1,004 Matching Annotations
  1. Aug 2020
    1. This is twitter. What is its purpose? It is a general-purpose electronic communication medium on the Internet, accessible via web and apps, comprising a high-volume global stream of written thoughts of people, attached with pics, gifs, links and audio- & video-embeds.

    1. This means that while groups can generate high levels of solidarity, which can in principle be put to powerful political effect, it also becomes harder to express disagreement within the group. If, for example, an outspoken and popular member of a neighbourhood WhatsApp group begins to circulate misinformation about health risks, the general urge to maintain solidarity means that their messages are likely to be met with approval and thanks. When a claim or piece of content shows up in a group, there may be many members who view it as dubious; the question is whether they have the confidence to say as much. Meanwhile, the less sceptical can simply forward it on. It’s not hard, then, to understand why WhatsApp is a powerful distributor of “fake news” and conspiracy theories.

      Instead of positive feedback like this, is there a way to create negative feedback loops in these social media apps?

    2. Groups are great for brief bursts of humour or frustration, but, by their very nature, far less useful for supporting the circulation of public information. To understand why this is the case, we have to think about the way in which individuals can become swayed and influenced once they belong to a group.
    3. Anecdotal evidence from local political organisers and trade union reps suggests that, despite the initial efficiency of WhatsApp groups, their workload often increases because of the escalating number of sub-communities, each of which needs to be contacted separately. Schools desperately seek to get information out to parents, only to discover that unless it appears in precisely the right WhatsApp group, it doesn’t register. The age of the message board, be it physical or digital, where information can be posted once for anyone who needs it, is over.

      We've been facing this problem for quite a while. This is the reason that ideas like syndication in social media are so prevalent. People are checking too many parallel and orthogonal channels.

  2. Jul 2020
    1. Make sure you have a good headset with a microphone as any background noise is distracting to others during the call. If there is excessive noise on your connection, you will be muted until you need to speak. Make sure you join the IRC channel as links and code examples are usually shared over the chat channel.
  3. Jun 2020
    1. Enfin, le Défenseur des droits a régulièrement l’occasion de constater une absence d’échanges entre les services, au détriment de la continuité de l’accompagnement et de la prise en charge des enfants. L’organisation administrative « en silo » est à l’origine de prises en charge inadéquates, sources de véritables violences faites aux enfants. Les interventions des différents services sont encore trop souvent cloisonnées : chacun réalise son investigation sans prendre connaissance des rapports des autres, les temps de concertation ne sont pas prioritaires, entraînant parfois des conséquences dramatiques.
    1. The man who publishes and edits an article written by an anonymous critic should be held as immediately responsible for it as if he had written it himself; just as one holds a manager responsible for bad work done by his workmen [who] would be treated as he deserves to be — namely, without any ceremony. An anonymous writer is a literary fraud against whom one should immediately cry out, “Wretch, if you do not wish to admit what it is you say against other people, hold your slanderous tongue.”
    1. Par ailleurs, les conducteurs effectuant des circuits de transports d’élèves et étudiants handicapés doivent disposer des formations obligatoires relatives à la prise en charge de personne à mobilité réduite. Une attestation devra être fournie à l’autorité organisatrice.

      La vérification de l'effectivité et de la qualité des formations auto-certifiées mise en place par les sociétés est à questionner

    1. Toutefois, la semaine de la rentrée, afin de garantir l'égalité de traitement entre les associations, les opérations de distribution de leurs documents se déroulent simultanément et dans les mêmes conditions. Les documents remis en retard seront distribués dans les meilleurs délais.

