. Feb 2020
    1. Upon the efficient consumption and summarizing of news from around the world. Remember? from when we though the internet would provide us timely, pertinent information from around the world? How do we find internet information in a timely fashion? I have been told to do this through Twitter or Facebook, but, seriously… no. Those are systems designed to waste time with stupid distractions in order to benefit someone else. Facebook is informative in the same way that thumb sucking is nourishing. Telling me to use someone’s social website to gain information is like telling me to play poker machines to fix my financial troubles.. Stop that.
  5. Jan 2020
  6. Dec 2019
  7. Nov 2019
    1. Clinic to view the NSAID value sets

      Drugs involved

    2. Click to view the warfarin value sets

      Drugs involved

    3. Concurrent use of both medications puts patients at a significant risk of bleeding that warrants appropriate management strategies

      Clinical consequences and Serious

    4. Algorithm

      Patient Context and Operational classification

    5. Warfarin is a vitamin K antagonist, which competitively inhibits a series of coagulation factors, as well as proteins C and S. These factors are biologically activated by the addition of carboxyl groups depending on vitamin K. Warfarin competitively inhibits this chemical reaction, thus depleting functional vitamin K reserves and hence reducing the synthesis of active coagulation factors.

      Mechanism

    6. Non-selective NSAIDs inhibit cyclooxygenase (COX) enzymes, COX-1 and COX-2 at different extent, leading varying effects on bleeding.(11, 12) COX-1 catalyzes the initial step in the formation of thromboxane (TxA2), and prostaglandins.(11, 12) TxA2 stimulates platelet aggregation.(13) Prostaglandins protect the gastrointestinal tract by increasing mucosal blood flow and the thickness of mucus layer,  stimulating bicarbonate secretion, and reducing gastric acid secretion.(

      Mechanism

    7. Misoprostol also has been demonstrated to help prevent gastric ulcer in those who receive NSAIDs.

      Recommended action

    8. Therefore, alternate management strategies such as utilizing proton pump inhibitors or misoprostol may help reduce bleeding events.

      Recommended action

    9. Thus, avoiding and/or limiting the use of NSAIDs is an ideal strategy to prevent serious complication from these medications.

      Recommended action

    10. Both corticosteroids and aldosterone antagonists have been shown to substantially increase the risk of upper gastrointestinal bleeding in patients on NSAIDs, with relative risks of 12.8 and 11 respectively compared to a risk of 4.3 with NSAIDs alone

      Risk modifying factor

    11. Several risk factors for NSAID-related gastroduodenal bleeding are old age, a history of peptic ulcer disease, high dosages of NSAIDs, concomitant use of different NSAIDs.

      Risk modifying factor

    12. The VKORC1 and CYP2C9 genotypes are the most important known genetic determinants of warfarin dosing. Warfarin targets VKORC1, an enzyme involved in vitamin K recycling. The variants CYP2C9*2 and *3, required with a lower dose of warfarin. The FDA-approved drug label for warfarin states that CYP2C9 and VKORC1 genotype information, when available, can assist in the selection of the initial dose of warfarin.

      Risk modifying factor

    13. Concomitant NSAIDs occur with 24.3% of warfarin courses of therapy

      Frequency of exposure

    1. all the blue checkmark really does is say that the person is who they say they are, that they are the person of that name and not an imposter.

      Evidence is what makes information reliable, not a source. Even the top experts are human and can make mistakes or present information from a particular perspective, without being neutral or impartial; but evidence presents undeniable facts.

    1. Since games typically have perfect information, the outcome of the game is completely driven by the actions of the players.
    1. The most interesting examples have been the weird ones (cf. HI7), where the language model has been trained on narrower, more colorful sets of texts, and then sparked with creative prompts. Archaeologist Shawn Graham, who is working on a book I’d like to preorder right now, An Enchantment of Digital Archaeology: Raising the Dead with Agent Based Models, Archaeogaming, and Artificial Intelligence, fed GPT-2 the works of the English Egyptologist Flinders Petrie (1853-1942) and then resurrected him at the command line for a conversation about his work. Robin Sloan had similar good fun this summer with a focus on fantasy quests, and helpfully documented how he did it.

