Search

You can find the results of your search below.

Fulltext results:

hacker_culture
14 Hits, Last modified:
kills and to help teach others. Hacker culture is not a spectator sport. ## Instructor Nathan Schneid... s the assigned sources. ### Bounties Grades are not especially conducive to hacking, but we need some... aterials cannot be annotated, and annotations are not expected for those. Bounty rubric: * Critical... he most you can out of the course, and absence is not particularly compatible with participation. Boun
academic_honesty
8 Hits, Last modified:
rocess. Academic dishonesty also includes, but is not limited to, providing false or misleading informa... ressing someone else's ideas in your own way does not make them yours. * *Common knowledge.* In an assi... among your readers or easy to find, it is usually not necessary to provide a source. (In a paper on American history, for example, it would not ordinarily be necessary to give a source for the
university_policies
6 Hits, Last modified:
lose contact with someone who has COVID-19 but do not have any symptoms and have not tested positive for COVID-19, you do not need to stay home but should follow the [guidance of the CDC ... Violations of the Honor Code may include but are not limited to: plagiarism (including use of paper wr
introduction_to_social_media
6 Hits, Last modified:
Please plan ahead on the assumption that you will not hear back during weekends, holidays, or evenings.... signment, consult your TA ahead of time. They are not obligated to grant one. Late work will be penaliz... sive, and you're expected to explore as you like, not necessarily to study the whole thing. Some weeks... tual testimony about how social media has (or has not) shaped your sense of your own identity; follow t
media_activism
4 Hits, Last modified:
omplete the weekly reading assignments. This does not necessarily mean microscopic reading of every pag... al strategy that addresses it. Interventions need not be realistic for students to carry out; students ... to the student's social-change goals. Projects do not need to be publicly released, but they should be ... s privacy. Content shared in class or online will not be shared with anyone outside of the class withou
email_etiquette
3 Hits, Last modified:
essor, every email is another few minutes they're not spending on their research or mentorship. Help ma... e outside normal working hours, in particular, do not expect an immediate response. In general, assume that any email may not get a response for a few business days. * **Share
class_etiquette
3 Hits, Last modified:
**Be fully present**. Class is a place for focus, not multitasking. Humans are [notoriously bad at mult... ents, as long as you keep the focus on the ideas, not the person. I also commit to honor your disagreement and not allow it to interfere with my evaluation of your
hypothesis
2 Hits, Last modified:
ected. While comments on others' annotations are not included in post data on the public site, they ar... s.is analytics tool. Currently, however, it only includes annotations, not replies, and doesn't export.
screen_devices
2 Hits, Last modified:
017) * Susan Dynarski, "[Laptops Are Great. But Not During a Lecture or a Meeting.](https://www.nytimes.com/2017/11/22/business/laptops-not-during-lecture-or-meeting.html)," _The New York T
disruptive_entrepreneurship
2 Hits, Last modified:
udents is welcome and encouraged. Attendance will not be taken formally, but meaningful participation is not compatible with absence. Be prepared to discuss e
internships
1 Hits, Last modified:
rnship experience. How does the book resonate (or not) with your experience so far? Does anything you h
whitepaper
1 Hits, Last modified:
al memos and external reports. They are generally not formally published and thus, despite their allege