      Il ne faut pas confondre égalité de traitement et égalité de communication. On doit offrir les mêmes option et droit à communiquer, les listes sont libres de les utiliser ou non

    2. I.2.2 Diffusion de documents La connaissance par les familles de la vie de l’école ou de l’établissement et de l’activité des associations de parents d’élèves nécessite la diffusion de documents. Ces communications revêtent donc une importance toute particulière. a) Contenu des documentsIdentifiés clairement comme émanant des associations de parents d’élèves, les documents remis aux responsables d’établissement doivent cependant respecter le principe de laïcité, les dispositions relatives à la vie privée et prohibant les injures et diffamations et exclure toute propagande en faveur d’un parti politique ou d’une entreprise commerciale.Même si le contenu de ces documents relève de la seule responsabilité des associations, l’institution se doit d’en prendre connaissance. En effet l’École, dans le cadre de sa mission de service public, ne peut distribuer de documents en s’affranchissant du respect des règles et principes rappelés au paragraphe précédent. Il ne s’agit en aucun cas d’exercer un contrôle a priori portant sur le fond. Le directeur d’école ou le chef d’établissement n’a pas à s’interroger sur l’opportunité de diffuser les documents émanant des associations de parents d’élèves.

      Les établissement et écoles n'ont donc rien à redire sur le contenu que l'on désire communiquer. seuls interdits:

      • le commercial
      • le prosélitisme politique ou religieux
      • la diffamation etc...
    3. Est affichée, dans les mêmes conditions, la liste des fédérations, unions ou associations de parents d’élèves représentées au Conseil supérieur de l’éducation, aux conseils académiques et départementaux de l’éducation nationale.En outre, toutes ces associations de parents d’élèves doivent disposer de boîtes aux lettres et de tableaux d’affichage.

      est-ce bien le cas sur votre territoire

    4. Les associations de parents d’élèves doivent être en mesure de se faire connaître auprès de l’ensemble des parents d’élèves et de les informer sur leur action. Elles peuvent prendre connaissance et obtenir copie de la liste des parents d’élèves de l’école ou de l’établissement scolaire mentionnant leurs noms, adresses postale et électronique, à la condition que ceux-ci aient donné leur accord exprès à cette communication.

      Là aussi c'est un élément de communication qui peut être utile, même si parfois il vaut mieux demander à l'établissement de transmettre à l'ensemble des parents

    1. There were also underlying security issues. Most of the messaging apps Tor Messenger supported are based on client-server architectures, and those can leak metadata (such as who's involved in a conversation and when) that might reveal who your friends are. There was no real way for the Tor crew to mitigate these issues.
    2. Tor suggests CoyIM, but it's prone to the same metadata issues as Messenger. You may have to accept that a small amount of chat data could find its way into the wrong hands, even if the actual conversations are locked down tight.
    1. e present a protocol for secure online com-munication, called “off-the-record messaging”, which hasproperties better-suited for casual conversation than do sys-tems like PGP or S/MIME.
    1. Of course, with Facebook being Facebook, there is another, more commercial outlet for this type of metadata analysis. If the platform knows who you are, and knows what you do based on its multi-faceted internet tracking tools, then knowing who you talk to and when could be a commercial goldmine. Person A just purchased Object 1 and then chatted to Person B. Try to sell Object 1 to Person B. All of which can be done without any messaging content being accessed.
    1. This is a major development—given the combined efforts of Google and the mobile networks, RCS will be the fastest deployed messaging technology of all time.
    2. One thing that would certainly be a game-changer would be some form of standardized RCS end-to-end encryption that allows secure messages to be sent outside Google Messages.
    3. The thinking behind RCS was to deliver a best of both worlds solution—the cross-platform ubiquity of SMS with the functionality of WhatsApp and iMessage, but built right into the core network infrastructure
    4. Rich Communication Services is a reinvention of cellular messaging, a halfway house between the SMS ecosystem run by network operators and platforms like WhatsApp and iMessage. The wide-scale RCS rollout is being driven by Google as Android’s iMessage equivalent
    1. First, the recognition that sensitive information needs to be transmitted securely over instant messaging platforms plays into the hands of the privacy advocates who are against backdoors in the end-to-end encryption used on WhatsApp, Signal, Wickr, iMessage and others. The core argument from the privacy lobby is that a backdoor will almost certainly be exploited by bad actors. Clearly, the EU (and others) would not risk their own comms with such a vulnerability.
  4. May 2020
    1. Encouraging everyone to do this regularly builds up both the team’s level of psychological safety and people’s courage to be vulnerable.

      psychological safety!

