UC Berkeley UC Berkeley Electronic Theses and Dissertations

Total Page:16

File Type:pdf, Size:1020Kb

UC Berkeley UC Berkeley Electronic Theses and Dissertations UC Berkeley UC Berkeley Electronic Theses and Dissertations Title HipHopathy, A Socio-Curricular Study of Introductory Computer Science Permalink https://escholarship.org/uc/item/5b5664z3 Author Miller, Omoju Adesola Publication Date 2015 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California HipHopathy, A Socio-Curricular Study of Introductory Computer Science by Omoju Adesola Miller A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Science and Mathematics Education in the Graduate Division of the University of California, Berkeley Committee in charge: Professor Alice A. Agogino, Chair Professor Bernard R. Gifford Teaching Professor Dan D. Garcia Fall 2015 HipHopathy, A Socio-Curricular Study of Introductory Computer Science Copyright 2015 by Omoju Adesola Miller 1 Abstract HipHopathy, A Socio-Curricular Study of Introductory Computer Science by Omoju Adesola Miller Doctor of Philosophy in Science and Mathematics Education University of California, Berkeley Professor Alice A. Agogino, Chair This work presents a study investigating social and curricular factors that lead to student retention and attrition in introductory Computer Science at UC Berkeley. CS10 and CS61A are identified as critical gateway classes in the curricula pipeline. To address the impedance match between the performance of CS10 students in CS61A, a new curricula Data Science unit, with a culturally-relevant learning experience, has been created for CS10. Prelimi- nary results show agreement with theoretical predictions and significant improvement over previous efforts. The central argument of this work is the belief that historically under- represented students in Computer Science increase their affinity for and ability to persist in Computer Science classes when they feel like what they are learning has some relevance outside the Computer Science classroom. This work introduces a learning framework for the computational exploration of data, within the context of an introductory Computer Science class. The work presented here has profound implications for future studies of how culturally resonant curriculum may one day help solve the problem of low-representation of female and ethnic minority students in the field of Computer Science. i To Oluwaroju ii Contents Contents ii List of Figuresv List of Tables vii 1 Introduction1 1.1 The Challenge................................... 1 1.2 Proposed Solution................................. 8 1.3 Theoretical Rationale............................... 10 1.4 Theoretical Framework.............................. 11 Socio-Cultural Perspective............................ 13 1.5 Research Context................................. 14 1.6 Research Framing................................. 15 2 Related Work 17 2.1 Computational Thinking............................. 18 Exploring Computational Thinking....................... 19 Computational Thinking: a 1980s Redux.................... 22 2.2 Understanding Barriers to Learning....................... 23 Stereotype Threat................................. 24 The Treisman Approach ............................. 26 Ethno-Computing: A Curricular Response to Stereotype Threat . 27 2.3 Misconceptions Pertaining to Computer Science................ 32 Writing Women and Ethnic Minorities out of CS History........... 33 The Myth of Innate Ability ........................... 37 2.4 Still Waiting for Superman. .......................... 39 3 Research Methods 42 3.1 Formative and Mixed-Method Research..................... 42 3.2 Data Collection.................................. 43 Formative Research: Blocks to Text Prototype Workshops .......... 43 iii Quantitative Research: Surveys Instruments.................. 45 Qualitative Research: Interviews......................... 46 3.3 Location and Context............................... 47 Class Context................................... 47 3.4 Participants.................................... 47 Participant Recruitment ............................. 48 4 Design of an Inclusive CS0 Course 51 4.1 The Beauty and Joy of Computing - CS10................... 51 Intro CS Track, UC Berkeley........................... 52 4.2 BYOB to Snap! .................................. 59 The Challenge of Graphical Languages..................... 61 4.3 Social Implications of Computing........................ 63 The Biography of an Idea: Black Criminality.................. 65 The Importance of Social Implications of Computing ............. 66 5 Design of Hip-Hop Data Module 67 5.1 Computer Science as Scientific Inquiry ..................... 68 How Do We Know What We Know? ...................... 