Search

You can find the results of your search below.

Fulltext results:

hacker_culture
65 Hits, Last modified:
w? This course plays with a kind of identity that began among geeky tinkerers and a murky criminal underground, only to be adopted by management consultants and CEOs. How h... need some equivalent in order for this course to be legible to the university. Therefore, work will be rewarded with [bounties](https://en.wikipedia.org/
introduction_to_social_media
35 Hits, Last modified:
This course introduces students to concepts for better understanding online social media, the techno... ange, and how design informs individual and group behavior. Students should expect to come away with ... ce for questions and concerns. TAs will do their best to get back to you within two business days. Pl... ck in on your progress and feedback. Quizzes will be conducted on Canvas, with a password provided in
disruptive_entrepreneurship
31 Hits, Last modified:
Entrepreneurship **MDST 2011** *Disruption* has become a hallowed achievement in contemporary busine... Internet evangelists mean by the word? What have been the great disruptions of our time, and who woun... Write an internal memo by an employee of an incumbent organization as it comes to terms with a potent... atening disruption taking place. Examples of incumbent organizations include large corporations, gover
media_activism
29 Hits, Last modified:
use. It's often both at the same time and more in between. Through examining the strategies and tactic... how media can shape social change and how we can become more savvy media practitioners ourselves. Th... trategy that addresses it. Interventions need not be realistic for students to carry out; students may imagine themselves as representing better-resourced organizations, real or imaginary. T
university_policies
28 Hits, Last modified:
ersity of Colorado Boulder Policies ## Classroom Behavior Both students and faculty are responsible ... emote or online. Those who fail to adhere to such behavioral standards may be subject to discipline. Professional courtesy and sensitivity are especially ... ophy.  For more information, see the [classroom behavior](http://www.colorado.edu/policies/student-c
internships
15 Hits, Last modified:
that I supervise at CU Boulder. The details will be worked out on a case-by-case basis. ## Learning ... etings Arrange to meet with me two times: at the beginning to agree on a plan and after turning in th... ound the midterm assignment is also recommended. Be sure to turn assignments in at least 48 hours before we meet so I have time to review them. ## Midte
email_etiquette
11 Hits, Last modified:
nters on what an effective email looks like. * **Be cordial**. It's important to signal respect when ... ourage laziness on the part of the recipient. * **Be brief**. Too many people spend too much of their ... eir research or mentorship. Help make the world a better place for everyone by keeping your message to... n in-person conversation. * **Do your homework**. Before asking a question about the assignments, expe
hypothesis
9 Hits, Last modified:
ally focused on supporting academic use. However, because it is an attempt to simulate a layer of the ... I am in touch with the Hypothesis team, and we'll be sharing the results of our experience directly with them for the benefit of future users. First, **create an account**. Please use a username that can be easily correlated to your identikey or name in th
screen_devices
8 Hits, Last modified:
se technologies often cause more distraction than benefit, as empirical research suggests. ## Bibliog... an Dynarski, "[For Note Taking, Low-Tech is Often Best](https://www.gse.harvard.edu/news/uk/17/08/note-taking-low-tech-often-best)," _Useable Knowledge_ from the Harvard Graduat... ure-or-meeting.html)," _The New York Times_ (November 22, 2017) * Reynol Junco, "[In-class multitask
academic_honesty
6 Hits, Last modified:
or significant; otherwise, paraphrasing tends to be easier on your reader. * *Paraphrasing.* Avoid cl... can history, for example, it would not ordinarily be necessary to give a source for the statement that the Civil War began in 1861 after the inauguration of Abraham Linc... eading. The underlying data an AI uses may itself be a form of plagiarism, which compounds the ethical
whitepaper
5 Hits, Last modified:
y Jewish-Palestinian conflicts. Whitepapers might be considered to lie on a spectrum between internal memos and external reports. They are generally not f... ed and thus, despite their alleged whiteness, may be considered [gray literature](https://en.wikipedia... tion, outlining the basic protocol for what would become the Internet * [The Bitcoin whitepaper](htt
class_etiquette
4 Hits, Last modified:
that includes different expectations about class behavior. As a result, I hope it is helpful for me t... my own expectations explicit, so that they don't become barriers to anyone's success in the class. For example: * **Be fully present**. Class is a place for focus, not ... class while in class. It will make the experience better for everyone. Avoiding [[screen devices]] whe