34 Matching Annotations
  1. Sep 2017
    1. imiting the foregoing, Instructure shall have the right, in its sole discretion, to remove any of Your Content for any reason (or no reason),

      What? Basically since they own Instructure, they have full access to the account at any time. They can even delete content if they feel as if it is a violation with no warning. Not fair.

    2. As a condition of use, you agree not to use the Instructure Properties for any purpose that is prohibited by the Terms or by applicable law.

      Be careful what you put on the web.

    3. You agree to allow Instructure and its applicable contractors to freely host, reproduce, transmit, modify, display and otherwise use Your Content (in whole or in part) as reasonably necessary to provide the Services to you, and in accordance with Instructure’s agreement with your Entity, if applicable.

      So we are agreeing to allow Instructure to have access to our student database?

    4. may provide you, via email, notice of such non-payment and a link for you to update your payment information. If such non-payment is not remedied within seven (7) days after receiving such notice of non-payment, Instructure may terminate your access to the applicable Course

      oh, so part of our tuition bill is the access to canvas?

    5. You may not share your Account or password with anyone, and you agree to notify Instructure immediately of any unauthorized use of your password or any other breach of security.

      Again, be careful about the account and who has access to it. At the end of the day, the owner of the account has to take full responsibility for the misuse of his account.

    6. We may permit you to login to the Services with your login credentials from certain social networking sites (e.g., Facebook) (“SNS”).

      I personally do not like to attach any school related things with my facebook account. I do not allow canvas or any school website to have any access to my contacts, messages, pictures, etc.. nothing.

    7. You agree not to create or access an Account using a false identity or information, or on behalf of someone other than yourself.

      It should be illegal to do such things. Taking someones identity to create a profile for ones own benefit. This happens alot.

    8. You will be responsible for any activities, including any violation of the Terms that occur under Student Accounts created using your Instructor Account.

      But, who is responsible for everything? The professors hopefully read all this before they signed it. Because if they are every hacked or anything happens, they are taking full responsibility.

    9. are protected by copyright laws throughout the world.

      important to understand the copyright laws.

    10. PLEASE NOTE THAT THE TERMS ARE SUBJECT TO CHANGE BY INSTRUCTURE IN ITS SOLE DISCRETION AT ANY TIME. When changes are made, Instructure will make a new copy of the Terms available at the Website.

      It is our responsibility to make sure we are updated with what is going on for any changes or new developments.

    11. IF YOU DO NOT AGREE TO BE BOUND BY THE TERMS, YOU MAY NOT ACCESS OR USE THIS WEBSITE OR THE SERVICES.

      I wonder if all the terms and conditions say this. Because if they do, now I am worried. To think about how we agree to such terms BEFORE we ever read them is bad.

    12. “TERMS”

      Terms, being bolded and in all capital letters, show that it is very serious. Its a warning before the warning, allowing us to understand the consequences of what will happen if we don't abide by the terms.

    1. As for “exploitation,” this runs counter to my intellectual commitment to sharing knowledge freely. I do not mean, in this case, that art should be given away, but rather that artists and their representation should be more conscious about exactly what they are exploiting and should question the durability of a model of art centered on exploiting artists (and, as a consequence, artists exploiting other artists).

      If information is flying around the digitally for free, then people should start owning their work and patent protect them. Their artwork is theirs, no one elses.

    2. As far as “exhibition” is concerned, social media, search engines, and online databases have transformed the way knowledge is shared, and numerous disciplines have worked to respond to this change.

      Information can be shared a million times under a minute, because social media has made it easy to gain access to such things.

    3. I would be grateful if you would confirm that, in view of the above, you have no complaint with regard to the exhibition and exploitation of Jason’s work.”

      Sometimes, you never get to fight your way to the truth because others want to stay protected behind the lies. The gallery handled the situation very poorly.

    4. I see in Shulman a distinct lack of that quality of reproducibility that allows for deeper engagement, a failure to recognize prior work or to place his work in any tradition other than the superficial.

