Free Essay

Data

In: Computers and Technology

Submitted By sakib1216
Words 6071
Pages 25
#nextchapter

A STUDY GUIDE TO
PROGRAM OR BE PROGRAMMED: TEN COMMANDMENTS FOR A DIGITAL AGE
BY
JENNIFER HANSEN
WILL LUERS
SETAREH ALIZADEH
DR. DENE GRIGAR

A Study Guide for Douglas Rushkoff’s

PROGRAM
OR BE
PROGRAMMED

#nextchapter

The following study guide aims to provoke further thoughts and extend the conversation surrounding Douglas Rushkoff’s book Program or Be Programmed: Ten Commands for a
Digital Age. It has been created for a wide variety of readers––from high school to adults––and purposes––from book clubs to study groups.

Rushkoff proposes 10 commands that are each based on one of the “biases” of digital media. In computer programming a “command” is a directive to a computer to perform a specific task. But
Rushkoff’s commands are not directives for human behavior as much as a code of ethics that, like the 10 commandments of Judaism in what was a new text-based age, help us navigate a new age of computer mediation and abstraction.

Digital technologies continue to increase the capabilities of mankind. These technologies, however, come with biases. If we aren’t aware of these biases, we’ll find ourselves at the mercy of the technology designed to serve us. While there’s still time, we must take matters into our own hands and learn to program!

Rushkoff, Douglas, dir. Program or Be Programmed. 2010. Film. 31 Jan 2013

2

RUSHKOFF’S PRINCIPLE OF:

I. TIME

DO NOT BE “ALWAYS ON”.
We live in a world dictated by time. However, to our digital devices, time is an unknown concept. This situation has caused us to become more concerned with the newest information rather than the most relevant. In order to remain effective, efficient humans, we must apply the concept of time to our digital devices. We hold the power to decide when we interact digitally. Being conscious of this notion will result in the quality and effectiveness of the information we produce and share electronically. By allowing ourselves to be “turned off,” we are actually becoming more connected than being “always on.”

Questions for Discussion
• When is it socially inappropriate to be online?
• Why do we sometimes aimlessly surf the web?
• What does Rushkoff say about the nature of computer programming that causes digital technology to be biased away from continuous time?
And what are some examples of the asynchronous (asynchronous means “not at the same time”) bias of digital technology?
• What prevents people from claiming their own time in the face of digital distraction? How are these interruptions and distractions any different from those that plagued us before we had cell phones in our hands or pagers on our hips?
• While the chapter focuses on the early, more asynchronous styles of communication on early networks, even newer technology such as streaming video and Facetime applications bring us onto each other’s screens in something like real time, or what we refer to as “synchronous” time.
Do these new forms of digital communication negate the basic premise of digital non-nowness? Or do they simply hide a greater imposition on what we think of as time?
3

c
TRY AN ACTIVITY
Live for 24 hours without being online. Keep a journal about your experience. Report in your journal about how often you missed being online or absent-mindedly went online, forgetting you were not going to go online for 24 hours? Discuss in your journal how you felt about giving up email,
Facebook, Words with Friends, or other activities you may engage in with hashnextchapter.com others or alone online.
Reflect on your experience with the group.

#next chapter RUSHKOFF’S PRINCIPLE OF:

I. TIME

DO NOT BE “ALWAYS ON”.
The First Commandment in Rushkoff’s Program or Be Programmed is “do not be always on.” He proposes that networked digital technology is biased away from continuous time, depending instead on command intervals to parse existence. As the speed and availability of networked connections grow, we become more and more attached to the constant stream of information that is always running, updating to our phones, laptops and inboxes. In this chapter, Rushkoff explores how this tendency to be “always on” changes our ability to engage with the world around us. He reminds us that paying attention to the digital distractions is still a choice and that we don’t have to surrender our time to technology that has no use for it.

#

“do not be always on”



h

– Rushkoff

#

#nextchapter

h

hashnextchapter.com

EXPLORE FURTHER WITH THESE LINKS
The 10,000 Year Clock
Rushkoff’s PDF Study Guide
Turkle, Sherry. Alone Together: Why We Expect More from Technology
& Less from Each Other. Cambridge, MA.: Basic Books, 2011.



“live in person”

The National Day Of Unplugging

– Rushkoff

#nextchapter

Solnit, Rebecca. 2004. River of Shadows: Eadweard Muybridge and the Technological Wild West. Penguin Books. hashnextchapter.com #

4

h

RUSHKOFF’S PRINCIPLE OF:

II. PLACE

LIVE IN PERSON.
The digital world provides the opportunity for interaction between groups of people who may not be physically near each other. This is an incredible development in technology, which has many proven benefits for bringing people together and allowing crowdsourcing of information.
However, there are aspects of physical interaction that cannot be simulated through the use of digital medium. Eye contact, physical touch, facial expression, and gestures are often lost in translation into the digital world. In-person interaction should always be option number one. There is no substitute. Digital media should be used only the former is not a viable option.