69 Why Do We Believe What We Know?...................... 70 What Exactly Do We Know? .......................... 71 5.2 Building a Hip-Hop Data Module........................ 72 Hip-Hop Data Module: Exploration and Play ................. 72 Hip-Hop Data Module: Hypothesis ....................... 73 Hip-Hop Data Module: Design Constraints................... 74 Hip-Hop Data Module: Curriculum....................... 75 Discussion of Data Module: Empathy...................... 78 Discussion of Data Module: Cultural Resonance................ 78 6 Findings 79 6.1 Quantitative Data Analysis ........................... 79 6.2 Findings...................................... 85 On the Role of Mentorship............................ 85 On the Role of Family in CS Choice....................... 88 On Gendered Ideas of Intelligence........................ 91 On Social Implications of Computing...................... 95 On Belonging................................... 98 On Computer Science Efficacy.......................... 104 On Programming................................. 111 The Impact of Data Module........................... 119 6.3 Qualitative Data Analysis ............................ 121 Outsider Experience ............................... 126 iv Role of Family in CS Choice........................... 127 Efficacy ...................................... 128 Belonging ..................................... 128 6.4 Triangulation ................................... 129 7 Discussion 130 7.1 Discussion..................................... 130 Research Question R1.) ............................. 130 Research Question R2.) ............................. 136 Research Question R3.) ............................. 141 Research Question R4.) ............................. 143 7.2 Conclusion..................................... 152 7.3 Recommendation................................. 153 Broadening Participation with a Focus on Inclusion . 153 CS Strength is its Weakness........................... 153 Integration Instead of Assimilation ....................... 154 No CS Ghettos!.................................. 154 Recreate Engineering Culture: Boot-Camps .................. 155 7.4 Summary ..................................... 156 Appendix A Hiphopathy Lab 158 A.1 Introduction to Data Science using Hip-Hop Lyrics . 158 A.2 The Natural Language ToolKit ......................... 159 A.3 Literary Corpus.................................. 162 A.4 Frequency Analysis................................ 163 Exercise...................................... 164 A.5 Text Analysis for Meaningful Insights...................... 165 Reflection ..................................... 167 Appendix B Technical Implementation of Data Analysis 169 B.1 Survey Data.................................... 169 Acquire data ................................... 169 Reformat and clean data............................. 169 Create analysis scripts .............................. 170 B.2 Interview Data .................................. 171 Appendix C Informed Consent Form 176 Appendix D Interview Protocol 179 Appendix E Survey Instruments 183 Bibliography 186 v List of Figures 1.1 High School Advanced Placement Exams, 2011. (ACM, 2012).......... 3 1.2 High School Advanced Placement Exams by Gender, 2011. (ACM, 2012).... 3 1.3 Female Percentage of Select STEM Undergraduate Degree Recipients...... 5 1.4 Top 10 Average SAT Mathematics Scores by Intended Major........... 5 1.5 United States Census by Gender and Race, 2010.................. 7 1.6 Undergraduate CS Degree Earned, 1991-2010 ................... 8 1.7 Ethnicity Distribution of Undergraduates at UC Berkeley, Fall 2004 - Fall 2014. (UC Berkeley Office of Planning & Analysis, 2015) ................ 9 2.1 Aerial image of Logone Birni, Cameroon, (Eglash, 1999).............. 29 2.2 Fractal model of the palace constructed by Eglash, (Eglash, 1999). 29 2.3 First three iterations of the fractal model, (Eglash, 1999).............. 29 2.4 Path to the throne room in the palace, (Eglash, 1999). .............. 30 2.5 The original Macintosh team in the 1980s ..................... 35 2.6 Katherine Johnson, NASA Computer Scientist (Makers Profile, 2015). 35 4.1 Alonzo, the mascot of CS10.............................. 53 4.2 The BJC Logo..................................... 53 4.3 The Tweet that Landed CS10 on the Front Page of the San Francisco Chronicle. 59 4.4 The Snap! programming environment........................ 60 4.5 Snap! Script, and Result of Snap! Script. ..................... 61 4.6 The LOGO programming environment........................ 62 4.7 Text Based programming in the browser...................... 63 5.1 Data Science WorkFlow diagram by (Guo, 2013).................. 76 6.1 Students' Responses with Regards to Mentorship.................. 85 6.2 Students' Responses with Regards to Mentorship.................
