Disrupting the Digital Humanities
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
What Is Digital Humanities?” Essays Like This One Are Already Genre Pieces
ADE BULL E TIN ◆ NUM be R 150, 2010 55 What Is Digital Humanities and What’s It Doing in English Departments? Matthew G. Kirschenbaum The author is associate People who say that the last battles of the computer revolution in En glish departments have been professor of English and fought and won don’t know what they’re talking about. If our current use of computers in En glish associate director of the studies is marked by any common theme at all, it is experimentation at the most basic level. As a pro- Maryland Institute for fession, we are just learning how to live with computers, just beginning to integrate these machines Technology in the Hu- effectively into writing- and reading- intensive courses, just starting to consider the implications of the manities at the University multilayered literacy associated with computers. of Maryland. A version of —Cynthia Selfe this article was presented at the 2010 ADE Sum- WHAT is (or are) the “digital humanities,” aka “humanities computing”? It’s tempt- mer Seminar East in ing to say that whoever asks the question has not gone looking very hard for an Adelphi, Maryland. answer. “What is digital humanities?” essays like this one are already genre pieces. Willard McCarty has been contributing papers on the subject for years (a mono- graph too). Under the earlier appellation, John Unsworth has advised us “what is humanities computing and what is not.” Most recently Patrik Svensson has been publishing a series of well- documented articles on multiple aspects of the topic, including the lexical shift from humanities computing to digital humanities. -
Using the Semantic Web in Digital Humanities
Semantic Web 0 (0) 1 1 IOS Press 1 1 2 2 3 3 4 Using the Semantic Web in Digital 4 5 5 6 Humanities: Shift from Data Publishing to 6 7 7 8 8 9 Data-analysis and Serendipitous Knowledge 9 10 10 11 Discovery 11 12 12 13 Eero Hyvönen 13 14 University of Helsinki, Helsinki Centre for Digital Humanities (HELDIG), Finland and 14 15 Aalto University, Department of Computer Science, Finland 15 16 Semantic Computing Research Group (SeCo) (http://seco.cs.aalto.fi) 16 17 E-mail: eero.hyvonen@aalto.fi 17 18 18 19 19 Editors: Pascal Hitzler, Kansas State University, Manhattan, KS, USA; Krzysztof Janowicz, University of California, Santa Barbara, USA 20 Solicited reviews: Rafael Goncalves, Stanford University, CA, USA; Peter Haase, metaphacts GmbH, Walldorf, Germany; One anonymous 20 21 reviewer 21 22 22 23 23 24 24 25 25 26 Abstract. This paper discusses a shift of focus in research on Cultural Heritage semantic portals, based on Linked Data, and 26 27 envisions and proposes new directions of research. Three generations of portals are identified: Ten years ago the research focus 27 28 in semantic portal development was on data harmonization, aggregation, search, and browsing (“first generation systems”). 28 29 At the moment, the rise of Digital Humanities research has started to shift the focus to providing the user with integrated 29 30 tools for solving research problems in interactive ways (“second generation systems”). This paper envisions and argues that the 30 next step ahead to “third generation systems” is based on Artificial Intelligence: future portals not only provide tools for the 31 31 human to solve problems but are used for finding research problems in the first place, for addressing them, and even for solving 32 32 them automatically under the constraints set by the human researcher. -
Introducing Dbpedia Spotlight and Widenet for Digital Humanities
