A Task-Based Study of Literacy Ecologies for Digital Composing

Total Page:16

File Type:pdf, Size:1020Kb

A Task-Based Study of Literacy Ecologies for Digital Composing Working in Patches, Groups, and Spaces: A Task-Based Study of Literacy Ecologies for Digital Composing Dissertation Presented in partial fulfillment of the requirements for the degree doctor of philosophy in the Graduate School of The Ohio State University By Julia Ann Voss, B.A., M.A. Graduate Program in English The Ohio State University 2013 Dissertation Committee: Beverly J. Moss, Advisor Harvey J. Graff Cynthia L. Selfe i Copyright by Julia Voss 2013 i Abstract Digital literacy learning has become a fundamental, mainstream concern for teachers and researchers because of the increasingly central roles played by writing in digital environments and multimodal composing in twenty-first century literacy and literacy instruction. Digital composing draws on many of the processes that apply to print composing (planning, drafting, revising, et cetera), but its medium makes additional technical and rhetorical demands on composers which print-based models of the composing process do not fully address. This study describes a process-based approach to group digital composing tasks that accounts for access to digital literacy resources, methods for sharing task responsibilities between group members, and workspaces for digital composing. The material resources (including hardware, software, and physical/virtual workspaces) and intellectual resources (the functional literacy skills to operate these material resources and the rhetorical sensibilities concerning design, mode, and audience according to which composers create digital texts) digital composing relies on recommend approaching digital composing tasks in terms of component parts, while situating these components within complex literacy ecologies. The case studies of student and faculty digital composing groups featured in this study focus on how groups approached and worked through their tasks. I analyze ii participants’ methods of digital literacy resource foraging, task structuring, and workspace selection/structuring to recommend strategies for teaching digital composing. Rather than offering sample assignments or rubrics, this study proposes metacognitive exercises designed to help students draw on the literacy resources present in their literacy ecologies and approach digital composing tasks as learning opportunities. Building on Selfe and Hawisher’s work on conditions of access to technology, I offer “foraging” as a metaphor for describing how digital composers access digital literacy resources and discuss how foraging works in physical and virtual ecological spheres with differing degrees of resource density. Once gathered around the group task, digital literacy resources help shape how groups use cooperative and collaborative methods to structure their composing task. Gathered literacy resources create the potential for members to accumulate new digital literacy resources, which they can potentially transfer to future digital composing tasks. Although dividing task responsibilities according to previous experience can discourage resource transfer between group members, in-group techne- mentoring can encourage digital literacy learning during collaborative task phases. The material and symbolic dimensions of the physical and virtual spaces in which digital composing groups worked also function as material digital literacy resources that shape groups’ composing processes. Studying how groups produce (work)spaces by inhabiting them considers the extent to which digital composers can alter literacy resources as they apply them to specific tasks. Positioning workspace as a digital literacy examines how iii resources change as they circulate in a literacy ecology through application to diverse composing tasks. Finally, groups’ physical and virtual workspaces also functioned as important digital literacy resources. Building on Paul Prior and Jody Shipka’s description of writers’ environment selecting and structuring practices, I look at how groups both follow and redefine the learning behavior cues designed into the physical and virtual environments in which they worked. iv Acknowledgements First, I want to thank everyone who participated in my study. Talking to and learning from you all reminded me of why I got into qualitative research in the first place. Thanks especially to Emily, the most generous and