1,093 Matching Annotations
  1. Jul 2021
    1. Inclusive, or bias-free, language uses expressions and terms that are likely to be perceived as neutral or welcoming by everyone, regardless of their gender, race, religion, age, etc. Using inclusive language can help people from diverse backgrounds feel more welcome and encourages precise, high quality work. As noted in a recent McKinsey survey, employees who feel more included are nearly three times more likely to feel excited by, and committed to, their organizations.

      Reason for using inclusive, bias-free language—it helps people feel welcome and creates an excited, committed community.

    1. Inside Facebook’s Data Wars

      My comment submitted to the NYTimes for consideration:

      If Facebook creates its own "Top 10" list, would it be believed? How far would Facebook go to devise an algorithm that shows a "Top 10" that they want the world to see based on whatever subset of internal signals they want to show? Would we know if a "Top 10" list was simply made up in the marketing department?

      Is it the responsibility of any regulator to check to see a "Top 10" list has any basis in reality? If it is no regulator's responsibility, how would well-informed citizens discover if they have been mislead? What recourse would a regulator have to put Facebook on the straight-and-narrow? If Facebook doesn't have to publish internal metrics, how firm would a citizen's case for fraud in civil court be?

      If the controlling interest in Facebook is Mark Zuckerberg himself [1], how can the public hold him accountable for Facebook's actions/inactions? If Mr. Zuckerberg used his wealth to buy off members of Congress, the executive branch, and the courts, would we know?

      Correct answers only. Our democracy and perhaps the continued existence of humankind are at stake.

      [1] https://www.vox.com/recode/2019/5/30/18644755/facebook-stock-shareholder-meeting-mark-zuckerberg-vote

    2. Mr. Zuckerberg is right about one thing: Facebook is not a giant right-wing echo chamber.But it does contain a giant right-wing echo chamber — a kind of AM talk radio built into the heart of Facebook’s news ecosystem, with a hyper-engaged audience of loyal partisans who love liking, sharing and clicking on posts from right-wing pages, many of which have gotten good at serving up Facebook-optimized outrage bait at a consistent clip.

      Facebook is not a giant echo chamber, but there is an echo chamber inside of it. Is it Facebook without the echo chamber? What is the monetization factor of the echo chamber participants versus the non-participants?

    3. “And it doesn’t want to make the data available for others to do the hard work and hold them accountable.”

      Facebook is such a black box that researchers and journalists that want to hold it accountable rely on Facebook for that data.

    4. The company, blamed for everything from election interference to vaccine hesitancy, badly wants to rebuild trust with a skeptical public. But the more it shares about what happens on its platform, the more it risks exposing uncomfortable truths that could further damage its image.

      Blamed for these things, but is the research conclusive about Facebook's effect on this society ills? Does "the more it shares about what happens on its platform" implicate it further in spreading misinformation about the election and anti-vax messaging?

    1. Some of these examples contain characters that are invalid, such as inline comments

      Sigh. Just another reminder of why JSON without comments stinks.

    2. person, group, organization, thing, or concept

      It may be further answered later in the spec, but this list sounds like an list of abstracts. Can the subject be an actual thing like a web resource?

  2. Jun 2021
    1. MATT: That the deeply traumatic act of coming into existence in the air breathing land world.  [SOUND CLIP, Baby: [Baby crying]] MATT: The severity of it and the harshness of it forces you to adapt. ANNIE: Right. MATT: In order to survive.

      Trauma is necessary for life. Part of a story about how a baby breathes its first Breath.

    1. she told me last fall that she expected this recognition of the 5 micron error and the kind of subsequent changes would take a generation or take 30 years that she hoped she would live to see it. And so, for it to happen in a year, both because of the urgency of the crisis and because of the tenacious pushing that she and others did, the reckoning that this pandemic has led to will have positive consequences for public health at long outlive this pandemic.

      What is the spark that moves the acceptance of a new finding from a generation to a year? Can that be harnessed?

      I wonder about middle school and high school science teachers; they must face this constant challenging of how they learned things, only to have new science force them to teach something that they thought wasn’t true.

