827 Matching Annotations
  1. Last 7 days
    1. Throughout the platform’s history, end-users have remained at the mercy of their WordPress theme. Most themes are built around what WordPress allows out of the box. They follow a similar formula. Some may have a fancy homepage or other custom page templates. But, on the whole, themes have been primarily built around the idea of a blog. Such themes do not give the user true control over where to place things on their website. While some developers have attempted solutions to this, most have never met the towering goal of putting the power of HTML and CSS into the hands of users through a visual interface. This lack of tools has given rise to page builders and the block editor.

      an apropos criticsm

    2. While I lament the loss of some of the artistry of the early web and lay much of the blame at the feet of blogging platforms like WordPress, such platforms also opened the web to far more people who would not have otherwise been able to create a website. Democratizing publishing is a far loftier goal than dropping animated GIFs across personal spaces.

      WordPress has done a lot to democratize publishing and make portions of it easier, but has it gone too far in crystalizing the form of things by not having more wiki-like or curation-based features?

    3. Personal websites can be so much more than a progression of posts over time, newer posts showing up while everything from the past is neatly tucked on “page 2” and beyond.

      This is an interesting idea and too many CMSes are missing this sort of UI baked into them as a core idea. CMSes could do a better job of doing both: the garden AND the stream

    1. The second article is from Tom Critchlow titled Building a Digital Garden. What I really like about Tom's piece is his discussion of the idea of "non-performative blogging" in your personal space on the web.I love this idea. Instead of "content marketing" we can use our websites to get back to what made the web awesome while also creating better resources for ourselves and our users.

      There's a nice kernel of an idea here that one's website should be built and made (useful) for ones self first and only secondarily for others. This is what makes it a "personal" website.

  2. Aug 2020
    1. 1) a inexistência de infraestrutura física de transmissão; 2) a disponibilidade de equipamento/conexão de acesso (como computadores, modem, antenas); 3) o treinamento no uso dos instrumentos do computador e da internet; 4) a capacitação intelectual dos usuários para o uso da tecnologia e dos espaços virtuais; e 5) o aproveitamento e o desenvolvimento de conteúdos específicos e adequados às necessidades de diversos segmentos da população. Por certo que os citados elementos se tornam ainda mais complexos se pensados em nível de satisfação e de qualidade de satisfação.

      Fatores para exclusão digital

    2. A ciberexclusão representa um dos vieses da desigualdade social e trata do problema da não fruição adequada (por variados motivos) da

      Exclusão Digital

  3. Jul 2020
    1. The word “pedagogy,” as we use it, defines the work of education at the intersection of theory and practice — the act of teaching that derives from reflection and which inspires reflection again. Pedagogy is both where “critical” and “digital” terminate, and also the whole terrain of teaching.

      I agree with this. Creating divisions on how pedagogy relates to one age group over another takes away from the key developments around education and pedagogy, and creates a slightly more disconnected, disjointed field for education. Good education and educational practices are just that - the subject or age specificity can distract from otherwise good practices and theories that can and often do transcend the disciplines.

    1. It is not unusual for one individual to possess several dozen different usernames and passwords.

      Having multiple names is an interesting manifestation of having multiple identities. Do you tend to use your "real" name, a consistent username across services, or different usernames based on the kind of service? What happens when those contexts collapse (like when you give a work acquaintance your personal email address).

    2. A digital identity is made up of the sum total of digital traces relating to an individual or a community

      I tend to think of my digital identities (plural) as something closer to personae - the personalities I wish to expose or highlight or preserve on particular platforms or with particular groups. Interesting challenge to think about the integrative, single identity.

    1. the indexable nature of human beings themselves via the traces they consciously or unconsciously leave on the network, that is to say the question of their digital identity.

      "Consciously or unconsciously" is interesting. The imposition of identity by others, as well as our own volition in crafting it.

    1. prevent its disclosure to any person not authorized to create the subscriber's digital signature

      So the signature can be used by another entity to create the digital signature if authorized beforehand.

      So if there is a statement that "I authorize [organization] to create a cryptographic key-pair on my behalf, and create the digital signature."

    1. Simply stated, students are often not provided with opportunities in school to practice the web literacies necessary to read, write, and participate on the web.

