Open Discussion: Instruments and Methods for Formative Assessment: by invitation of teachers from Plovdiv region | Тема: Инструменти и методи за актуални училищни занятия
Where | Къде: СУ „Димитър Матевски“ https://goo.gl/maps/rojNjE3dk4s and online ( виртуално) When | Кога: 2. май, 2018, 14 часа | May 2, 2018, 2PM local time (Bulgaria) Who | Кой: преподаватели и педагози | teachers and faculty How | Как: използвайте “обратна връзка” за споделяне на вашите идеи | use the following hashtag for backchanneling#BGtechEd
Intro | Представяне – 5мин. Who are we (please share short intro about your professional interests) | Кои сме ние: споделете накратко професионалните си интереси (използвайте “comment” section под този блог) http://web.stcloudstate.edu/pmiltenoff/faculty/
Reality Check (before we do tech) | минута за откровение (преди да започнем с технологии):
who is our audience | кого учим/обучаваме? https://blog.stcloudstate.edu/ims/2018/04/21/in-memoriam-avicii/ https://blog.stcloudstate.edu/ims/2018/04/17/edtech-implementation-fails/
why technology application fails | защо се проваля използването на технологии в обучението?
Understanding Purpose | какъв е смисълът
Insufficient Modeling of Best Practices | недостатъчен или несподелен опит
Bad First Impressions | лоши първи впечатления
Real-World Usability Challenges | ежедневни проблеми
The Right Data to Track Progress | кои данни определят успеха
Share your thoughts for the fails | Сподели твоите мисли за провала
Тема1. Сравняване на Kahoot, Edpuzzle и Apester – 1-1, 1/2 час продължителност Topic 1: A comparison of Kahoot, Apester and EdPuzzle
Дискусия, относно методиката на използване. Споделяне на опит кога и как го използват колегите от България и САЩ (други страни?).
Short demonstration and discussion regarding methodology of use. Sharing experience of use.
Споделяне на опит | ideas and experience exchange.
Comparison to other tools (e.g. flipped classroom advantage to Kahoot; difference from EdPuzzle, similarities to EdPuzzle) | съпоставяне с други инструменти: например, обърната класна стая – предимство пред Кахут; разлики и прилики с ЕдПъзил и тн)
Създаване на акаунт | account creation and building of learning objects
Comparison to other tools (e.g. flipped classroom advantage to Kahoot; difference from EdPuzzle, similarities to EdPuzzle) | съпоставяне с други инструменти: например, обърната класна стая – предимство пред Кахут; разлики и прилики с Еиптстър и тн)
Тема 2. Виртуална реалност в учебния процес – теория и практика- 1-1, 1/2 час продължителност Topic 2. Virtual reality in teaching and learning – theory and hands-on
When a student is brilliant on the street corner but falling asleep in class, something is wrong with the schooling system Ако учащ се е страхотен на ъгъла на улицата, но се проваля или заспива в клас, тогава нещо е грешно с учебната система https://blog.stcloudstate.edu/ims/2018/04/17/education-teched-frenemies/
Outline:
The Gamification of the educations process is not a new concept. The advent of educational technologies, however, makes the idea timely and pertinent. In short 60 min, we will introduce the concept of gamification of the educational process and discuss real-live examples.
Learning Outcomes:
at the end of the session, participants will have an idea about gaming and gamification in education and will be able to discriminate between those two powerful concepts in education
at the end of this session, participants will be able search and select VIdeo 360 movies for their class lessons
at the end of the session, participants will be able to understand the difference between VR, AR and MR.
if you are interested in setting up a makerspace and/or similar gaming space at your school, please contact me after this workshop for more information.
How would you define gamification of the educational process?
Gaming and Gamification in academic and library settings (paper) Short URL: http://scsu.mn/1F008Re
Gamification takes game elements (such as points, badges, leaderboards, competition, achievements) and applies them to a non-game setting. It has the potential to turn routine, mundane tasks into refreshing, motivating experiences (What is GBL (Game-Based Learning)?, n.d.).
Gamification is defined as the process of applying game mechanics and game thinking to the real world to solve problems and engage users (Phetteplace & Felker, 2014, p. 19; Becker, 2013, p. 199; Kapp, 2012). Gamification requires three sets of principles: 1. Empowered Learners, 2. Problem Solving, 3. Understanding (Gee, 2005).
Apply gamification tactics to existing learning task
split in groups and develop a plan to gamify existing learning task
from the web page above, choose a movie or click on this link: https://youtu.be/nOHM8gnin8Y (to watch a black hole in video 360) Open the link on your phone and insert the phone in Google Cardboard. Watch the video using Google Cardboard.
China Central Television (formerly Beijing Television), commonly abbreviated as CCTV, is the predominant statetelevision broadcaster in the People’s Republic of China. CCTV has a network of 50 channels broadcasting different programmes and is accessible to more than one billion viewers.[1] As of present, there are 50 television channels, and the broadcaster provides programming in six different languages. Most of its programmes are a mixture of news, documentary, social education, comedy, entertainment, and drama, the majority of which consists of Chinese soap operas and entertainment.[2]
this why metadata was entered in the post-processed MP4 file using the VLC player
export
H.264 . / iPAD 480p 29.9 fps
Shortcuts:
If you are using Premiere CC: 1. File/New/Sequence. 2. Ctrl M is the shortcut to export (M is for media)
Issues
the two Apple/Macs will deliver error messages with both the export to the MP4 format and for burning the CDs and DVDs.
e.g.
other issues
regular restart required for new capture
error messages e.g.
other issues:
audio. Audio synchronization during the digitization is off. Solution: possible solution is the last of this thread : https://forums.adobe.com/thread/2217377
open in in QT Pro copy an segment then past it into a new QT file and save. It then plays normally in Adobe products.
old Apple desktops. needed to be rebuild and reformatted.
Apple burner issues. issues with Premiere license (bigger organization, bigger bureaucracy – keep the licenses within the library, not with IT or the business department)
old VCRs – one of the VCRs was recording bad audio signal
old VHS tapes: the signal jump makes the digital recording stop, thus requiring a constant attendance of the digitization, instead of letting it be digitized and working on something else
the person who is uploading the digitized VHS movies can “Add Collaborator”
The collaborator can be “co-editor” and / or “co-publisher”
Thus, at the moment, Tom Hegert has been designated to a digitized VHS video as Co-:Publisher and Rhonda Huisman as “Co-Editor.”
Please DO log in into MediaSpace with your STAR ID and confirm that you can locate the video and you can, respectively edit its metadata.
If you can edit the video, this means that the proposed system will work, since the Library can follow the same pattern to “distribute” the videos to the instructors, who these videos are used by; and, respectively these instructors can further control the distribution of the videos in their classes.
issues:
sharing the videos from the generic Library account for MediaSpace to the MediaSPace account of the faculty who had requested the digitization either through sending the link to the video or publish in channel (we called our channel “digitized VHS”)
issue: ripping off content from DVD.
