Skip to main content

Home/ Digital Ethnography at Kansas State University/ Group items tagged operating

Rss Feed Group items tagged

Trapper Callender

Man-Computer Symbiosis - 2 views

  • In short, it seems worthwhile to avoid argument with (other) enthusiasts for artificial intelligence by conceding dominance in the distant future of cerebration to machines alone.
  • There will nevertheless be a fairly long interim during which the main intellectual advances will be made by men and computers working together in intimate association. A multidisciplinary study group, examining future research and development problems of the Air Force, estimated that it would be 1980 before developments in artificial intelligence make it possible for machines alone to do much thinking or problem solving of military significance. That would leave, say, five years to develop man-computer symbiosis and 15 years to use it. The 15 may be 10 or 500, but those years should be intellectually the most creative and exciting in the history of mankind.
  • It is often said that programming for a computing machine forces one to think clearly, that it disciplines the thought process. If the user can think his problem through in advance, symbiotic association with a computing machine is not necessary.
  • ...25 more annotations...
  • They would be easier to solve, and they could be solved faster, through an intuitively guided trial-and-error procedure in which the computer cooperated, turning up flaws in the reasoning or revealing unexpected turns in the solution.
  • Poincare anticipated the frustration of an important group of would-be computer users when he said, "The question is not, 'What is the answer?' The question is, 'What is the question?'" One of the main aims of man-computer symbiosis is to bring the computing machine effectively into the formulative parts of technical problems.
  • It is to bring computing machines effectively into processes of thinking that must go on in "real time," time that moves too fast to permit using computers in conventional ways.
  • To think in interaction with a computer in the same way that you think with a colleague whose competence supplements your own will require much tighter coupling between man and machine than is suggested by the example and than is possible today.
  • Throughout the period I examined, in short, my "thinking" time was devoted mainly to activities that were essentially clerical or mechanical: searching, calculating, plotting, transforming, determining the logical or dynamic consequences of a set of assumptions or hypotheses, preparing the way for a decision or an insight. Moreover, my choices of what to attempt and what not to attempt were determined to an embarrassingly great extent by considerations of clerical feasibility, not intellectual capability.
  • the operations that fill most of the time allegedly devoted to technical thinking are operations that can be performed more effectively by machines than by men.
  • If those problems can be solved in such a way as to create a symbiotic relation between a man and a fast information-retrieval and data-processing machine, however, it seems evident that the cooperative interaction would greatly improve the thinking process.
  • Computing machines can do readily, well, and rapidly many things that are difficult or impossible for man, and men can do readily and well, though not rapidly, many things that are difficult or impossible for computers. That suggests that a symbiotic cooperation, if successful in integrating the positive characteristics of men and computers, would be of great value. The differences in speed and in language, of course, pose difficulties that must be overcome.
  • Men will fill in the gaps, either in the problem solution or in the computer program, when the computer has no mode or routine that is applicable in a particular circumstance.
  • Clearly, for the sake of efficiency and economy, the computer must divide its time among many users. Timesharing systems are currently under active development. There are even arrangements to keep users from "clobbering" anything but their own personal programs.
  • It seems reasonable to envision, for a time 10 or 15 years hence, a "thinking center" that will incorporate the functions of present-day libraries together with anticipated advances in information storage and retrieval and the symbiotic functions suggested earlier in this paper. The picture readily enlarges itself into a network of such centers, connected to one another by wide-band communication lines and to individual users by leased-wire services. In such a system, the speed of the computers would be balanced, and the cost of the gigantic memories and the sophisticated programs would be divided by the number of users.
  • The first thing to face is that we shall not store all the technical and scientific papers in computer memory. We may store the parts that can be summarized most succinctly-the quantitative parts and the reference citations-but not the whole. Books are among the most beautifully engineered, and human-engineered, components in existence, and they will continue to be functionally important within the context of man-computer symbiosis. (Hopefully, the computer will expedite the finding, delivering, and returning of books.)