      I remember having to take a computer science course in high school/middle school, but it mainly focused on developing digital skills instead of digital literacies

  4. Jun 2020
    1. This integration of digital tools and automated technologies into building practices has become ever-more urgent in light of the agility that will be required to cope with the effects of climate change, including the increased mobility of people and reduction in material and human resources. Architecture that could accommodate more people in the event of mass migration, or construction practices that could efficiently utilise local resources instead of relying on global supply chains, are possible results of digitising the production of the built environment.

      As long as the tools are made freely available to the public, lest the control shift to those who own/control such tools (proprietary software in the hands of large digital coroporations).

    1. I love the general idea of where he's going here and definitively want something exactly like this.

      The closest thing I've been able to find in near-finished form is having a public TiddlyWiki with some IndieWeb features. Naturally there's a lot I would change, but for the near term a mixture of a blog and a wiki is what more of us need.

      I love the recontextualization of the swale that he proposes here to fit into the extended metaphor of the garden and the stream.

  5. May 2020
    1. being able to follow links to “follow a conversation” that is threaded on Twitter.

      This is one of my favorite parts about my website and others supporting Webmention: the conversation is aggregated onto or more closely adjacent to the source. This helps prevent context collapse.

      Has anyone made a browser tool for encouraging lateral reading? I'd love a bookmarklet that I could click to provide some highly relevant lateral reading resources for any particular page I'm on.