Faculty (mostly teaching online / hybrid courses) want to place teaching material from DVD to MediaSpace. Most DVDs are DRM protected.
Handbreak (https://handbrake.fr/) does not allow ripping DRM-ed DVDs. to bypass this Handbreak issue, we use DVD Decrypter before we run the file through Handbreak
Solutions:
From: “Lanska, Jeremiah K” <Jeremiah.Lanska@ridgewater.edu> Date: Tuesday, September 11, 2018 at 10:03 AM
I use a software on a MAC called MacX DVD Video Converter Pro. https://www.macxdvd.com/
I convert videos to MP4 with this and it just works for just about any DVD. Then upload them to MediaSpace.
From: “Docken, Marti L” <Marti.Docken@saintpaul.edu> Date: Tuesday, September 11, 2018 at 8:17 AM
Good morning Plamen. Here at Saint Paul College, we are asked to get permission from owner when we are looking at making any alterations to a video, tape, etc. This is true of adding closed captioning as well. The attached are forms given by Minnesota State which they may have an updated form.
Thank you and have a wonderful day.
Marti Docken Instructional Technology Specialist 651.846.1339 marti.docken@saintpaul.edu
From: Geri Wilson Sent: Friday, September 14, 2018 3:23 PM
What I do with DVDs is give a warning to the faculty that the MediaSpace link with the captions I’ve created should not be widely shared and should be treated as if it were still a DVD that can be shown in the classroom, but not posted on D2L. Because even if we use those forms, I don’t believe it gives us the right to use the video in a broader way. However, a safer approach might be to burn a new DVD with captions, so that it’s still in the same format that can’t be misused as easily.
Just my 2 cents. Geri
From: “Hunter, Gary B” <Gary.Hunter@minnstate.edu> Date: Friday, September 14, 2018 at 2:55 PM To: Plamen Miltenoff_old <pmiltenoff@stcloudstate.edu> Subject: RE: Process of ripping DVD video to mount it on MediaSpace
I’ll assume the contents of the DVDs are movies/films unless I hear otherwise from you. There’s a lot we need to consider from a copyright perspective. Let me know a day and time that we can touch base via a phone call. Next week my schedule is flexible, so let me know what day and time work for you. Until we speak, here’s some of the information related to making copies of copyrighted works for nonprofit teaching purposes.
There are two sections of the Copyright Act that authorize “copying” of copyrighted works for nonprofit educational purposes. It doesn’t matter if the copyrighted works are being copied from DVDs, CDs, flash drives, a computer’s hard drive, etc., the same sections of the Copyright Act apply.
Section 110(2), also known as the TEACH Act, allows nonprofit educational institutions to make a digital copy of a nondramatic copyrighted work and save it to a server for online and hybrid teaching. I have a TEACH Act checklist on the IP Tools & Forms webpage at http://www.minnstate.edu/system/asa/academicaffairs/policy/copyright/forms.html. The checklist identifies the few things that may not be copied under this section of the Copyright Act. If an instructor meets the various requirements on the checklist, than you can make a digital copy of the entire nondramatic copyrighted work and save it to MediaSpace. For nondramatic works, all MinnState instructors should be able to complete the TEACH Act checklist successfully, so I wouldn’t request a completed checklist from them.
Under the TEACH Act, nonprofit educational institutions are only permitted to make a digital copy of reasonable and limited portions of dramatic copyrighted works. Movies and films are usually dramatic works. Most people in higher education interpret “reasonable and limited portions” to mean something less than the whole and not the entire movie/film. There are several guidance documents on the TEACH Act on the IP Tools & Forms webpage that go into greater detail as to what is reasonable and limited portions. Unfortunately, this section only authorizes the copying of part of the movie/film and not the entire thing.
Section 107 Fair Use of the Copyright Act is the second section that permits copying of copyrighted works for nonprofit educational purposes. Fair Use is used more than any other section to make copies of copyrighted works for nonprofit educational purposes. An instructor needs to complete a fair Use Checklist showing the proposed copying is authorized by fair use. An instructor who completes a Fair Use Checklist that ends up being 50/50 or more in support of fair use for their proposed copying of a copyrighted work, should be able to make the digital copy. Fair Use has some nuances in it for unique situations. Let’s set up a phone call to further discuss them. There is also a flow chart that may helpful at http://www.minnstate.edu/system/asa/academicaffairs/policy/copyright/docs/Flow%20Chart-Using%20video%20in%20Online%20-%20D2L%20Courses.pdf.
We also have to consider whether or not the movies/films were purchased with “personal use” rights or “public performance” rights. Or if an educational license or some similar type of license gives us permission to make copies or publicly perform the movie/film. More layers of the onion that need peeled back to address the copyright concerns.
++++++++++++++
Issue: confidentiality
All digitized material is backedup on DVDs, whether faculty wants a DVD or not.
Some video content is confidential (e.g. interviews with patients) and faculty does not want any extra copies, but the DVD submitted to them. How do we archive / do we archive the content then?
Burning (Archiving)
where to store the burned DVDs? their shelf life is 12 years.
DVD’s must be labeled with soft tip perm marker, not labels. labels glue ages quickly.
all our desktops are outdated (5+ years and older). We used two Apple/Macs. OS El Captain, Version 10.11.6, 2.5 Gxz Intel Core i5. 8GB memory, 1333 MHz DDR3, Graphic Card AMD Radeon HD 6750 MD 512 MB
Question about the process of archiving the CDs and DVDs after burning. What is the best way to archive the digitized material? Store the CD and DVDs? Keep them in the “cloud?”
Question about the management of working files: 1. Premiere digitizes the original hi-quality file in .mov format and it is in GB. The export is in .mp4 format and it is in MB. Is it worth to store the GB-size .mov format and for how long, considering that the working station has a limited HDD of 200GB
we decided to export two types of files using Adobe Premiere: a) a low end .MP4 file about several hundred megabites, which respectively is uploaded in SCSU Media Space (AKA Kaltura) and b) one high-end (better quality) one the realm of several GBs, which was the archived copy
We placed a request for two 2TB HDD with the library dean and 10TB file space with the SCSU IT department. Idea being to have the files for MediaSpace readily available on the hardrives, if we have to make them available to faculty and the high-end files being stored on the SCSU file server.
++++++++++++++++++
Nov. 2019: transfer of accounts. The generic SCSULibraryVideo account is discontinued because of the August 2019 transition to the minnstate.edu. Agreed to host the accumulated digitized videos under the private account of one of the team members, who will be assigning the other members and the requesting faculty as co-editors.