    1. MARGARET ATWOOD Young people worry a lot more than older people. And the reason they worry a lot more than older people is that they don't know the plot of their own lives yet. They don't know how it's going to turn out for them. Will they meet their true love? Will they be successful? At my age, I kind of know how the story goes. So should I get hit by a truck tomorrow? The plot will pretty much have unfolded.

      Young people are more anxious because the course of their lives is unknown—there are so many doorways yet to be gone through. Older people have seen much of the arc of their life stories.

      Is that the root of anxiety—not knowing the outcome? Can one be at peace with that?

    1. Now, if you’re on a decentralized platform, data is distributed across many servers or computers. Those aren’t necessarily owned or operated by the creator of the platform you’re using. The power, the authority, the control is spread out. A decentralized system gives everyone more freedom, but it also means that because the data is distributed, there’s no authority who gets the final word, so it’s harder to find and remove illegal or objectionable content.

      Holy cow...listening to this brought back dormant memories. UUCP then Bitnet for point-to-point email exchange. IRC, of course. Then NNTP for newsgroups. Later in the podcast, they interview someone with Mastodon who talks about funding an instance for $500/month using Patreon. Could there be a resurgence of distributed communication tools run by dedicated hobbyists? Should there be?

    1. One thing Amazon doesn’t bring up is that athletes train for an event with a definite end date. Athletes aren’t competing day in and day out, and they have time to rest and recuperate in between.

      More on the [[Societal Cost of Advancing Technologies]] theme, along with a bit of [[Two-tier workers]].

    1. When contacted by Ars, Charter said that "Spectrum Internet retail prices, speeds, and features are consistent in each market—regardless of the competitive environment." But "retail prices" are the standard rates customers pay after promotional rates expire. Stop the Cap showed that Charter's promotional rates vary between competitive and noncompetitive areas.

      This is key to understanding the article, and should be further up towards the top. The retail price is the came, but the promotional price offered to new customers is different. This isn't the full story, because the length of time the promotional price is locked in is different, as is the installation price.

    1. My own Dewey Decimal Classification is 306.765, for bisexual. But that isn’t my favorite word; I believe it reinforces the gender binary and overemphasizes sex. During my long relationship with a woman, I tried calling myself a lesbian, but that didn’t fit either. When we were over, I stopped calling myself anything.
    2. People often ask me why, in the digital age, libraries still have print books with obscure coded labels. I find comfort in categorization. But knowledge, like love, is as vast and ever-changing as the ocean.

      Related notion of the classification of physical items (of course): a physical item can only be shelved in one place...given one classification, as it were. But knowledge, like love, defies being put in one place. Nice.

    1. The published fee for a Visa Signature Preferred card on a restaurant charge, for example, is 2.7 percent.

      This is true! See page 7 of the linked document with the heading "Visa U.S.A. Consumer Credit Interchange Reimbursement Fees" (also on Wayback).

    2. Credit card rewards aren’t generally taxed like regular income, so to a certain extent, they’re even a bigger benefit than they appear on paper. In a 2019 piece for NBC News, Klein offered up a concrete example: Say a family spends $80,000 a year on a credit card and gets 1.5 percent cash back, translating to $1,200. By his estimate, that’s equivalent to about $2,000 in pre-tax earnings.

      Credit card rewards—a kind of income—are not taxed. Those that use reward cards—likely more affluent people—effectively get a tax break by making purchases with a credit card over someone who pays in cash.

      This article doesn't describe it, but I wonder to what extent this is true for debit cards. Debit cards can offer rewards, too, but the equivalent of the interchange fees is much less, I think.

    1. About 81 percent of rural households are plugged into broadband, compared with about 86 percent in urban areas, according to Census Bureau data. But the number of urban households without a connection, 13.6 million, is almost three times as big as the 4.6 million rural households that don’t have one.

      Demonstrating the difference in population, 81% of rural households versus 86% of urban households, but there are 3x the number of urban households that don't have broadband access.

    1. Finally, one should probably not underestimate the importance of a haven in society that supports community without financial barriers; 75% believes that the public library strengthens the local community and environment. This is basically where the modern library really stands out from other learning and cultural institutions.