responsive participant ever. Thanks also to Kristy, Lisa, Sylvia, and Donna for generously inviting me into your classrooms and making my research possible. Thank you Donna, in particular, for an illuminating discussion of space and community that literally changed the course of this project and set me on a research trajectory I couldn’t have imagined a year ago. I also want to thank the edited collection contributors: you were all so generous with your time and so supportive of my project, for which I am deeply grateful. Your thoughtful responses to my questions and interest in my research are a credit to you and to our field’s tradition of welcoming new scholars into the fold. Thank you also to my committee members, Beverly J. Moss, Harvey J. Graff, and Cynthia L. Selfe. Your advice, guidance, and reading recommendations were much appreciated, even if you don’t see much evidence of them here. Thanks, in particular, for your confidence in my ability to finish this project and the faith you showed in my ideas, especially when I had both in short supply. And Beverly: like I said when you won the English Graduate Organization’s Professor of the Year Award, you are the master (mistress?) of both carrot and stick motivation. I recommend you as a wonderful advisor v and mentor to everyone, so know that no good deed ever goes unpunished. Thanks also to Annie and Jen, for your generous readings of and excellent feedback on many ghastly drafts. Our writing group was one of the main reasons why my committee members could see potential in my work once I finally I showed it them. You’d already done the hardest, messiest work. As for everyone else who made this project possible…too many people to count. Thanks to everyone who talked me down during my fits of hysterical dissertation panic— Jen, Katie, Kate, Anne, Cassie, the list goes on… Thank you to my family for countless emails, Skype chats, phone calls, care packages, and letters stuffed with newspaper clippings over the past six years. When I felt lonely, talking and writing with you reminded me of home and where I come from. And the home-made snacks, advent calendars, clothes, forwarded mail…didn’t hurt either. And Andrew, you should have your own acknowledgements chapter. But I’ll limit myself to saying thank you for countless meals (quick ones when I needed to get back to work, special ones when I needed a morale boost or had an accomplishment to celebrate), for your ongoing faith in my ability to complete this project (god knows why), for your much-needed expertise on technical matters, for rides all over town (but mostly to research sites and the airport), for your gentle reminders to stop reading romance novels and get back to work, and for your calm reassurance during my spirals of self-doubt. I couldn’t have finished this project if not for the fact that a) giving in to my fantasy of running away and living under an vi assumed name would have meant never seeing you again and b) you told me that the position of your wife had a PhD requirement, so I had to finish my degree. I meant it when I said that I literally can’t imagine how I could have done this without you. And, of course, thank you to Mojo, my spirit-muse. How could I have written anything without you to warm my lap? vii Vita Biographical Information 2002 ............................................................ Bishop Blanchet High School 2006 ............................................................ B.A. English and History; Minors in German, Philosophy, and Medieval Studies; Seattle University 2009 ............................................................ M.A. English, The Ohio State University 2008 to present ............................................ Graduate Teaching Assistant, Department of English, The Ohio State University Publications “‘So my computer literacy journey…’: Re-creating and Re-thinking Technological Literacy Experience through Narrative.” Stories That Speak to Us: Exhibits from the Digital Archive of Literacy Narratives. Ed. H. Lewis Ulman, Scott Lloyd DeWitt, and Cynthia L. Selfe. Logan, UT: Computers and Composition Digital Press/Utah State University Press, 2013. Web. Review of Writing Matters: Rhetoric in Public and Private Lives by Andrea Lunsford. Composition Studies 37.1 (2009): 142-145. Print. viii Fields of Study Major Field: English Rhetoric, Composition, and Literacy ix Table of Contents Abstract .......................................................................................................................... ii