++++++++++++++++++
2. correspondence among Greg J, Tom H and Plamen
email correspondence Greg, Tom, Plamen regarding Kaltura account:
From: Greg <gsjorgensen@stcloudstate.edu> Date: Friday, November 17, 2017 at 11:32 AM To: Plamen Miltenoff <pmiltenoff@stcloudstate.edu> Subject: RE: Question Kaltura
Plamen,
Channels are not required using this workflow. Just the collaboration change.
–g–
From: Miltenoff, Plamen Sent: Friday, November 17, 2017 11:31 AM To: Jorgensen, Greg S. <gsjorgensen@stcloudstate.edu>; Hergert, Thomas R. <trhergert@stcloudstate.edu> Subject: Question Kaltura
Greg,
About the channel:
Do I create one channel (videos)?
It seems to be a better idea to create separate channels for each of faculty, who’s videotapes are digitized.
******* any user you wish to collaborate with, will need to first sign in to mediaspace in order to provision their account.**** After they have signed in, you will be able to add them as collaborator.
Once they’ve been added, they will have access to the video in their MedisSpace account.
Like so:
From the My Media area:
Click ‘Filters’:
Then choose either media I can publish, or media I can edit:
If you want to simply change ownership to the requestor (for video available only to a single person), just choose change media owner on the collaboration tab.
The process above will allow for any number of collaborators, in a fashion similar to ‘on reserve’.
–g–
From: Miltenoff, Plamen Sent: Friday, November 17, 2017 11:19 AM To: Jorgensen, Greg S. <gsjorgensen@stcloudstate.edu>; Hergert, Thomas R. <trhergert@stcloudstate.edu> Subject: FW: Supplemental Account Request Status
Tom,
I submitted the request to Greg with the “SCSULibraryVideo” name
Greg, I submitted, Tom, Rachel W and Rhonda H (and you) as “owners.”
Pls, if possible, do not assigned to Tom ownership rights yet and add him later on.
I also received your approval, so I am starting to work on it
This message confirms your request for a new Supplemental Account with the requested username of SCSULibraryVideo. Please allow 2-3 business days for processing. You will be notified by email when your request is approved or denied. You may also check the status of your request by returning to the Supplemental Accounts Maintenance site.
Thank you for your request and please contact us with questions or concerns.
Once you’ve done that, just let me know the name of the account. (LibraryVideoDrop, SCSULibraryVideo, etc….)
I’ll then add it to the Mediaspace access list.
If there’s already an account to which you have access, we can use that, too. Remember, though, credentials will be shared at least between the two of you.
Well, that is a good question. Do we need a “STAR ID” type of account for the library?
If so, who will be the person to talk to. After Diane Schmitt, I do not know who to ask
Tom, can you ask the library dean’s office for any “generic” account?
Greg, for the time being, is it possible to have me as the “owner” of that account? Would that conflict with my current Kaltura account/content?
Can I participate for this project with my student account (as you helpled me several weeks ago restore it for D2L usage)?
Yes, except that there may be needs for multiple faculty to access the files. Think of it as analogous to DVDs on reserve or even in the general collection.
I think we’re hoping for an account from which we can share Library resources such as the digitized versions of VHS tapes that Plamen and I are creating. As I understand it, a closed channel is probably not the best answer. We need a common repository that can have open access to SCSU Kaltura users.
A single account can’t really be shared in the way you’re asking, but we can easily add a dept. supplemental account to Mediaspace. I just need the name of the account.
Depending on what you intend, maybe a closed channel? Create a closed channel and add individuals as needed?
Can you help me create a MediaSpace account for the library use.
How can it be tight up to the STAR ID login specifications?
Is it possible, let’s say Tom and I to use our STAR ID to login into such account?
Any info is welcome…
Plamen
++++++++++++
3. correspondence on the LITA listserv regarding “best practices for in house digital conversion”
From: <lita-l-request@lists.ala.org> on behalf of Sharona Ginsberg <lita-l@lists.ala.org> Reply-To: “lita-l@lists.ala.org” <lita-l@lists.ala.org> Date: Tuesday, November 21, 2017 at 10:07 AM To: “lita-l@lists.ala.org” <lita-l@lists.ala.org> Subject: Re: [lita-l] best practices for in house digital conversion
I’m at an academic rather than public library, but you can see what we offer for digital conversion here: https://www.oswego.edu/library/digital-conversion. We’ve been generally happy with our equipment, and I especially think the Elgato Video Capture device (VHS to digital) is a good tool.
– Sharona
From: <lita-l-request@lists.ala.org> on behalf of Molly Schwartz <mschwartz@metro.org> Reply-To: “lita-l@lists.ala.org” <lita-l@lists.ala.org> Date: Tuesday, November 21, 2017 at 10:03 AM To: “lita-l@lists.ala.org” <lita-l@lists.ala.org> Subject: Re: [lita-l] best practices for in house digital conversion
I would also definitely recommend DCPL’s Memory Lab and the project to build a Memory Lab Network, which is more applicable to public libraries.
best,
Molly
On Tue, Nov 21, 2017 at 10:49 AM, Stewart Wilson <SWilson@onlib.org> wrote:
Hi all,
I know there is a lot of information already out here, but is anyone up for a conversation about media conversion technologies for public library patrons?
I’m interested in best practices and recommended technologies or guides that you use in your system.
Anything that converts projector slides, 35mm, VHS, photographs, cassette, etc.
We are building a new PC for this and 3D rendering, so any recommendations for things like soundcards or video capture cards are also useful.
Thanks for your help; this group is the best.
Stew Wilson
Paralibrarian for Network Administration and Technology
10. The Virtualized Library: A Librarian’s Introduction to Docker and Virtual Machines
This session will introduce two major types of virtualization, virtual machines using tools like VirtualBox and Vagrant, and containers using Docker. The relative strengths and drawbacks of the two approaches will be discussed along with plenty of hands-on time. Though geared towards integrating these tools into a development workflow, the workshop should be useful for anyone interested in creating stable and reproducible computing environments, and examples will focus on library-specific tools like Archivematica and EZPaarse. With virtualization taking a lot of the pain out of installing and distributing software, alleviating many cross-platform issues, and becoming increasingly common in library and industry practices, now is a great time to get your feet wet.
(One three-hour session)
11. Digital Empathy: Creating Safe Spaces Online
User research is often focused on measures of the usability of online spaces. We look at search traffic, run card sorting and usability testing activities, and track how users navigate our spaces. Those results inform design decisions through the lens of information architecture. This is important, but doesn’t encompass everything a user needs in a space.
This workshop will focus on the other component of user experience design and user research: how to create spaces where users feel safe. Users bring their anxieties and stressors with them to our online spaces, but informed design choices can help to ameliorate that stress. This will ultimately lead to a more positive interaction between your institution and your users.