      The author calls out "haven" as an underestimated characteristic. That rings true for me as well. How can libraries build on this perception in its service offerings and its justification for existence?

    2. Haven: The public library is a haven in everyday life, where citizens find room for contemplation and take time for themselves and each other Perspective: The public library is a credible communicator of knowledge and gives citizens an enlightened and critical perspective on life. Community: The public library is a place where citizens experience togetherness – alone, or with others – and where they experience that materials and facilities are a common property without financial barriers to use. Creativity: The public library is a source of inspiration and stimulates citizens imagination. The public library can also help motivate citizens to try something new and acquire new skills

      The study found these four features of public libraries to be of significance: Haven, Perspective, Community, and Creativity. It might be interesting to compare this with the ALA Library Bill of Rights—which speaks almost exclusively of content ("credible communicator of knowledge")— or Ranganathan's Five laws of library science—which, too, is almost all about content. If these are the ultimate metrics that libraries are using to guide their services, what is being missed by not including the three other facets.

    1. From 1999 to 2017, the number of alcohol-related deaths in the U.S. doubled, to more than 70,000 a year—making alcohol one of the leading drivers of the decline in American life expectancy.

      Cites NIH news release.

    2. he later became one of the country’s leading whiskey distillers. But he nonetheless took to moralizing when it came to other people’s drinking, which in 1789 he called “the ruin of half the workmen in this Country.”

      George Washington was "one of the country's leading whiskey distillers? Again...verify before reuse.

    3. The Mayflower landed at Plymouth Rock because, the crew feared, the Pilgrims were going through the beer too quickly.

      Interesting anecdote; I've never heard this before. If used further, verify with other sources.

  3. May 2021
    1. Newsrooms ought to consider adopting tools to suit their workflows and make link preservation a seamless part of the journalistic process. Partnerships between library and information professionals and digital newsrooms would be fruitful for creating these strategies.

      One such tool that could be used is [[RobustLinks]], which ties into web archive services. Such services could even be run by the publisher itself.

    2. Thirteen percent of intact links from that sample of 4,500 had drifted significantly since the Times published them. Four percent of reachable links published in articles from 2019 had drifted, as compared to 25 percent of reachable links from 2009. 

      Researchers conducted a human review of 4,500 links.

    3. Of these deep links, 25 percent of all links were completely inaccessible. Linkrot became more common over time: 6 percent of links from 2018 had rotted, as compared to 43 percent of links from 2008 and 72 percent of links from 1998. Fifty-three percent of all articles that contained deep links had at least one rotted link. 

      Analyzing 2.3m links from 550k articles. About 1.6m were "deep links" (beyond the home page). Link rot appears as a linear function over time.

    1. She understood that, you know, we have power and sometimes you have to wait ‘til the moment is right.

      Quote from Kitt Shapiro, mother to Eartha Kitt, on how her mother reacted to a situation when she was thrown out of a amusement park, only to be at a photoshoot days later in front of the park and remarking to the press how she was asked to leave. An example of using personal power to affect change with a greater impact.

    1. the reality is when we founded the company, there was no centralized data on how these attacks happened. And we felt that the first thing you have to do to solve the problem is to collect the data. And I think we've done that very well.

      Although being a company that has its basis in helping others respond to ransomware attacks does perpetuate the cycle of attacks, being a company in the space with a wide view of the landscape gives them data that can be used to ultimately end the practice.

    2. What I would say is that the contributory factors that have led us to where we are today are as much socioeconomic as they are other things. There are such low barriers to entry to cybercrime, and there are lots of well-educated, sometimes STEM-educated individuals in lots of parts of the world. They don't have the job prospects that will pay them the money that they aspire to make.

      Contributing factors:

      • Low barriers to entry
      • Well-educated people with poor job prospects
      • Jurisdictions that look the other way because of income for local economy
    3. The answer is you have very little, but you still have to find ways to negotiate successfully on behalf of your client. You can't just concede. You can't look desperate. And so you have to find ways to draw the negotiation to some semblance of a successful conclusion.

