Skip to main content

Home/ WomensLearningStudio/ Group items tagged pairs

Rss Feed Group items tagged

Lisa Levinson

The End of 'Genius' - NYTimes.com - 0 views

  •  
    Opinion piece in the July 19th 2014 NYTimes by Joshua Wolf Shenk, the author of the forthcoming book: Powers of Two: Finding Essence of Innovation in Creative Pairs". He begins:"the lone genius is a myth that has outlived its usefulness. Fortunately, a more truthful model is emerging: the creative network, as with the crowd-sourced Wikipedia or the writer's room at "The Daily Show" or - the real heart of creativity - the intimate exchange of the creative pair, such as John Lennon and Paul McCartney and myriad other examples with which we've yet to fully reckon." and ends with: "This raises vital questions. What is the optimal balance between social immersion and creative solitude? Why does interpersonal conflict so often coincide with innovation? Looking at pairs allows us to grapple with these questions, which are as basic to the human experience as the push and pull of love itself. As a culture, we've long been preoccupied with romance. But we should also take seriously something just as important, but long overlooked - creative intimacy."
  •  
    Although the author stresses pairs, the history of genius is really interesting - for example, before the 16th century, individuals were not geniuses, but having genius which was a value that emerged from within a person given to them at birth".
Doris Reeves-Lipscomb

Less is more. Teach less, learn more. - David Truss :: Pair-a-dimes for Your Thoughts - 0 views

  •  
    Blog post by David Truss, Pair-A_Dimes, January 4, 2011, on learning at work by professionals, i.e., teachers. Has much more good stuff to say than this excerpt but I find this useful for Information Overload. Another term I ran across lately--practical obscurity--in relation to why we are now part of NSA's scope--because costs have fallen so low to monitor so much behavior online--voice and text--that what was once unavailable without a lot of costs is now quite feasible for someone to monitor, such as NSA, Google, Facebook, etc. Excerpt: "I read a post recently by Jeff Utecht, whom you have worked with, that said this: "Today at school I answered personal e-mail, updated my Facebook status, Tweeted, looked up flights for winter break, and even read articles that didn't pertain to school. And they say we're becoming less productive at work. What really is happening is the line between our work life and our social life is becoming blurred more and more every day." and he continues: "Sure I use some of my work time to do social things, yet I get home from work after 3pm and answer work e-mails, text faculty members about a computer problem, and work on lessons and things that need to be done. So it's an even swap. I'll use some of your time, you can use some of mine.""
Doris Reeves-Lipscomb

ICTlogy » ICT4D Blog » The Dichotomies in Personal Learning Environments and ... - 0 views

  •  
    Authors did an opening exercise at a conference in 2010 to force choices by educators on organizationally controlled vs. individually controlled PLEs. It clear that the shift is toward individualized learning supported/guided by educators side by side not in front of the learner. Excerpt "To help them in this endeavour, institutions have an important role as guides (not leaders) that have to trespass their own walls and enter the environments (in plural) where learning actually takes place, which increasingly is outside of the framework of formality. In fact, this seems to be answering at the WHAT question: what is learning in the digital era? The rest of pairs (Openness and the Barriers) seem to be pointing at the HOW question: how should learning be carried on in the digital era?. The answer seems to be open and flexible institutions, new educational systems and methodologies and a dire organizational change."
Doris Reeves-Lipscomb

Sticky data: Why even 'anonymized' information can still identify you - The Globe and Mail - 0 views

  • This isn’t the first time this has happened, that big data sets full of personal information – supposedly obscured, or de-identified, as the process is called – have been reverse engineered to reveal some or even all of the identities contained within. It makes you wonder: Is there really such a thing as a truly anonymous data set in the age of big data?
  • That might sound like a bore, but think about it this way: there’s more than taxi cab data at stake here. Pretty much everything you do on the Internet these days is a potential data set. And data has value. The posts you like on Facebook, your spending habits as tracked by Mint, the searches you make on Google – the argument goes that the social, economic and academic potential of sharing these immensely detailed so-called “high dimensional” data sets with third parties is too great to ignore.
  • University of Colorado Law School associate professor Paul Ohm’s 2009 paper on the topic made the bold claim that “data can be either useful or perfectly anonymous but never both.”
  • ...1 more annotation...
  • A similar situation was cited by Princeton University researchers Arvind Narayanan and Edward W. Felten in a recent response to Cavoukian and Castro. The pair wrote that, in one data set where location data had supposedly been anonymized, it was still possible in 95 per cent of test cases to re-identify users “given four random spatio-temporal points” – and 50 per cent if the researchers only had two. In other words, de-identifying location data is moot if you know where a target lives, where they work and have two other co-ordinates they visit with regularity.
  •  
    post by Matthew Braga as special to The Globe and Mail, 8/6/14 on how deidentified data can be hacked to reveal identities of users.
1 - 4 of 4
Showing 20 items per page