Acknowledgements .........................................................................................................v Vita ............................................................................................................................. viii List of Tables............................................................................................................... xiii List of Figures ............................................................................................................... xv Chapter 1: Introduction ....................................................................................................1 Ecological Approaches to Analyzing Human Culture and Society................................8
Recommended publications
  • Die Kulturelle Aneignung Des Spielraums. Vom Virtuosen Spielen
    Alexander Knorr Die kulturelle Aneignung des Spielraums Vom virtuosen Spielen zum Modifizieren und zurück Ausgangspunkt Obgleich der digital divide immer noch verhindert, dass Computerspiele zu ge- nuin globalen Gütern werden, wie es etwa der Verbrennungsmotor, die Ka- laschnikow, Hollywoodikonen, Aspirin und Coca Cola längst sind, sprengt ihre sich nach wie vor beschleunigende Verbreitung deutlich geografische, natio- nale, soziale und kulturelle Schranken. In den durch die Internetinfrastruktur ermöglichten konzeptuellen Kommunikations- und Interaktionsräumen sind Spieler- und Spielkulturen wesentlich verortet, welche weiten Teilen des öf- fentlichen Diskurses fremd und unverständlich erscheinen, insofern sie über- haupt bekannt sind. Durch eine von ethnologischen Methoden und Konzepten getragene, lang andauernde und nachhaltige Annäherung ¯1 an transnational zusammengesetzte Spielergemeinschaften werden die kulturell informierten Handlungen ihrer Mitglieder sichtbar und verstehbar. Es erschließen sich so- ziale Welten geteilter Werte, Normen, Vorstellungen, Ideen, Ästhetiken und Praktiken – Kulturen eben, die wesentlich komplexer, reichhaltiger und viel- schichtiger sind, als der oberflächliche Zaungast es sich vorzustellen vermag. Der vorliegende Artikel konzentriert sich auf ein, im Umfeld prototypischer First-Person-Shooter – genau dem Genre, das im öffentlichen Diskurs beson- ders unter Beschuss steht – entstandenes Phänomen: Die äußerst performativ orientierte Kultur des trickjumping. Nach einer Einführung in das ethnologische
    [Show full text]
  • 06523078 Galih Hendro Martono.Pdf (8.658Mb)
    PANDUAN MIGRASI DARI WINDOWS KE UBUNTU TUGAS AKHIR Diajukan Sebagai Salah Satu Syarat Untuk Memperoleh Geiar Sarjana Teknik Informatika ^\\\N<£V\V >> ^. ^v- Vi-Ol3V< Disusun Oleh : Nama : Galih Hendro Martono No. Mahasiswa : 06523078 JURUSAN TEKNIK INFORMATIKA FAKULTAS TEKNOLOGI INDUSTRl UNIVERSITAS ISLAM INDONESIA 2010 LEMBAR PENGESAHAN PEMBIMBING PANDUAN MIGRASI DARI WINDOWS KE UBUNTU LAPORAN TUGAS AKHIR Disusun Oleh : Nama : Galih Hendro Martono No. Mahasiswa : 06523078 Yogyakarta, 12 April 2010 Telah DitejHha Dan Disctujui Dengan Baik Oleh Dosen Pembimbing -0 (Zainudki Zukhri, ST., M.I.T.) ^y( LEMBAR PERNYATAAN KEASLIAN TUGAS AKIilR Sa\a sane bertanda langan di bawah ini, Nama : Galih Hendro Martono No- Mahasiswa : 06523078 Menyatakan bahwu seluruh komponen dan isi dalam laporan 7'ugas Akhir ini adalah hasi! karya sendiri. Apahiia dikemudian hari terbukti bahwa ada beberapa bagian dari karya ini adalah bukan hassl karya saya sendiri, maka sava siap menanggung resiko dan konsckuensi apapun. Demikian pennalaan ini sa\a buaL semoga dapa! dipergunakan sebauaimana mesthna. Yogvakarta, 12 April 2010 ((ialih Hendro Martono) LEMBAR PENGESAHAN PENGUJI PANDUAN MIGRASI DARI WINDOWS KE UBUNTU TUGASAKHIR Disusun Oleh : Nama Galih Hendro Martono No. MahaMSwa 0f>52.'iU78 Telah Dipertahankan di Depan Sidang Penguji Sebagai Salah Satti Syarat t'nUik Memperoleh r>ekii Sarjana leknik 'nlormaUka Fakutlss Teknologi fiuiii3iri Universitas Islam Indonesia- Yogvakai .'/ April 2010 Tim Penguji Zainuditi Zukhri. ST., M.i.T Ketua Yudi Prayudi S.SUM.Kom Anggota Irving Vitra Paputungan,JO^ M.Sc Anggota lengelahui, "" ,&'$5fcysan Teknik liInformatika 'Islam Indonesia i*YGGYA^F' +\ ^^AlKfevudi. S-Si.. M. Kom, IV CO iU 'T 'P ''• H- rt 2 r1 > -z o •v PI c^ --(- -^ ,: »••* £ ii fc JV t 03 L—* ** r^ > ' ^ (T a- !—• "J — ., U > ~J- i-J- T-,' * -" iv U> MOTTO "liada 1'ufian sefainflffaft dan Jiabi 'Muhamadadafafi Vtusan-Tiya" "(BerdoaCzfi ^epada%u niscaya a^anjl^u ^a6u0ian (QS.