    2. Where you should enforce high-quality writing is broad or upwards communication, because there clarity is more important than speed and ideation.

      clarity > speed & ideation

    3. It forces us to be more precise than in verbal communication and thus leads to clearer thinking.
    1. Why question also need a context. We have to limit with things that we want to know. Have some emphaty with the person who want to provide the answer of your why.

      Context is key

    1. To exercise the right of withdrawal, you must inform us (LEFAS Fashion GmbH, Heckmannufer 3, 10997 Berlin, Germany, hello@wayks.com) of your decision to withdraw from this contract by an unequivocal statement (e.g. a letter sent by post or e-mail). You may use the attached model withdrawal form, but it is not obligatory.
    2. To meet the withdrawal deadline, it is sufficient for you to send your communication concerning your exercise of the right of withdrawal before the withdrawal period has expired.
    1. I reckon that it was: less a communication failure more a failure to pay attention – no disrespect intended. Given the unfortunate coincidence, it's almost entirely understandable that everyone concerned lost sight of Mozilla's forewarning.
    1. 70% async using Twist, Github, Paper25% sync using something like Zoom, Appear.in, or Google Meet5% physical meetings, e.g., annual company or team retreats

      Currently applied work structure at Doist

    2. According to the Harvard Business Review article “Collaborative Overload”, the time employees spend on collaboration has increased by 50% over the past two decades. Researchers found it was not uncommon for workers to spend a full 80% of their workdays communicating with colleagues in the form of email (on which workers’ spend an average of six hours a day); meetings (which fill up 15 percent of a company’s time, on average); and more recently instant messaging apps (the average Slack user sends an average of 200 messages a day, though 1,000-message power users are “not the exception”)

      Time spent in the office

  5. Apr 2020
    1. The word "passphrase" is used to convey the idea that a password, which is a single word, is far too short to protect you and that using a longer phrase is much better.
    1. terms like "malicious security cracker" are sufficiently evocative and clear that their use actually helps make communication more effective than the common journalistic misuse of "hacker".
    2. The more easily relabeled of the two uses of the term "hacker" is the malicious security cracker: it is not only the more recent phenomenon to acquire that label, but also the one whose meaning is most easily evoked by an alternative term. This is why, when you read an article of mine that talks about malicious security crackers, I use the term "malicious security cracker"
    3. When two different phenomena acquire the same label, as in the case of hackers in the classic sense on one hand and malicious security crackers on the other, either something has to give or discussion is bound to suffer from confusion that could easily have been avoided.
    4. Maintaining distinct terms for distinct phenomena is an important aspect of communication
    1. Email is not considered a secure communications channel. You have no idea if your email is encrypted when it's sent between mail providers nor is it a suitable secure storage facility
    1. Comme dans leurs relations humaines, les gens ont des rapports avec leur technologie qui peuvent être sécurisants, anxieux, évitants ou une combinaison (souvent désorganisée) des trois.

      Cela peut créer des problèmes futures, des personnes qui ne sont confortable seulement avec des personnes virtuelles, qu'ils peuvent dans un sens "controller". S'en suivra une génération incapable de communiquer dans la realité. Correctement utilisé, la technologie permet néanmoins de garder certains liens sociaux et des les renforcer.

  6. Mar 2020
    1. Dois-je communiquer avec chacun de mes élèves chaque jour?Il est nécessaire d’installer une communication régulière avec les élèves afin de s’assurer que le travail effectué est régulier.Cette régularité est laissée à l’appréciation des professeurs en fonction des besoins des élèves, et en fonction des contextes particuliers de chaque élève.