      Negotiating tactic: you may have little leverage, but you can't concede and you can't look desperate. Keep your eye on the goal of having a successful outcome.

    4. "It's not a foregone conclusion that a company has to pay a ransom," he says. Large companies may need days to figure out whether their data is safely backed up. They can start talking just to buy time. "We'll kick off negotiation, knowing that a very likely outcome is that we actually don't end up paying."

      First—there are companies that specialize in negotiating ransomware attack responses. Secondly, it is entirely possible that a company may start negotiations to stave off harsher ransoms while figuring out if their internal processes can safely recover systems without paying the ransome.

    1. Bitdefender recognized that DarkSide might correct the flaw, Botezatu said. “We are well aware that attackers are agile and adapt to our decryptors.” But DarkSide might have “spotted the issue” anyway. “We don’t believe in ransomware decryptors made silently available. Attackers will learn about their existence by impersonating home users or companies in need, while the vast majority of victims will have no idea that they can get their data back for free.”

      Counter-argument: the attackers would have found this vulnerability anyway, and a public announcement levels the field for everyone that is affected—not just those with the means to know where to go for help.

    2. Wosar said that publicly releasing tools, as Bitdefender did, has become riskier as ransoms have soared and the gangs have grown wealthier and more technically adept.

      Careless disclosure caused ransomware creators to improve their code before it was necessary, which raises societal cost of dealing with attacks.

    3. The incident also shows how antivirus companies eager to make a name for themselves sometimes violate one of the cardinal rules of the cat-and-mouse game of cyber-warfare: Don’t let your opponents know what you’ve figured out.

      Individual good—promotion of the company's skills—over the public good—reducing the impact of the ransomware attacks. #ITethics

    1. The format of this property depends on the current value of sort. When search_after is used in conjunction with a chronological sort value—e.g. updated, created—this parameter should be formatted as an ISO 8601 string. It may also be formatted in ms (milliseconds) since the Epoch.

      A sort order of asc also seems to be a requirement, otherwise the API returns earlier hits.

    1. The final challenge was about assessing the level of use of different parts of the Schema.org model. If we wanted to propose a change in how a term was documented or suggest a revision to its expected values, it is difficult to assess the potential impact of that change. There’s no easy way to see which applications might be relying on specific parts of the model. Or how many people are publishing data that uses different terms.

      Anticipate difficulty—or at least potential confusion—when taking a broader, open community's vocabulary and making more narrow definitions that fit your domain.

    2. Too much flexibility made it harder for implementers to understand what data would be most useful to publish. And how to do it well. Many publishers were building new services to expose the data so they needed a clearer specification for their development teams. We addressed this in Version 2 of the specifications by considerably tightening up the requirements. We defined which terms were required or just recommended (and why). And added cardinalities and legal values for terms. Our specification became a more formal, extended profile of Schema.org. This also allowed us build a data validator that is now being released and maintained alongside the specifications.

      Suggestions for communities considering using [[SchemaOrg]] as a basis. These suggestions are of particular importance for implementers who are not used to open standards development work. Be more prescriptive, which offers the option of setting up a conformance validator.

    3. Our initial community sessions around the OpenActive standards involved demonstrating how well the existing Schema.org model fitted the core requirements. And exploring where additional work was needed. This meant we skipped any wrangling around how to describe events and instead focused on what we wanted to say about them. Important early questions focused on what information would potential participants find helpful in understanding whether this is specific activity or event is something that they might want to try? For example, details like: what activities they involved and for what level of competency?

      Applying [[SchemaOrg]] to a particular use case meant skipping the already-defined parts (like describing events) and focusing on information and terms that are specific to the target domain.

    4. For many people Schema.org may be more synonymous with publishing data for use by search engines. But as a project its goal is much broader, it is “a collaborative, community activity with a mission to create, maintain, and promote schemas for structured data“.

      Broader use of [[SchemaOrg]]

    1. Workers were extremely limited in functionality to start; just a bit of stateless Javascript code running in a V8 isolate, but as close to users as possible. In 2018 Cloudflare added a key-value store, giving Workers access to highly distributed eventually-consistent data storage; in 2020 the company introduced Workers Unbound, dramatically expanding Workers capabilities, and Durable Objects, which not only store data but also state, which means a single source of truth.

