Search

You can find the results of your search below.

Fulltext results:

hacker_culture
19 Hits, Last modified:
cker culture helped form our technological lives? Do hacker formations like Wikileaks, Anonymous, and ... learning process in the way that grades normally do. Bounties will be compiled in (more or less) rea... 25 points* Computers count from zero, so hackers do too. Students are responsible for contributing t... least one assigned source]] from the week. Also: do not break the law. Bounty rubric: * Clear exp
media_activism
3 Hits, Last modified:
te to the student's social-change goals. Projects do not need to be publicly released, but they should... ). Consider it in light of the book we just read. Do some additional research to examine the mediated ... ). Consider it in light of the book we just read. Do some additional research to examine the mediated
university_policies
3 Hits, Last modified:
n close contact with someone who has COVID-19 but do not have any symptoms and have not tested positive for COVID-19, you do not need to stay home but should follow the [guid... ed to diversity We want to hear from you so that we can do better, and to support you however we can!
email_etiquette
3 Hits, Last modified:
ng the details for an in-person conversation. * **Do your homework**. Before asking a question about t... rite outside normal working hours, in particular, do not expect an immediate response. In general, ass... essors because they're passionate about what they do. We're much more likely to want to help you if we
introduction_to_social_media
3 Hits, Last modified:
f interface for questions and concerns. TAs will do their best to get back to you within two business... ed to be used without any documentation. But what do we lose when we don't really understand something... lass confidential unless permission is granted to do otherwise * Adhere to all [[university policies]]
disruptive_entrepreneurship
3 Hits, Last modified:
in contemporary business culture. What, exactly, do entrepreneurs, investors, and Internet evangelist... lass confidential unless permission is granted to do otherwise * Be present in our interactions togeth... ## Phase three: Disruptionism What, then, can we do? #### 10. Disrupting work * Ben Tarnoff, _[The
class_etiquette
3 Hits, Last modified:
re-harm-good)—far worse than they think they are. Do yourself a favor and focus on class while in clas... er what your body and mind might need in order to do that. Coming and going is distracting to me and t... se, emergencies happen, and we understand if they do. If you know you will need to leave early, tell m
academic_honesty
1 Hits, Last modified:
in, it should be credited like any other source. Do not present AI-generated content as your own, as