      Circle back around and read this when it comes out.

      Similarly, these other references should be an interesting read as well.

    1. Teaching and learning methods: opreparing for teaching ofacilitating the integration of knowledge, skills and attitudes oteaching and learning in groups ofacilitating learning and setting ground rules oexplaining ogroup dynamics omanaging the group olectures osmall group teaching methods and discussion techniques oseminars and tutorials ocomputer based teaching and learning – information technology and the World Wide Web ointroducing problem based learning ocase based learning and clinical scenarios

      this website is consisted of available resources.

      Rating: 9/10

    1. A description field may include HTML elements or Markdown, with special characters escaped or encoded.

      For the ASUM Information and Referral project, would we prefer HTML or Markdown? I think HTML would be preferable.

    1. Science sorely needs best practices in visual communication as well as in information design, a mature field with quantitative methods.

      Visual communication has scientifically proven grounds; it is not just some obscur magic from an artistic genius

  8. Oct 2019
  9. Sep 2019
    1. information privilege

      Char Brooks's 2014 post "On Information Privilege" examines this topic from Brooks's perspective as a librarian and educator.

      Duke University's Library 101 Toolkit provides additional information, classroom activities, student readings, and a CC-BY-NC-licensed infographic about information privilege. (Click infographic hyperlink for larger version.)

      Works Cited:

      Brooks, Char. "On Information Privilege" Infomational, 1 December 2014, https://infomational.com/2014/12/01/on-information-privilege/. Permalink: perma.cc/Y7AT-C6VZ.

      "Information Privilege." Library 101 Tookit, Duke University, 13 August 2018, https://sites.duke.edu/library101_instructors/2018/08/13/information-privilege/. Permalink: perma.cc/DNY3-HHUM.

    1. He is now intending to collaborate with Bourne on a series of articles about the find. “Having these annotations might allow us to identify further books that have been annotated by Milton,” he said. “This is evidence of how digital technology and the opening up of libraries [could] transform our knowledge of this period.”
    2. “Not only does this hand look like Milton’s, but it behaves like Milton’s writing elsewhere does, doing exactly the things Milton does when he annotates books, and using exactly the same marks,” said Dr Will Poole at New College Oxford.

      The discussion of the information theoretic idea of "hand" is interesting here, particularly as it relates to the "hand" of annotation and how it was done in other settings by the same person.

    1. In Reconstruction in Philosophy (1920), Dewey argues against the longstanding Platonic bias of epistemology: “We tend to think of it [knowledge] after the model of a spectator viewing a finished picture rather than after that of the artist producing the painting.” It’s this spectator bias that explains why we don’t routinely recognize the knowledge embodied in our hands – sewing, cooking, caring for a baby or an elder, welding  – especially when that activity gets our hands dirty.5
    1. The learner’s key skills shift away from certainty and towards decision making between various options.

      from certainty to decision making - moving from simplicity to complexity, from knowing what to do to knowing ways to do things

  10. Jul 2019
    1. Mutual information is one of many quantities that measures how much one random variables tells us about another. It is a dimensionless quantity with (generally) units of bits, and can be thought of as the reduction in uncertainty about one random variable given knowledge of another. High mutual information indicates a large reduction in uncertainty; low mutual information indicates a small reduction; and zero mutual information between two random variables means the variables are independent.
    1. In 1996 and 1998, a pair of workshops at the University of Glasgow on information retrieval and human–computer interaction sought to address the overlap between these two fields. Marchionini notes the impact of the World Wide Web and the sudden increase in information literacy – changes that were only embryonic in the late 1990s.

      it took a half a century for these disciplines to discern their complementarity!