      With a CDN foundation, Cloudflare added Workers to move processing to the edge. Then it added eventually-consistent key-value storage. Now it is adding "Durable Objects" of data-and-state that move across the Cloudflare network to where they are closest to the users.

    2. What Cloudflare had in its favor, though, was the most potent advantage on the Internet: the service, much like Google a decade-earlier with its link-based ranking system, got better with use. This was because Cloudflare paired its content delivery network with DDoS protection; the latter was extremely attractive to websites, gave Cloudflare an in with ISPs who valued the protection to build point-of-presence servers around the world, and, critically, gave Cloudflare better-and-better data about how data flowed around the world (improving its service) even as it improved its CDN capabilities.

      [[DDoS]] protection made the service valuable to ISPs as well as content providers.

    3. That was basically Prince’s value proposition: Cloudflare’s CDN would be cheaper (free), simpler (just change DNS servers), smaller (only 5 servers to start), and more convenient (ridiculously easy!).

      How Cloudflare would use [[Innovator's Dilemma]] principles to start at the fringe and move up-market.

    1. BRENDAN CHAMBERLAIN-SIMON It really does, and it's so funny. I went to visit my parents back in June. I got to drive the Mars rover from my childhood bed. You know, my mom used to say, you'll never make anything happen if you don't get out of bed. [BROOKE CHUCKLES] Touché.

      Good quote about what you can do from your childhood bedroom.

    1. Colati argues in the panel (55:52) that our perceived notions of quality should go down, such as digitization at lower resolution

      Colati's argument was for a refocusing of effort towards lower quality reference scans for a wider range of material, then see what floats to the top for better treatment. This comment was also made in the context of machine-generated metadata as a way to try to get past the human-generated metadata bottleneck.

    2. Their audience is, largely, academic library and IT administrators, although sometimes they let some of folks in the “unwashed masses” (26:44) attend if we’re presenting.

      "unwashed masses" is an unfair pull from the talk. Scheinfeldt's reference was not to CNI attendance, but towards "democratization of access to [archives]"

    3. Sourcery endeavors to make document requests “easy” by “[giving] archival staff and patrons one easy platform for requesting and receiving scans”.

      Definition of "Sourcery"

    1. Scheinfeldt

      33:08 — there has been a bias towards when an archival document is digitized, it is done at the highest quality level and put in the best system with the most complete metadata. That there is only one scan of a document on the archive's website; that there can't more than one scan of document.

      But there are already parallel digitization paths, mostly driven by individual researchers for reference needs. Do they need to be integrated or should they exist in parallel?

      56:54 — Discovery though footnotes in books is underestimated by archivists versus use of finding aids. Sourcery founding idea was linking footnotes to finding aids for serendipitous discovery.

    2. Greg

      31:40 — Analog collections are managed at the collection or box or folder level. Digitizing an item in a folder almost mandates item-level metadata.

      55:49 — Turn the formal digitization model on its head...put as much out there as possible in whatever low quality you can do, and then see what rises to the top.

    3. Sourcery Project

      Does the Sourcery Project provide new signals to archives on where to prioritize effort for systematic digitization?

      Cliff, prompted by audience text questions, asks if there is a place for outreach for remote access to archives...to have a digitization specialist on a call with a remote scholar flipping through the contents of a folder or box?

    4. Dan

      29:00 — Opens up collections to access beyond credentialed users.

    5. Barbara

      28:00 — Scholars need different types of sources...for reference, for publication, etc. Sourcery becomes a new source.

    6. Tom

      27:30 — Software as a provocation, and in this case a provocation for openness...collections that are not open on Sourcery would be cited fewer times; encouraging closed archives to open up their collections.