  • The second point is that a very important section of memory will be permanent: part indelible memory and part published memory. The computer will be able to write once into indelible memory, and then read back indefinitely, but the computer will not be able to erase indelible memory. (It may also over-write, turning all the 0's into l's, as though marking over what was written earlier.) Published memory will be "read-only" memory. It will be introduced into the computer already structured. The computer will be able to refer to it repeatedly, but not to change it.
  • The basic dissimilarity between human languages and computer languages may be the most serious obstacle to true symbiosis.
  • In short: instructions directed to computers specify courses; instructions-directed to human beings specify goals.
  • We may in due course see a serious effort to develop computer programs that can be connected together like the words and phrases of speech to do whatever computation or control is required at the moment. The consideration that holds back such an effort, apparently, is that the effort would produce nothing that would be of great value in the context of existing computers. It would be unrewarding to develop the language before there are any computing machines capable of responding meaningfully to it.
  • By and large, in generally available computers, however, there is almost no provision for any more effective, immediate man-machine communication than can be achieved with an electric typewriter.
  • Displays seem to be in a somewhat better state than controls. Many computers plot graphs on oscilloscope screens, and a few take advantage of the remarkable capabilities, graphical and symbolic, of the charactron display tube. Nowhere, to my knowledge, however, is there anything approaching the flexibility and convenience of the pencil and doodle pad or the chalk and blackboard used by men in technical discussion.
  • 2) Computer-Posted Wall Display: In some technological systems, several men share responsibility for controlling vehicles whose behaviors interact. Some information must be presented simultaneously to all the men, preferably on a common grid, to coordinate their actions. Other information is of relevance only to one or two operators. There would be only a confusion of uninterpretable clutter if all the information were presented on one display to all of them. The information must be posted by a computer, since manual plotting is too slow to keep it up to date.
  • Laboratory experiments have indicated repeatedly that informal, parallel arrangements of operators, coordinating their activities through reference to a large situation display, have important advantages over the arrangement, more widely used, that locates the operators at individual consoles and attempts to correlate their actions through the agency of a computer. This is one of several operator-team problems in need of careful study.
  • 3) Automatic Speech Production and Recognition: How desirable and how feasible is speech communication between human operators and computing machines?
  • Yet there is continuing interest in the idea of talking with computing machines.
  • In large part, the interest stems from realization that one can hardly take a military commander or a corporation president away from his work to teach him to type. If computing machines are ever to be used directly by top-level decision makers, it may be worthwhile to provide communication via the most natural means, even at considerable cost.
  • It seems reasonable, therefore, for computer specialists to be the ones who interact directly with computers in business offices.
  • Certainly, if the equipment were already developed, reliable, and available, it would be used.
  •  
    Man-computer symbiosis is an expected development in cooperative interaction between men and electronic computers. It will involve very close coupling between the human and the electronic members of the partnership. The main aims are 1) to let computers facilitate formulative thinking as they now facilitate the solution of formulated problems, and 2) to enable men and computers to cooperate in making decisions and controlling complex situations without inflexible dependence on predetermined programs. In the anticipated symbiotic partnership, men will set the goals, formulate the hypotheses, determine the criteria, and perform the evaluations. Computing machines will do the routinizable work that must be done to prepare the way for insights and decisions in technical and scientific thinking. Preliminary analyses indicate that the symbiotic partnership will perform intellectual operations much more effectively than man alone can perform them. Prerequisites for the achievement of the effective, cooperative association include developments in computer time sharing, in memory components, in memory organization, in programming languages, and in input and output equipment.
Ali Safe