    [Show full text]
  • 00 Initial Pages.Qxd
    Fast Track to Freeware By Team Digit Almost everything we speak about here, we’ve provided on our CD/DVD for this month. Credits The People Behind This Book EDITORIAL Deepak Ajwani Editor Robert Sovereign-Smith Writer, Copy Editor Ram Mohan Rao Copy Editor Nimish Chandiramani Writer, Copy Editor Karmanya Aggarwal Writer Abey John Writer Srikanth R Writer Prakash Ballakoor Writer DESIGN AND LAYOUT Shivshankar Pillai, Vijay Padaya Layout Designers Sivalal S Layout and Cover Design Harsho Mohan Chattoraj Illustrator © Jasubhai Digital Media Published by Maulik Jasubhai on behalf of Jasubhai Digital Media. No part of this book may be reproduced, stored in a retrieval system or transmitted in any form or by any means without the prior written permission of the publisher. March 2007 Free with Digit. Not to be sold separately. If you have paid separately for this book, please e-mail the editor at [email protected] along with details of location of purchase, for appropriate action. Introduction No Strings Attached his little guide is indispensable, even though we’re saying it Tourselves! We simply must, because what we’ve put together here is a collection of freeware in all the categories of computer usage that matter, from an office suite to prank software you can use on a friend. It’s all there. Some amongst us have gone bad and prefer to pirate stuff, which we don’t like. We like our software either paid or free—and interestingly, there’s free stuff for almost everything you’d need to accomplish. Covered here are system tools, which affect every aspect of your computer; multimedia tools to play and manipulate your media files; software you’d use when connected to the Internet; applica- tions for your mobile phone; tools to increase your productivity, whether at work or at home; desktop enhancements and such; and developer tools.
    [Show full text]
  • The Tweakguides Tweaking Companion Download Page, Or to the Main Tweakguides Page Without Seeking Written Permission
    WWW.TWEAKGUIDES.COM [Version 3.00 ‐ January 2006] T HE T WEAKG UIDES T WEAKING C OMPANION TABLE OF CONTENTS Table Table of Contents ........................................................................................................................................................... 2 of Copyright & Credits..................................................................................................................................................... 10 Contents Introduction................................................................................................................................................................... 11 Using this Guide .......................................................................................................................................................... 12 Basic Requirements ........................................................................................................................................................................................... 12 Different Versions of Windows ......................................................................................................................................................................... 12 Why is the Guide So Long? .............................................................................................................................................................................. 12 Recommended Software ..................................................................................................................................................................................
    [Show full text]
  • [Amok] S/N: 1299275 a Smaller Note 99 2.08 Firstname