The presenters will discuss the theory behind empathetic design, delve deeply into using ethnographic research methods – including an opportunity for attendees to practice those ethnographic skills with student participants – and finish with the practical application of these results to ongoing and future projects.
(One three-hour session)
14. ARIA Basics: Making Your Web Content Sing Accessibility
https://dequeuniversity.com/assets/html/jquery-summit/html5/slides/landmarks.html
Are you a web developer or create web content? Do you add dynamic elements to your pages? If so, you should be concerned with making those dynamic elements accessible and usable to as many as possible. One of the most powerful tools currently available for making web pages accessible is ARIA, the Accessible Rich Internet Applications specification. This workshop will teach you the basics for leveraging the full power of ARIA to make great accessible web pages. Through several hands-on exercises, participants will come to understand the purpose and power of ARIA and how to apply it for a variety of different dynamic web elements. Topics will include semantic HTML, ARIA landmarks and roles, expanding/collapsing content, and modal dialog. Participants will also be taught some basic use of the screen reader NVDA for use in accessibility testing. Finally, the lessons will also emphasize learning how to keep on learning as HTML, JavaScript, and ARIA continue to evolve and expand.
Participants will need a basic background in HTML, CSS, and some JavaScript.
(One three-hour session)
18. Learning and Teaching Tech
Tech workshops pose two unique problems: finding skilled instructors for that content, and instructing that content well. Library hosted workshops are often a primary educational resource for solo learners, and many librarians utilize these workshops as a primary outreach platform. Tackling these two issues together often makes the most sense for our limited resources. Whether a programming language or software tool, learning tech to teach tech can be one of the best motivations for learning that tech skill or tool, but equally important is to learn how to teach and present tech well.
This hands-on workshop will guide participants through developing their own learning plan, reviewing essential pedagogy for teaching tech, and crafting a workshop of their choice. Each participant will leave with an actionable learning schedule, a prioritized list of resources to investigate, and an outline of a workshop they would like to teach.
(Two three-hour sessions)
23. Introduction to Omeka S
Omeka S represents a complete rewrite of Omeka Classic (aka the Omeka 2.x series), adhering to our fundamental principles of encouraging use of metadata standards, easy web publishing, and sharing cultural history. New objectives in Omeka S include multisite functionality and increased interaction with other systems. This workshop will compare and contrast Omeka S with Omeka Classic to highlight our emphasis on 1) modern metadata standards, 2) interoperability with other systems including Linked Open Data, 3) use of modern web standards, and 4) web publishing to meet the goals medium- to large-sized institutions.
In this workshop we will walk through Omeka S Item creation, with emphasis on LoD principles. We will also look at the features of Omeka S that ease metadata input and facilitate project-defined usage and workflows. In accordance with our commitment to interoperability, we will describe how the API for Omeka S can be deployed for data exchange and sharing between many systems. We will also describe how Omeka S promotes multiple site creation from one installation, in the interest of easy publishing with many objects in many contexts, and simplifying the work of IT departments.
(One three-hour session)
24. Getting started with static website generators
Have you been curious about static website generators? Have you been wondering who Jekyll and Hugo are? Then this workshop is for you
But this article isn’t about setting up a domain name and hosting for your website. It’s for the step after that, the actual making of that site. The typical choice for a lot of people would be to use something like WordPress. It’s a one-click install on most hosting providers, and there’s a gigantic market of plugins and themes available to choose from, depending on the type of site you’re trying to build. But not only is WordPress a bit overkill for most websites, it also gives you a dynamically generated site with a lot of moving parts. If you don’t keep all of those pieces up to date, they can pose a significant security risk and your site could get hijacked.
The alternative would be to have a static website, with nothing dynamically generated on the server side. Just good old HTML and CSS (and perhaps a bit of Javascript for flair). The downside to that option has been that you’ve been relegated to coding the whole thing by hand yourself. It’s doable, but you just want a place to share your work. You shouldn’t have to know all the idiosyncrasies of low-level web design (and the monumental headache of cross-browser compatibility) to do that.
Static website generators are tools used to build a website made up only of HTML, CSS, and JavaScript. Static websites, unlike dynamic sites built with tools like Drupal or WordPress, do not use databases or server-side scripting languages. Static websites have a number of benefits over dynamic sites, including reduced security vulnerabilities, simpler long-term maintenance, and easier preservation.
In this hands-on workshop, we’ll start by exploring static website generators, their components, some of the different options available, and their benefits and disadvantages. Then, we’ll work on making our own sites, and for those that would like to, get them online with GitHub pages. Familiarity with HTML, git, and command line basics will be helpful but are not required.
(One three-hour session)
26. Using Digital Media for Research and Instruction
To use digital media effectively in both research and instruction, you need to go beyond just the playback of media files. You need to be able to stream the media, divide that stream into different segments, provide descriptive analysis of each segment, order, re-order and compare different segments from the same or different streams and create web sites that can show the result of your analysis. In this workshop, we will use Omeka and several plugins for working with digital media, to show the potential of video streaming, segmentation and descriptive analysis for research and instruction.
(One three-hour session)
28. Spark in the Dark 101 https://zeppelin.apache.org/
This is an introductory session on Apache Spark, a framework for large-scale data processing (https://spark.apache.org/). We will introduce high level concepts around Spark, including how Spark execution works and it’s relationship to the other technologies for working with Big Data. Following this introduction to the theory and background, we will walk workshop participants through hands-on usage of spark-shell, Zeppelin notebooks, and Spark SQL for processing library data. The workshop will wrap up with use cases and demos for leveraging Spark within cultural heritage institutions and information organizations, connecting the building blocks learned to current projects in the real world.
(One three-hour session)
29. Introduction to Spotlight https://github.com/projectblacklight/spotlight http://www.spotlighttechnology.com/4-OpenSource.htm
Spotlight is an open source application that extends the digital library ecosystem by providing a means for institutions to reuse digital content in easy-to-produce, attractive, and scholarly-oriented websites. Librarians, curators, and other content experts can build Spotlight exhibits to showcase digital collections using a self-service workflow for selection, arrangement, curation, and presentation.
This workshop will introduce the main features of Spotlight and present examples of Spotlight-built exhibits from the community of adopters. We’ll also describe the technical requirements for adopting Spotlight and highlight the potential to customize and extend Spotlight’s capabilities for their own needs while contributing to its growth as an open source project.
(One three-hour session)
31. Getting Started Visualizing your IoT Data in Tableau https://www.tableau.com/
The Internet of Things is a rising trend in library research. IoT sensors can be used for space assessment, service design, and environmental monitoring. IoT tools create lots of data that can be overwhelming and hard to interpret. Tableau Public (https://public.tableau.com/en-us/s/) is a data visualization tool that allows you to explore this information quickly and intuitively to find new insights.