Recommended publications
  • The Book of Apigee Edge Antipatterns V2.0
    The Book of Apigee Edge Antipatterns Avoid common pitfalls, maximize the power of your APIs Version 2.0 Google Cloud ​Privileged and confidential. ​apigee 1 Contents Introduction to Antipatterns 3 What is this book about? 4 Why did we write it? 5 Antipattern Context 5 Target Audience 5 Authors 6 Acknowledgements 6 Edge Antipatterns 1. Policy Antipatterns 8 1.1. Use waitForComplete() in JavaScript code 8 1.2. Set Long Expiration time for OAuth Access and Refresh Token 13 1.3. Use Greedy Quantifiers in RegularExpressionProtection policy​ 16 1.4. Cache Error Responses 19 1.5. Store data greater than 512kb size in Cache ​24 1.6. Log data to third party servers using JavaScript policy 27 1.7. Invoke the MessageLogging policy multiple times in an API proxy​ 29 1.8. Configure a Non Distributed Quota 36 1.9. Re-use a Quota policy 38 1.10. Use the RaiseFault policy under inappropriate conditions​ 44 1.11. Access multi-value HTTP Headers incorrectly in an API proxy​ 49 1.12. Use Service Callout policy to invoke a backend service in a No Target API proxy 54 Google Cloud ​Privileged and confidential. ​apigee 2 2. Performance Antipatterns 58 2.1. Leave unused NodeJS API Proxies deployed 58 3. Generic Antipatterns 60 3.1. Invoke Management API calls from an API proxy 60 3.2. Invoke a Proxy within Proxy using custom code or as a Target 65 3.3. Manage Edge Resources without using Source Control Management 69 3.4. Define multiple virtual hosts with same host alias and port number​ 73 3.5.
    [Show full text]
  • Google for Education National Parks VR Google Expeditions Google Arts & Culture Be Internet Awesome Made with Code CS First Google Science Fair
    Google For Education National Parks VR Google Expeditions Google Arts & Culture Be Internet Awesome Made with Code CS First Google Science Fair Learn how tools built for teaching and learning, Discover the hidden worlds of our Take a field trip to virtually anywhere (even Explore works of art and stories from around Teach learners the fundamentals of digital Make the connection between coding and Learn the basics of Computer Science using the Create projects that show how Science, like Classroom, G Suite for Education, and National Parks on ranger-guided trips places school buses can’t go) using immersive the world with 360° tours of exhibits in over 70 safety and citizenship so they can be safe, creativity, empowering girls to engage with block-based programming language, Scratch. Technology, Engineering, and Math can be used Chromebooks, can increase engagement through virtual reality. AR and VR technology. different countries. confident explorers of the online world. technology and bring their ideas to life. to impact the world around us. and inspire curiosity. Google for National Google Google Arts Education Parks VR Expeditions & Culture Discover the hidden worlds of Explore works of art and stories Tools built for teaching and learning. Field trips to virtually anywhere. our National Parks. from around the world. Over 80 million teachers and students around the world Take a ranger-guided journey through the glaciers of What if you could journey to the surface of Mars or From The Metropolitan Museum of Art to Nairobi’s communicate and collaborate using Classroom and Alaska’s Kenai Fjords or get up close with active climb to the top of Machu Picchu without ever leaving Kenya National Archives, Google Arts & Culture offers G Suite for Education, while Chromebooks are the most volcanoes in Hawai’i.