    1. The web, in yet another example of its leveling effect, allows nearly everyone to see nearly every interface. Thus designers can learn rapidly from what others have done, and users can see if one web site's experience is substandard compared to others.
  11. Jun 2019
  12. May 2019
    1. teaching facts is a poor substitute for teaching people how to learn, i.e., giving them the skills to be able to locate, evaluate, and effectively use information for any given need

      equates learning how to learn with IL

    2. little in their environment fosters active thinking or problem solving

      an appeal for open education

    3. They remain one of the few safeguards against information control by a minority

      ominous and prophetic

  13. Apr 2019
    1. But even when both milk and sugar are taken out of the equation, chocolate appears to play a role in pimple formation.

      "Future studies with a larger study group using dark chocolate as well as specific components of chocolate, such as the flavonoids coupled with more diligent documentation of the participants' diets and menstrual cycles may provide valuable and comprehensive dermatology guidance to acne patients" (Delost, Delost, & Lloyd, 2016).

    2. Interestingly, jelly beans didn't have an effect on acne. But when people ate chocolate, their pimples increased.

      The pimples increased with "the chocolate consumption group [having] a statistically significant (P < .0001) increase in acne lesions (+4.8 lesions) compared with the jellybean consumption group (−0.7 lesions)" (Delost, Delost, & Lloyd, 2016).

    3. All patients received both "treatments."

      When they say all patients received both treatments they are referring to the "Crossover analysis was done 4 weeks later. There was no statistically significant difference in the number of acne lesions between the 2 groups when the crossover occurred (P = .322), which demonstrates adequate washout from the first part of the study" (Delost, Delost, & Lloyd, 2016).

    4. glycemic load

      "The link of chocolate to acne vulgaris was replaced by the theory that a high glycemic index may contribute to acne vulgaris. In this study, we attempted to revisit the controversial topic by assessing the development of new acne lesions following ingestion of chocolate versus a nonchocolate candy with a similar glycemic load." (Delost, Delost, & Lloyd, 2016).

    1. Our culture is defined by the music we listen to, and the way it is portrayed in the media. Every culture around the world has a different style of song or dance that represents their traditions. Culture can not only be changed through popular songs, but is best represented through music. One of the best ways to understand a foreign culture is by listening to the music that is favorable among the people whose culture you are trying to understand. Music is one of the most powerful forms of art between cultures.

      Music has the power to redefine cultures. We can see this through generational differences between song preferences. For example, American country music back in the late 1900s has a much different feel and style compared to country music now in 2019. While keeping within the same genre, this style of music touches upon different subjects, and uses different instruments, sounds and lyrics. Even early hip-hop has evolved from its beginnings. Hip-hop music is considered the most popular music as of right now, but it has not always been that way. Each generation favors different types of genres of music, and it is clear which backgrounds over the years have favored certain genres of music. As much as music can differentiate cultures, and generations, music can bring people of completely different background together by its artistic flavor and general popularity throughout the mainstream media.

    1. Virtual reality meets this bar when it comes to one-on-one conversations: when we analyzed the EEG results of participants who chatted in virtual reality, we found that on average they were within the optimal range of cognitive effort. To put it another way, participants in virtual reality were neither bored nor overstimulated. They were also in the ideal zone for remembering and processing information.
    1. How does having diverse members in a group increase the critical thinking of the group?

      It is just as important to define concepts as it is to identify them. For example, diversity will actually mean different things in different circumstances. This is a subtle but important distinction- you must have a clear (if not absolute) definition of a cncept before you begin to research it.

    1. Evidence to win a bet with a rival in the dorm.

      What are the stakes? Money? Bragging rights? Public humiliation for the loser? The secrets of creation? (I have a sneaking suspicion that this will not be considered, considered a substantive annotation, so I will make an extra).

    1. Only one version of the truth is presented about controversial issues.

      Very important. You can create a false impression easily simply by omitting information, as opposed to outright lying. The "sin of omission" is a huge and often unrecognized problem in researching information. If you know there is another side, please gather information about it. Ideally, study until you can understand why your opponents feel the way they do.

    1. Digital sociology needs more big theory as well as testable theory.

      Here I might posit that Cesar Hidalgo's book Why Information Grows (MIT, 2015) has some interesting theses about links between people and companies which could be extrapolated up to "societies of linked companies". What could we predict about how those will interact based on the underlying pieces? Is it possible that we see other emergent complex behaviors?