    LETRA A A Real Validator 1.01 Name: ubique.daemon [AmoK] s/n: 1299275 A Smaller Note 99 2.08 FirstName: ViKiNG LastName: Crackz Company: private Street: ViKiNG Zip: 11111 City: Crackz Code: 19147950 Order: 97234397 A.I.D 2.1 s/n: AD6778-A2G0 A.I.D. 2.0.2 s/n: AD6778-A2G0T A+ Math 1.0 Name: (Anything) s/n: 8826829 A+ MathMAT 1.0.0 Name: TEAM ElilA s/n: 8826829 A-1 Image Screen Saver 4.1 s/n: B5K7ij49p2 A1 Text Finder 4.02 s/n: PCSLT3248034 ABCPager 1.6.4 Name: Sara s/n: 1DQDSSSSSSSS ABCPager Plus 5.0.5 Name: Sara s/n: M5N5SSSSSSSS Ability Office 2000 2.0.007 Name: Ben Hooks s/n: 12878044-01034-40997 Ability Office 2000 2.0.005 Name:Nemesis] Organization:TNT s/n: 15155445-37898- 08511 Ablaze Quick Viewer 1.6 Name: Hazard s/n: 81261184XXXXXXX Abritus Business 2000 3.02 Name/Company: (Anything) s/n: 1034-314-102 Abritus Business 2000 3.02 Name/Company: (Anything) s/n: 1034-314-102 Absolute Fast Taskbar 1.01 Name: (Anything) s/n: nxpwvy Absolute Security 3.6 Name: Evil Ernie 2K [SCB] s/n: GMKKRAPZBJRRXQP Absolute Security Pro 3.3 Name: C0ke2000 s/n: GPBKTCNKYZKWQPJ Absolute Security Standard 3.4 Name: Hazard 2000 s/n: ECHVNZQRCYEHHBB or Name: PhatAzz [e!] s/n: RBFXPLUMBPGDFYW Absolute Security Standard 3.5 Name: embla of phrozen crew s/n: LTPDTDMAEHNKNTR AbsoluteFTP 1.0 beta 6 Name: CORE/JES Company: CORE s/n: 00-00-000000 Exp: never Key: 1074 2875 9697 3324 3564 AbsoluteFTP 1.0 Final Name: CORE/JES Company: CORE s/n: 00-00-000000 Exp: Never Key: 1074 2875 9697 3324 3564 AbsoluteFTP 1.0 RC 11 Name: _RudeBoy_ Company: Phrozen Crew s/n: 02-01-
    [Show full text]
  • Introduction to Reconfigurable Computing
    Introduction to Reconfigurable Computing Introduction to Reconfigurable Computing Architectures, Algorithms, and Applications by Christophe Bobda University of Kaiserslautern, Germany A C.I.P. Catalogue record for this book is available from the Library of Congress. ISBN 978-1-4020-6088-5 (HB) ISBN 978-1-4020-6100-4 (e-book) Published by Springer, P.O. Box 17, 3300 AA Dordrecht, The Netherlands. www.springer.com Printed on acid-free paper All Rights Reserved c 2007 Springer No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, microfilming, recording or otherwise, without written permission from the Publisher, with the exception of any material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. To Lewin, Jan and Huguette for being so patient Foreword "Christophe Bobda’s book is an all-embracing introduction to the fundamentals of the entire discipline of Reconfigurable Computing, also seen with the eyes of a software developer and including a taxonomy of application areas. Reconfigurable Computing is a disruptive innovation currently going to com- plete the most important breakthrough after introduction of the von Neumann paradigm. On software to FPGA migrations a dazzling array of publications from a wide variety application areas reports speed-up factors between 1 and 4 orders of magnitude and promises to reduce the electricity bill by at least an order of magnitude. Facing the tcyberinfrastructure’s growing electricity con- sumption (predicted to reach 35–50% of the total electricity production by the year 2020 in the USA) also this energy aspect is a strategic issue.
    [Show full text]
  • Multiplayer Online Games Insecurity
    Multiplayer Online Games Insecurity [Re]Vuln Luigi Auriemma & Donato Ferrante Who? Donato Ferrante @dntbug Luigi Auriemma @luigi_auriemma ReVuln Ltd. – revuln.com – twitter.com/revuln – [email protected] 2 Who? ReVuln Ltd. – revuln.com – twitter.com/revuln – [email protected] 3 Agenda . Introduction Introduction on Multiplayer Games Security . Why games? . Possible scenarios . The market Finding Vulnerabilities . Game vulnerabilities . Welcome to the real world . What about the future? . Conclusion Considerations ReVuln Ltd. 4 Introduction . Games are an underestimated field for security . Number of online players: . 1,3,6,10,55,66,120,153,171,190,300,351,595,630,666,820,3003,5995,8778.. Number of online games . 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, 233, 377, 610, 987.. Think about games as possible attack vectors and players as possible targets… . You have thousands of attack vectors and millions of possible victims . Excellent and stealthy attack vector . Oh! Many games require Admin privs to run . Often because of anti-cheating solutions.. Thanks anti-cheating! :] ReVuln Ltd. 5 Why games? ReVuln Ltd. 6 Why games? . Two main entities/targets: Players Companies . Each of these targets has a different “attacker subset” . Mostly defined by interests.. ReVuln Ltd. 7 Why games? . Two main entities/targets: 1) Players 2) Companies Who wants to attack your game? Your roommate… Script Kiddies.. Rest of the world… He told you to stop wasting bandwidth! ReVuln Ltd. 8 Why games? . Two main entities/targets: 1) Players 2) Companies Who wants to attack your company? Script Kiddies.. Your competitors.. Others… They are everywhere ReVuln Ltd. 9 Why games? .