Read Excellence & Repair Truck Access Platforms Online Free | Business | YUDU - 0 views

  •  
    The first step in selecting an access platform implies identifying your business needs. So what kind of operations do you plan to do with it? Most of these operations are highly related to your business purpose.
robertp885

Buy Google Verified Reviews - - 0 views

  •  
    Buy Google Verified Reviews Introduction In essence, Google Verified Reviews are a mechanism for Google to confirm that the reviews that show up on a search results page are legitimate and not spam. Google accomplishes this by confirming the reviewer's identification and the fact that they actually have an account with the company they are evaluating. This verification procedure is intended to help raise the caliber of reviews that show up on Google and assist companies in gaining the trust of prospective clients. Buy Google Verified Reviews What Are Google Verified Reviews? In essence, Google Verified Reviews are a mechanism for Google to confirm that the reviews that show up on a search results page are legitimate and not spam. Google accomplishes this by confirming the reviewer's identification and the fact that they actually have an account with the company they are evaluating. This verification procedure is intended to help raise the caliber of reviews that show up on Google and assist companies in gaining the trust of prospective clients. Buy Google Verified Reviews Customers who see Google Verified Reviews can be sure that the testimonials are from actual clients and not from fictitious accounts. This can increase a company's prospects of gaining more business by fostering trust with potential clients. You may grow your business and establish credibility by using Google Verified Reviews. with prospective clients. To get your clients to leave Google Verified Reviews for your company, follow the above instructions. Why Google Verified Customer Reviews Are Important? Customer reviews are significant, as you are aware as a business owner. After all, one of the key ways that prospective clients find out about your organization is through customer reviews. Also, in today's digital environment, the majority of prospective clients will conduct a fast Google search to read your customer reviews before choosing to do business with you. Buy Google Verified Re
  •  
    Buy Google Verified Reviews Introduction In essence, Google Verified Reviews are a mechanism for Google to confirm that the reviews that show up on a search results page are legitimate and not spam. Google accomplishes this by confirming the reviewer's identification and the fact that they actually have an account with the company they are evaluating. This verification procedure is intended to help raise the caliber of reviews that show up on Google and assist companies in gaining the trust of prospective clients. Buy Google Verified Reviews What Are Google Verified Reviews? In essence, Google Verified Reviews are a mechanism for Google to confirm that the reviews that show up on a search results page are legitimate and not spam. Google accomplishes this by confirming the reviewer's identification and the fact that they actually have an account with the company they are evaluating. This verification procedure is intended to help raise the caliber of reviews that show up on Google and assist companies in gaining the trust of prospective clients. Buy Google Verified Reviews Customers who see Google Verified Reviews can be sure that the testimonials are from actual clients and not from fictitious accounts. This can increase a company's prospects of gaining more business by fostering trust with potential clients. You may grow your business and establish credibility by using Google Verified Reviews. with prospective clients. To get your clients to leave Google Verified Reviews for your company, follow the above instructions. Why Google Verified Customer Reviews Are Important? Customer reviews are significant, as you are aware as a business owner. After all, one of the key ways that prospective clients find out about your organization is through customer reviews. Also, in today's digital environment, the majority of prospective clients will conduct a fast Google search to read your customer reviews before choosing to do business with you. Buy Google Verified Re
Mike Wesch