Semantic Corpus Exploration: Introducing DBpedia Spotlight and WideNet for Digital Humanities This tutorial provides a hands-on experience with semantic annotations for selecting text sources from large corpora. While many humanist scholars are familiar with annotation during the analysis of their selected source texts, we invite participants to discover the utility of semantic annotations to identify documents that are relevant to their research question. Introduction Digitization efforts by libraries and archives have greatly expanded the potential of historical and diachronic corpora to be used as research objects. Whereas paper-based research favors a selection of sources that are known a priori to be relevant, the digitization of sources has opened up ways to find and identify source texts that are relevant beyond the “usual suspects.” Full-text search has been the primary means to retrieve and select a suitable set of sources, e.g. as a research corpus for close reading. Achieving a balanced and defensible selection of sources, however, can be highly challenging when delimiting sources with keyword-based queries. It, too often, requires scholars to handcraft elaborate queries which incorporate long synonym lists and enumerations of named entities (Huistra and Mellink, 2016). In this tutorial, we instruct participants in the use of semantic technology to bridge the gap between the conceptually-based information needs of scholars, and the term-based indices of traditional information retrieval systems. Since we address working with corpora of a scale that defies manual annotation, we will focus on automated semantic annotation, specifically on (named) entity linking technology. Entity Linking with Spotlight We start the tutorial with a practical introduction to entity linking, using the open source DBpedia Spotlight software. -
Vocabulary for Conversations About Race, Gender, Equality, and Inclusivity
Vocabulary for conversations about race, gender, equality, and inclusivity. Term/Concept Definition Abolitionism, or the abolitionist movement, is the movement to end slavery. In the Abolitionism modern era, abolition takes the form of removing state-sanctioned slavery such as the prison industrial complex and the police force. Actor: The actions of an Actor do not disrupt the status quo, much the same as a spectator at a game. Both have only a nominal effect in shifting an overall outcome. The actions of an Actor do not explicitly name or challenge the pillars of White supremacy which is necessary for meaningful progress towards racial justice. Lila Watson said, “If you have come here to help me, you’re wasting your time. If you have come because your liberation is bound up with mine, then let us work together.” Ally: An Ally is someone who is not BIPOC who acts to challenge institutionalized racism, and White supremacy. Allies constantly educate themselves, and do not speak or act only when it is convenient. E.g., When an Ally hears something inappropriate being discussed, the Ally disrupts the conversation, and takes the opportunity to educate those present. Actor/Ally/Accomplice Accomplice: An Accomplice is a non-BIPOC person whose actions are meant to directly challenge institutionalized racism, colonization, and White supremacy by blocking or impeding racist people, policies, and structures. An Accomplice realizes that all people’s freedoms and liberations are bound together, so retreat or withdrawal in the face of oppressive structures is not an option. Accomplices’ actions are informed by, directed and often coordinated with BIPOC leaders they actively listen with respect, and understand that op-pressed people are not monolithic in their tactics and beliefs. -
Complaint for Violations of The
Case 1:13-cv-04347-AJN Document 1 Filed 06/21/13 Page 1 of 12 JUDGE NATHAN i 3 eN 4347 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK -- -- ---- -- - -- ---- - -- -- -- --- - -- - -- - -- -- -- - --- -- - - --- ----- -- -- - --- --- )( AULISTAR MARK, HAN CHEN Civ. ANDREW HUDSON, Individual All Others Similarly Situated, CLASS / COLLECTIVE ACTION COMPLAINT FOR VIOLATIONS OF THE -against- GA WKER MEDIA LLC, and N Defendants. Plaintiffs Aulistar Mark, Hanchen Lu, and Andrew Hudson, individually and on behalf of all others similarly situated, by their attorneys, Liddle & Robinson, L.L.P., upon personal knowledge as to themselves and upon information and belief as to other matters, hereby fie this Complaint against Defendants Gawker Media LLC ("Gawker") and Nick Denton ("Denton"), and allege as follows: NATURE OF THE ACTION 1. This lawsuit seeks to recover unpaid wages, including but not limited to minimum wages, for Plaintiffs and other similarly situated workers who have been employed by Gawker in the United States. 