Game On
Labels: higher education, UC Irvine
A blog about digital rhetoric that asks the burning questions about electronic bureaucracy and institutional subversion on the Internet.
Labels: higher education, UC Irvine
Labels: game politics, parody, religion
Labels: higher education, youtube rhetoric
Labels: game politics, human rights
Labels: free speech, higher education, justice system
Labels: military, technology
The problem with a public-facing Twitter stream in events like this is that it FORCES the audience to pay attention the backchannel. So even audience members who want to focus on the content get distracted. Most folks can't multitask that well. And even if I had been slower and less dense, my talks are notoriously too content-filled to make multi-tasking possible for the multi-tasking challenged. This is precisely why I use very simplistic slides that evokes images for the visual types in the room without adding another layer of content. But the Twitter stream fundamentally adds another layer of content that the audience can't ignore, that I can't control. And that I cannot even see.
Now, I'm AOK with not having complete control of the audience during a talk, but it requires a fundamentally different kind of talk. That was not what I prepared for at all. Had I known about the Twitter stream, I would've given a more pop-y talk that would've bored anyone who has heard me speak before and provided maybe 3-4 nuggets of information for folks to chew on. It would've been funny and quotable but it wouldn't have been content-wise memorable. Perhaps that would've made more sense? Realistically though, those kinds of talks bore me at this point. So I probably would've opted not to give a talk at all. Perhaps I'm not the kind of speaker you want if you want a Twitter stream? But regardless, what I do know is that certain kinds of talks do not lend themselves to that kind of dynamic. I would *NEVER* have given my talk on race and class in such a setting. I shudder to think about how the racist language people used when I gave that talk would've been perceived on the big screen.
I suspect that these kinds of more public backchannels may be here to stay at academic conferences. I know from my own talks, that seeing the critical responses of live bloggers and status updaters can be disconcerting, so I'd probably rather keep myself unaware of those exchanges at the moment of performance whenever I can.Labels: conferences, social networking
Labels: government websites, print media, social networking
Labels: e-mail etiquette, environment, privacy, science, security
Labels: massive games, serious games, virtual worlds
Labels: government websites, science, social networking, White House
Labels: big media, ubiquitous computing
Labels: conferences
Labels: photoshop, visual culture, White House
Labels: remix culture, visual culture
Labels: copyright, Google, visual culture
Labels: government websites, social networking
Labels: military, serious games
Labels: blogging, game politics
Labels: economics, Google, information theory
Labels: distance learning, higher education, virtual worlds
Labels: economics, game politics, massive games, print media
Labels: conferences, remix culture
Labels: military, social networking
Labels: information aesthetics
Labels: photoshop, visual culture
Labels: generators
Labels: ubiquitous computing, visual culture, White House
Labels: composition, generators
Labels: alternate reality games, big media
In terms of software, the main culprits for the Army’s Luddite setup here is a weak architecture and lack of interoperability between systems.
Without going into operational and technical specifics, there are multiple systems the military uses for tracking vehicles and units, but many of these systems do not speak to one another. Even within systems one unit often cannot speak or synchronize with another because a software upgrade or patch makes their equipment incompatible. This results in a confusing battlespace where units sometimes lack complete situational awareness of other units operating around them.
There are also too many platforms being tailored to specific uses, inadvertently adding to the fog of war. Command and control, intelligence, logistics, and medical systems all have a plethora of platforms with their own hardware and software requirements. These operating systems are an extreme hindrance for forward-deployed personnel operating in austere environments as they entail a greater support tail, and, more importantly, they all need power.Labels: Iraq war, military, MIT Press, ubiquitous computing
The social technologies that assist in dating and mating today are more than palliatives—they’ve changed the nature of the game. If the cold approach is more than you can deal with, put up a Craigslist ad, or join OkCupid, Manhunt, or Nerve. If the phone call makes you nervous, send a text message. And while you’re at it, send a text message to a half-dozen other people with everyone’s favorite late-night endearment: “where u at?” If nothing works out and you find yourself alone at home again, simply fire up XTube or YouPorn and choose from an endless variety of positions to help you reach a late-night climax.
Virtually everyone under the age of 30 has grown up with their sexuality digitally enhanced, and the rest of us are rapidly forgetting the world before we all were hooked into the same erotically charged network of instantaneously transmitted messages and images. This must be true across the country, but it seems particularly suited for a city as dense, morally libertine, and sexually spirited as New York. Part of the promise of this city has always been that there’s another prospective partner a subway stop away, but not until recently could that partner interrupt your daily business with a cell-phone snapshot of their parted thighs. And of course, the same technology that makes it easier to score also makes the sexual boast or confession easily transmissible to millions of other people.
Today, in "Cellphones, Texts and Lovers," New York Times columnist David Brooks analyzes the diaries and puts forward a hypothesis that seems somewhat at odds with his conventional championing of the free market, because in arguing that technology is compromising the "recurring and stable reciprocity that is the building block of trust" he also appears to question the ideology of choice and unregulated consumption that appeals to many neo-libertarian conservatives of his own party.People are thus thrown back on themselves. They are free agents in a competitive arena marked by ambiguous relationships. Social life comes to resemble economics, with people enmeshed in blizzards of supply and demand signals amidst a universe of potential partners.
The opportunity to contact many people at once seems to encourage compartmentalization, as people try to establish different kinds of romantic attachments with different people at the same time.
It seems to encourage an attitude of contingency. If you have several options perpetually before you, and if technology makes it easier to jump from one option to another, you will naturally adopt the mentality of a comparison shopper.Labels: sexuality, ubiquitous computing
Here at the Sunlight Foundation, we spend a lot of time with Adobe's products-- mainly trying to reverse the damage that these technologies create when government discloses information. The PDF file format, for instance, isn't particularly easily parsed. As ubiquitous as a PDF file is, often times they're non-parsable by software, unfindable by search engines, and unreliable if text is extracted.
As a recipient of mail for "Adobe Government Solutions," I can attest to how special tutorials and workshops for government employees are direct e-mail marketed. Next week I can attend a session on Photoshop Lightroom 2 for design savvy civil servants on matters of such civic import as creating "proper digital exposure," importing images, and making virtual copies. (See above.)The Berkman academic fellowship is designed to support an early-to-mid career academic conducting research expected to yield valuable data and/or new insights related to Internet and society.
The Berkman Center looks forward to facilitating and advancing significant works of scholarship achieved through both traditional and experimental methods. The academic fellowship provides a focused opportunity for the production of such works as articles, books, and other considerable contributions to our understanding of cyberspace.
Beyond executing the plan proposed by the fellow, interaction with, support from, and contributions to the fellows and Berkman Center communities play a vital part of the academic fellowship experience.
3) Last, but certainly not least, the Yale Information Society Project is developing a great track record for selecting interesting young scholars with an interest in public service through their Resident Fellows Program.The Yale ISP resident fellowship is designed for recent graduates of law or Ph.D. programs who are interested in careers in teaching and public service in any of the following areas: law and innovation, media studies, Internet and telecommunications law, intellectual property law, access to knowledge, first amendment law, social software, digital education, privacy, cybersecurity, standards and technology policy, biotechnology, and law, technology, and culture generally.
Fellows receive a salary of approximately 44,000 USD plus Yale benefits. Fellows are expected to work on an independent scholarly project as well as help with administrative and scholarly work for the Information Society Project at Yale Law School. A small number of special ISP visiting fellowships are also available for persons who provide their own sources of funding.Labels: higher education, interdisciplinarity