    1. When we think about caring for our neighbors, we think about local churches, and charities—systems embedded in our communities. But I see these technological systems as one of the main ways that we take care of each other at scale. It’s how Americans care for all three hundred million of our neighbors, rich or poor, spread over four million square miles, embedded in global supply chains.
  14. Mar 2019
    1. Given that engagement and integration(i.e., involvement in the various social and academic ac-tivities of university/college life) are considered key tosuccessful academic achievement (see Tinto2006), theidentifying features of social anxiety, including fear ofnegative evaluation and distress and avoidance of new orall social situations (Ginsburg et al.1998), may be espe-cially disadvantageous in the social and evaluative contexts

      The author provides context for the problem to be clearly understood by the readers and those who do not have any sort of background information concerning the topic

    1. This page is not necessarily attractive to look at but it is a thorough presentation of various features of infographics. Features are organized by topic and generally presented as a bulleted list. The focus of the page is how to use infographics for assessment; however, the page is useful to those who wish to learn how to create infographics and to identify the software tools that can be used to create them easily. Rating 4/5

    1. This link is for the Association of Information Science and Technology. While many of the resources are available only to those who are association members, there are a great many resources to be found via this site. Among the items available are their newsletter and their journal articles. As the title suggests, there is a technology focus, and also a focus on scientific findings that can guide instructional designers in the presentation and display of visual and textual information, often but not exclusively online. Instructional designers are specifically addressed via the content of this site. A student membership is available. Rating 5/5

    1. WebQuests typically contain an introduction, task, process, evaluation, and conclusion

      The process of obtaining information from the web which can help students to understand the type of information they are recieving and deciding if it is relevant and accurate

    1. Engelbart insisted that effective intellectual augmentation was always realized within a system, and that any intervention intended to accelerate intellectual augmentation must be understood as an intervention in a system. And while at many points the 1962 report emphasizes the individual knowledge worker, there is also the idea of sharing the context of one’s work (an idea Vannevar Bush had also described in “As We May Think”), the foundation of Engelbart’s lifelong view that a crucial way to accelerate intellectual augmentation was to think together more comprehensively and effectively. One might even rewrite Engelbart’s words above to say, “We do not speak of isolated clever individuals with knowledge of particular domains. We refer to a way of life in an integrated society where poets, musicians, dreamers, and visionaries usefully co-exist with engineers, scientists, executives, and governmental leaders.” Make your own list.
  15. Feb 2019
    1. The result is that these new knowledge territories become the subject of political conflict. The first conflict is over the distribution of knowledge: “Who knows?” The second is about authority: “Who decides who knows?” The third is about power: “Who decides who decides who knows?”
    1. The summation of human experience is being expanded at a prodigious rate

      The prodigious rate itself is expanding, is it a scale even conceivable at this time? (insert the usual stats of YouTube content growing at 300 hours a minute).

      I'm anxious to read if he anticipates the notion of turning to automation to try and handle this organization- it always seemed that Bush's vision was human focused.

    1. These discussions can be fraught with power dynamics, resulting in controversial issues appearing unbalanced as more powerful authors block alternative viewpoints.

      Students need to know which information is going to be unbiased and true. There are MANY internet sources that use shock value information or biased information rather than presenting corect information.

    1. Using questions and keywords to find the information you need

      Learning how to search correctly can help to find more accurate information faster by using keywords and other searching practices.

  16. Jan 2019
    1. Our students have an unprecedented breadth of information resources at their fingertips, yet there is a significant danger that they will miss the opportunity to engage with those voices that hold the greatest prospects for growth. Collecting confirmations of one’s existing views is a poor substitute for meaningful learning.
    2. For example, an individual who believes that knowledge in a certain domain consists of a set of discrete, relatively static facts will likely achieve a sense of certainty on a research question much more quickly than someone who views knowledge as provisional, relative, and evolving.

      But when curricula reinforce the confusion of speed and intelligence, that time may be precious.