A Year in the Life. 2011. Film. 31 Jan 2013.

“Digital media is biased away from the local, and toward dislocation.”
--Douglas Rushkoff

TRY AN ACTIVITY
Search the internet for information about of a favorite local business. What kind of information do you find? Evaluate their online presence: website, social media, maps. Discuss how small businesses can compete with the giants like Amazon.com. Does digital technology favor certain kinds of local businesses? What would you prefer not to purchase online?
Search the internet to see if your local community has a “shop local” movement? What is the messaging the campaign uses to educate the public about the need to “relocalize” itself?

5

hashnextchapter.com

RUSHKOFF’S PRINCIPLE OF:

II. PLACE

LIVE IN PERSON.
Questions for Discussion
• Even though it gives exposure to a worldwide market, in what ways does the internet work against local business?
• What are some ways the internet can be a benefit to local business, local activism or local culture?

hashnextchapter.com

hashnextchapter.com

In Chapter 2, Rushkoff asserts that digital media are biased away declaring or should “live in
“live in person” from the local, toward dislocation,“program we be
“be yourself” programmed” – Rushkoff
Rushkoff
person.” All– media have a bias toward-– Rushkoff as carrying a distance, #nextchapter message from one place to another is what media are for. It just
#nextchapter
#nextchapter hashnextchapter.com so happens that this bias toward dislocation breaks down the hashnextchapter.com hashnextchapter.com systems of local business, community and communication, leaving people disconnected from the local and engaged with national brands and ubiquitous corporations. By recognizing media’s bias toward dislocation and learning to live in person, we can reclaim power by reclaiming the local.
“you may always
“do not sell choose none of your friends” the above”
– Rushkoff
EXPLORE FURTHER WITH THESE LINKS
– Rushkoff

#nextchapter hashnextchapter.com Ed Shane. Disconnected America: The Consequences of Mass
#nextchapter
hashnextchapter.com (New York: M.E. Sharpe, 2000)
Media in a Narcissistic World
Great data on how people use the net. Pew Internet Reports.
TED TALKS : Sheikha Al Mayassa, “Globalizing the local, localizing the global.”

• One result of the “delocalizing” nature of the
Internet is the use of long-distance technologies when local and face-to-face interaction is possible.
(Have you ever used an Instant Messaging Client to message a roommate, even though she was working on her computer in the same room?) What are two more examples of delocalization as a result of a networked existence?
• Beyond the way we sometimes employ technologies for the gee whiz factor, or for convenience, do we sometimes utilize distancing as a “feature” rather than a “bug?” In other words, when do we like the fact that the person we’re communicating with is far away? 6

RUSHKOFF’S PRINCIPLE OF:

III. CHOICE

YOU MAY ALWAYS CHOOSE
NONE OF THE ABOVE.

It all comes down to yes or no when digital technology is concerned. In Chapter 3, Rushkoff explains that digital technology is built on a binary system that articulates the flow of electricity, where no flow means “off” and flow means
“on.” Off and on equates to “no-yes,” “0-1.” This binary system forces humans into making choices that are narrow and finite (one or the other, this or that) without any space around them for possibilities). Our reliance on digital technology allows the computers we thought we controlled to make minute choices about how we experience the world in ways we are not even aware of––and meanwhile we try to cram the human experience into the searchable confines of a database. Rushkoff points out that maybe our best choice is not to choose anything at all.

Machines by design split up everything into qualifiers of true or false, yes or no, 1’s or 0’s. In order for us as human beings to more efficiently make use of our technology, we’ve learned to sideline the grey areas between “yes” and “no” in favor of mechanical ultimatums. People mistake fields that ask the user questions for the application trying to promote a unique user experience, when in fact those questions are used to force us into certain categories created by the programmer of that application. Tagging is a new method of choice that truly offers the user a choice. 7

#nextchapter

#nextchapter

hashnextchapter.com

hashnextchapter.com

hashnextchapter.com

TRY AN ACTIVITY

RUSHKOFF’S PRINCIPLE OF:

III. CHOICE

Login to your Amazon.com account. Search for a product that you have never bought before from Amazon. If you have a Facebook account, go to it. Do you see an ad for that product on your Facebook page? What do you think has happened? Discuss ways to minimize the computer choosing for you in cases like this.

YOU MAY ALWAYS CHOOSE
“live in person”
“be yourself”
NONE OF THE ABOVE.
– Rushkoff

– Rushkoff

#nextchapter

#nextchapter

hashnextchapter.com

#nextchapter

hashnextchapter.com
Questions for Discussion

“program or be programmed” -– Rushkoff

#nextchapter
EXPLORE FURTHER WITH THESE hashnextchapter.com • We are used to seeing “aggregated” (content pulled together from various other sources) content based on our own purchase history, but how do you feel about content created based on our own purchase history? What does this mean for culture?

