Skip to main content

Home/ educators/ Group items tagged symbol sets

Rss Feed Group items tagged

yc c

Symbol Signs - AIGA | the professional association for design - 0 views

  •  
    The complete set of 50 passenger/pedestrian symbols developed by AIGA is now available on the web, free of charge. Signs are available in EPS and GIF formats.
Ed Webb

The Progressive Stack and Standing for Inclusive Teaching - The Tattooed Professor - 2 views

  • There are two fundamental truths about Inclusive Pedagogy: it is an eminently desirable set of practices for teaching in higher ed, and it is an eminently difficult set of practices for teaching in higher ed
  • Put simply, the Progressive Stack is a method of ensuring that voices that are often submerged, discounted, or excluded from traditional classroom discussions get a chance to be heard
  • There are personal, cultural, learning, and social reasons people don’t speak up in class.  Students of color and women of all races, introverts, the non-conventional thinkers, those from poor previous educational backgrounds, returning or “nontraditional students,” and those from cultures where speaking out is considered rude not participatory are all likely to be silent in a class where collaboration by difference is not structured as a principle of pedagogy and organization and design.   Who loses?  Everyone.  Arguments that are smart and valuable and can change a whole conversation get lost in silence and, sometimes, shame.  When that happens, we don’t really have discussion or collaboration.  We have group think–and that is why we all lose.
  • ...10 more annotations...
  • Taking “stack” just means keeping a list of people who wish to participate—offer a question or comment—during the Q & A. Rather than anxiously waving your hand around and wondering if you’ll be called on, if you would like to participate, signal to me in some way (a gesture, a dance move, a traditional hand-in-the-air, meaningful eye contact, etc.) and I will add you to the list. However, we’re not just going to take stack, we are going to take progressive stack in an effort to foreground voices that are typically silenced in dominant culture. According to Justine and Zoë, two self-identified transwomen who were active in the movement, progressive stack means that “if you self-identify as trans, queer, a person of color, female, or as a member of any marginalized group you’re given priority on the list of people who want to speak – the stack. The most oppressed get to speak first.” As I take stack, I will also do my best to bump marginalized voices and those who haven’t yet had a chance to participate to the top.
  • As with any tool that confronts the effects of privilege and power head-on, the Progressive Stack makes some people uncomfortable
  • In a complete social and historical vacuum, level-playing-field equality is an excellent proposition. But in the actual lived world of our history, experiences, and interactions the idea of treating everyone uniformly “regardless of gender” or without “seeing color” simply strengthens already-entrenched inequalities
  • As the increasing number of targeted online harassment campaigns has shown us, once a concept or issue has traveled through the right-wing Outrage-Distortion Complex, there is little hope of reclaiming rational discussion. It’s been permanently stained. One might dismiss the frothing lamentations of white-genocide-via-classroom-pedagogy that bubble up from a subreddit, but the insidious trope of “reverse racism” has put its thumb on the scale enough to have distorted the conversation around the Progressive Stack
  • because the Progressive Stack calls attention to existing structures of inequality by replacing them with another structure entirely, it forces those of us who identify as white (and, particularly, male) to confront the ways in which we have been complicit in maintaining inequality
  • When you’re accustomed to privilege, even the suggestion of equality will feel like oppression
  • google “progressive stack.” Almost every result you get will take you to the fever swamps of right-wing Reddit and warmed-over piles of gamergate droppings. The common denominator is that “Progressive Stack” is simply anti-white “racism” dressed in fancy intellectual clothes
  • Giving up power, it turns out, is hard for some people. Especially when that power has been historically-constructed to be so pervasive as to render it unquestioned and indeed unseen in its hegemonic sway. Pierre Bourdieu calls this symbolic power: “For symbolic power is that invisible power which can be exercised only with the complicity of those who do not want to know that they are subject to it or even that they themselves exercise it”
  • It means there will be times when people who are not accustomed to their identity being a source of discomfort and exclusion will have to learn–in a managed and intentional space–what that feels like.
  • there will be friction and messiness and uncomfortable adjustments, because any education worth the name involves friction and messiness and uncomfortable adjustments
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
1 - 4 of 4
Showing 20 items per page