This full-day workshop will teach you the basics of building your own own IoT sensor using a Raspberry Pi (https://www.raspberrypi.org/) in order to gather, manipulate, and visualize your data.
All are welcome, but some familiarity with Python is recommended.
(Two three-hour sessions)
32. Enabling Social Media Research and Archiving
Social media data represents a tremendous opportunity for memory institutions of all kinds, be they large academic research libraries, or small community archives. Researchers from a broad swath of disciplines have a great deal of interest in working with social media content, but they often lack access to datasets or the technical skills needed to create them. Further, it is clear that social media is already a crucial part of the historical record in areas ranging from events your local community to national elections. But attempts to build archives of social media data are largely nascent. This workshop will be both an introduction to collecting data from the APIs of social media platforms, as well as a discussion of the roles of libraries and archives in that collecting.
Assuming no prior experience, the workshop will begin with an explanation of how APIs operate. We will then focus specifically on the Twitter API, as Twitter is of significant interest to researchers and hosts an important segment of discourse. Through a combination of hands-on and demos, we will gain experience with a number of tools that support collecting social media data (e.g., Twarc, Social Feed Manager, DocNow, Twurl, and TAGS), as well as tools that enable sharing social media datasets (e.g., Hydrator, TweetSets, and the Tweet ID Catalog).
The workshop will then turn to a discussion of how to build a successful program enabling social media collecting at your institution. This might cover a variety of topics including outreach to campus researchers, collection development strategies, the relationship between social media archiving and web archiving, and how to get involved with the social media archiving community. This discussion will be framed by a focus on ethical considerations of social media data, including privacy and responsible data sharing.
Time permitting, we will provide a sampling of some approaches to social media data analysis, including Twarc Utils and Jupyter Notebooks.
How algorithms impact our browsing behavior? browsing history? What is the connection between social media algorithms and fake news? Are there topic-detection algorithms as they are community-detection ones?
How can I change the content of a [Google] search return? Can I?
Massanari, A. (2017). #Gamergate and The Fappening: How Reddit’s algorithm, governance, and culture support toxic technocultures. New Media & Society, 19(3), 329-346. doi:10.1177/1461444815608807
CRUZ, J. D., BOTHOREL, C., & POULET, F. (2014). Community Detection and Visualization in Social Networks: Integrating Structural and Semantic Information. ACM Transactions On Intelligent Systems & Technology, 5(1), 1-26. doi:10.1145/2542182.2542193
Bai, X., Yang, P., & Shi, X. (2017). An overlapping community detection algorithm based on density peaks. Neurocomputing, 2267-15. doi:10.1016/j.neucom.2016.11.019
Zeng, J., & Zhang, S. (2009). Incorporating topic transition in topic detection and tracking algorithms. Expert Systems With Applications, 36(1), 227-232. doi:10.1016/j.eswa.2007.09.013
Zhou, E., Zhong, N., & Li, Y. (2014). Extracting news blog hot topics based on the W2T Methodology. World Wide Web, 17(3), 377-404. doi:10.1007/s11280-013-0207-7
The W2T (Wisdom Web of Things) methodology considers the information organization and management from the perspective of Web services, which contributes to a deep understanding of online phenomena such as users’ behaviors and comments in e-commerce platforms and online social networks. (https://link.springer.com/chapter/10.1007/978-3-319-44198-6_10)
ethics of algorithm
Mittelstadt, B. D., Allo, P., Taddeo, M., Wachter, S., & Floridi, L. (2016). The ethics of algorithms: Mapping the debate. Big Data & Society, 3(2), 2053951716679679. https://doi.org/10.1177/2053951716679679
The upper management might consider fire and/or tornado alarm app for SCSU students similarly to the one, which the Israelis are using to back up their alarm system.
I am confident that some other US school is already thinking about the same and developing probably the app.
Thanks for considering…
Plamen
++++++++++++++++++
From: Miltenoff, Plamen Sent: Tuesday, July 8, 2014 8:59 PM To: ???????, Colette ????????? Cc: ??????, Joseph Subject: Yo at LRS
I would like to ask you again to consider testing Yo and sharing your ideas how we can apply it at LRS
It is worth checking the penetration of Yo among SCSU students and use it.
Thank you and lkng forward to hearing your opinion
Plamen
+++++++++++++++++++
benefits for the library and potentially for the campus:
reduce financial cost: batteries for the walkie talkies and the wear off of the walkie talkie can be replaced by a virtual app (again, apps for each of the three potential candidates are free)
environmentally friendly. Apps are virtual. Walkie talkies are physical
improve productivity. walkie talkie allow only talk. Apps allow: audio, video (images) and text
raise the level of critical thinking (increase productivity by proxy): the use of several media: text, visuals, audio will allow users to think in a wider diapason when troubleshooting and/or doing their tasks
the library can be the sandbox to smooth out details of the application and lessons learned can help replace walkie talkies across campus with 21st century tools and increase productivity campus wide.
From attending class to talking with peers and professors, and from going to the local bookstore to having everything on a laptop in a dorm room, students on campus typically have a more “organic” learning experience than an online student who may not know how to best access these features of a higher education in an entirely mobile setting.
The essentials for getting started
Computer terms (Android) (Apple): Online learning means you’ll need to know basic computer technology terms. Both apps are free and break down terms ranging from words like “cache” to “hex code,” all in layman’s language.
Mint (Android) (Apple): Online learning students are usually financially savvy, looking for less expensive alternatives to traditional four-year tuition. This app allows students to keep careful track of personal finances and spending.
Study Tracker (Android) (Apple): These paid apps help track the time spent on courses, tasks and projects to help online students better manage their time and be able to visualize unique study patterns with the aim of ultimately improving efficiency.
Wi-Fi Finder (Android) (Apple): It’s a no-brainer: If you’re learning online and on-the-go, you’ll probably need to find a connection!
To access actual courses (LMS)
Blackboard Mobile (Android) (Apple): Access all courses that are integrated with Blackboard’s LMS.
Canvas (Android) (Apple). Access all courses integrated with Canvas by Instructure.
Moodle (Android) (Apple): Access all courses integrated with this open-source learning platform.
My note: No D2L in this list, folks; choose carefully in 2018, when MnSCU renews its D2L license
For access to files and remote annotation
Documents to Go (Android) (Apple): Students can access the full Microsoft Office suite, as well as edit and create new files without requiring a cloud app for syncing.
Dropbox (Android) (Apple): This app allows students to access any-size files from their computer anytime, anywhere. My Note: Google Drive, SCSU File space as alternatives.
iAnnotate (Android) (Apple): Read, edit and share PDFs, DOCs, PPTs, and image files.
Instapaper (Android) (Apple): Recall websites for research purposes; strip away clutter for an optimized view of content; and read anywhere, since no internet connection is needed.