The Boxxy Story - 0 views

  • Accusations began to fire. Just who would want to try and throw people off the trail and confuse them, and who would have a new, large photo of her? Boxxy herself, or a close accomplice was the consensus. They must have caught wind of her full name being found, and merely be attempting to mitigate the damage by stirring the pot with false leads. 
  • It sounded semi-plausible, but, unbeknownst to the vast majority of /b/ at that moment, the CBRC had long since uncovered a photobucket account which was later seen to contain the same photos, so the implication is obvious, members of the CBRC were trolling /b/ with the photos in a attempt to throw them off, as they themselves were close to breaking into her accounts and did not want Anonymous to do it first.
  • We have no way of verifying if they were telling the truth, or if any of the claimed locations were in any way accurate but the mere possibility of this is shocking indeed. Thankfully, these were almost certainly fake - one of the addresses was a mall, one of the phone numbers was for a chiropractor.
  • ...30 more annotations...
  • Within a couple of hours, CBRC had breached her Youtube account, via successfully guessing the secret answer for her email account, deduced from the stack of information they uncovered.
  • Or phishing her with a fake email, depending on who you listen to.
  • They then made her videos private, uploading a video warning her to never post another video again. This attracted 1000 comments within an hour and became the most commented video of the day on Youtube. So that brought it to an end, in theory. They had removed the ‘cancer’.
  • So after all that, was the ‘chemo’ even effective? No, not really. A look at /b/ will reveal Boxxy threads are still being posted. By essentially martyring the Boxxy meme, CBRC have simply created a new groundswell of people willing to troll with her image, as well as genuine resentment at their actions. 
  • Now she has her name, age, dozens of photos, school, internet accounts, alleged phone numbers, and alleged location available online, along with the details of several uninvolved friends. Nobody could have predicted she would create so much chaos, not least Boxxy herself. She had no idea what she was getting herself into by posting a response video.
  • This entire debacle ultimately stems from those who spammed /b/ with her image and pissed off so many people.
  • The lesson for all of us here, obvious as it is, is to think about what you divulge online. Is your Myspace secure? Is your Facebook account private? What forum accounts contain your details, and can they be traced and linked to each other? Everything you write online can potentially be linked, as if it were a jigsaw, and a profile of your life built up. I know plenty of people who have publicly viewable Facebook accounts containing their D.O.B, phone numbers, emails, addresses, places they work, go to college and so on. This is lunacy. This is asking for trouble. Boxxy didn’t do this, yet was still tracked down. 
  • “First, we, CBCR, pretty much made all the breakthroughs in the investigation. I don't care if it sounds arrogant, but if you look through our now-leaked dox, you can see that everything that was found on 4chan was found by us beforehand.”
  • Give people anonymity, and they become de-individuated, whether it be on an image board or in a rioting mob.
  • he same internet machine that could propel you to the top of the Youtube charts and hand you online fame will happily chew you up and spit you back out just as quickly, with zero remorse or consideration for the consequences. This is the reality of the internet today, this case is not the first, and surely not the last.
  • A few examples of fakes:www.youtube.com/user/boxxiebabee  www.youtube.com/user/therealboxxybabee www.youtube.com/user/boxxxxybabeee www.youtube.com/user/boxxyfriendsonly www.youtube.com/user/B0xxxybabee www.youtube.com/user/boxxybaabee www.youtube.com/user/boxxybabee2 www.youtube.com/user/thenewboxxybabee
  • And of course:www.youtube.com/user/Boxxyakamoldybread 
  • P.P.S Some distasteful and blatantly fake photoshopped news items are being posted on /b/ claiming Boxxy is dead. The fakes are very poorly written and contain numerous flaws. Again, don’t be fooled.
  • It's Friday January 16th. On Youtube, the user 'boxxybabee', has 21,800 subscribers, 1.4 million video views and over 38,000 comments on her videos and channel, yet she only signed up 8 days ago, and has only 3 videos. Many people were, and are confused. How did this happen? By documenting what I personally saw, I will show you.
  • The story essentially begins back in April 2006 when 'Boxxy' joined the anime forum/game based site Gaia Online under the username 'M o l d yLunchboxx'. It appears Boxxy returned from a Gaia hiatus at the very end of 2007, and embarked on a posting spree which lasted a week. It was during this first week of January 2008 that she made two Youtube videos for two fellow Gaia users, '4DM1RALAWESOME' and another referred to simply as 'Ant'.
  • Boxxy's last login to Youtube was February 2008, and for Gaia Online, April 2008.