“you may always choose none of the above”
– Rushkoff

#nextchapter

• What happens to content that doesn’t fit into any easy categories and demographics?

“do not sell
• Why is the bias of digital technology so heavy toward your friends” choice, rather than ambiguity? What are the human re– Rushkoff sults of making so many digital decisions? Why would ambiguity be valued?

NPR: Netfix Moves Back in Content
Production with Cards

Listen to the story

Lanier, Jaron. You Are Not a Gadget:
A Manifesto (New York: Knopf, 2010

#nextchapter

• Rushkoff points out that this world of constant choice is hashnextchapter.com hashnextchapter.com a benefit for marketers and those who would use these decision points as pressure points to force sales. How exactly does this work, and what is an example of marketers using forced choice as a sales force?
• Despite being biased toward top-down control, databases have the potential to be open-ended, bottom-up systems if we choose to use them in such a way. How would freeing the database help free us from forced choices?
8

RUSHKOFF’S PRINCIPLE OF:

IV. COMPLEXITY

YOU ARE NEVER COMPLETELY
RIGHT.

Our machines are designed to make us function quicker and more efficiently. In doing so, access to information has become democratized. Not as much effort or expertise is
“you are never completely right” required to find the information that we are searching for. In a
– Rushkoff
– Rushkoff few clicks we have access to short bits of summarized information thathashnextchapter.com suffices as an anhashnextchapter.com swer to our question, rather than the whole, complete, complexity of the answer. We have access to facts, and points of information, rather than an actual knowledge and understanding of a subject.

The combination of the first three biases exposes the problem Rushkoff points out in Chapter 4. Because our digital technology reduces our world into an abstraction to be processed, it is “biased” toward a reduction in complexity. Digital technology seeks to level the playing field and holds all human knowledge at the same distance, only one level deep through any Internet search. This reductive nature of digital technology leads us to cherry-pick what we want to know, when we want to know it, and ways to forget the information as soon as we have no use for it. It leads us to develop skills based on accessing this information, rather than using it. And more than anything, it leads us to think we understand the complex world around us when we are only reading part of the map.

“tell the truth”

#nextchapter

#nextchapter

“share,
“one size does
Never again don’t steal” not fit all” will we not know the answer. Every answer to every

Google Search App: Martin Van Buren. 2012. Film. 31 Jan 2013.

question is available for someone to findRushkoff
– on the internet. Applica– Rushkoff tions like Google and Wikipedia make information available in a matter of seconds. But are we really learning anything, or are we just becoming dependent on our devices (and the people makhashnextchapter.com hashnextchapter.com ing them)?

#nextchapter

#nextchapter

9

TRY AN ACTIVITY

RUSHKOFF’S PRINCIPLE OF:

IV. COMPLEXITY

YOU ARE NEVER COMPLETELY
RIGHT.

Questions for Discussion
• While there are obvious benefits to having aggregated personalized content, what are the cultural implications of filtering out what does not fit your profile?
• What does Rushkoff mean by a “data-point?” How have data-points been used in political debates? Is this a new phenomenon? What makes it seem different now? Conduct a google search for the word “bass.” Try searching other words that have more than one meaning. Compare the results with your group. In recent years,
Google has changed its search “algorithms” (mathematical formulae common to computing) to include personalized results based on geography, searcher history, and social networks. Open up your personal search history on Google
< https://history.google.com/history/ > and think about how and why your search profile returned certain results. Try searching the same words after turning off personalized search:
< http://support.google.com/websearch/bin/answer.py?hl=en&answer=2410479 >.
Play with other search filters such as time and location.

EXPLORE FURTHER WITH THESE LINKS
Shirky, Clay. Here Comes Everybody: The Power of Organizing
Without Organizations (New York: Penguin Press, 2008). Online
Alternative (excerpt)

TED TALKS The Filter Bubble by Eli Pariser

• Reflect on how, in your life, exposure to unexpected people, places, events and ideas have shaped who you are. What are the ways the bias of digital culture filters out these unexpected and complex encounters?
• What are some of the effects of this digital oversimplification on education? What are the effects on skilled labor and the experience of discovery?

10

RUSHKOFF’S PRINCIPLE OF:

V. SCALE

ONE SIZE DOES NOT FIT ALL.

Digital technologies have the tendency to create abstractions of real, tangible entities. A mom and pop store that relies on personal relationships with customers and its local connections, isn’t going to be as successful in an abstract form. It
“you are never who can scale now have to compete with doesn’t scale. Those completely the standard in their respective profession. The right” those who are
– Rushkoff
– Rushkoff
Internet takes away power from the small businesses and gives it to the mega-corporation. As more abstraction occurs, and abstractions of abstractions start to feel real, we will become hashnextchapter.com hashnextchapter.comhere and the now. disconnected with the

“tell the truth”

#nextchapter

#nextchapter

Questions for Discussion

“one size does not fit all”
– Rushkoff

#nextchapter hashnextchapter.com • What are “vertical” and “horizontal” integration mentioned by Rushkoff in this chapter? And how do they differ from the new requirement of “scaling up?”