2. Gawker is an American online media company and weblog network, founded and owned by Nick Denton based in New York City. Gawker has been listed in major news publications as being among the most valuable and financially successful weblogs in America. One article in particular attributes Gawker's high profit margin to its low operating costs, which are in part attributable to the unpaid labor of its workers. Case 1:13-cv-04347-AJN Document 1 Filed 06/21/13 Page 2 of 12 3. This is a collective action complaint under the Federal Labor Standards Act and a class action complaint under the New York State Labor Law and other applicable state labor laws based on Gawker's policies and practices of refusing to pay wages to its workers by designating them as "interns," even though they are performing vital work that inures to the benefit of Gawker's various business enterprises. -
Blog Title Blog URL Blog Owner Blog Category Technorati Rank
Technorati Bloglines BlogPulse Wikio SEOmoz’s Blog Title Blog URL Blog Owner Blog Category Rank Rank Rank Rank Trifecta Blog Score Engadget http://www.engadget.com Time Warner Inc. Technology/Gadgets 4 3 6 2 78 19.23 Boing Boing http://www.boingboing.net Happy Mutants LLC Technology/Marketing 5 6 15 4 89 33.71 TechCrunch http://www.techcrunch.com TechCrunch Inc. Technology/News 2 27 2 1 76 42.11 Lifehacker http://lifehacker.com Gawker Media Technology/Gadgets 6 21 9 7 78 55.13 Official Google Blog http://googleblog.blogspot.com Google Inc. Technology/Corporate 14 10 3 38 94 69.15 Gizmodo http://www.gizmodo.com/ Gawker Media Technology/News 3 79 4 3 65 136.92 ReadWriteWeb http://www.readwriteweb.com RWW Network Technology/Marketing 9 56 21 5 64 142.19 Mashable http://mashable.com Mashable Inc. Technology/Marketing 10 65 36 6 73 160.27 Daily Kos http://dailykos.com/ Kos Media, LLC Politics 12 59 8 24 63 163.49 NYTimes: The Caucus http://thecaucus.blogs.nytimes.com The New York Times Company Politics 27 >100 31 8 93 179.57 Kotaku http://kotaku.com Gawker Media Technology/Video Games 19 >100 19 28 77 216.88 Smashing Magazine http://www.smashingmagazine.com Smashing Magazine Technology/Web Production 11 >100 40 18 60 283.33 Seth Godin's Blog http://sethgodin.typepad.com Seth Godin Technology/Marketing 15 68 >100 29 75 284 Gawker http://www.gawker.com/ Gawker Media Entertainment News 16 >100 >100 15 81 287.65 Crooks and Liars http://www.crooksandliars.com John Amato Politics 49 >100 33 22 67 305.97 TMZ http://www.tmz.com Time Warner Inc. -
Campus Artworks
20 House of Phineas Gage 26 Lokey Science Complex Gargoyles “House of Phineas Gage” (2003), hidden in the courtyard Albert Einstein, Marie Curie, Sir Isaac Newton, Maxwell & his of Straub Hall, is made of wooden strips. It was a 1% for Demon, Thomas Condon, Alan Turing, and John von Neumann CCampusampus ArtworksArtworks Art commission associated with the Lewis Center for are portrayed on the façades of the Lokey Science Complex Neuroimaging. The work was created by artist/architect buildings, along with sculptures of Drosophilia (fruit fl y) James Harrison. The “subject,” Phineas Gage, is a legend in and Zebrafi sh. The hammered sheet copper sculptures were the history of brain injury: he survived a 3-foot rod blown into designed and installed by artist Wayne Chabre between 1989- his head from a construction blast in 1848. 90. 21 “Aggregation” This art installation was a 1% for Art commision made by 27 Science Walk Adam Kuby as part of his series “disintegrated” art, in “Science Walk” is a landscape work that connects the major which he takes an object and breaks it down into several science buildings from Cascade Hall to Deschutes Hall. It smaller pieces. “Aggregation” is represented through six consists of inlaid stone and tile beginning at the fountain sites surrounding the EMU green, each containing a four- “Cascade Charley.” It was designed in 1991 by Scott Wylie. by-four granite block that was quarried in Eastern Oregon. The inlaid stones were donated by three members of the UO As one moves around the circle, the blocks break down into Geological Sciences faculty Allan Kays, Jack Rice and David smaller pieces from one solid cube to a cluster of 32 broken Blackwell. -
You Are Not Welcome Among Us: Pirates and the State