Marvin (Apple): A completely customizable eBook reader that includes DRM-free books, customizable formats, layouts, and reading gestures, as well as highlighting and annotations tools. Considered one of the best replacements for the Stanza app, which is now discontinued.
Pocket (Android): An app that allows students to save websites, blog posts, videos, and other online resources to access at a later time. It also saves the information to the device, meaning no internet connection is needed.
Wolfram Alpha (Android) (Apple): Considered the scholar’s version of Google, this app is a search engine that reveals precise information for natural-language searches. For example, if you ask “What is the graduation rate for Harvard?” the engine will bring up exact numbers with citations and suggestions for similar queries.
For online communication with peers and profs
Dragon Dictation (Android) (Apple): Create text messages, social media posts, blog posts and more by using your voice (speech-to-text). According to the company, Dragon Dictation is up to five times faster than typing on the keyboard.
Evernote (Android) (Apple): Whenever you look at a list of education apps, Evernote is usually listed. This app allows students to scribble notes, capture text, send notes to computers and other users, and much more for ultimate multi-media communication.
Hangouts (Android) (Apple): Google’s social network shines for its own online video chat solution, which lets teachers, students and third-party experts easily videoconference in groups—it’s even been used to broadcast presenters live to packed auditoriums. My note: desktopsharing is THE most important part. Alternatives: SCSU subscription for Adobe Connect. Skype also has desktopsharing capabilities
Quora (Android) (Apple): Ask questions to experts including astronauts, police officers, lawyers, and much more to receive industry-insider responses.
Smartsheet (Android) (Apple): An app that allows students to create task lists and assign deadlines to share with remote group/team members.
Tom’s planner (Web): A Gantt chart-based, online planning tool that uses color-coded charts to reveal work completed and many more features for project management.
From: Jodie Borgerding [mailto:Borgerding@amigos.org] Sent: Wednesday, July 05, 2017 3:07 PM To: Miltenoff, Plamen <pmiltenoff@stcloudstate.edu> Cc: Nicole Walsh <WALSH@AMIGOS.ORG> Subject: Proposal Submission for Privacy & Security Conference
Hi Plamen,
Thank you for your recent presentation proposal for the online conference, Privacy & Security in Today’s Library, presented by Amigos Library Services. Your proposal, The role of the library in teaching with technology unsupported by campus IT: the privacy and security issues of the “third-party,” has been accepted. I just wanted to confirm that you are still available to present on September 21, 2017 and if you have a time preference for your presentation (11 am, 12 pm, or 2 pm Central). If you are no longer able to participate, please let me know.
Nicole will be touch with you shortly with additional details and a speaker’s agreement.
Please let me know if you have any questions.
Thanks!
___________________
Jodie Borgerding Consulting & Education Services Manager Amigos Library Services 1190 Meramec Station Road, Suite 207 | Ballwin, MO 63021-6902 800-843-8482 x2897 | 972-340-2897(direct) http://www.amigos.org | borgerding@amigos.org
+++++++++++++++++
Bio
Dr. Plamen Miltenoff is an Information Specialist and Professor at St. Cloud State University. His education includes several graduate degrees in history and Library and Information Science and terminal degrees in education and psychology.
His professional interests encompass social media, multimedia, Web development and design, gaming and gamification, and learning environments (LEs).
The virtuality of privacy and security on the modern campus:
The role of the library in teaching with technology unsupported by campus IT: the privacy and security issues of the “third-party software” teaching and learning
Abstract/Summary of Your Proposed Session
The virtualization reality changes rapidly all aspects of learning and teaching: from equipment to methodology, just when faculty have finalized their syllabus, they have to start a new, if they want to keep abreast with content changes and upgrades and engagement of a very different student fabric – Millennials.
Mainframes are replaced by microcomputers, microcomputers by smart phones and tablets, hard drives by cloud storage and wearables by IoT. The pace of hardware, software and application upgrade is becoming unbearable for students and faculty. Content creation and methodology becomes useless by the speed of becoming obsolete. In such environment, faculty students and IT staff barely can devote time and energy to deal with the rapidly increasing vulnerability connected with privacy and security.
In an effort to streamline ever-becoming-scarce resources, campus IT “standardizes” campus use of applications. Those are the applications, which IT chooses to troubleshoot campus-wide. Those are the applications recommended to faculty and students to use.
In an unprecedented burgeoning amount of applications, specifically for mobile devices, it is difficult to constraint faculty and students to use campus IT sanctioned applications, especially considering the rapid pace of such applications becoming obsolete. Faculty and students often “stray” away and go with their own choice. Such decision exposes faculty and students, personally, and the campus, institutionally, at risk. In a recent post by THE Journal, attention on campuses is drown to the fact that cyberattacks shift now from mobile devices to IoT and campus often are struggling even with their capability to guarantee cybersecurity of mobile devices on campus. Further, the use of third-party application might be in conflict with the FERPA campus-mandated policies. Such policies are lengthy and complex to absorb, both by faculty and students and often are excessively restrictive in terms of innovative ways to improve methodology and pedagogy of teaching and learning. The current procedure of faculty and students proposing new applications is a lengthy and cumbersome bureaucratic process, which often render the end-users’ proposals obsolete by the time the process is vetted.
Where/what is the balance between safeguarding privacy on campus and fostering security without stifling innovation and creativity? Can the library be the campus hub for education about privacy and security, the sandbox for testing and innovation and the body to expedite decision-making?
Abstract
The pace of changes in teaching and learning is becoming impossible to sustain: equipment evolves in accelerated pace, the methodology of teaching and learning cannot catch up with the equipment changes and atop, there are constant content updates. In an even-shrinking budget, faculty, students and IT staff barely can address the issues above, less time and energy left to address the increasing concerns about privacy and security.
In an unprecedented burgeoning amount of applications, specifically for mobile devices, it is difficult to constraint faculty and students to use campus IT sanctioned applications, especially considering the rapid pace of such applications becoming obsolete. Faculty and students often “stray” away and go with their own choice. Such decision exposes faculty and students, personally, and the campus, institutionally, at risk. In a recent post by THE Journal (https://blog.stcloudstate.edu/ims/2017/06/06/cybersecurity-and-students/), attention on campuses is drawn to the fact of cyberattacks shifting from mobile devices to IoT but campus still struggling to guarantee cybersecurity of mobile devices on campus. Further, the use of third-party applications might be in conflict with the FERPA campus-mandated policies. Such policies are lengthy and complex to absorb, both by faculty and students and often are excessively restrictive in terms of innovative ways to improve methodology and pedagogy of teaching and learning. The current procedure of faculty and students proposing new applications is a lengthy and cumbersome bureaucratic process, which often render the end-users’ proposals obsolete by the time the process is vetted.