    1. The investigators behind the report found that nearly 80% of the comments funded by the broadband industry were collected by lead generation companies that offered consumers various rewards in exchange for their information. "Marketing offers varied widely, and included everything from discounted children's movies to free trials of male enhancement products," the report reads. The broadband industry would then run additional solicitations alongside those promotions, asking consumers to join the anti-net neutrality campaign, according to the report. But the lead generation companies did not always run those solicitations, the report says. "Instead, they copied names and addresses they had purchased or collected months or years earlier through unrelated lead generation efforts, and passed it off as information submitted by consumers who had agreed to join the broadband industry's campaign," it reads.One lead generator went so far as to use information obtained through a data breach to submit fake comments.

      Did broadband companies have deniability because they used these "lead generation" companies.?

    1. EDWARD DOLNICK: He came out with how gravity works, how light works, how rainbows work, how the tides work.

      Isaac Newton, around 1665, is sent home from Cambridge University (UK) because of a plague. In the course of one summer, he works out all sorts of scientific findings, including the basics of orbital mechanics.

  4. Apr 2021
    1. Facebook, on the other hand, is worried that if you have a choice, you'll choose not to let it track you, which would be bad for Facebook. The social media giant literally doesn't want you to have a choice because it's more concerned about what's good for Facebook than what's good for users.  

      Facebook's position is to benefit Facebook, not the user.

    2. Craig Federighi, Apple's senior vice president of software engineering, told The Wall Street Journal's Joanna Stern that the company's goal is to "give users a choice." Those four words are at the core of the problem with the position Facebook has taken since Apple announced the changes last year at its developer conference.

      Apple is saying that giving users the choice over how their data is used on their devices is "the right thing".

    1. If you've seen Denis Shirayev's upscaled historical videos, you've seen the past enhanced by a touch of the future. He takes videos scanned from very old films, like our poignant A Trip Down Market Street Before the Fire, shot just days before the 1906 quake and fire that devastated San Francisco, upscales them to 4K, smoothes out jitter and adds color. (Today any video editor can make something almost as good using off-the-shelf tools like Topaz Video Enhance AI.) Shirayev's videos are beautiful and compelling, but they show you something that never was. They're not archival; they're fiction

      Applying AI enhancements to historical artifacts introduces the bias of the AI algorithm to the representation.

    2. Registries are emerging to authenticate sources and provenance, and perhaps even indemnify purchasers against false representations by sellers. These have long existed in the collectibles business. Rare coins are frequently processed by trusted grading and authentication services, which charge to inspect coins and then encapsulate them in sealed plastic slabs.

      These registration services—providing authenticity and quality grading—don’t come for free and the cost of them must be somehow factored into the blockchain transaction.

    3. While the blockchain is supposed to draw an unbroken link between creator/tokenizer and purchaser, it's just a record of transactions that might be tainted or even bogus. We know the original Mona Lisa resides in the Louvre, but it's very hard to identify who really created and who owns many of the millions of creative works made in the analog era.

      NFTs do not answer the question of provenance. A statement is just attributed to a blockchain address. The provenance is only as secure as that blockchain address is recognized and not compromised. Black-and-white...it is or it isn’t.

    4. This would worsen an already bad situation, where institutions like our Library of Congress hold physical copies of millions of films, TV programs, and recordings that can't be touched because someone else holds the copyright. Ideally, archives and museums should own and control both the physical and digital states of its collections. That won't happen if they have to sell or license NFTs in order to survive.

      I don’t see the connection here—if the archive holds the copyright, why would selling an NFT on an object prevent them from controlling the physical and digital archives?

    5. Law professor Tonya M. Evans optimistically suggests that crypto art offers Black artists and communities opportunities to bypass white art gatekeepers and "capture and own the value of the culture that they produce."

      NFTs may help underrepresented artists find support by bypassing gatekeepers.

    6. By design, archives are deliberate and thoughtful, with a timeline designed to preserve culture "forever." They're not built to nimbly weather disruption.

      Archives are haphazardly scattered through culture and are typically underfunded. Deliberate and thoughtful, but rigid and underfunded.

    7. I give old films away for free. It started in 1999 when I was seduced by the promise, excitement, and just-felt-rightness of the gift economy. Not 30 seconds after we first met, Internet Archive founder Brewster Kahle asked me, "Want to put your film archives online for free?"