    [Show full text]
  • Code Girl Tracey Acosta Santa Clara University
    Santa Clara University Scholar Commons Computer Engineering Senior Theses Engineering Senior Theses 6-1-2015 Code girl Tracey Acosta Santa Clara University Amanda Holl Santa Clara University Paige Rogalski Santa Clara University Follow this and additional works at: https://scholarcommons.scu.edu/cseng_senior Part of the Computer Engineering Commons Recommended Citation Acosta, Tracey; Holl, Amanda; and Rogalski, Paige, "Code girl" (2015). Computer Engineering Senior Theses. 43. https://scholarcommons.scu.edu/cseng_senior/43 This Thesis is brought to you for free and open access by the Engineering Senior Theses at Scholar Commons. It has been accepted for inclusion in Computer Engineering Senior Theses by an authorized administrator of Scholar Commons. For more information, please contact [email protected]. Code Girl by Tracey Acosta Amanda Holl Paige Rogalski Submitted in partial fulfillment of the requirements for the degrees of Bachelor of Science Computer Science and Engineering Bachelor of Science in Web Design and Engineering School of Engineering Santa Clara University Santa Clara, California June 1, 2015 Code Girl Tracey Acosta Amanda Holl Paige Rogalski Computer Science and Engineering Web Design and Engineering Santa Clara University June 1, 2015 ABSTRACT Despite the growing importance of technology and computing, fewer than 1% of women in college today choose to major in computer science.[1] Educational programs and games created to interest girls in computing, such as Girls Who Code and Made With Code, have been successful in engaging girls with interactive and creative learning environments, but they are too advanced for young girls to benefit from. To address the lack of educational, computer science games designed specifically for young girls, we developed a web-based application called Code Girl for girls age five to eight to customize their own avatar using Blockly, an open-source visual coding editor developed by Google.
    [Show full text]
  • Filling the Shoes the Organization Considers
    TODAY ONLINE >> Lariat Letters: Send us responses to articles, columns and editorials at [email protected]. Baylor FRIENDS FOR LIFE pg. 3 LariatWE’RE THERE WHEN YOU CAN’T BE OCTOBER 22, 2015 THURSDAY BAYLORLARIAT.COM BAYLOR BLESSING SUSTAINABILITY Baylor becomes even greener RACHEL LELAND Reporter Baylor proved that it was green in more than one way when the university was recognized by e Association for the Advancement of Sustainability in Higher Education for outstanding performance in sustainability. e Association for the Advancement of Sustainability in Higher Education presented Baylor with the Silver award, the second highest award. Baylor was also recognized as the top performer Dane Chronister | News Editor in the categories of Coordination, DREAM COME TRUE Midway High School sophomore Kade Perry got a chance to not only meet with one of his mascot heroes, but he got to be Planning,and Governance and Bruiser. Perry walked around campus on Wednesday and greeted students with a Sic ‘em and a hug. Diversity and A ordability. Although Baylor had been awarded the Bronze award by e Association for the Advancement of Sustainability in Higher Education in 2012, this was the rst year Baylor quali ed as a top performer in any of the 17 categories Filling the shoes the organization considers. “We’ve never been recognized at this higher level,” said director of sustainability, Smith Getterman. Young man from Midway gets the opportunity of a lifetime Getterman along with the Baylor Student Sustainability Advisory Board were instrumental in gathering the DANE CHRONISTER Panther. epitome of what we are supposed to be,” said data that was to be submitted to e News Editor In his journey in becoming the mascot, Wesley Perry.
    [Show full text]
  • Open Dissertation Draft Revised Final.Pdf
    The Pennsylvania State University The Graduate School ICT AND STEM EDUCATION AT THE COLONIAL BORDER: A POSTCOLONIAL COMPUTING PERSPECTIVE OF INDIGENOUS CULTURAL INTEGRATION INTO ICT AND STEM OUTREACH IN BRITISH COLUMBIA A Dissertation in Information Sciences and Technology by Richard Canevez © 2020 Richard Canevez Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy December 2020 ii The dissertation of Richard Canevez was reviewed and approved by the following: Carleen Maitland Associate Professor of Information Sciences and Technology Dissertation Advisor Chair of Committee Daniel Susser Assistant Professor of Information Sciences and Technology and Philosophy Lynette (Kvasny) Yarger Associate Professor of Information Sciences and Technology Craig Campbell Assistant Teaching Professor of Education (Lifelong Learning and Adult Education) Mary Beth Rosson Professor of Information Sciences and Technology Director of Graduate Programs iii ABSTRACT Information and communication technologies (ICTs) have achieved a global reach, particularly in social groups within the ‘Global North,’ such as those within the province of British Columbia (BC), Canada. It has produced the need for a computing workforce, and increasingly, diversity is becoming an integral aspect of that workforce. Today, educational outreach programs with ICT components that are extending education to Indigenous communities in BC are charting a new direction in crossing the cultural barrier in education by tailoring their curricula to distinct Indigenous cultures, commonly within broader science, technology, engineering, and mathematics (STEM) initiatives. These efforts require examination, as they integrate Indigenous cultural material and guidance into what has been a largely Euro-Western-centric domain of education. Postcolonial computing theory provides a lens through which this integration can be investigated, connecting technological development and education disciplines within the parallel goals of cross-cultural, cross-colonial humanitarian development.