International Journal of Communication 9(2015), 890–908 1932–8036/20150005 You Are Not Welcome Among Us: Pirates and the State JESSICA L. BEYER University of Washington, USA FENWICK MCKELVEY1 Concordia University, Canada In a historical review focused on digital piracy, we explore the relationship between hacker politics and the state. We distinguish between two core aspects of piracy—the challenge to property rights and the challenge to state power—and argue that digital piracy should be considered more broadly as a challenge to the authority of the state. We trace generations of peer-to-peer networking, showing that digital piracy is a key component in the development of a political platform that advocates for a set of ideals grounded in collaborative culture, nonhierarchical organization, and a reliance on the network. We assert that this politics expresses itself in a philosophy that was formed together with the development of the state-evading forms of communication that perpetuate unmanageable networks. Keywords: pirates, information politics, intellectual property, state networks Introduction Digital piracy is most frequently framed as a challenge to property rights or as theft. This framing is not incorrect, but it overemphasizes intellectual property regimes and, in doing so, underemphasizes the broader political challenge posed by digital pirates. In fact, digital pirates and broader “hacker culture” are part of a political challenge to the state, as well as a challenge to property rights regimes. This challenge is articulated in terms of contributory culture, in contrast to the commodification and enclosures of capitalist culture; as nonhierarchical, in contrast to the strict hierarchies of the modern state; and as faith in the potential of a seemingly uncontrollable communication technology that makes all of this possible, in contrast to a fear of the potential chaos that unsurveilled spaces can bring. -
Slate.Com Table of Contents Faith-Based a Skeptic's Guide to Passover
Slate.com Table of Contents faith-based A Skeptic's Guide to Passover fighting words ad report card Telling the Truth About the Armenian Genocide Credit Crunch foreigners Advanced Search Why Israel Will Bomb Iran books foreigners Why Write While Israel Burns? Too Busy To Save Darfur change-o-meter foreigners Supplemental Diet No Nukes? No Thanks. change-o-meter gabfest Unclenched Fists The Velvet Snuggie Gabfest change-o-meter grieving Dogfights Ahead The Long Goodbye change-o-meter human guinea pig Big Crowds, Few Promises Where There's E-Smoke … chatterbox human nature A Beat-Sweetener Sampler Sweet Surrender corrections human nature Corrections Deeper Digital Penetration culture gabfest jurisprudence The Culture Gabfest, Empty Calories Edition Czar Obama dear prudence jurisprudence It's a Jungle Down There Noah Webster Gives His Blessing drink jurisprudence Not Such a G'Day Spain's Most Wanted: Gonzales in the Dock dvd extras moneybox Wauaugh! And It Can't Count on a Bailout explainer movies Getting High by Going Down Observe and Report explainer music box Heated Controversy When Rock Stars Read Edmund Spenser explainer music box Why Is Gmail Still in Beta? Kings of Rock explainer my goodness It's 11:48 a.m. Do You Know Where Your Missile Is? Push a Button, Change the World faith-based other magazines Passionate Plays In Facebook We Trust faith-based poem Why Was Jesus Crucified? "Bombs Rock Cairo" Copyright 2007 Washingtonpost.Newsweek Interactive Co. LLC 1/125 politics today's papers U.S. Department of Blogging Daring To Dream It's -
The Evolution of Batman and His Audiences
Georgia State University ScholarWorks @ Georgia State University English Theses Department of English 12-2009 Static, Yet Fluctuating: The Evolution of Batman and His Audiences Perry Dupre Dantzler Georgia State University Follow this and additional works at: https://scholarworks.gsu.edu/english_theses Part of the English Language and Literature Commons Recommended Citation Dantzler, Perry Dupre, "Static, Yet Fluctuating: The Evolution of Batman and His Audiences." Thesis, Georgia State University, 2009. https://scholarworks.gsu.edu/english_theses/73 This Thesis is brought to you for free and open access by the Department of English at ScholarWorks @ Georgia State University. It has been accepted for inclusion in English Theses by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. STATIC, YET FLUCTUATING: THE EVOLUTION OF BATMAN AND