Skip to main content

Home/ New Media Ethics 2009 course/ Group items tagged Work

Rss Feed Group items tagged

Weiye Loh

Oxford academic wins right to read UEA climate data | Environment | guardian.co.uk - 0 views

  • Jonathan Jones, physics professor at Oxford University and self-confessed "climate change agnostic", used freedom of information law to demand the data that is the life's work of the head of the University of East Anglia's Climatic Research Unit, Phil Jones. UEA resisted the requests to disclose the data, but this week it was compelled to do so.
  • Graham gave the UEA one month to deliver the data, which includes more than 4m individual thermometer readings taken from 4,000 weather stations over the past 160 years. The commissioner's office said this was his first ruling on demands for climate data made in the wake of the climategate affair.
  • an archive of world temperature records collected jointly with the Met Office.
  • ...3 more annotations...
  • Critics of the UEA's scientists say an independent analysis of the temperature data may reveal that Phil Jones and his colleagues have misinterpreted the evidence of global warming. They may have failed to allow for local temperature influences, such as the growth of cities close to many of the thermometers.
  • when Jonathan Jones and others asked for the data in the summer of 2009, the UEA said legal exemptions applied. It said variously that the temperature data were the property of foreign meteorological offices; were intellectual property that might be valuable if sold to other researchers; and were in any case often publicly available.
  • Jonathan Jones said this week that he took up the cause of data freedom after Steve McIntyre, a Canadian mathematician, had requests for the data turned down. He thought this was an unreasonable response when Phil Jones had already shared the data with academic collaborators, including Prof Peter Webster of the Georgia Institute of Technology in the US. He asked to be given the data already sent to Webster, and was also turned down.
  •  
    An Oxford academic has won the right to read previously secret data on climate change held by the University of East Anglia (UEA). The decision, by the government's information commissioner, Christopher Graham, is being hailed as a landmark ruling that will mean that thousands of British researchers are required to share their data with the public.
Syntacticsinc SEO

The Results of Persistent SEO - 1 views

I have hired Philippine outsourcing firm Syntactics Inc to work on my website and take care of my online marketing needs too. In just one month, they were able to put a business-oriented website th...

search engine optimization

started by Syntacticsinc SEO on 06 Jul 11 no follow-up yet
Weiye Loh

The Mechanic Muse - What Is Distant Reading? - NYTimes.com - 0 views

  • Lit Lab tackles literary problems by scientific means: hypothesis-testing, computational modeling, quantitative analysis. Similar efforts are currently proliferating under the broad rubric of “digital humanities,” but Moretti’s approach is among the more radical. He advocates what he terms “distant reading”: understanding literature not by studying particular texts, but by aggregating and analyzing massive amounts of data.
  • People recognize, say, Gothic literature based on castles, revenants, brooding atmospheres, and the greater frequency of words like “tremble” and “ruin.” Computers recognize Gothic literature based on the greater frequency of words like . . . “the.” Now, that’s interesting. It suggests that genres “possess distinctive features at every possible scale of analysis.” More important for the Lit Lab, it suggests that there are formal aspects of literature that people, unaided, cannot detect.
  • Distant reading might prove to be a powerful tool for studying literature, and I’m intrigued by some of the lab’s other projects, from analyzing the evolution of chapter breaks to quantifying the difference between Irish and English prose styles. But whatever’s happening in this paper is neither powerful nor distant. (The plot networks were assembled by hand; try doing that without reading Hamlet.) By the end, even Moretti concedes that things didn’t unfold as planned. Somewhere along the line, he writes, he “drifted from quantification to the qualitative analysis of plot.”
  • ...5 more annotations...
  • most scholars, whatever their disciplinary background, do not publish negative results.
  • I would admire it more if he didn’t elsewhere dismiss qualitative literary analysis as “a theological exercise.” (Moretti does not subscribe to literary-analytic pluralism: he has suggested that distant reading should supplant, not supplement, close reading.) The counterpoint to theology is science, and reading Moretti, it’s impossible not to notice him jockeying for scientific status. He appears now as literature’s Linnaeus (taxonomizing a vast new trove of data), now as Vesalius (exposing its essential skeleton), now as Galileo (revealing and reordering the universe of books), now as Darwin (seeking “a law of literary ­evolution”).
  • Literature is an artificial universe, and the written word, unlike the natural world, can’t be counted on to obey a set of laws. Indeed, Moretti often mistakes metaphor for fact. Those “skeletons” he perceives inside stories are as imposed as exposed; and literary evolution, unlike the biological kind, is largely an analogy. (As the author and critic Elif Batuman pointed out in an n+1 essay on Moretti’s earlier work, books actually are the result of intelligent design.)
  • Literature, he argues, is “a collective system that should be grasped as such.” But this, too, is a theology of sorts — if not the claim that literature is a system, at least the conviction that we can find meaning only in its totality.
  • The idea that truth can best be revealed through quantitative models dates back to the development of statistics (and boasts a less-than-benign legacy). And the idea that data is gold waiting to be mined; that all entities (including people) are best understood as nodes in a network; that things are at their clearest when they are least particular, most interchangeable, most aggregated — well, perhaps that is not the theology of the average lit department (yet). But it is surely the theology of the 21st century.
Weiye Loh