  • The story now takes a leap forward to December 27th, 2008, when, according to Encyclopedia Dramatica, the video 'FOAR 4DD1 FRUM BOXXY' was posted on i-am-bored.com. This was spotted by someone at 7chan, who embedded the video at the top of the random '/b/' board. 
  • This writer first saw FOAR 4DD1 on January 3rd, 2009, when the video was posted as a 'you rage you lose thread' on the /b/ board at 4chan, with the 'Expert' level afforded to those who would withstand the entire video without wanting to tear out their hair or hurt small animals. /b/tards saw what has been labelled 'the most insane display we've ever seen on youtube' and 'the cutest girl you've ever seen'. This was the true start of the Boxxy phenomenon.
  • Over the next couple of days, interest grew, and Boxxy threads began to populate /b/. Why have her videos lain virtually unviewed and untouched for 51 weeks only to be brought up now. Who was this girl? What was the cause of her unique behaviour - her vivacious mannerisms, head bobbing, jaw grinding, random accents and rambling? Was she really 21 as her profile stated? Speculation began. Some pulled out their wikiPHD and speculated, tourettes? ADHD? Drug abuse - cocaine, ecstacy, meth? No, just too much coffee, according to others, or simple acting up to the camera. Comparisons to Zed from Police Academy and Heath Ledger's Joker were immediate.
  • Regardless, a split already began to emerge at /b/. Half of /b/ appeared smitten, captivated by this pretty, wacky girl drenched in eyeliner, but the rest were having their patience tested. Whilst a group of /b/tards declared 'Operation Valkyrie' on Boxxy - intending to find, raid and destroy as much as possible - youtube, myspace, facebook, photobuckets, etc in search of an identity and the 'upper boob' sign mentioned in 41DD, others simply sat and dismayed at the whole effort. Why try and raid the accounts of someone who hasn't logged into any known accounts for almost a year? Many /b/tards resented the obsession with someone who was not only inactive, but a Gaiafag, emo and a camwhore to boot. As one naysayer put it, it was: 'proof that /b/ is full of 13 y.o boys'.
  • The known accounts, Youtube and Gaia, were quickly spammed with the Operation Valkyrie tag. Via analysis of so called 'Gaiafaggotry' forum posts, /b/tards extracted two pictures of Boxxy from her Gaia friends photobucket accounts, and threw out possible names.
  • On January 6th, someone claiming to be Boxxy posted two previously unseen photos on /b/. A troll, surely? The same day, her Youtube account disappeared and her Gaia account became inaccessible to the public. Was this the real Boxxy intervening, or simply trolls posting photos from photobucket under her guise, and hacking into her accounts and shutting them down? It was also on the 6th that a clearly fake Youtube account was created - 'Boxxyakamoldybread'. Even though the videos are clearly of lower resolution than the originals, some were fooled by this, and some probably still are.
  • The 'boxxy lovers' of 4chan were by now declaring her the 'Queen of /b/' and a instant new meme. The haters labelled this as a perfect example of a forced meme. To them, she was the epitome of the 'cancer killing /b/'. Battle lines were being drawn.
  • On the 9th, Boxxy delivered. She addressed 'recent events', said she was in fact free of drugs and personality disorders, and proved it actually was her posting her photos on /b/. Whilst /b/tards were scrambling to find her identity and spamming her accounts, she was there, watching.
  • his interest generated over 70,000 views within 12 hours, pushing the video onto the first page for most viewed of the day on Youtube.
  • Identical chaos was occurring at 7chan, with the /b/ first page 100% filled with Boxxy at some points. On the 10th, with Boxxy now approaching 400,000 views and 10,000 subscribers, Operation Clampdown was declared. If Moot did not ban the users spamming boxxy threads on the 4chan /b/, the site would be brought down via a DDOS. 
  • On the 12th, Youtube 'celeb' Sxephil included Boxxy in the intro for his new video, and used her face as the thumbnail. Personally, I found it extremely cynical of Phil, a Youtube partner who makes money from views, to advertise his extremely boring video about Joe the Plumber with Boxxy's face. What a dick. Worse still, the exposure to his 310,000 subscribers sent several thousand more people to the Boxxy videos.
  • There are many patently absurd theories about Boxxy. If you listen to the drooling idiocy leaking through the interweb, you'll be told she is in fact an actress hired by Gaia Online to promote their product (that's why she says she moved on to bigger and better things, huh, morons?), the whole thing is a giant trolling exercise meticulously planned by her and accomplices, the entire thing was perpertrated by 7chan users attempting to cripple 4chan, she's a paid actress akin to lonelygirl15, or most bizarrely of all, a claim has been put forward that she is a fraud mocking the mannerisms of a 15 year old girl who lives in Chicago, orchestrated by said girl's obsessed crush who is angry at his unrequited love. Some people actually believe this.Well, there you have it. That's pretty much what happened.
masquebf1