“share, don’t steal”
• While abstraction allows us to use such important tools as language and math, it also makes us more

– Rushkoff dependent on centralized standards, such as the presentation of online identity and the categories and genres of cultural objects. What does this dependency do to the power structure of contemporary society, especially in the worlds of business and politics?

#nextchapter hashnextchapter.com • According to Rushkoff, how can the German philosopher Walter Benjamin’s ideas help us navigate and appreciate our abstract world?
11

RUSHKOFF’S PRINCIPLE OF:

V. SCALE

ONE SIZE DOES NOT FIT ALL.

In Chapter 5, Rushkoff explains that the Internet, and the digital technologies that support it, are biased toward scalability. More than just a business buzz word, scalability is the requirement of any business operating in our digital century. The constant need for businesses to “scale up,” usurp competitors’ territory, and develop new markets to tap has fueled the modern evolution of business and, as
Rushkoff explains, bring our recent financial troubles into a clear, new light. Due to the constant need for growth and development, business must rely on another bias of the medium––abstraction. Abstraction here means activities or products with no tangible quality, like a virtual sword in War of Warcraft or a dollar in your account in PayPal. By further abstracting how business is done (from face-to-face interaction to databases and algorithms), we can either choose to engage the digital economy on a more human scale or get lost and left behind by the demanding
“scalability” of the status quo.

TRY AN ACTIVITY
Look at this list of the companies Google has purchased in the last 12 years: http://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Google. What kind of companies is Google interested in and why? Why does a search engine need to “scale up” into offering authoring tools, social networks and content distribution?
Look at the way you may be saving your data. See if you are using the Cloud for backing up your documents, music, photos and other media objects. See if you have a back-up plan for preserving these objects if something happens to your Cloud accessibility.

EXPLORE FURTHER WITH THESE ARTICLES
Tim O’Reilly and John Batelle’s “Web Cubed”

Benjamin, Walter. The Work of Art in the Age of Its Technological Reproducibility, and Other Writings on Media. (Boston: Belknap Press, 2008)”
Apple vs. Google vs. Facebook vs. Amazon
The Lines Between Software and Hardware Continue to Blur

12

“one size does not fit all”

“share, don’t steal”

– Rushkoff

– Rushkoff

#nextchapter

#nextchapter

RUSHKOFF’S PRINCIPLE OF:

VI. IDENTITY

hashnextchapter.com

hashnextchapter.com

BE YOURSELF.

The anonymity of the digital world can be a dangerous thing. It leaves people disconnected with the real-life consequences of their online actions.
– Rushkoff
We all have a certain reputation to
-– Rushkoff uphold and our actions serve to promote that reputation. We need to hashnextchapter.com identify online as our true selves, just as hashnextchapter.com we do in real life in order to hold ourselves accountable for our actions.
Furthermore, if everyone on the internet identifies themselves as a real person, they will seem less like strangers and more like a members of a community. “be yourself”

#nextchapter

“program or be programmed” #nextchapter

“do not sell your friends”
Questions for Discussion

– Rushkoff
• Considering that only 7 % of human communication is verbal, and we strip away the other 93 percent of nonverbal, tonal and physical communication by interacting through digital technologies, what are some of the societal side effects we can expect?

#nextchapter

hashnextchapter.com

• What key difference between the generations that have “adapted” to digital technologies and those that have grown up “native” with digital technologies does Rushkoff point out, and why is it relevant to identity?
• Respond to this proposal: No one should ever post anything anonymously online unless under threat of physical or legal persecution.
And even then, the ideal behavior would be for everyone to post their similar sentiments and thus make persecution impossible.
13

RUSHKOFF’S PRINCIPLE OF:

VI. IDENTITY
BE YOURSELF.

Rushkoff tells us that he has always been made himself available online without hiding his identity in any way, and this display of identity online has come with happiness and heartache. In Chapter Six,
Rushkoff looks at the Internet’s bias toward anonymity and the effect that bias has on our personal lives and our social interactions. These days, we operate in a virtual world, free from our bodies, but not from identity.
Because of this reality, we have a unique ability to reshape our identity to anything we please, and also operate anonymously and outside the restrictions of civil society. With the ability to reshape ourselves, we also have the potential to reshape how our society works––but only if we realize the power we hold.