    [Show full text]
  • Decolonizing Education with Anishinaabe Arcs: Generative STEM As a Path to Indigenous Futurity
    Education Tech Research Dev (2020) 68:1569–1593 https://doi.org/10.1007/s11423-019-09728-6 CULTURAL AND REGIONAL PERSPECTIVES Decolonizing education with Anishinaabe arcs: generative STEM as a path to indigenous futurity Ron Eglash1 · Michael Lachney2 · William Babbitt3 · Audrey Bennett4 · Martin Reinhardt5 · James Davis3 Published online: 19 December 2019 © Association for Educational Communications and Technology 2019 Abstract This paper introduces a generative framework in which translations of Indigenous knowl- edge systems can expand student agency in science, technology, engineering, and math- ematics (STEM). Students move from computer simulations to physical renderings, to repurposing STEM innovation and discovery in the service of Indigenous community development. We begin with the math and computing ideas in traditional Anishinaabe arcs; describe their translation into software and physical rendering techniques, and fnally their workshop implementation with a mix of Native and non-Native students. Quantitative and qualitative analyses of pre-survey and post-survey data indicate increases in students’ understanding of Indigenous knowledge, their creative ability to utilize it in moving from algorithmic to physical designs, and their visions for new hybrid forms of Indigenous futu- rity. We use these fndings to argue that culture-based education needs to shift from a vin- dicationist mode of admiring ancient achievements, to one that highlights students’ agency in a generative relationship with cultural knowledge. Keywords STEM education · Native American · Indigenous knowledge · Educational technology · Design agency Introduction While culturally responsive education has been a promising trend, it is also a tricky path to navigate. Take, for example, ethnomathematics, which endeavors to “translate” between Indigenous math concepts and their Western equivalents.
    [Show full text]
  • The Identification and Division of Steve Jobs
    AN ABSTRACT OF THE THESIS OF Scott M. Anderson for the degree of Master of Arts in Interdisciplinary Studies in Speech Communication, Speech Communication, and English presented on May 17, 2012. Title: The Identification and Division of Steve Jobs Abstract approved: Mark P. Moore On April 1, 1976, Steve Jobs and Steve Wozniak entered into a partnership agreement to found Apple Computer. In the decade that followed, Apple experienced remarkable growth and success, as Jobs catapulted Apple to the Fortune 500 list of top‐flight companies faster than any other company in history. Under direction of Jobs, Apple, an idea that started in a garage, transformed into a major force in the computer industry of the 1980s. Though Jobs’ leadership undoubtedly influenced Apple’s success during this time, in 1995, he was forced to resign, when conflicts mounted at the executive level. Using Kenneth Burke’s theory of identification and the dramatistic process, this thesis examines Jobs’ discourse through a series of interviews and textual artifacts. First, I provide a framework for Jobs’ acceptance and rejection of the social order at Apple, and then consider the ways in which Jobs identified with employee and consumer audiences on the basis of division. Analysis shows that Jobs identified with individual empowerment, but valued separation and exclusivity. Jobs’ preference to create identification through division, therefore, established the foundation for new identifications to emerge. The findings of this study suggest that division has significant implications for creating unity. ©Copyright by Scott M. Anderson May 17, 2012 All Rights Reserved The Identification and Division of Steve Jobs by Scott M.