HIS AUDIENCES by PERRY DUPRE DANTZLER Under the Direction of H. Calvin Thomas ABSTRACT The Batman media franchise (comics, movies, novels, television, and cartoons) is unique because no other form of written or visual texts has as many artists, audiences, and forms of expression. Understanding the various artists and audiences and what Batman means to them is to understand changing trends and thinking in American culture. The character of Batman has developed into a symbol with relevant characteristics that develop and evolve with each new story and new author. The Batman canon has become so large and contains so many different audiences that it has become a franchise that can morph to fit any group of viewers/readers. Our understanding of Batman and the many readings of him gives us insight into ourselves as a culture in our particular place in history. -
National Conference
NATIONAL CONFERENCE OF THE POPULAR CULTURE ASSOCIATION AMERICAN CULTURE ASSOCIATION In Memoriam We honor those members who passed away this last year: Mortimer W. Gamble V Mary Elizabeth “Mery-et” Lescher Martin J. Manning Douglas A. Noverr NATIONAL CONFERENCE OF THE POPULAR CULTURE ASSOCIATION AMERICAN CULTURE ASSOCIATION APRIL 15–18, 2020 Philadelphia Marriott Downtown Philadelphia, PA Lynn Bartholome Executive Director Gloria Pizaña Executive Assistant Robin Hershkowitz Graduate Assistant Bowling Green State University Sandhiya John Editor, Wiley © 2020 Popular Culture Association Additional information about the PCA available at pcaaca.org. Table of Contents President’s Welcome ........................................................................................ 8 Registration and Check-In ............................................................................11 Exhibitors ..........................................................................................................12 Special Meetings and Events .........................................................................13 Area Chairs ......................................................................................................23 Leadership.........................................................................................................36 PCA Endowment ............................................................................................39 Bartholome Award Honoree: Gary Hoppenstand...................................42 Ray and Pat Browne Award -
Piracy Versus Privacy: an Analysis of Values Encoded in the Piratebrowser
International Journal of Communication 9(2015), 818–838 1932–8036/20150005 Piracy Versus Privacy: An Analysis of Values Encoded in the PirateBrowser BALÁZS BODÓ University of Amsterdam, Institute for Information Law The Netherlands The PirateBrowser is a Web browser that uses Tor privacy-enhancing technology to circumvent nationally implemented Internet filters blocking access to The Pirate Bay. This article analyzes the possible consequences of a mass influx of copyright pirates into the privacy domain. The article addresses the effects of the uptake of strong privacy technologies by pirates on copyright enforcement and on free speech and privacy technology domains. Also discussed are the norms and values reflected in the specific design choices taken by the developers of the PirateBrowser. Keywords: piracy, privacy, Tor, privacy-enhancing technologies, policy Introduction Tor (The Onion Router), “endorsed by Egyptian activists, WikiLeaks, NSA, GCHQ, Chelsea Manning, Snowden” (Dingledine & Appelbaum, 2013), is a volunteer network of computers that relays Web traffic through itself to provide anonymous, unobserved, and uncensored access to the Internet. It has about 4,000 relays and about 1,000 exit nodes. Tor users connect to the network, and their Web traffic is channeled through the internal relays to reach its final destination through one of the exit nodes. This arrangement makes the identification and surveillance of Tor users difficult. Anonymity is promised by the difficulty of tracing the Web traffic that appears on the exit node back to the individual who initiated the traffic, as long as there is a sufficient number of internal hops in between. Protection from surveillance is granted by the fact that each link in the communication chain is encrypted.