Skip to main content

Home/ Digital Ethnography at Kansas State University/ Group items matching "connection" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
ankityng

Best Internet Franchise - 0 views

  •  
    Are you searching for top inernet franchise? Connect with Franchise India get to know about internet franchise,franchise fees and many more.
ankityng

Advantages of Reading a Business Magazine - 0 views

  •  
    Do you want to know about advantages of business magazine? Connect with Franchise India and enhance your business skills, Business magazines enhance your skills and let you know all the matter related to it for use in future aspects.
edwin maicle

Working in Government Establishment Being a Phlebotomist - 0 views

  •  
    People are always seeking for a job opportunity from government establishments. This is due to the fact that we cannot avoid the thinking that once you are working in government owned establishments, you have lots of benefits. Actually it is considered as total or full benefit. And since the government has so many job opportunities to graduates, it is right to say that we must know first and foremost what are offered in its bulletin before going to other sources. We might find out that there are offers that we can grab and apply with. This is also the reason why there are some job fairs. Secure your license and know what are available and start applying as a phlebotomist in hospitals and other medical agencies connected to the government.
ankityng

How to Become a Successful Business Entrepreneur - 0 views

  •  
    Entrepreneur India provides all information of different industry ideas, how to start up small business with low investment. Get connected with us & know about latest information of how to become a successful business entrepreneur.
ankityng

Off Grid Flashlight - 0 views

  •  
    LED's(Light Emitting Diode's) are special diodes that emit light when connected in a circuit. They are frequently used as "pilot" lights in electronic appliances to indicate whether the circuit is closed or not.
michol lasti

UsbFix 8.015 Free Download | librosdigitalescs software - 0 views

  •  
    UsbFix 8.015 Free Download - UsbFix 8.015 is often a free malware removal tool that allows you to detect and remove contaminated USB memory sticks or every other USB removable devices, including external HDD's, smartphones, digital cameras or some other peripherals that connects to your laptop or computer via the USB slot
Melissa Caddy

Colocation Services - 0 views

  •  
    A colocation center is a type of data centre where equipment, space, and bandwidth are available for rental to retail customers.Rackbank has state-of-the-art data centers located in India.The facilities are designed and built with better redundancy to reduce the breakdowns and guard your assets and critical data. We provide: * A wide range of power connections with full backup * Cost-effective cooling * Advanced fire and water detection systems * Multi-layer security to protect your data
Kevin Champion

Maintained Relationships on Facebook | overstated - 0 views

  • What it shows is that, as a function of the people a Facebook user actively communicate with, you are passively engaging with between 2 and 2.5 times more people in their network. I’m sure many people have had this feeling, but these data make this effect more transparent.
  • The stark contrast between reciprocal and passive networks shows the effect of technologies such as News Feed. If these people were required to talk on the phone to each other, we might see something like the reciprocal network, where everyone is connected to a small number of individuals. Moving to an environment where everyone is passively engaged with each other, some event, such as a new baby or engagement can propagate very quickly through this highly connected network.
  • All Friends: the largest representation of a person’s network is the set of all people they have verified as friends. Reciprocal Communication: as a measure of a sort of core network, we counted the number of people with whom a person had had reciprocal communications, or an active exchange of information between two parties. One-way Communication: the total set of people with whom a person has communicated. Maintained Relationships: to measure engagement, we took the set of people for whom a user had clicked on a News Feed story or visited their profile more than twice.
  • ...3 more annotations...
  • Peter Marsden found the number of people with whom individuals “can discuss important matters” numbers only 3 for Americans[3]. In a subsequent survey, researchers found that this number has dropped slightly over the past 10 years[4], causing some alarm in the press, but without sufficient explanation[5].
  • Killworth, et al. found using this technique and others that the number of people a person will know in their lifetime ranges somewhere between 300 and 3000[1]. On Facebook, the average number of friends that a person has is currently 120[2]. Given that Facebook has only been around for 5 years, that not everyone uses it, and that the not every acquaintance has found each other, this number seems reasonable for an average user.
  • We were asked a simple question: is Facebook increasing the size of people’s personal networks?
Kevin Champion