TRY AN ACTIVITY
Go online to your Facebook profile page (if you have one), and list the biases the social network has in shaping one’s personal identity for public presentation. How does the data on a profile page both help and hinder real connection with others? If you could design your own social network page, how would you present your identity?
Search for the famous cartoon that reads “on the internet no one knows you are a dog.” What is meant by this caption? How true is it really?
Have you ever read about people passing for someone else? Have you ever posed as someone or something else online? What were the repercussions? EXPLORE FURTHER WITH THESE LINKS
Sherry Turkle on Digital Nation
Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. (New York: Basic Books, 2011)
Internet Society: Online Identity

14

“one size does not fit all”

“share, don’t steal”

– Rushkoff

– Rushkoff

RUSHKOFF’S PRINCIPLE OF:

VII. SOCIAL
#nextchapter
hashnextchapter.com

#nextchapter hashnextchapter.com DO NOT SELL YOUR FRIENDS.
Digital media has forever favored the social.
No matter what phases the internet goes through, there is one thing that remains constant: the desire to remain socially connected. Today’s internet is compromised,
– Rushkoff running rampant with people and business looking for any and all opportunities for monetary gain, rather than social contact. hashnextchapter.com Today we run the risk of losing sight of the true potential of the internet and the integrity of the content it once held.

“be yourself”

#nextchapter

“program or be programmed” -– Rushkoff

#nextchapter hashnextchapter.com Rushkoff, Douglas, dir. Program or Be Programmed. 2010. Film. 31 Jan 2013.

“do not sell your friends”
– Rushkoff

#nextchapter

hashnextchapter.com

In Chapter 7, Rushkoff uncovers one of the Internet’s first and most powerful biases. The Internet is for being social. It’s biased toward contact. With the boom of social networks and trending topics, marketers have co-opted the Internet’s ability to connect readily to friends, family members, even strangers. But peer-to-peer communication has always been the Internet’s strength. So no matter how many followers a brand has, the real power comes in the connections those followers from with one another. It’s those peer-to-peer connections that we turn to when we need real advice or consolation, or any other intangible feeling a true friend can offer. But as we continue to count our friends instead of really contact them, we are changing their nature of friendship.
Perhaps even robbing ourselves of what real human friendships uniquely offer.
15

RUSHKOFF’S PRINCIPLE OF:

VII. SOCIAL

Questions for Discussion

DO NOT SELL YOUR FRIENDS.

• What is it about the history of the Internet makes it biased toward contact?
• What is the “monetization of friendship,” and how does it occur in the Internet’s social spaces?

New media theorist Howard Rheingold argues:
“People act and learn together for a rich mixture of reasons. The current story that most of us tell ourselves about how humans get things done is focused on the well-known flavors of self-interest, which make for great drama –– survival, power, wealth, sex, glory. People also do things together for fun, for the love of a challenge, and because we sometimes enjoy working together to make something beneficial to everybody. If I had to reduce the essence of Homo sapiens to five words, ‘people do complicated things together’ would do. Online social networks can be powerful amplifiers of collective action precisely because they augment and extend the power of ever complexifying human sociality. To be sure, gossip, conflict, slander, fraud, greed and bigotry are part of human sociality, and those parts of human behavior can be amplified, too. But altruism, fun, community and curiosity are also parts of human sociality –– and I propose that the Web is in existence proof that these capabilities can be amplified, as well. Indeed, our species’ social inventiveness is central to what it is to be human.” TRY AN ACTIVITY
Look at two popular photo sharing apps (Instagram, Path, Photoset,
Twitter or Flickr). Examine their product and terms of service, and then compare how the two applications handle the sharing of photos online.
What are the privacy settings? Can your photos be used commercially?
Do you own the rights to your photos? How does tagging other people in photos work? Is it possible to “sell your friends?”

• What do you think of this comment ? What may push the quality of social networks to one side or the other of
Rheingold’s two possibilities? What is your experience of
Facebook? Do you find your relationships made more complex by their existence online? Are you online relationships deepening for you?

EXPLORE FURTHER WITH THESE LINKS
Howard Rheingold, “Participative Pedagogy for a Literacy of Literacies”

CNNMoney: How to protect your Instagram photos

16

RUSHKOFF’S PRINCIPLE OF:

VIII. FACT

TELL THE TRUTH.

“The easiest way to sell stuff in the digital age is to make good stuff.”
--Douglas Rushkoff

In Chapter 8, Rushkoff explores how our ideas spread socially, replicating like genes replicate our physical features. Ever since the feudal system overpowered the bazaar, stories about kings and brands became more important than the facts of everyday life. But in the digital landscape, we operate in something much more like the bazaar, where the truths about everyday life are again the most important stories to tell. And when the media space is biased toward truth telling, the easiest way to accomplish anything is to tell the truth.

Among our society facts are highly valued.
The internet provides the perfect opportunity for the crowdsourcing of information. Each person can share what bit of truth they have come to learn and on to that knowledge others will add, thus gradually making more things common knowledge, and increasing the capabilities of humans. With digital media, facts are easily distinguishable from myths.
We learn to seek out the facts and dismiss what is false. In order to successfully communicate your message through digital media, it should be based on fact.

Al l The se Websit es share somet hing in com mon: T hey all spread memes of t ruth.

17

RUSHKOFF’S PRINCIPLE OF:

VIII. FACT

TELL THE TRUTH.

“The easiest way to sell stuff in the digital

Questions for Discussion

“tell the truth”

• What is a “meme,” and how is it like one of our own genes?