Is Assange the "world-spirit embodied"? A Hegel scholar reports fro... - 0 views

  • Although the atmosphere at the Troxy was very genial, and Žižek generally enthusiastic about WikiLeaks (as he was in the London Review of Books article he published about it), there was a distinct tension between the rather standard Enlightenment rhetoric employed by Assange (more facts, a more complete historical record, better educated journalists)  and the significantly more radical conclusions the philosopher was drawing. This is why - whilst it should no doubt be read in a similar light as Žižek’s own remarks on his position during the conversation (I feel now like that Stalinist commentator: the leader has spoken, I provide the deeper meaning) - the ventured analogy nevertheless contains a kernel of truth beyond its bombast: defining the emancipatory significance of phenomena should not be left to the actors alone.
  • in response to Goodman's initial question on the significance of the Iraq war logs, Assange primarily emphasized the concrete revelations WikiLeaks had provided. He mentioned the 400.000 cables leaked, 15.000 previously unreported deaths revealed, a video of an American helicopter mowing down civilians, and so on. In contrast, Žižek went far enough to say that even if WikiLeaks had not revealed a single new thing, it should be considered game-changing. Why? Because of the very way it functions. For the philosopher, our democracies not only have rules regarding what can be revealed, but also rules which regulate the transgression of those first rules (the independent press, NGOs, etc). The contention then is that WikiLeaks operates outside both these sets of rules, and that there is the source of its power.
  • the reply was firmly anchored in the key trope Žižek has championed since his first major work in English: that ideology in today's "post-ideological" world is not dead, but rather more powerful than ever - alive not so much on the level of knowledge but in the ways it structures social reality itself.
  • ...2 more annotations...
  • Žižek points out, the innocence of the accusers is anything but innocent; they decry the violence of WikiLeaks revelations, themselves oblivious to the military, economic, political and social framework of everyday violence that goes unmentioned in public discourse. The violence of leaks is on a formal level, and precisely this is at the root of the Slovene’s exclamation to Assange: “Yes, you are a terrorist, but by God, then what are they?”
  • WikiLeaks should not be seen as merely another chapter in investigative journalism and free flow of information, but a positive, subversive emancipatory force by virtue of the way it operates outside the system of secrets and allowed revelations. What then remains ahead is the hard task of keeping this subversive strength alive.
  •  
     in response to Goodman's initial question on the significance of the Iraq war logs, Assange primarily emphasized the concrete revelations WikiLeaks had provided. He mentioned the 400.000 cables leaked, 15.000 previously unreported deaths revealed, a video of an American helicopter mowing down civilians, and so on. In contrast, Žižek went far enough to say that even if WikiLeaks had not revealed a single new thing, it should be considered game-changing. Why? Because of the very way it functions. For the philosopher, our democracies not only have rules regarding what can be revealed, but also rules which regulate the transgression of those first rules (the independent press, NGOs, etc). The contention then is that WikiLeaks operates outside both these sets of rules, and that there is the source of its power.
Weiye Loh