    [Show full text]
  • Bibliotekarstudentens Nettleksikon Om Litteratur Og Medier
    Bibliotekarstudentens nettleksikon om litteratur og medier Av Helge Ridderstrøm (førsteamanuensis ved OsloMet – storbyuniversitetet) Sist oppdatert 09.12.20 Mod (_dataspill) Forkortelse for “spillmodifikasjon” (“game modification”). Reglene, grafikken og/eller lyden i et dataspill forandres, altså modifiseres (Genvo 2002 s. 62). Aktiviteten kalles “modding”. En “ombygging” av et dataspill, vanligvis utført av fans og spredt over Internett. Mods gir ofte spillkarakteren flere nivåer og nye oppdrag å utfolde seg på og utføre. “In our understanding, the act of making mods is a practice that alters some game elements, and it comprises including something new in its structure or mechanics (add-ons), improving the game aesthetics, or even including new game levels and game contents.” (Oliveira m.fl. 2014) “In gaming, modification (mod) refers to the process of editing or changing the structure, syntax or code of a game. Modification is performed to change the operations of a game in par with the requirements, environment, or end result or experience. Modification is performed to allow a gamer to play a game different from its original released version. It is generally performed by end users or developers, and the modded version is considered as an unofficial version of the game. Typically, when a modification is applied to a game, the user or gamer can have better weapons, more game money, different background textures, stronger character health and any other characteristics specific to a game. Modification can be partial or total, or it may be used only to fix some bugs.” (https://www. techopedia.com/definition/3841/modification-mod; lesedato 08.11.16) “Modding, in the videogame world, is adding, altering, or purging content on a videogame, especially on the pc.
    [Show full text]
  • Shooter-Spiele
    Kein anderes Computerspiel-Genre wird in der Öffentlichkeit so kontrovers diskutiert wie Shooter-Spiele. In der politischen und pädagogischen Rhetorik ist seit einiger Zeit sogar von ›Killerspielen‹ die Rede. Dieser Band will einen Beitrag zum Verständnis dieser umstrittenen Spielformen leisten. Dabei geht es den hier versammelten Aufsätzen nicht allein um die Frage der möglichen ›Wirkungen‹ gewalthaltiger Spiele wie etwa Doom, Quake, Half-Life, GTA oder Counterstrike. Es geht darüber hinaus auch um die wissenschaftliche Analyse konkreter Spielformen, um Einsichten in die Ästhetik populärer Spiele sowie um die Frage nach den Diskursen, Aus- drucksformen und sozialen Gemeinschaften, die Shooter als Phänomene Shooter. Eine Multidisziplinäre Einführung Eine Multidisziplinäre Shooter. der zeitgenössischen audiovisuellen Kultur kennzeichnen. Damit gibt der Band einen Einblick in die Vielfalt aktueller Ansätze der Computerspiel- forschung und macht dadurch die Konturen eines noch jungen Forschungs- Matthias Bopp / Rolf F. Nohr / Serjoscha Wiemer (Hg.) feldes anschaulich. Berücksichtigt werden beispielsweise, pädagogische, psychologische, kunst- und kulturwissenschaftliche, enthnologische, dis- Shooter kursanalytische und medientheoretische Zugangsweisen. Eine Multidisziplinäre Einführung Bopp / Nohr / Wiemer Bopp / Nohr / Medien' Welten LIT Matthias Bopp / Serjoscha Wiemer / Rolf F. Nohr Shooter Shooter_Endversion.indd 1 05.05.2009 13:14:39 Medien ’ Welten Braunschweiger Schriften zur Medienkultur, herausgegeben von Rolf F. Nohr Band 12 Lit Verlag Münster/Hamburg/Berlin/London Lit Shooter_Endversion.indd 2 05.05.2009 13:14:55 Matthias Bopp / Serjoscha Wiemer / Rolf F. Nohr (Hg.) Shooter. Eine multidisziplinäre Einführung Lit Shooter_Endversion.indd 3 05.05.2009 13:14:55 Bucheinbandgestaltung: Tonia Wiatrowski / Rolf F. Nohr unter Verwendung einer Werbe- anzeige des Spiels Keeney´s Anti-Aircraft Machine Gun © J.H.