    [Show full text]
  • Disneyization in Shangri-La
    Disneyization in Shangri-La Maaike Baks, 1447742 MA Politics, Economy and Society of Asia, supervisor: Prof. dr. S.R. Landsberger Faculty of Humanities, Leiden University 2015 – 2017 Table of Contents Abstract 3 Introduction 4 Paradise found 5 Shangri-La, paradise turned theme park? 8 Research Question and Framework 10 The Shangri-La narrative and tourist’s perceptions 11 The postmodernity of Shangri-La and theme parks 11 Authenticity in Shangri-La 12 Western and Chinese tourists’ expectations 14 Chinese theme parks 16 Chinese state and Ethnic minorities 17 Features of a Chinese theme park: Yunnan Ethnic Folk Village 18 Theming 20 Shangri-La themes: the exotic, the sacred and the ethnic 20 Western tourists’ perceptions 22 Hybrid Consumption 25 Merchandising 27 Performative labor 39 Ethnic dancing in Shangri-La and YEFV 30 Conclusion 32 References 34 2 Abstract In 2001, the Chinese government officially recognized Zhongdian County in Yunnan Province as Shangri-La, which is a fictional concept that signifies paradise introduced by the British author James Hilton (1933). Ever since the region has been renamed, some visitors have started to express that Shangri-La County has transformed into a theme park and has lost its authenticity. The current essay explored, by using Bryman’s (2004) theory of Disneyization as a framework, whether it can be said that the name change into Shangri-La has changed the region into a theme park. The resources of this research were scholarly literature, travel blogs and TripAdvisor reviews about Shangri-La. Of the four principles mentioned in Disneyization, that all describe a trend common to a theme park, the principles of theming, hybrid consumption and merchandising were all found to be take place in the Shangri-La region.
    [Show full text]
  • 321444 1 En Bookbackmatter 533..564
    Index 1 Abdominal aortic aneurysm, 123 10,000 Year Clock, 126 Abraham, 55, 92, 122 127.0.0.1, 100 Abrahamic religion, 53, 71, 73 Abundance, 483 2 Academy award, 80, 94 2001: A Space Odyssey, 154, 493 Academy of Philadelphia, 30 2004 Vital Progress Summit, 482 Accelerated Math, 385 2008 U.S. Presidential Election, 257 Access point, 306 2011 Egyptian revolution, 35 ACE. See artificial conversational entity 2011 State of the Union Address, 4 Acquired immune deficiency syndrome, 135, 2012 Black Hat security conference, 27 156 2012 U.S. Presidential Election, 257 Acxiom, 244 2014 Lok Sabha election, 256 Adam, 57, 121, 122 2016 Google I/O, 13, 155 Adams, Douglas, 95, 169 2016 State of the Union, 28 Adam Smith Institute, 493 2045 Initiative, 167 ADD. See Attention-Deficit Disorder 24 (TV Series), 66 Ad extension, 230 2M Companies, 118 Ad group, 219 Adiabatic quantum optimization, 170 3 Adichie, Chimamanda Ngozi, 21 3D bioprinting, 152 Adobe, 30 3M Cloud Library, 327 Adonis, 84 Adultery, 85, 89 4 Advanced Research Projects Agency Network, 401K, 57 38 42, 169 Advice to a Young Tradesman, 128 42-line Bible, 169 Adwaita, 131 AdWords campaign, 214 6 Affordable Care Act, 140 68th Street School, 358 Afghan Peace Volunteers, 22 Africa, 20 9 AGI. See Artificial General Intelligence 9/11 terrorist attacks, 69 Aging, 153 Aging disease, 118 A Aging process, 131 Aalborg University, 89 Agora (film), 65 Aaron Diamond AIDS Research Center, 135 Agriculture, 402 AbbVie, 118 Ahmad, Wasil, 66 ABC 20/20, 79 AI. See artificial intelligence © Springer Science+Business Media New York 2016 533 N.