– Rushkoff

#nextchapter hashnextchapter.com • While analog media are “read only,” digital media are “read-write,” allowing for a deep interaction between the user and the producer. What effect does this transition have on our communication, and how does it put us back in the bazaar? • According to Rushkoff, we live in a realm where a person’s value is dependent on the strength of their facts. What does the author mean by this, and what is one example of this concept from recent news events?

• What is your opinion of WikiLeaks? Does the factual bias of the net favor their efforts to release and spread the truth? Are we, as a society, ready for such levels of honesty? Are we learning anything we didn’t already know? If not, then what’s the big deal?

“share, don’t ACTIVITY
TRY AN steal”

– Rushkoff
Read the following wikipedia article about how to be an editor on a wikipedia article
<http://en.wikipedia.org/wiki/Wikipedia:About#Contributing_to_
hashnextchapter.com
Wikipedia >, and try to find how the “truth” of an entry is determined. What is the difference between verifiability and truth?

#nextchapter

EXPLORE FURTHER WITH THESE LINKS
Postman, Neil. Technopoly: The Surrender of Culture to Technology
(New York: Vintage, 1993)

Wikileaks

18

RUSHKOFF’S PRINCIPLE OF:

IX. OPENNESS
SHARE, DON’T STEAL.

The internet was created with the idea of sharing in mind.
The sharing and collaborating of knowledge has led to advancements including Firefox, Linux, and Wikipedia.
Sharing our ideas allows us to be more creative and to be more successful at creating. What we need to be aware of is the invisible line that divides what constitutes sharing and what is stealing. That line is ethics. What goes on the internet should be free; it should be shared and allowed to turn into something better. Ideas should not be stolen and then used for personal or monetary gain.

BEFORE & AFTER

TRY AN ACTIVITY
Examine the licensing options for Creative Commons: http://creativecommons.org/choose/. How does this system of copyright amplify the sharing of information, while protecting intellectual property?
Read “The Hacker Manifesto” (1986)
<http://www.phrack.org/issues.html?issue=7&id=3&mode=
txt.> How do the sentiments of this document differ from
Rushkoff’s? How are they similar? Now look up the word
“Hackathon” and “hackivist.” What is it, and how has the notion of shared information morphed in the last 25 years?

Dreamboy, . 2012. PxleyesWeb. 31 Jan 2013.

BEFORE: This image was taken and then was essentially donated by the photographer to a creative commons website for others to use.

19

never ely right”

shkoff

“tell the truth”
– Rushkoff

RUSHKOFF’S PRINCIPLE OF:

IX. OPENNESS

chapter

hapter.com

#nextchapter hashnextchapter.com SHARE, DON’T STEAL.

ze does all” shkoff

chapter

hapter.com

urself”

shkoff

chapter

hapter.com

t sell riends” “share, don’t steal”
– Rushkoff

#nextchapter hashnextchapter.com The Internet was designed to run on a shared architecture and, thus, developed a bias toward openness. But Rushkoff does not believe this means the floodgates should be open to repurposing and stealing everyone’s content. Because we operate in a digital world innately biased toward openness, we sometimes forget where the line is drawn––or to draw the line at all. In this chapter, Rushkoff looks to address the problem of digital piracy and the commodification of content by showing how the laws and regulations we use to govern the open Internet were developed for a closed, controlled, analog world. Unlike the marketplace for fixed goods, our digital space is also a product of shared cost structures, something our financial institutions engineered out of our currencies a long time ago.

Questions for Discussion

“program or be
• What about the Internet’s bias toward openness makes it a particularly programmed” sticky battlegroundRushkoff
-– for content rights lawyers? What is so different about digital property from physical property?

#nextchapter

hashnextchapter.com
• What is “Fair Use” and what provoked its development? What has been some of the arguments in the debate surrounding it?

EXPLORE FURTHER WITH THESE LINKS
Lessig, Larry. Free Culture (excerpt)
Internet Archive

• How do Digital Rights Management strategies work? Why do some of them make the situation worse instead of better?
• Instead of being biased toward hoarding like existing currencies, local and peer-to-peer currencies depend on what factors to ensure a more open flow of capital? Why would they work, or not, today?

shkoff

chapter

20

RUSHKOFF’S PRINCIPLE OF:

X. PURPOSE

PROGRAM OR BE
PROGRAMMED.

The “user friendly” programs we use everyday make our work with computers easy; however, they come with a cost: we as a society are becoming further removed from the code that actually creates the applications we’re using. We just accept the programs that exist, and are content to attempt to master how to use them. We are at the mercy of the programmers and any potential agendas they may have. Familiarizing ourselves with how to program will allow us to innovate and create technology that serves the specific needs of many individuals, not just those of the elite who know how to program.

TRY AN ACTIVITY
Make a game using the Scratch programming software: http://scratch.mit.edu. It is easy, fun and a great way to start on using computational thinking.