      Opinion piece author is Rick Prelinger

    1. NISO Standard for the ResourceSync Framework (ResourceSync Framework, 2014). This would facilitate the automatic updating of the links upon changes to any of the versions.

      [[ResourceSync]] to "facilitate the automatic updating of links"...as described by [[Herbert Van de Sompel]] through John.

    2. So, what would it take to build what I would call an ‘Open Web Smart Link’, which would facilitate a user getting to a shared version of an article via a clearly labelled link so that the user knows what to expect? Librarians have been working on things like this for many years (Sugita et al., 2007), but I am not aware of any publishers adopting similar linking technologies.

      John's definition of what something like [[GetFTR]] would do.

    3. Some readers will know that they need the article of record. A very high percentage, however, who are reading this article for the first time and want to follow a citation simply need to reassure themselves that they understand the argument being presented. They will simply need read‐access to the cited work.

      Some users will need the article-of-record. Others ("a very high percentage", John says) can make use of something that isn't the article-of-record.

    4. the users’ need in this case is a link or a set of links that give them their best access choices. In my opinion, these links should be revealing as to whether or not clicking on them will get you to the full text or not.

      John sees the need for what [[GetFTR]] is trying to solve.

    5. But inside of a library that does not subscribe to this particular journal, this single open access article is very unlikely to participate in any of the discovery services, and when other articles cite her article, the link‐resolvers that would normally provide the reader with a direct link to her article will not do so.

      Because library tools for accessing journal articles are tied to the journal level, this one open access article in a journal for which the library does not have a subscription cannot be discovered.

    6. it does cover the landscape of where there might be unnecessary friction between someone's intent to share and a user's desire to discover

      Purpose of the Open Content Discovery Grid

    7. If an institution passes an open access policy, it is in large part motivated by having the results of scholarship at that institution have maximum reach and influence. If a funding agency establishes an open access mandate, as most of them have, it often stems from a desire to accelerate research in areas in which they provide funding. If a scholarly publisher comes out with an open access journal or offers for a fee to make certain articles ‘open’, they should certainly seek to have that article or that journal achieve maximum reach. And scholars/researchers who share their papers on personal websites or on scholar sites, like academia.edu or ResearchGate, tell me that this is their way of making sure that colleagues in their field have access to their works.

      Reasons why institutions, funding agencies, scholarly publishers, and authors post content in open access.

    8. ‘helping people find things that they need, but are not looking for’

      John Dove's definition of serendipity in discovery.

    1. This is an example of a dark pattern: design that manipulates or heavily influences users to make certain choices. Instagram uses terms like “activity” and “personalized” instead of “tracking” and “targeting,” so the user may not realize what they’re actually giving the app permission to do. Most people don’t want Instagram and its parent company, Facebook, to know everything they do and everywhere they go. But a “better experience” sounds like a good thing, so Instagram makes the option it wants users to select more prominent and attractive than the one it hopes they’ll avoid.

      Definition of [[Dark Pattern]].

      Article covers legislative efforts in states and nationally to ban dark patterns.

    1. No provider or user of any interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.

      The 26 words of Section 230 of the Communications Decency Act of 1996.

    2. So what he's saying here is if someone had run these same ads about these T-shirts in the classifieds section of a newspaper, Ken could have sued the newspaper. He might not have won that lawsuit, but he could have had his day in court. But what this ruling in Ken's case means is he doesn't even get to argue the merits of his case. He simply cannot sue AOL over these posts, period.

      Why Section 230 made internet platforms different from newspapers—newspapers could be sued for publishing inaccurate information. (Might not have won, but at least the avenue was open.)

    1. the other thing is this whole thing of the military having this culture that you keep things secret, which means that it's very hard to have, like, an open - and it's very top-down. So it's very hard to have an open discussion about - like, a scientific discussion going on around these topics. I mean, now I make it sound like they are very different from the rest of us, but in a way, they are just human beings. And you can easily wind yourself up in some kind of explanation. If you have a few authorities telling you how things are, you can easily start to collect evidence that that must be how it was.