      This is the critical time in the forgery investigation. Because, Shulman should have been careful of how he described the work he produced. It shows how there is no realness behind his work.

    5. While I find these abstract images beautiful and engaging on their own, I also use them as a form of media historical research that I call “digital surrealism,” treating the abstract images in their own right in order to study media history.

      Many things are common in the social media world, especially art work that is spread wide through the internet. It is great to use others ideas in order to create and modify your own. As long as credit is given where credit is due.

    6. Rather, it means that processes underlying the work should be made available to others, so that others may likewise experiment, expand, and engage with my practice.

      When it comes to learning new things, we all learn from something or someone. We admire others works and try to use their methods to help create our own. If the teacher is willingly teaching their knowledge on the material, it makes it easier for the students to gather all the intel and grow on their own projects.

    7. Beyond the imperative to acknowledge previous work, I share my work and process in a scientific tradition of reproducibility. If these are ever going to be anything more than just pretty pictures — whether that means a scholarly use for media studies research or as transformative artistic work in a particular aesthetic tradition — then understanding what these images do and how they work is critical.

      Great idea. Isn't that what its all about? Sharing ones work with the rest of the world?

    8. Although I never mentioned copyright in my email, I could easily see the line that was being drawn: if Shulman’s work was created in “a different way” than mine, then it would not violate copyright, and if it did not violate copyright, then the gallerist could see no reason not to continue the exhibition.

      The lawyers should have tried harder, because when it comes to art, it is very easy to forge somebody else work. There is always something that is different from the original art work to the look-a-like. (learned this on White Collar)

    9. “My” work appeared all over social media and, maddeningly, on a growing number of websites that I admired.

      Social media has a way of sharing information with in a matter of seconds. Without knowing it, if you post a picture on instragram (if you're kim k) then youre picture would've been liked by nearly hundreds of thousands of people in a second. So, no wonder your work was shared.

    10. I am embarrassed now to recall how unseemly it felt to write the gallery before the opening to let them know about the situation. I was imagining the great expense of running a posh gallery in London, the effort of publicity, the time spent producing and mounting work, and here I was asking them to reconsider running the show in its current state.

      To have worked so hard on your own work, and only to have someone steal your idea is very tragic. Many people never get to claim their work but the way she handled it by talking to the gallery was good.

    11. The press and interviews collected on the gallery’s website lauded a conceptual beauty and rigor in his work, but the only thing I could see was a rip-off. “Email for price list.”

      The work was copied?

  2. Aug 2017
    1. Our social networking platforms are increasingly neo-liberal “Me, Inc” spaces where we are exhorted to monetize and to “find our niche.”  I’ve argued that in these spaces, no matter how we choose to perform our identity, we end up branding ourselves.

      So many famous Instagram, only known for their pictures on Instagram. They look nothing like their real selves. Except, they are trying to brand. They are the brand. All these photos online of someone that just loves taking pictures of themselves and making it seem like they live a lavish life. Sometimes they don't, but sometimes they do.

    2. particular subjects brought into being by our relational, mobile interactions in the world of bits and extending into the world of atoms.

      It is so easy now to communicate with someone half way across the world.

    3. Simply put: I hate when my phone rings. And I’m not alone.

      If I am on my cellphone and on one of my apps like Instagram or snap chat and I get a call, I immediately decline because I am busy. Can always get a call back.

    4. within my networks I am both a creator of my own content but also a consumer of that which my peers produce and share.

      About every hour, I check instagram and view new posts that is on my timeline. Just like how they check my page, i check theirs.

    5. and our actions and contributions are quantified. This makes the act of choosing to follow or “friend” another person always already a public, performative statement (see above) and likewise a notch in the belt of one’s personal metrics.

      Whether we post our statuses on Facebook or tweet our daily adventures on twitter, we are still exposing our thoughts to the rest of the world in under 140 characters each time.

    6. how this self differs from previous cultural conceptions of identity and subjectivity

      Everyone has a different cultural background, therefore its obvious we all have our own conceptions of how we view ourselves and those around us.