TRY AN ACTIVITY
Make a simple blog post using (wordpress.com or blogger.com).
Go to the “dashboard” once you have finished and look at your
“post.” Notice that you can toggle between “visual” and “text.” Look at your post in both options. What information is located in the text mode that is not in the visual mode? Play with eliminating items in the text mode and see what your post looks like in the visual mode when you do. Are you able to fix any problems that you have caused after changing your code?

21

hashnextchapter.com

RUSHKOFF’S PRINCIPLE OF:

X. PURPOSE

PROGRAM OR BE
“share,
PROGRAMMED. don’t steal”
– Rushkoff

In the final chapter of Program or Be Programmed, Rushkoff proposes our best solution for taking advantage of all the biases of digital technology––to become programmers ourselves. As popular understandings of technologies have hashnextchapter.com always been one step behind the technologies themselves, we have become complacent users rather than agents of our own computing activities. This situation allows those with the ability to create through programming to maintain control, simply by designing the technology for or against their natural biases, leaving us to either fall in line or struggle against the natural flow. By taking the reigns as programmers ourselves, we can occupy the highest leverage point in a digital society. We can shape the world
-– Rushkoff any way we see fit.

#nextchapter

“program or be programmed” #nextchapter hashnextchapter.com Questions for Discussion
• How is digital technology like speech, text and the printing press? In what ways have users lagged one leap behind technological advances?
• What are the four stages of interaction Rushkoff points out in his example of the gamer, and what is the relationship between user and program at each stage?
• After reflecting on the book, what for you is the real promise of digital media, and what might we do to come to realize it?

EXPLORE FURTHER WITH THESE LINKS
Kelly, Kevin. What Technology Wants. (New York: Viking, 2010)
Exploring Computational Thinking
Lynda.com helps anyone learn software, creative, and business skills to achieve their personal and professional goals.
Code Academy: Learn to code interactively, for free
Scratch is a programming language that makes it easy to create your own interactive stories, animations, games, music, and art ! and share your creations on the web.
LOGOS - programming for elementary school http://www.terrapinlogo.com/ http://softronix.com/

22

DOUGLAS RUSHKOFF
WRITER,MEDIA THEORIST,TEACHER.
As a graduate of Princeton in 1983, with a master in fine arts from the California Art Institute, Douglas Rushkoff started to garner some attention in the 1990s. He was a writer taking part in the cyberpunk movement that combined the areas of thought from technology, society and culture. Rushkoff’s recurring themes include helping people understand the biases of the technology they are consuming, innovating media to become more interactive, and questioning the impact of media on society. In 1994,
Rushkoff’s ideas of the “media virus” and “social contagion” became accepted concepts, and Rushkoff went on to write three award-winning documentaries for
PBS and do commentary on NPR. He is currently a technology and media coordinator for CNN.

"About." Rushkoff.com. N.p. Web. 31 Jan 2013.
"Douglas Rushkoff." Wikipedia.org. N.p. Web. 31 Jan 2013.

23

CREDITS
This study guide is provided as a service by #nextchapter. We have received permission from Douglas Rushkoff to use his material in creating it. We want to thank the following students and faculty from the Creative Media & Digital Culture Program at Washington State University Vancouver:





Jennifer Hansen, student, iBook Designer & Content Specialist
Will Luers, Faculty, Study Guide Content
Setareh Alizadeh, Student, iBook Editor
Dr. Dene Grigar & Jack Burkman, Faculty, iBook Editors

As one would expect, we used the Creative Commons for the production of this book. xxiv

Similar Documents

Premium Essay

Data

...Discuss the importance of data accuracy. Inaccurate data leads to inaccurate information. What can be some of the consequences of data inaccuracy? What can be done to ensure data accuracy? Data accuracy is important because inaccurate data leads may lead to such things as the closing down of business, it may also lead to the loosing of jobs, and it may also lead to the failure of a new product. To ensure that one’s data is accurate one may double check the data given to them, as well as has more than one person researching the data they are researching. Project 3C and 3D Mastering Excel: Project 3G CGS2100L - Section 856 MAN3065 - Section 846 | | 1. (Introductory) Do you think Taco Bell was treated fairly by the mass media when the allegations were made about the meat filling in its tacos? I think so being that they are serving the people for which I must say that if you are serving the people then it’s in the people rights to know what exactly you are serving them. 2. (Advanced) Do you think the law firm would have dropped its suit against Taco Bell if there were real merits to the case? It’s hard to say but do think that with real merits it would have changed the playing feel for wit real merits whose the say that Taco Bell wouldn’t have had an upper hand in the case. 3. (Advanced) Do you think many people who saw television and newspaper coverage about Taco Bell's meat filling being questionable will see the news about the lawsuit being withdrawn? I doubt that...