Where/what is the balance between safeguarding privacy on campus and fostering security without stifling innovation and creativity? Can the library be the campus hub for education about privacy and security, the sandbox for testing and innovation and the body to expedite decision-making?
Discuss and form an opinion about the education-pertinent issues of privacy and security from the broad campus perspective, versus the narrow library one
Discuss and form an opinion about the role of the library on campus in terms of the greater issues of privacy and security
Re-examine the thin red line of the balance between standardization and innovation; between the need for security and privacy protection a
chat – slide 4, privacy. please take 2 min and share your definition of privacy on campus. Does it differ between faculty and students? what are the main characteristics to determine privacy
chat – slide 5, security. please take 2 min and share your definition of security on campus regarding electronic activities. Who’s responsibility is security? IT issue [only]?
poles: slide 6, technology unsupported by campus IT, is it worth considering? 1. i am a great believer in my freedom of choice 2. I firmly follow rules and this applies to the use of computer tools and applications 3. Whatever…
chat – slide 6, why third party applications? pros and cons. E.g. pros – familiarity with third party versus campus-required
pole, slide 6, appsmashing. App smashing is the ability to combine mobile apps in your teaching process. How do you feel about it? 1. The force is with us 2. Nonsense…
pole slide 7 third party apps and the comfort of faculty. How do you see the freedom of using third party apps? 1. All I want, thank you 2. I would rather follow the rules 3. Indifference is my middle name
pole slide 8 Technology standardization? 1. yes, 2. no, 3. indifferent
chat slide 9 if the two major issues colliding in this instance are: standardization versus third party and they have impact on privacy and security, how would you argue for the one or the other?
Dr. Steve Albrecht, author of Library Security: Better Communication, Safer Facilities, manages a training, coaching, and management consulting firm, using a dedicated and experienced team of subcontractor specialists. He is internationally known for his consulting and training work in workplace violence prevention training programs, school violence prevention, and high-risk human resources. Dr. Albrecht provides HR consulting, site security assessments, coaching, and training workshops in supervisory improvement, workplace violence prevention, harassment prevention, drug and alcohol awareness, team building, and more. He holds a B.A. in English, B.S. in Psychology, M.A. in Security Management, and a doctoral degree in Business Administration (D.B.A.). He has been a trainer for over 26 years and is a certified Professional in Human Resources (PHR), a Certified Protection Professional (CPP), a Board Certified Coach (BCC), and a Certified Threat Manager (CTM).
Session Description: Libraries don’t always need to hire a consultant to review the level of facility security. Using a structured assessment process, librarians can create a report that will help to make their building, staff, and patrons safer.
Chris Markman, MSLIS, MSIT Public Services Librarian Worcester Public Library
Globalization’s cheerleaders, from Columbia University economist Jagdish Bhagwati to New York Times columnist Thomas Friedman, made arguments from classical economics: by buying manufactured products from people overseas who made them cheaper than we did, the United States could get rich concentrating on product design, marketing, and other lucrative services. That turned out to be a mostly inaccurate description of how globalism would work in the developed world, as mainstream politicians everywhere are now discovering.
Certain skeptics, including polymath author Edward Luttwak and Harvard economist Dani Rodrik, put forward a better account. In his 1998 book Turbo-Capitalism, Luttwak gave what is still the most succinct and accurate reading of the new system’s economic consequences. “It enriches industrializing poor countries, impoverishes the semi-affluent majority in rich countries, and greatly adds to the incomes of the top 1 percent on both sides who are managing the arbitrage.”
In The Great Convergence, Richard Baldwin, an economist at the Graduate Institute in Geneva, gives us an idea why, over the past generation, globalization’s benefits have been so hard to explain and its damage so hard to diagnose.
We have had “globalization,” in the sense of far-flung trade, for centuries now.
ut around 1990, the cost of sharing information at a distance fell dramatically. Workers on complex projects no longer had to cluster in the same factory, mill town, or even country. Other factors entered in. Tariffs fell. The rise of “Global English” as a common language of business reduced the cost of moving information (albeit at an exorbitant cost in culture). “Containerization” (the use of standard-sized shipping containers across road, rail, and sea transport) made packing and shipping predictable and helped break the world’s powerful longshoremen’s unions. Active “pro-business” political reforms did the rest.
Far-flung “global value chains” replaced assembly lines. Corporations came to do some of the work of governments, because in the free-trade climate imposed by the U.S., they could play governments off against one another. Globalization is not about nations anymore. It is not about products. And the most recent elections showed that it has not been about people for a long time. No, it is about tasks.
his means a windfall for what used to be called the Third World. More than 600 million people have been pulled out of dire poverty. They can get richer by building parts of things.
The competition that globalization has created for manufacturing has driven the value-added in manufacturing down close to what we would think of as zilch. The lucrative work is in the design and the P.R.—the brainy, high-paying stuff that we still get to do.
But only a tiny fraction of people in any society is equipped to do lucrative brainwork. In all Western societies, the new formula for prosperity is inconsistent with the old formula for democracy.
One of these platitudes is that all nations gain from trade. Baldwin singles out Harvard professor and former George W. Bush Administration economic adviser Gregory Mankiw, who urged passage of the Obama Administration mega-trade deals TPP and Transatlantic Trade and Investment Partnership (TTIP) on the grounds that America should “work in those industries in which we have an advantage compared with other nations, and we should import from abroad those goods that can be produced more cheaply there.”
That was a solid argument 200 years ago, when the British economist David Ricardo developed modern doctrines of trade. In practical terms, it is not always solid today. What has changed is the new mobility of knowledge. But knowledge is a special commodity. It can be reused. Several people can use it at the same time. It causes people to cluster in groups, and tends to grow where those groups have already clustered.
When surgeries involved opening the patient up like a lobster or a peapod, the doctor had to be in physical contact with a patient. New arthroscopic processes require the surgeon to guide cutting and cauterizing tools by computer. That computer did not have to be in the same room. And if it did not, why did it have to be in the same country? In 2001, a doctor in New York performed surgery on a patient in Strasbourg. In a similar way, the foreman on the American factory floor could now coordinate production processes in Mexico. Each step of the production process could now be isolated, and then offshored. This process, Baldwin writes, “broke up Team America by eroding American labor’s quasi-monopoly on using American firms’ know-how.”
To explain why the idea that all nations win from trade isn’t true any longer, Baldwin returns to his teamwork metaphor. In the old Ricardian world that most policymakers still inhabit, the international economy could be thought of as a professional sports league. Trading goods and services resembled trading players from one team to another. Neither team would carry out the deal unless it believed it to be in its own interests. Nowadays, trade is more like an arrangement by which the manager of the better team is allowed to coach the lousier one in his spare time.