An Interview with Michael Wesch | EDUCAUSE CONNECT - 0 views

  •  
    Educase interview talking about anonymity project
Mike Wesch

Anonymous: Still Alive - 1 views

  • Anonymity is a concept that has existed throughout history. We all know of the anonymous letter, anonymous donations to charity and the anonymous tips to police. In every case, there is no connection between the message and an identifiable individual. The message stands alone. The advantage of anonymity is that the sender is without responsibility, or rather, they are only responsible for themselves. This can be beneficial if one does not desire the attention that a controversial point of view, large donation, or revelation of important information would bring. Anonymity gives security, freedom and a lack of responsibility. Complete anonymity is difficult, indeed almost impossible, to maintain in the real world - at least if we are to interact with our surroundings.
  • On the Internet, real anonymity can be a viable option for the free exchange of ideas.
  • When no one can tell who is speaking, it is difficult, if not impossible, to connect these words with any one person. Newcomers to this culture will often encounter a harsher tone and a macabre sense of humor that can be difficult to understand. This is what emerges in the absence of an ability to tie people to their actions and words. This anonymous image board culture has spread from Japan to the Western World. On certain image board websites, users are allowed the option of being identified only as "anonymous." And it is precisely on these sites the first timid steps in "Project Chanology", a campaign to dismantle the Scientology organization, were taken.
  • ...1 more annotation...
  • Everyone can have their own reason for wishing to participate in Project Chanology's fight against Scientology. These reasons vary from the desire to save people from brainwashing and financial ruin, to the sheer unadulterated hilarity and the lulz. The only common ground that participants of Project Chanology share is that they wish dismantle the Scientology enterprise by entirely legal and peaceful means.
Adam Bohannon

YouTube - Alisa Miller on Global News 2.0 - 0 views

  •  
    How the news shapes the way we see the world, and why Americans seem to know less and less about the world around them and their many connections to it.
Mike Wesch

mobiles, human rights, and anonymity - 0 views

  • So that got me wondering: is there a mobile equivalent of Tor? For those of you who aren't familiar with it, TOR is a software project that helps Internet users remain anonymous. Running the TOR software on your computer causes your online communications to bounce through a random series of relay servers around the world. That way, there's no easy way for authorities to track you or observe who's visiting banned websites. For example, let's say you're in Beijing and you publish a blog the authorities don't like. If you just used your PC as usual and logged into your publishing platform directly, they could follow your activities and track you down. With Tor, you hop-scotch around: your PC might connect to a server in Oslo, then Buenos Aires, then Miami, then Tokyo, then Greece before it finally connects to your blogging platform. Each time you did this, it would be a different series of servers. That way, it's really difficult for authorities to trace your steps.
  •  
    Mobile Phones, Human Rights and Anonymity I've been playing around with my new Nokia N95 for the last couple of weeks and quite amazed with its ability to stream live video from the phone to the Internet. Like last weekend when I streamed from the Smithsonian Kite Festival; for around 30 minutes I gave a tour of the festivities and took questions from users as they watched the stream over the Internet. I've also spent some time talking it up with colleagues at NPR, brainstorming the possibilities of what would happen if reporters used these phones - or if their sources did. The example that keeps coming to mind regarding the latter scenario is the rioting in Tibet. While some video has leaked out, it's been limited and often delayed. Imagine if the protestors were able to webcast their protests - and the ensuing crackdowns - live over their phones using China's GSM network? The video would stream live and get crossposted via tools like YouTube, Seesmic and Twitter, spreading the content around so it can't be snuffed. But that raises an obvious question - how long could protestors or dissidents get away with such activities before getting caught? If you were running software on your phone to send live video over a 3G network, like I've been doing on my N95, you'd think it wouldn't take too much effort on the part of the mobile provider and/or government to figure out which phone was sending the signal and its precise location. So that got me wondering: is there a mobile equivalent of Tor? For those of you who aren't familiar with it, TOR is a software project that helps Internet users remain anonymous. Running the TOR software on your computer causes your online communications to bounce through a random series of relay servers around the world. That way, there's no easy way for authorities to track you or observe who's visiting banned websites. For example, let's say you're in Beijing and you publish a blog the authorities don't like. If you just used your PC as
anonymous

The Power of Trust Seminar - Waldo - Your Wingman - 0 views

  •  
    The key to building and sustaining business and personal relationships is to develop them based on mutual trust. Connecting with people on a human and emotional level, and developing a reputation as a trusted resource is one of the most important traits you can have in business.
Trapper Callender

