Get LISNews via email! Enter Your Email Address:
The next cyber security bill is even worse than SOPA
Just when you thought it was safe to go out on the InterWebs comes a new effort by Congress to put a snoop on every cellphone and two spies in every cable modem. Contrary to what you may have read, the Cyber Intelligence Sharing and Protection Act is not SOPA II. But in many ways, it's worse.
3 Major Publishers Sue Open-Education Textbook Start-Up
The complaint attempts to distance itself from attacking the legitimacy of open-education resources, but goes on to argue that Boundless is building its business model by stealing.
“Whether in the lecture hall or in a textbook, anyone is obviously free to teach the subjects biology, economics, or psychology, and can do so using, creating, and refining the pedagogical materials they think best, whether consisting of ‘open source educational content’ or otherwise,” it reads. “But by making unauthorized ‘shadow-versions’ of Plaintiffs’ copyrighted works, Defendant teaches only the age-old business model of theft.”
How We Will Read: Clay Shirky
“Social reading,” the way I’ve always interpreted the phrase, is reading that recognizes that you’re not just a consumer, you’re a user. You’re going to do something with this, and that something is going to involve a group of other people. Read a book. The very next thing you’re going to do, if it was at all interesting, is talk to someone about it. Book groups and discussion lists are social reading. Because so much of our media in the 20th century was delivered in real-time, with very little subsequent ability to share, save, shift, store, we separated the consumption from the reproduction and use of media. We don’t actually think of ourselves as users of media, when in fact we are.
The Student Research Pad
What if colleges were to set up a combination note-taking, bookmarking, citation management web service for every incoming student? The tool could be all set up and ready to go, accessible on the web to the student by means of the same authentication/login system they use to get to campus email, course management systems, remote access to library databases, etc. The “research pad” that I have been brainstorming off and on for the past few years would connect to lots of resources and tools automatically and would allow the easy manual import of new items (articles found in a database, for example) via a number of means (bookmarklets, import via a custom email address, RSS feeds from your Zotero account, etc.)
‘Where are these jobs that will require such rapid “searching, browsing, assessing quality, and synthesizing the vast quantities of information”? We don’t need those skills to drive a truck or manage company accounts or sell clothes or do IT customer service or write novels or write code or give inoculations to patients or teach seven-year-olds how to read … so what do, or what will, need them for? And how many of us will need them?’
Revealed: How China censors its social networks
The way the Chinese government censors and deletes politically-sensitive terms online has been revealed for the first time.
As expected, the communists are hypersensitive to criticism of the state - but also to people slating the so-called 'Great Firewall', the network blocking technology that prevents Chinese people browsing the internet freely.
Google-Trained Minds Can't Deal with Terrible Research Database UI
"The librarians quoted here understand most of the key problems, and are especially sharp about "the myth of the digital native" -- about which see also this deeply sobering Metafilter thread -- but there's one vital issue they're neglecting: research databases have the worst user interfaces in the whole world."