    7. as the set of data constituted by a person’s interactions online, and that specific user’s psychological relationship to his or her data trail.

      It is so crazy how ignorant I am when it comes to data trail. For example, sometimes when we download a new app, it sometimes asks if facebook messenger could have access to my contacts and pictures. If we say yes to this, that means that facebook itself has some type of access to our internal phones. iCloud sharing is dangerous too because it leaves data trails and causes others to easily hack in to others accounts.

    8. Or, is this what we choose to let people think? Assume that what we post online is who we really are?

    9. Does our digital identity, truly reflect who we are?

    10. so everyone has a contribution to offer based on their own practices and experiences..

      This is interesting because I am in love with social media. The only reason I have an iPhone is because I have almost every social media app downloaded on my phone (facebook, twitter, instagram, snapchat) etc. It is a great way to connect with others because not everyone has has every single app like I do, so whatever social media app they want to communicate with me through, I am on it.

    1. The Web We Need to Give Students

      The title itself is expressive towards the fact that the educational system has been trying to come up with many ways to help students manage their understanding of the web in general.

      some 170 bills proposed so far ...

      Its no surprise tha tthe schools can share data with companies and researchers for their own benefits. Some of these actions are violations of privacy laws.

      arguments that restrictions on data might hinder research or the development of learning analytics or data-driven educational software.

      Unbelievable! The fact that there is actually a problem with the fact that students or anyone wants their privacy, but abusing companies and businesses can't handle invading others privacies is shocking. It seems to be a threat to have some privacy.

      Is it crazy that this reminds me of how the government wants to control the human minds?

      All the proof is there with telephone records, where the NSA breaches computers and cellphones of the public in order to see who they communicate with.

      Countries like Ethiopia; the government controls what the people view on their TV screens. They have complete control of the internet and everything is vetted. Privacy laws has passed! Regardless, no one is safe. For example: Hackers have had access to celebrity iCloud accounts, and exposed everything.

      The Domain of One’s Own initiative

      Does it really protect our identities?

      Tumblr?

      Virginia Woolf in 1929 famously demanded in A Room of One’s Own — the necessity of a personal place to write.

      Great analogy! Comparing how sometimes people need to be in a room all on their own in order to clear their minds and focus on their thoughts on paper to also how they express themselves in the web is a good analogy.

      ... the Domains initiative provides students and faculty with their own Web domain.

      So, the schools are promising complete privacy?

      ...the domain and all its content are the student’s to take with them.

      Sounds good!

      Cyberinfrastructure

      To be able to be oneself is great. Most people feel as if their best selves are expressed online rather than real life face-to-face interactions.

      Tumblr is a great example. Each page is unique to ones own self. That is what Tumblr sells, your own domain.

      Digital Portfolio

      Everyone is different. Sounds exciting to see what my domain would look like.

      High school...

      Kids under 13 already have iPhones, iPads, tablets and laptops. They are very aware to the technology world at a very young age. This domain would most likely help them control what they showcase online, before they grow older. Leaving a trail of good data would benefit them in the future.

      Digital citizenship:

      It teaches students and instructors how to use technology the right way.

      What is appropriate, and what is not appropriate?

      Seldom incluse students' input...

      Students already developed rich social lives.

      Google doc= easy access to share ones work.

      Leaving data trails behind.

      Understanding options on changes made?

      Being educated on what your privacy options are on the internet is a good way of protecting your work.

      Student own their own domain- learning portfolio can travel with them.

      If the students started using this new domain earlier in their lives, there should be less problems in schools coming up with positive research when it comes to the growth of the students on their data usages.

      School district IT is not the right steward for student work: the student is.

      So to my understanding, if the student is in the school, one has to remember to move around the files saved in the domain. The school is not responsible for any data lost, because the student is responsible for all their work.

      Much better position to control their work...

      If all of this is true and valid, it should not be a big deal then for the student to post what ever they want on their domain. No matter how extreme, and excessive it seems, if that is how they view themselves, their domain would be as unique as their personalities.