Sony's Stringer 'sorry' over data breach - 0 views

  • Sony has worked to strengthen its information security systems, 'placing our highest priority on ensuring the security of our customers' personal information, and regaining their trust.' The Japanese electronics and entertainment giant has faced a series of cyber attacks and said more than 100 million accounts have been affected, making it one of the largest data breaches in the history of the Internet. Analysts say costs associated with the breach could be as much as US$1 billion (S$1.24 billion), but deeper damage to Sony's brand image could undermine efforts to link its gadgets to an online network of games, movies and music.
  •  
    SONY chairman and president Howard Stringer on Tuesday apologised to shareholders and customers over a massive data leak, which helped push its its share price to a two-year low this month. 'In April, we faced a serious challenge in the form of a cyber attack launched against the PlayStation Network, Qriocity and the network systems of Sony Online Entertainment,' Mr Stringer said at a meeting in Tokyo attended by about 5,900 shareholders. 'We are sorry for any concern and inconvenience that the incidents may have caused our shareholders, customers and stakeholders,' he said. The company is expecting its third-straight annual loss this year.
Weiye Loh

Interview etiquette : Johann Hari - 0 views

  • occasionally, at the point in the interview where the subject has expressed an idea, I’ve quoted the idea as they expressed it in writing, rather than how they expressed it in speech. It’s a way of making sure the reader understands the point that (say) Gideon Levy wants to make as clearly as possible, while retaining the directness of the interview.
  • if somebody interviewed me and asked my views of Martin Amis, instead of quoting me as saying “Um, I think, you know, he got the figures for, uh, how many Muslims there are in Europe upside down”, they could quote instead what I’d written more cogently about him a month before, as a more accurate representation of my thoughts. I stress: I have only ever done this where the interviewee was making the same or very similar point to me in the interview that they had already made more clearly in print.
  • after doing what must be over fifty interviews, none of my interviewees have ever said they had been misquoted, even when they feel I’ve been very harsh on them in other ways.
  • ...3 more annotations...
  • Gideon Levy said, after my interview with him was published, that it was “the most accurate take on me anyone has written” and “profoundly moved him” – which hardly fits with the idea it was an inaccurate or misleading picture.
  • one blogger considers this “plagiarism”. Who’s being plagiarized? Plagiarism is passing off somebody else’s intellectual work as your own – whereas I’m always making it clear that (say) Gideon Levy’s thought is Gideon Levy’s thought. I’m also a bit bemused to find that some people consider this “churnalism”. Churnalism is a journalist taking a press release and mindlessly recycling it – not a journalist carefully reading over all a writer’s books and selecting parts of it to accurately quote at certain key moments to best reflect how they think.
  • I called round a few other interviewers for British newspapers and they said what I did was normal practice and they had done it themselves from time to time. My test for journalism is always – would the readers mind you did this, or prefer it? Would they rather I quoted an unclear sentence expressing a thought, or a clear sentence expressing the same thought by the same person very recently? Both give an accurate sense of what a person is like, but one makes their ideas as accessible as possible for the reader while also being an accurate portrait of the person.
Weiye Loh

Stanford Security Lab Tracks Do Not Track - 0 views

  • What they found is that more than half the NAI member companies did not remove tracking codes after someone opted out.
  • At least eight NAI members promise to stop tracking after opting out, but nonetheless leave tracking cookies in place.
  • I take that to mean that the other 25 companies never actually said they would remove tracking cookies, it’s just that they belong to a fellowship that wishes they would. On the positive side, ten companies went beyond what their privacy policy promises (say that three times fast) and two companies were “taking overt steps to respect Do Not Track.”
  • ...2 more annotations...
  • There’s probably a small percentage of companies who will blatantly ignore any attempts to stop tracking. For the rest, it’s more likely a case of not having procedures in place. Their intentions are good, but lack of manpower and the proper tech is probably what’s keeping them from following through on those good thoughts.
  • Since they can’t go after them with big guns, the Stanford study went with public embarrassment. They’ve published a list of the websites showing which ones are compliant and which ones aren’t. If you’re working with an ad network, you might want to check it out.
  •  
    The folks at the Stanford Security Lab are a suspicious bunch. Since they're studying how to make computers more secure, I guess it comes with the territory. Their current interest is tracking cookies and the Do Not Track opt-out process. Using "experimental software," they conducted a survey to see how many members of the Network Advertising Initiative (NAI), actually complied with the new Do Not Track initiatives.
« First ‹ Previous 321 - 327 of 327
Showing 20 items per page