    [Show full text]
  • This Month In
    This month in Features PCUG News & Services 8 Quake World 6 Membership Notes Andrew Clayton prepares us to be fragged Mike Burke with information for new members 12 Grolier Multimedia 27 Group Notices A review by Alan Tebb ACT Alive, Quiz Night and The Stuffers 15 Gloria’s Gaddings 28 Software Library News Gloria Robbins’ travels Phil Trudinger reviews a selection of software 16 CD ROM Column 36 The Internet Project Nick Thomson reviews recent CDs Iain Gould reports 20 Take Control 38 Internet Project Application John Saxon goes a step further Get connected with TIP 22 Corel Ventura 7 39 Member Services Ted Monaghan looks at DTP software Details of services available to members only 34 Qool URLs 39 Notice of Special Meeitng Jim Hume selects the best of the web Change is in the wind 40 What’s News? 42 Special Interest Groups Jim Hume keeps up with the latest Where the real action is 43 Training News Profile Low cost training for members 2 Editorial Information 44 Vendor Discounts How to contribute to Sixteen Bits Membership has its privileges 3 Contact Information 46 Members’ Ads How to contact us Check here first for bargains 4 Editorial 46 PCUG Membership Darrell Burkey The official membership form 4 President’s Letter 47 Help Directory Ann Byrne Stuck? Call the experts 5 Letters 48 Calendar From our readers... What’s on next month Advertiser & Product Information Inside Front Panther Publishing 7 InterACT Technology Group 9 Bettowynd, Sustance Pty Ltd, L&S Associates 11 Hi Micro, AB&T Systems 13 Software Shop, Creative Impulse 15 Spirit
    [Show full text]
  • Error:The Highly Unreliable Times
    Error:The Highly Unreliable Times This Week Updated 07/15/07 Version 0.0.0.14 Issue 3 Contact Us, Home, About Us, our Radio Show YOUR ADD HERE! The People or companies who wrote these articles can be found by clicking on the Title of the article if you have an Internet connection. Computer Rescue 1-208-750-5628 From The Editor Justin Breithaupt LEADING STORY PAYPAL WON'T PROTECT YOU! I am putting this story out because many of you don't know what you are getting into by using Paypal. Most people think they are protected by Paypal from Fraud no matter what. Here is a quote from Paypal's user agreement. “11.3 Qualification Requirements. In order to qualify for coverage under the Seller Protection Policy, you must meet the following requirements: a. You must have a Verified Business or Verified Premier Account at the time of the transaction, b. The transaction must be between a US, UK or Canadian buyer and a US, UK or Canadian seller, c. The payment must be listed as "Seller Protection Policy Eligible" on the "Transaction Details" page, or cleared by PayPal through Payment Review, d. You must accept a single payment from one PayPal Account for the purchase, e. You must not charge a surcharge for accepting PayPal, f. You must ship the purchased item to the address listed on the "Transaction Details" page, and that address must be identified as a Confirmed Address, g. You must ship the item to the buyer within 7 Days of receiving payment, h.
    [Show full text]
  • Computer Game Modding, Intermediality and Participatory Culture
    Computer Game Modding, Intermediality and Participatory Culture Olli Sotamaa University of Tampere, Finland [email protected] Introduction Artistic freedom. Do what you want. But just make sure that the money ain't gone. The Jam, All Mod Cons The lines by Paul Weller captured a moment in time in the late 70’s but interestingly they also reveal something of the dynamics of 21st century mod scene. And today, I’m not talking about kids wearing smart suits and riding fancy scooters but gamer-made modifications of computer games that are celebrated as a new medium for artistic innovation and simultaneously successfully used as a marketing strategy for new retail titles. The ways modding1 phenomenon links together media production and consumption clearly go beyond the simple oppositions of co- optation and resistance. In a larger scale a growing number of literature has lately identified the need for a closer integration of studies of media production and consumption. In obtaining a profound picture of the meanings attached to artefacts and media texts neither processes of production nor forms of consumption should be privileged. (du Gay et. al. 1997, Deacon 2003) In case of contemporary digital media defined as “interactive” and “multilinear”, all this sounds somewhat obvious. Take virtual worlds or mobile communication, active users and user communities constantly construct new ways of interpreting, using and manipulating the media environment. In context of computer games the involvement of the player becomes a fundamental feature: the result of the game is not determined beforehand but it is highly dependent on the skills and creativity of the player.
    [Show full text]