    1. If your hosting provider does not support HTTPS, the following options are available: You can contact your web hosting provider: tell them you want a free HTTPS certificate through Let’s Encrypt. You’re probably not the only one using your web hosting provider service who wants HTTPS. You can request that your web hosting provider offer Let’s Encrypt HTTPS certificates as a free part of their hosting package. An effective way to make this ask is through email, their help desk system, or by contacting the web hosting provider through social media. You can switch to a different web hosting provider. Find a web hosting provider who offers full HTTPS support as part of their web hosting package by checking our list. You might be able to use Certbot. If you have SSH access to the server your website is hosted on, you might be able to use Certbot. You will need to know the software and system your server is running on. After you confirm the software and system information, you can use the dropdown menus above to generate specific instructions for running Certbot on your server through the command line.
    1. ABSTRACTLet’s Encrypt is a free, open, and automated HTTPS certificate au-thority (CA) created to advance HTTPS adoption to the entire Web.Since its launch in late 2015, Let’s Encrypt has grown to become theworld’s largest HTTPS CA, accounting for more currently valid cer-tificates than all other browser-trusted CAs combined. By January2019, it had issued over 538 million certificates for 223 million do-main names. We describe how we built Let’s Encrypt, including thearchitecture of the CA software system (Boulder) and the structureof the organization that operates it (ISRG), and we discuss lessonslearned from the experience. We also describe the design of ACME,the IETF-standard protocol we created to automate CA–server inter-actions and certificate issuance, and survey the diverse ecosystemof ACME clients, including Certbot, a software agent we created toautomate HTTPS deployment. Finally, we measure Let’s Encrypt’simpact on the Web and the CA ecosystem. We hope that the successof Let’s Encrypt can provide a model for further enhancements tothe Web PKI and for future Internet security infrastructure.
    1. public-benefit digital infrastructure projects, the first of which was the Let's Encrypt certificate authority. ISRG's founding directors were Josh Aas and Eric Rescorla. The group's founding sponsors and partners were Mozilla, the Electronic Frontier Foundation, the University of Michigan, Cisco, and Akamai.
    2. About Internet Security Research Group Mission Our mission is to reduce financial, technological, and educational barriers to secure communication over the Internet.
    1. HTTPS Everywhere HTTPS Everywhere is a Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure. Encrypt the web: Install HTTPS Everywhere today.
    1. Certbot is part of EFF’s larger effort to encrypt the entire Internet. Websites need to use HTTPS to secure the web. Along with HTTPS Everywhere, Certbot aims to build a network that is more structurally private, safe, and protected against censorship. Certbot is the work of many authors, including a team of EFF staff and numerous open source contributors.
    2. What’s Certbot? Certbot is a free, open source software tool for automatically using Let’s Encrypt certificates on manually-administrated websites to enable HTTPS. Certbot is made by the Electronic Frontier Foundation (EFF), a 501(c)3 nonprofit based in San Francisco, CA, that defends digital privacy, free speech, and innovation.
    1. The objective of Let’s Encrypt and the ACME protocol is to make it possible to set up an HTTPS server and have it automatically obtain a browser-trusted certificate, without any human intervention. This is accomplished by running a certificate management agent on the web server. To understand how the technology works, let’s walk through the process of setting up https://example.com/ with a certificate management agent that supports Let’s Encrypt. There are two steps to this process. First, the agent proves to the CA that the web server controls a domain. Then, the agent can request, renew, and revoke certificates for that domain. Domain Validation Let’s Encrypt identifies the server administrator by public key. The first time the agent software interacts with Let’s Encrypt, it generates a new key pair and proves to the Let’s Encrypt CA that the server controls one or more domains. This is similar to the traditional CA process of creating an account and adding domains to that account. To kick off the process, the agent asks the Let’s Encrypt CA what it needs to do in order to prove that it controls example.com. The Let’s Encrypt CA will look at the domain name being requested and issue one or more sets of challenges. These are different ways that the agent can prove control of the domain. For example, the CA might give the agent a choice of either: Provisioning a DNS record under example.com, or Provisioning an HTTP resource under a well-known URI on http://example.com/ Along with the challenges, the Let’s Encrypt CA also provides a nonce that the agent must sign with its private key pair to prove that it controls the key pair. The agent software completes one of the provided sets of challenges. Let’s say it is able to accomplish the second task above: it creates a file on a specified path on the http://example.com site. The agent also signs the provided nonce with its private key. Once the agent has completed these steps, it notifies the CA that it’s ready to complete validation. Then, it’s the CA’s job to check that the challenges have been satisfied. The CA verifies the signature on the nonce, and it attempts to download the file from the web server and make sure it has the expected content. If the signature over the nonce is valid, and the challenges check out, then the agent identified by the public key is authorized to do certificate management for example.com. We call the key pair the agent used an “authorized key pair” for example.com. Certificate Issuance and Revocation Once the agent has an authorized key pair, requesting, renewing, and revoking certificates is simple—just send certificate management messages and sign them with the authorized key pair. To obtain a certificate for the domain, the agent constructs a PKCS#10 Certificate Signing Request that asks the Let’s Encrypt CA to issue a certificate for example.com with a specified public key. As usual, the CSR includes a signature by the private key corresponding to the public key in the CSR. The agent also signs the whole CSR with the authorized key for example.com so that the Let’s Encrypt CA knows it’s authorized. When the Let’s Encrypt CA receives the request, it verifies both signatures. If everything looks good, it issues a certificate for example.com with the public key from the CSR and returns it to the agent. Revocation works in a similar manner. The agent signs a revocation request with the key pair authorized for example.com, and the Let’s Encrypt CA verifies that the request is authorized. If so, it publishes revocation information into the normal revocation channels (i.e. OCSP), so that relying parties such as browsers can know that they shouldn’t accept the revoked certificate.
    1. Let’s Encrypt is a free, automated, and open certificate authority (CA), run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG). We give people the digital certificates they need in order to enable HTTPS (SSL/TLS) for websites, for free, in the most user-friendly way we can. We do this because we want to create a more secure and privacy-respecting Web. You can read about our most recent year in review by downloading our annual report (Desktop, Mobile). The key principles behind Let’s Encrypt are: Free: Anyone who owns a domain name can use Let’s Encrypt to obtain a trusted certificate at zero cost. Automatic: Software running on a web server can interact with Let’s Encrypt to painlessly obtain a certificate, securely configure it for use, and automatically take care of renewal. Secure: Let’s Encrypt will serve as a platform for advancing TLS security best practices, both on the CA side and by helping site operators properly secure their servers. Transparent: All certificates issued or revoked will be publicly recorded and available for anyone to inspect. Open: The automatic issuance and renewal protocol will be published as an open standard that others can adopt. Cooperative: Much like the underlying Internet protocols themselves, Let’s Encrypt is a joint effort to benefit the community, beyond the control of any one organization. We have a page with more detailed information about how the Let’s Encrypt CA works.
    1. Ross-Hellauer, T., Tennant, J. P., Banelytė, V., Gorogh, E., Luzi, D., Kraker, P., Pisacane, L., Ruggieri, R., Sifacaki, E., & Vignoli, M. (2020). Ten simple rules for innovative dissemination of research. PLOS Computational Biology, 16(4), e1007704. https://doi.org/10.1371/journal.pcbi.1007704