Vietnam, which does low-level assembly of wire harnesses for Honda. This does not mean Vietnam has industrialized, but nations like it no longer have to.
In the work of Thomas Friedman and other boosters you find value chains described as kaleidoscopic, complex, operating in a dozen different countries. Those are rare. There is less to “global value chains” than meets the eye. Most of them, Baldwin shows, are actually regional value chains. As noted, they exist on the periphery of the United States, Europe, or Japan. In this, offshoring resembles the elaborate international transactions that Florentine bankers under the Medicis engaged in for the sole purpose of avoiding church strictures on moneylending.
One way of describing outsourcing is as a verdict on the pay structure that had arisen in the West by the 1970s: on trade unions, prevailing-wage laws, defined-benefit pension plans, long vacations, and, more generally, the power workers had accumulated against their bosses.
In 1993, during the first month of his presidency, Bill Clinton outlined some of the promise of a world in which “the average 18-year-old today will change jobs seven times in a lifetime.” How could anyone ever have believed in, tolerated, or even wished for such a thing? A person cannot productively invest the resources of his only life if he’s going to be told every five years that everything he once thought solid has melted into ait.
The more so since globalization undermines democracy, in the ways we have noted. Global value chains are extraordinarily delicate. They are vulnerable to shocks. Terrorists have discovered this. In order to work, free-trade systems must be frictionless and immune to interruption, forever. This means a program of intellectual property protection, zero tariffs, and cross-border traffic in everything, including migrants. This can be assured only in a system that is veto-proof and non-consultative—in short, undemocratic.
Sheltered from democracy, the economy of the free trade system becomes more and more a private space.
+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+
Caldwell, C. (2014, November). Twilight of Democracy. CRB, 14(4).
Caldwell’s book review of
Fukuyama, Francis. The Origins of Political Order: From Prehuman Times to the French Revolution. New York: Farrar, Straus and Giroux, 2011. SCSU Library: https://mplus.mnpals.net/vufind/Record/007359076 Call Number: JC11 .F85 2011
Fukuyama’s first volume opened with China’s mandarin bureaucracy rather than the democracy of ancient Athens, shifting the methods of political science away from specifically Western intellectual genealogies and towards anthropology. Nepotism and favor-swapping are man’s basic political motivations, as Fukuyama sees it. Disciplining those impulses leads to effective government, but “repatrimonialization”—the capture of government by private interests—threatens whenever vigilance is relaxed. Fukuyama’s new volume, which describes political order since the French Revolution, extends his thinking on repatrimonialization, from the undermining of meritocratic bureaucracy in Han China through the sale of offices under France’s Henri IV to the looting of foreign aid in post-colonial Zaire. Fukuyama is convinced that the United States is on a similar path of institutional decay.
Political philosophy asks which government is best for man. Political science asks which government is best for government. Political decline, Fukuyama insists, is not the same thing as civilizational collapse.
Fukuyama is not the first to remark that wars can spur government efficiency—even if front-line soldiers are the last to benefit from it.
Relative to the smooth-running systems of northwestern Europe, American bureaucracy has been a dud, riddled with corruption from the start and resistant to reform. Patronage—favors for individual cronies and supporters—has thrived.
Clientelism is an ambiguous phenomenon: it is bread and circuses, it is race politics, it is doing favors for special classes of people. Clientelism is both more democratic and more systemically corrupting than the occasional nepotistic appointment.
why modern mass liberal democracy has developed on clientelistic lines in the U.S. and meritocratic ones in Europe. In Europe, democracy, when it came, had to adapt itself to longstanding pre-democratic institutions, and to governing elites that insisted on established codes and habits. Where strong states precede democracy (as in Germany), bureaucracies are efficient and uncorrupt. Where democracy precedes strong states (as in the United States but also Greece and Italy), government can be viewed by the public as a piñata.
Fukuyama contrasts the painstaking Japanese development of Taiwan a century ago with the mess that the U.S. Congress, “eager to impose American models of government on a society they only dimly understood,” was then making of the Philippines. It is not surprising that Fukuyama was one of the most eloquent conservative critics of the U.S. invasion of Iraq from the very beginning.
What distinguishes once-colonized Vietnam and China and uncolonized Japan and Korea from these Third World basket cases is that the East Asian lands “all possess competent, high-capacity states,” in contrast to sub-Saharan Africa, which “did not possess strong state-level institutions.”
Fukuyama does not think ethnic homogeneity is a prerequisite for successful politics
the United States “suffers from the problem of political decay in a more acute form than other democratic political systems.” It has kept the peace in a stagnant economy only by dragooning women into the workplace and showering the working and middle classes with credit.
public-sector unions have colluded with the Democratic Party to make government employment more rewarding for those who do it and less responsive to the public at large. In this sense, government is too big. But he also believes that cutting taxes on the rich in hopes of spurring economic growth has been a fool’s errand, and that the beneficiaries of deregulation, financial and otherwise, have grown to the point where they have escaped bureaucratic control altogether. In this sense, government is not big enough.
Washington, as Fukuyama sees it, is a patchwork of impotence and omnipotence—effective where it insists on its prerogatives, ineffective where it has been bought out. The unpredictable results of democratic oversight have led Americans to seek guidance in exactly the wrong place: the courts, which have both exceeded and misinterpreted their constitutional responsibilities. the almost daily insistence of courts that they are liberating people by removing discretion from them gives American society a Soviet cast.
“Effective modern states,” he writes, “are built around technical expertise, competence, and autonomy.”
the sociologists Richard Sennett and Jonathan Cobb call the “hidden injuries of class.” These are dramatized by a recent employment study, in which the sociologists Lauren A. Rivera and Andras Tilcsik sent 316 law firms résumés with identical and impressive work and academic credentials, but different cues about social class. The study found that men who listed hobbies like sailing and listening to classical music had a callback rate 12 times higher than those of men who signaled working-class origins, by mentioning country music, for example.
The college-for-all experiment did not work. Two-thirds of Americans are not college graduates. We need to continue to make college more accessible, but we also need to improve the economic prospects of Americans without college degrees.
the United States has a well-documented dearth of workers qualified for middle-skill jobs that pay $40,000 or more a year and require some postsecondary education but not a college degree. A 2014 report by Accenture, Burning Glass Technologies and Harvard Business School found that a lack of adequate middle-skills talent affects the productivity of “47 percent of manufacturing companies, 35 percent of health care and social assistance companies, and 21 percent of retail companies.”
Skillful, a partnership among the Markle Foundation, LinkedIn and Colorado, is one initiative pointing the way. Skillful helps provide marketable skills for job seekers without college degrees and connects them with employers in need of middle-skilled workers in information technology, advanced manufacturing and health care.For more information, see my other IMS blog entries, such as: https://blog.stcloudstate.edu/ims/2017/01/11/credly-badges-on-canvas/