Pochette Trousse longchamp Le Pliage Approximately - 0 views

Moreover, this second mission could follow in the footsteps of the first. ''The threat today is the return of the Talebans, who are helped by what resembles more and more like a veritable Pashtun (...

Sac Portefeuilles Pochette Trousse longchamp Le Pliage Porte monnaie

started by masquebf1 on 11 Aug 14 no follow-up yet
masquebf1

nike janoski pas chere According - 0 views

Together with South Korea, Australia and Japan are among Washington's traditional allies in the Asia-Pacific region. Australia, a member of the coalition in Iraq, participates in NATO combat operat...

nike air jordan pas chere janoski sb

started by masquebf1 on 13 Nov 14 no follow-up yet
hootoo2011

How to Find a Good Electronic Website? - 0 views

  •  
    There are multiple gadget websites and electronic forums talking about this topic, how to find a reliable electronic websites from umnipresent scammers, or should i say "Bag Companies". Though smalll status they are, some of them are armed with complete facilities like webshops, office and even registered company. However, with the facilitation of registering company (only cost 1,000 USD or less) and renting some rooms (even one single room to place one table for working) and operating a website (which can transfer some many blog websites like weblog.com ). Therefore, it's more important and harder for us to find a reliable and good webshop via virtual internet. There are at least four tips concluded by my daily working for your referrence.
ankityng

Latest Franchise News in South - 0 views

  •  
    Global Series Designers (GFA), Switzerland-based cafe group that operates popular manufacturers like Pizzas Corner, Donut Chef, Cream n Fudge, and Coffee World, declared their development plan for the Native Indian market.
ankityng

Growing Your Business - 0 views

  •  
    SMBs especially those with complex and lengthy supply chain can benefit the most.Technology has been one of the limiting factors for most small businesses; especially when it operates in a heterogeneous, network-based environment. Complex and lengthy supply chains add more to the woes of such business owners.
ankityng

New Business New Life - 0 views

  •  
    Most of the resuscitators used to save babies during birth are difficult for front line health workers to operate. Avijit Bansal and Ayesha Chaudhary, came together during their Stanford India Biodesign fellowship and created a novel, low-cost and user-friendly newborn resuscitation solution called NeoBreathe to tackle the problem.
Ali Safe

AliSafe on All Type Platforms & Ladders | Pinterest - 0 views

  •  
    Custom access platforms can be operated in several different ways. Diesel platforms are equipped with powerful engines. They are recommended for outdoor needs. They work with white or red diesel, so ask about these things upfront.
Ali Safe

Ensure Maximum Safety And Get Stable Ladders For Any Occasion - 0 views

  •  
    Safety is one of the most important aspects of any industry. Without safety, nothing can be guaranteed. A ladder platform is a much necessary tool of almost every single industry operation.
descendants1 descendants1

Oakley Stephen Murray Il patrimonio - 0 views

E' un lavoro che si rivolge non solo agli addetti ai lavori ma per un pubblico sempre più vasto; l'arte aiuta la pace, ha detto Umberto Agnelli consigliere per l'Italia del Praemium Imperiale" l'an...