    1. In general, developers are free to maintain their add-ons in the manner they choose. Is that generally pro- or generally anti-freedom?
    2. honestly it looks a lot more like typical tech company anti-freedomism
    3. What's terrible and dangerous is a faceless organization deciding to arbitrarily and silently control what I can and can not do with my browser on my computer. Orwell is screaming in his grave right now. This is no different than Mozilla deciding I don't get to visit Tulsi Gabbard's webpage because they don't like her politics, or I don't get to order car parts off amazon because they don't like hyundai, or I don't get to download mods for minecraft, or talk to certain people on facebook.
    4. They don't have to host the extension on their website, but it's absolutely and utterly unacceptable for them to interfere with me choosing to come to github and install it.
    5. It's no less beyond the pale than when apple actively sabotaged people's devices to force them to upgrade or amazon deleted people's already bought and downloaded ebooks. It's completely unacceptable and frankly should fall under consumer rights laws.
  6. Apr 2020
    1. Abdulla, A., Wang, B., Qian, F., Kee, T., Blasiak, A., Ong, Y. H., Hooi, L., Parekh, F., Soriano, R., Olinger, G. G., Keppo, J., Hardesty, C. L., Chow, E. K., Ho, D., & Ding, X. (n.d.). Project IDentif.AI: Harnessing Artificial Intelligence to Rapidly Optimize Combination Therapy Development for Infectious Disease Intervention. Advanced Therapeutics, n/a(n/a), 2000034. https://doi.org/10.1002/adtp.202000034

    1. un ensemble hétérogène mais cohérent

      en effet, cette harmonisation technique est nécessaire pour penser la filiation entre l'écriture et la production: écrire dans MS Word peut être aussi éloigné de l'objet de publication que le manuscrit rédigé à la main (pas de cohérence), alors que l'écriture en Markdown ou LaTeX s'inscrit dans la logique fluide d'un système de publication nativement numérique comme la chaîne de Quire ou de Stylo (cohérent du premier jet à la publication finale).

    2. Nous pouvons constater qu’il y a un lien entre les formes produites et les moyens mis en œuvre pour les produire.

      dans une perspective nativement numérique, écrire et produire sont alors intrinsèquement liés.

      par exemple: dans le modèle du manuscrit rédigé à la main ou tapé à la dactylo, le processus de production est au mieux analogue (consistant à reproduire des lettres que l'auteur a posées sur papier), au pire complètement hétérogène à l'acte d'écriture (il faut prendre le processus du début pour en faire un livre publiable).

    1. Duygusal Pazarlama Süreci Duygusal pazarlama, kitleleri markalarla kişisel ve insani bir şekilde bağlayan bir hikaye anlatır. Yeni medya kanalları, cihazları ve platformları ortaya çıktıkça, insanların marka öykülerine bolca erişebilmelerini sağlıyorlar. Dahası, şirketlerin duygusal kimliklerini daha basit hale getirerek kimliklerini ve vizyonlarını aktarmaları için birçok yol var.
    1. Dijital Pazarlama ve Empati Dijital pazarlamadaki hedef kitlenizin tıpkı sizin gibi insanlar tarafından oluştuğunu düşünürseniz sizden ne bekleyeceklerini, ne isteyeceklerini ve nasıl harekete geçeceklerini anlayabilirsiniz. Bu yüzden bu yazımızda pazarlama stratejinize empatiyi nasıl yerleştirmeniz gerektiğini ele alıyoruz.
    1. By retracing how one body is chained to another in precarity, it shows the thickness of desire and potential inside these digital bonds.

      i'm still not sold on the idea that there is desire or love for the work that is performed (see annotation about digital worker above).

    2. Lily and Bill were part of a supply chain that fed the military indus-trial complex that fed the budding digital industries.

      this still reads pre-digital to me.

    3. this ten-year span of digital work exemplified the precarity of digital labor before precarity became a term to describe the uncertain and stressful conditions of work for digital workers.

      Are they digital workers though? Maybe they need to define digital. I was reading this case study as a proceeding what