Man-Computer Symbiosis - 2 views

  • In short, it seems worthwhile to avoid argument with (other) enthusiasts for artificial intelligence by conceding dominance in the distant future of cerebration to machines alone.
  • There will nevertheless be a fairly long interim during which the main intellectual advances will be made by men and computers working together in intimate association. A multidisciplinary study group, examining future research and development problems of the Air Force, estimated that it would be 1980 before developments in artificial intelligence make it possible for machines alone to do much thinking or problem solving of military significance. That would leave, say, five years to develop man-computer symbiosis and 15 years to use it. The 15 may be 10 or 500, but those years should be intellectually the most creative and exciting in the history of mankind.
  • It is often said that programming for a computing machine forces one to think clearly, that it disciplines the thought process. If the user can think his problem through in advance, symbiotic association with a computing machine is not necessary.
  • ...25 more annotations...
  • They would be easier to solve, and they could be solved faster, through an intuitively guided trial-and-error procedure in which the computer cooperated, turning up flaws in the reasoning or revealing unexpected turns in the solution.
  • Poincare anticipated the frustration of an important group of would-be computer users when he said, "The question is not, 'What is the answer?' The question is, 'What is the question?'" One of the main aims of man-computer symbiosis is to bring the computing machine effectively into the formulative parts of technical problems.
  • It is to bring computing machines effectively into processes of thinking that must go on in "real time," time that moves too fast to permit using computers in conventional ways.
  • To think in interaction with a computer in the same way that you think with a colleague whose competence supplements your own will require much tighter coupling between man and machine than is suggested by the example and than is possible today.
  • Throughout the period I examined, in short, my "thinking" time was devoted mainly to activities that were essentially clerical or mechanical: searching, calculating, plotting, transforming, determining the logical or dynamic consequences of a set of assumptions or hypotheses, preparing the way for a decision or an insight. Moreover, my choices of what to attempt and what not to attempt were determined to an embarrassingly great extent by considerations of clerical feasibility, not intellectual capability.
  • the operations that fill most of the time allegedly devoted to technical thinking are operations that can be performed more effectively by machines than by men.
  • If those problems can be solved in such a way as to create a symbiotic relation between a man and a fast information-retrieval and data-processing machine, however, it seems evident that the cooperative interaction would greatly improve the thinking process.
  • Computing machines can do readily, well, and rapidly many things that are difficult or impossible for man, and men can do readily and well, though not rapidly, many things that are difficult or impossible for computers. That suggests that a symbiotic cooperation, if successful in integrating the positive characteristics of men and computers, would be of great value. The differences in speed and in language, of course, pose difficulties that must be overcome.
  • Men will fill in the gaps, either in the problem solution or in the computer program, when the computer has no mode or routine that is applicable in a particular circumstance.
  • Clearly, for the sake of efficiency and economy, the computer must divide its time among many users. Timesharing systems are currently under active development. There are even arrangements to keep users from "clobbering" anything but their own personal programs.
  • It seems reasonable to envision, for a time 10 or 15 years hence, a "thinking center" that will incorporate the functions of present-day libraries together with anticipated advances in information storage and retrieval and the symbiotic functions suggested earlier in this paper. The picture readily enlarges itself into a network of such centers, connected to one another by wide-band communication lines and to individual users by leased-wire services. In such a system, the speed of the computers would be balanced, and the cost of the gigantic memories and the sophisticated programs would be divided by the number of users.
  • The first thing to face is that we shall not store all the technical and scientific papers in computer memory. We may store the parts that can be summarized most succinctly-the quantitative parts and the reference citations-but not the whole. Books are among the most beautifully engineered, and human-engineered, components in existence, and they will continue to be functionally important within the context of man-computer symbiosis. (Hopefully, the computer will expedite the finding, delivering, and returning of books.)
  • The second point is that a very important section of memory will be permanent: part indelible memory and part published memory. The computer will be able to write once into indelible memory, and then read back indefinitely, but the computer will not be able to erase indelible memory. (It may also over-write, turning all the 0's into l's, as though marking over what was written earlier.) Published memory will be "read-only" memory. It will be introduced into the computer already structured. The computer will be able to refer to it repeatedly, but not to change it.
  • The basic dissimilarity between human languages and computer languages may be the most serious obstacle to true symbiosis.
  • In short: instructions directed to computers specify courses; instructions-directed to human beings specify goals.
  • We may in due course see a serious effort to develop computer programs that can be connected together like the words and phrases of speech to do whatever computation or control is required at the moment. The consideration that holds back such an effort, apparently, is that the effort would produce nothing that would be of great value in the context of existing computers. It would be unrewarding to develop the language before there are any computing machines capable of responding meaningfully to it.
  • By and large, in generally available computers, however, there is almost no provision for any more effective, immediate man-machine communication than can be achieved with an electric typewriter.
  • Displays seem to be in a somewhat better state than controls. Many computers plot graphs on oscilloscope screens, and a few take advantage of the remarkable capabilities, graphical and symbolic, of the charactron display tube. Nowhere, to my knowledge, however, is there anything approaching the flexibility and convenience of the pencil and doodle pad or the chalk and blackboard used by men in technical discussion.
  • 2) Computer-Posted Wall Display: In some technological systems, several men share responsibility for controlling vehicles whose behaviors interact. Some information must be presented simultaneously to all the men, preferably on a common grid, to coordinate their actions. Other information is of relevance only to one or two operators. There would be only a confusion of uninterpretable clutter if all the information were presented on one display to all of them. The information must be posted by a computer, since manual plotting is too slow to keep it up to date.
  • Laboratory experiments have indicated repeatedly that informal, parallel arrangements of operators, coordinating their activities through reference to a large situation display, have important advantages over the arrangement, more widely used, that locates the operators at individual consoles and attempts to correlate their actions through the agency of a computer. This is one of several operator-team problems in need of careful study.
  • 3) Automatic Speech Production and Recognition: How desirable and how feasible is speech communication between human operators and computing machines?
  • Yet there is continuing interest in the idea of talking with computing machines.
  • In large part, the interest stems from realization that one can hardly take a military commander or a corporation president away from his work to teach him to type. If computing machines are ever to be used directly by top-level decision makers, it may be worthwhile to provide communication via the most natural means, even at considerable cost.
  • It seems reasonable, therefore, for computer specialists to be the ones who interact directly with computers in business offices.
  • Certainly, if the equipment were already developed, reliable, and available, it would be used.
  •  
    Man-computer symbiosis is an expected development in cooperative interaction between men and electronic computers. It will involve very close coupling between the human and the electronic members of the partnership. The main aims are 1) to let computers facilitate formulative thinking as they now facilitate the solution of formulated problems, and 2) to enable men and computers to cooperate in making decisions and controlling complex situations without inflexible dependence on predetermined programs. In the anticipated symbiotic partnership, men will set the goals, formulate the hypotheses, determine the criteria, and perform the evaluations. Computing machines will do the routinizable work that must be done to prepare the way for insights and decisions in technical and scientific thinking. Preliminary analyses indicate that the symbiotic partnership will perform intellectual operations much more effectively than man alone can perform them. Prerequisites for the achievement of the effective, cooperative association include developments in computer time sharing, in memory components, in memory organization, in programming languages, and in input and output equipment.
michol lasti

