46 Matching Annotations
  1. Mar 2018
  2. Feb 2018
    1. Westlake closed for renovations in November for four months, but by December Walker, the contractor, was already weeks behind schedule due to the following: •Missed deadline for permit filing: 3 weeks •Delivery of incorrect materials/reorder & redelivery: 2 weeks •Builder staffing shortage: 1 week

      contractor falls behind early on

    2. The existing menu of pizza and mainstream draft beer would be replaced, but Givens did not have the funds to build and run a full-service restaurant facility in the existing space.

      menu needs to change in order with the changes to the facility

    3. Givens recognized that Sugar Bowl possessed an extremely valuable grandfathered asset beyond bowling lanes: a state-issued liquor license and county permit to serve not just beer but the full range of alcoholic beverages.3 But bringing the “right” businesses to the neighborhood was important to residents and government officials. They fought strongly against businesses that posed a threat to the newly cultivated district.

      very valuable resource for the firm to exploit

    4. was always thinking about how to shave costs. Who might value the opportunity to work on Sugar Bowl for below-market rates? Two Raleigh universities offered degrees in Architecture and Design. I contacted the deans, proposed our project as an independent study and was contacted by several teams of graduate students willing to work with me for three summer months at no cost in return for academic credit. Though I’d be more involved in the design, I’d save around $90,000 and that was worth it to me.

      thoughts on how to shave costs through the design

    5. Burke credited cost-effective online marketing, word of mouth “buzz,” and private event sales efforts with High Rollers’ consistent and robust revenue stream.

      forms of marketing and avenues for revenue streams

    Annotators

  3. Jan 2018
    1. Many teens are comfortable sharing their passwords with their parents “in case of an emergency” but expect that their parents will not use them to snoop.

      There needs to be trust on both ends!

    2. ople I meet tell me, ‘It’s so weird I know everything about you.’ No you don’t! Ninety-five percent of my life is not blogged about.”2

      That small amount of is still a lot to share!

    3. Privacy is not a static construct. It is not an inherent property of any particular information or setting. It is a process by which people seek to have control over a social situation by managing impressions, information flows, and context

      It is all about context!

    4. Although not all parents and guardians are trying to control their children’s every move, many believe that being a “good” parent means being all-knowing

      It is important for parents to be aware of what their kids are doing, but at the same time, it is important for children to have freedom.

    5. Encoding content, subtweeting, and otherwise engaging in social steganography offers one strategy for reclaiming agency in an effort to achieve privacy in networked publics. In doing so, teens recognize that limiting access to meaning can be a much more powerful tool for achieving privacy than trying to limit access to the content itsel

      Is this considered healthy?

    6. When teenagers post encoded messages in a visible way, they are aware that people outside of their intended audience will be curiou

      Subtweets happen all the time, but they are often overlooked.

    7. When they think something might be sensitive, they often switch to a different medium, turning to text messages or chat to communicate with smaller audiences directly.

      This reminds me of how people will use Snapchat for conversations that they do not a record of.

    8. n a site like Facebook, it is far easier to share with all friends than to manipulate the privacy settings to limit the visibility of a particular piece of content to a narrower audience.

      On a site like Facebook, don't people usually post content with the purpose of having as many people as possible see it?

    9. privacy isn’t necessarily something that they have; rather it is something they are actively and continuously trying to achieve in spite of structural or social barriers that make it difficult to do so.

      Teens often seem confused about what privacy truly entails. They will never be able to achieve true privacy with the way life is structured around the internet today.

    10. Privacy is a complex concept without a clear definition.11 Supreme Court Justice Louis Brandeis described privacy as “the right to be let alone,” while legal scholar Ruth Gavison describes privacy as a mea-sure of the access others have to you through information, attention, and physical proximity.

      This really interests me. The definition of privacy will continue to change, and the line of right and wrong for data monitoring will continue to be pushed.

    11. What’s at stake is not whether someone can listen in but whether one should. Eti-quette and politeness operate as a social force that challenges what’s functionally possibl

      You should want to be polite and respectful! This falls under the level of how you "should."

    12. also wrote about the impor-tance of “civil inattention” in enabling people to respectfully negotiate others in public spaces.

      At times it seems like younger generations, or society in general, forgets how to respect each other, especially in public places.

    13. The teens that I met genuinely care about their privacy, but how they understand and enact it may not immediately resonate or appear logical to adults

      Teens value their privacy, but they still feel comfortable posting many details about their lives on social media.

    14. Although teens grapple with managing their identity and navigat-ing youth-centric communities while simultaneously maintaining spaces for intimacy, they do so under the spotlight of a media ecosys-tem designed to publicize every teen fad, moral panic, and new hyped technology.

      What more can teens do to help themselves find their identity in healthy and safe ways?

    15. In other words, common and long-standing teen practices have historically been sure signs of teens’ unhealthy obsession with, or rejection of, privacy

      I agree with this statement. Teens struggle with identity and often find unsafe ways to cope with it.

    16. Consider, for example, the widespread concern over internet addic-tion. Are there teens who have an unhealthy relationship with technol-ogy? Certainly. But most of those who are “addicted” to their phones or computers are actually focused on staying connected to friends in a culture where getting together in person is highly constrained

      I have often felt addicted to social media.

    17. Teens’ efforts to control their self-presentation—often by donning clothing or hairstyles their parents deem socially unacceptable or engaging in practices that their parents deem risky—are clearly related to their larger effort at self-fashioning and personal autonom

      This is a very true representation of society today.

    18. Thus, much of what people post online is easily spreadable with the click of a few keystrokes.9 Some systems provide simple buttons to “forward,” “repost,” or “share” content to articulated or curated lists.

      This displays how fast info can travel. 7 degrees of connection has made the world much smaller.

    19. Although these affordances are not in and of themselves new, their relation to one another because of networked publics creates new opportunities and challenges. They are:•persistence: the durability of online expressions and content;•visibility: the potential audience who can bear witness;•spreadability: the ease with which content can be shared; and•searchability: the ability to find content

      These quality are all inherent in most social media sites today. People get impatient and want everything at their fingertips.

    20. Although the underlying structure of physical spaces and the relationships that are enabled by them are broadly understood, both the architecture of networked spaces and the ways they allow people to connect are different.

      This is very true. I often find myself wondering what will be the next shift in social media.

    21. When early social network sites like Friendster and MySpace launched, they were designed to enable users to meet new people—and, notably, friends of friends—

      The purpose of social media has changes so much... it is all about perception and displaying yourself now.

    22. In addition to referring to various communication tools and platforms, social media also hints at a cultural mindset that emerged in the mid-2000s as part of the technical and business phenomenon referred to as “Web2.0.”

      Interesting... I never thought of it this way before.

    23. I was in Nashville to talk with teens about how technology had changed their lives.

      People are often blind to how technology has shaped them and the influence it has on everyday life.

    24. As we were talking and laughing and exploring Mike’s online vid-eos, Mike paused and turned to me with a serious look on his face. “Can you do me a favor?”

      I find it interesting that a teenager would stop in the moment of fun to consider if what he is doing would upset his mother. Teenagers, and many adults, do not realize that there are larger consequences to what they are doing online other than the approval or disapproval of the people immediately around them.