Oakley Lifestyle Stephen Murray Asian Fit

started by descendants1 descendants1 on 07 May 14 no follow-up yet
Ali Safe

Most Essential Types Of Access Platforms Look For Designed - 0 views

  •  
    Custom access platforms can be operated in several different ways. Diesel platforms are equipped with powerful engines. They are recommended for outdoor needs.
Ali Safe

Access Platforms - 0 views

  •  
    Custom access platforms may also come in personnel lifts, towable lifts, track mounted booms or push around the platforms. Just like you have probably guessed already, personnel lifts only go up and down. They are mostly recommended for people. Standard sizes can lift one individual only. Such platforms are good for small repairs or maintenance operations.
michol lasti

phpMyAdmin 4.4.5 Free Download | librosdigitalescs software - 0 views

  •  
    phpMyAdmin 4.4.5 Free Download - phpMyAdmin is a free programming device written in PHP proposed to handle the organization of MySQL over the World Wide Web. phpMyAdmin 4.4.5 underpins an extensive variety of operations with MySQL
Mark Clayson

1 Hour Payday Loans No Credit Check- Gain Much Convenient Cash Backing Till Your Next P... - 0 views

  •  
    If you are in need of emergency pecuniary hold up then they can apply for 1 hour payday loans no credit check. These finances are particularly intended to support the salaried people in order to tackle accidental operating cost right on time.
Mike Wesch

Deep Thought: 4Chan.org Threatend By Internet War Against Boxxy - 0 views

  • There is a large movement amoung 4chan.org users to perform a DDOS attack on the site at 7:00PM EST tonight.
  • The group of users are calling the attack under two codename: Operation Valkyrie and Operation Clampdown. The goal of the attack is to, according to the boards at 4chan, “stop the spread of the boxxy cancer.”
Mike Wesch

YouTube - Anonymous comments on Merchandising. - 0 views

  • We are Anonymous.Recently, it has come to our attention that several online retailers have decided to ride the coattails of our sudden popularity by offering aparrel and other swag bearing our image. This is extremely offensive to Anonymous, as the very idea of wearing an article that identifies one as anonymous flies directly into the face of who exactly we are. We are anonymous. We cook your meals. We haul your trash. We connect your calls. We drive your ambulances and we guard you while you sleep. We put you under the knife to remove your bloated, infected spleen. We deliver your mail. We relay the evening news from the comfort of your television set, and we work dilligently to print it to give you something to read with your coffee and croissants the next morning. We are everyone and we are no one. We do not need to advertise our identity.Because our image is not a copyright, we can not stop anyone from selling items bearing it. However, we can suggest that you do not purchase these items. Wearing anything that tells the world you are anonymous compromises the veil of protection being anonymous provides, as well as cancelling out your anonymity. Wearing a t-shirt is like wearing a crosshair. You become an easy target for the Cult of $cientology and it puts you at serious risk of harm by its operatives. Use good judgement. Do not compromise yourself and your fellow Anonymous. Do not reveal your personal information to an online retailer that could possibly be a front for data mining operations by the cult.Remain Anonymous. Remain vigilant.We are Anonymous.We are LegionWe do not forgive.We do not forget.And we are certainly not some Xenu-forsaken fashion statement!
Hilary Dees

BBC News - State multiculturalism has failed, says David Cameron - 0 views

  •  
    "speaker at the counter-rally to the EDL demo in Luton, added: "The attack on multiculturalism surrenders to the far-right ideology that moderate and fundamentalist ideas cannot be distinguished from each other, and actually undermines respect and co-operation between peoples of different faith. "The phrase 'muscular liberalism' in particular sadly endorses the climate of threat, fear and violence which is present on the streets of Luton today." In a joint statement, Luton council and Bedfordshire police said a "tiny handful" of people from various backgrounds"
  •  
    Reading more into this it seems as though identifying/having an identity with a nation rather than cultural subgroups within a nation is being attacked...
1 - 20 of 89 Next › Last »
Showing 20 items per page