CCleaner 5.01.5075 Free Download | librosdigitalescs software - 0 views

  •  
    CCleaner 5.01.5075 Free Download - Browsing the online world your computer covers a whole coordinator of unnecessary records and historical past and cookies. The same thing happens when you run most programs on your desktop - lots connected with temporary files in addition to settings are saved.
michol lasti

Google Chrome 38.0.2125.24 Dev Free Download | librosdigitalescs software - 0 views

  •  
    Google Chrome 38.0.2125.24 Dev Free Download - Google's game changing browser Firefox combines sophisticated technology using a simple UI, to make a faster, safer and also easier browsing encounter. Launched in 2008, Google Chrome 38.0.2125.24 easily dominated the browser market to get the most utilized browser globally in 4 years connected with its public generate
michol lasti

UsbFix 7.811 Free Download | librosdigitalescs software - 0 views

  •  
    UsbFix 7.811 Free Download - UsbFix 7.811 is usually a free malware removal tool that allows you to detect and remove infected USB memory sticks or another USB removable devices, such because external HDD's, digital cameras, smartphones or other peripherals that connects to your computer or laptop via the USB port.
Pinhopes Job Site

warning that the employee is going to quit | Pinhopes - 0 views

  •  
    Hiring the right employee is the key to business success. Organizations spend huge amount of time in looking, connecting and bringing on-board the right kind of talent. Losing and replacing an existing employee may cost companies both time and money. It is better that you identify these few early warning signs of an employee planning to quit.
michol lasti

ooVoo 3.6.7.19 Free Download | librosdigitalescs software - 0 views

  •  
    ooVoo 3.6.7.19 Free Download - ooVoo 3.6.7.19 is a great Skype alternative that allows you to connect with anyone, anytime, by means of video calls, video messages, phone calls, text and more
‹ Previous 21 - 40 of 107 Next › Last »
Showing 20 items per page