      It is sort of like "group-think", but enforced in a rigid, top-down structure such that you can't question it—you don't know to question it.

  5. Aug 2019
    1. pseudonymous identifiers
    2. eduPersonEntitlement
    3. Each of these use cases has a different demand of the metadata about the user.

      Implementers of OAUTH have a good example of attribute release policy pages.

    4. Let’s consider first the issue that a user is logged into an online system, individually and therefore can be tracked.

      Logged into an online system is reminiscent of the days of CompuServe and AOL. Today it is about being a node on a network. Logged in isn't as accurate as Connected.

  6. Feb 2017
    1. Well the leaks are real. You're the one that wrote about them and reported them, I mean the leaks are real. You know what they said, you saw it and the leaks are absolutely real. The news is fake because so much of the news is fake.

      The leaks are real, but the news based on the leaked information is false?

    2. new buy American measures in place to require American steel for American pipelines

      U.S. steelmakers will receive negligible benefit from the multi-billion dollar Keystone XL project, one of the two projects Trump ordered to proceed, because they have limited ability to meet the stringent materials requirements for the TransCanada line.

      American steel unlikely to get Keystone boost despite Trump order Reuters, Mon Jan 30, 2017 at 12:08pm EST, http://www.reuters.com/article/us-usa-trump-pipeline-transcanada-idUSKBN15E22M

    3. And I want regulations because I want safety, I want environmental - all environmental situations to be taken properly care of. It's very important to me. But you don't need four or five or six regulations to take care of the same thing.

      This is the first time I've seen him say "I want regulations because of safety...environmental." Would love to see data backing up "five or six regulations to take care of the same thing."

  7. Jun 2015
    1. cyber-physical systems

      Cyber-physical systems are the next evolution of embedded systems. From Wikipedia:

      Today, a precursor generation of cyber-physical systems can be found in areas as diverse as aerospace, automotive, chemical processes, civil infrastructure, energy, healthcare, manufacturing, transportation, entertainment, and consumer appliances. This generation is often referred to as embedded systems. In embedded systems the emphasis tends to be more on the computational elements, and less on an intense link between the computational and physical elements.

    2. Fair In formation Practice Prin ciples
    3. privacy impact assessments
    4. Privacy engineering is an emergi ng field, but currently there is no widely-accepted definition of the discipline. For the purposes of this publication, privacy engineering is a collection of methods to support the mitigation of risks to individuals arising from th e processing of their personal information within information systems.
    5. The NIST RMF categorizes four broad 523 processes in looped phases, as illustrated in 524 Figure 01 : (i) frame risk (i.e., establish the 525 context for risk-based decisions); (ii) assess 526 risk; (iii) respond to risk once determined; 527 and (iv) monitor risk on an ongoing b
    6. Predictability is the enabling of reliable assumptions by individuals, owners, and operators about personal information and its processing by an information system. Manageability is providing the capability for granular administration of personal information including alteration, deletion, and selective disclosure. Disassociability is enabling the processing of personal information or events without association to individuals or devices beyond the operational requirements of the system.
    7. Data actions are information system operations that process personal information. “Processing” can include, but is not limited to, the collection, retention, logging, generation, transformation, disclosure, transfer, and disposal of personal information.
    8. Personal Information: For the purpose of risk assessment, personal information is 963 considered broadly as any information that ca n uniquely identify an individual as well as 964 any other information, events or behavior th at can be associated with an individual. 965 Where agencies are conducting activities subj ect to specific laws, regulation or policy, 966 more precise definitions may apply.

      A definition for personal information.

    1. A new taxonomy to understand privacy violations is thus sorely needed. This Article develops a taxonomy to identify privacy problems in a compre- hensive and concrete manner. It endeavors to guide the law toward a more coherent understanding of privacy and to serve as a framework for the fu- ture development of the field of privacy law.
    2. In the taxonomy that follows, there are four basic groups of harmful ac- tivities: (1) information collection, (2) information processing, (3) informa- tion dissemination, and (4) invasion. Each of these groups consists of dif- ferent related subgroups of harmful activities.