    [Show full text]
  • Fombandrazana Vezo: Ethnic Identity and Subsistence
    FOMBANDRAZANA VEZO: ETHNIC IDENTITY AND SUBSISTENCE STRATEGIES AMONG COASTAL FISHERS OF WESTERN MADAGASCAR by EARL FURMAN SANDERS (Under the Direction of THEODORE GRAGSON) ABSTRACT The complex dynamic among coastal peoples of western Madagascar involves spread of cultural elements due to extensive seasonal migrations, tribes and ethnic groups merging into progressively broader ethnic groups, distinctions based on interethnic and intra-ethnic boundaries, and lumping of peoples with remotely similar subsistence patterns which has perpetuated ethnonym vagaries. This study analyzes the cultural bases of the Vezo, a group of marine fishers inhabiting the west coast of Madagascar, with the intent of presenting a clearer image of what is entailed within the ethnonym, Vezo, both with respect to subsistence strategies and cultural identity. Three broad areas of inquiry, ethnohistory, ecological niche as understood from the Eltonian definition, and geographical scope inform the field research. Access to these areas leans heavily on oral histories, which in turn is greatly facilitated by intensive participant observation and work in the native language. The analysis shows that the Vezo constitute a distinct ethnic group composed of diverse named patrilineal descent groups. This ethnic group is defined by common origins and a shared sense of common history, which along with the origins of the taboos are maintained within their oral histories. Within the ethnonym, Vezo, there are subsistence as well as other cultural distinctions, most notably the taboos. These distinctions are the bases of the ethnic boundaries separating those who belong to the Vezo cultural group and others who are referred to as Vezo (Vezom-potake and Vezo-loatse) due to geographical disposition.
    [Show full text]
  • Bittium Tough Mobile User Manual
    Bittium Tough Mobile Quick Start Guide Device at a glance 1 Power key / status indicator LED / emer- gency key 2 Earpiece and auxiliary microphone 3 Headset and protective cover 4 Front camera 5 Back camera 6 Loudspeakers 7 Flash LED 8 Volume key 9 Programmable key 10 Battery cover 11 Battery charging connectors 12 USB 3.0 port and protective cover 13 Main microphones 14 Noise cancellation microphone 2 Bittium Tough Mobile Quick Start Guide 1 2 3 4 6 5 7 8 9 10 13 12 13 11 11 14 Bittium Tough Mobile Quick Start Guide 3 The ambient light sensor and proximity sensor are located next to the camera on the front of Tough Mobile. The micro USB 3.0 port is located on the bottom of Tough Mobile. Please read this quick guide carefully before using the device. Bittium Tough Mobile is water and dust resistant (IP67). In order to maintain the water and dust resistance the battery cover, the USB connector cover and the headset cover must be properly closed and un- damaged. Intentional dropping and underwater immersion of Bittium Tough Mobile should be avoided. Bittium Tough Mobile is not designed for underwater use or use for example in shower. Purposeful use of the device in these environments will result in a void of the warranty. For more info on Bittium Tough Mobile Ingress Protection see www.bittium.com/BittiumToughMobile. Box contents Bittium Tough Mobile sales package contains the following items: • Battery • Charger, with US, UK and EU adapters • Micro USB cable • 3.5 mm Headset • Quick Start Guide • Plastic wedge for opening battery cover Box contents and the appearance of the accessories may vary.
    [Show full text]
  • Public Response to RFI on AI
    White House Office of Science and Technology Policy Request for Information on the Future of Artificial Intelligence Public Responses September 1, 2016 Respondent 1 Chris Nicholson, Skymind Inc. This submission will address topics 1, 2, 4 and 10 in the OSTP’s RFI: • the legal and governance implications of AI • the use of AI for public good • the social and economic implications of AI • the role of “market-shaping” approaches Governance, anomaly detection and urban systems The fundamental task in the governance of urban systems is to keep them running; that is, to maintain the fluid movement of people, goods, vehicles and information throughout the system, without which it ceases to function. Breakdowns in the functioning of these systems and their constituent parts are therefore of great interest, whether it be their energy, transport, security or information infrastructures. Those breakdowns may result from deteriorations in the physical plant, sudden and unanticipated overloads, natural disasters or adversarial behavior. In many cases, municipal governments possess historical data about those breakdowns and the events that precede them, in the form of activity and sensor logs, video, and internal or public communications. Where they don’t possess such data already, it can be gathered. Such datasets are a tremendous help when applying learning algorithms to predict breakdowns and system failures. With enough lead time, those predictions make pre- emptive action possible, action that would cost cities much less than recovery efforts in the wake of a disaster. Our choice is between an ounce of prevention or a pound of cure. Even in cases where we don’t have data covering past breakdowns, algorithms exist to identify anomalies in the data we begin gathering now.
    [Show full text]