Words: 857 - Pages: 4

Free Essay

Data

...Import Data from CSV into Framework Manager 1. Save all your tables or .csv file under one folder. In our case we will use the Test folder saved on blackboard with three .csv files named TestData_Agent.csv, TestData_Customer.csv, TestData_InsuranceCompany.csv. 2. Now , locate the correct ODBC exe at “C:\Windows\SysWOW64\odbcad32.exe” 3. Once the ODBC Data Source Administrator is open, go to the “System DSN” tab and click “Add”. 4. Select “Microsoft Text Driver (*.txt, *.csv)” if you want to import from csv files. 5. Unclick the “Use Current Directory”, and then click Select Directory to define the path of your data source. Give data source a name as well. Let’s use TestData in this case. NOTE: All the files under the specified location will be selected by default. 6. Again press ok and close the dialogue. Now we will import this Database/csv files into Cognos using Framework Manager. 7. Now Go to find Framework Manager. C:\Program Files (x86)\ibm\Cognos Express Clients\Framework Manager\IBM Cognos Express Framework Manager\bin 8. Right click on 'FM.exe', and then select 'Properties'. Click 'Compatibility' tab. Check "Run this program as an administrator' under 'Privilege Level'.  9. Open Framework Manager and create a new project and give it any name, in this case CSV_MiniProject. Then click OK. 10. Put the username: “Administrator” and password:”win7user”. 11. Select Language as English and hit ok. 12. Select Data Sources...

Words: 775 - Pages: 4

Free Essay

Data

...instructed to backfill with temporary labour. The collated data is being used to investigate the effect of this shift in labour pattern, paying particular attention to staff retention. The table below gives a month by month record of how many staff have been employed, temporary and permanent , how many temporary staff are left at the end of each month compared to how many are left that are on a permanent contract. Month | Temporary staff | permanent staff | total | permanent leavers | Temporary leavers | total leavers | Jan-15 | 166 | 359 | 525 | 7 | 2 | 9 | Feb-15 | 181 | 344 | 525 | 15 | 5 | 20 | Mar-15 | 181 | 344 | 525 | 0 | 7 | 7 | Apr-15 | 204 | 321 | 525 | 23 | 7 | 30 | May-15 | 235 | 290 | 525 | 31 | 12 | 43 | Jun-15 | 238 | 287 | 525 | 3 | 17 | 20 | Jul-15 | 250 | 275 | 525 | 12 | 42 | 54 | Aug-15 | 267 | 258 | 525 | 17 | 23 | 40 | Sep-15 | 277 | 248 | 525 | 10 | 27 | 37 | Oct-15 | 286 | 239 | 525 | 9 | 30 | 39 | Nov-15 | 288 | 237 | 525 | 2 | 34 | 36 | Dec-15 | 304 | 221 | 525 | 16 | 45 | 61 | Jan-16 | 305 | 220 | 525 | 1 | 53 | 54 | Feb-16 | 308 | 217 | 525 | 3 | 57 | 60 | An explanation of how I analysed and interpreted the data To make a comparison between the labour pattern and retention, I placed the above data into a line graph this gives a more of an idea to trends over the period My Findings The actual level of staff has remained constant throughout the data collated, as each job requires a specific amount of man...

Words: 621 - Pages: 3

Free Essay

Data

...Data Collection - Ballard Integrated Managed Services, Inc. (BIMS) Learning Team C QNT/351 September 22, 2015 Michael Smith Data Collection - Ballard Integrated Managed Services, Inc. (BIMS) Identify types of data collected--quantitative, qualitative, or both--and how the data is collected. A survey was sent out to all the employees’ two paychecks prior and a notice to complete the survey was included with their most recent paychecks. After reviewing the surveys that have been returned it was found that the data collected is both quantitative and qualitative. Questions one thru ten are considered qualitative data because the response for those questions are numbered from one (very negative) to five (very positive), which are measurements that cannot be measured on a natural numerical scale. They can only be classified or grouped into one of the categories and are simply selected numerical codes. Then, questions A-D could fall under quantitative data because it can determine the number of employees in each department, whether they are male or female and amount of time employed with the company. From that data it is able to find an average of time employed, then subcategorize by department, gender and if they are a supervisor or manager. Identify the level of measurement for each of the variables involved in the study. For qualitative variable there are a couple levels of measurements. Questions A, C, and D in Exhibit A fall in nominal-level data because when asking...

Words: 594 - Pages: 3

Premium Essay

Big Data and Data Analytics

...Big Data and Data Analytics for Managers Q1. What is meant by Big Data? How is it characterized? Give examples of Big Data. Ans. Big data applies to information that can’t be processed or analysed using traditional processes or tools or software techniques. The data which is massive in volume and can be both structured or unstructured data. Though, it is a bit challenging for enterprises to handle such huge amount fast moving data or one which exceeds the current processing capacity, still there lies a great potential to help companies to take faster and intelligent decisions and improve operations. There are three characteristics that define big data, which are: 1. Volume 2. Velocity 3. Variety * Volume: The volume of data under analysis is large. Many factors contribute to the increase in data volume, for example, * Transaction-based data stored through the years. * Unstructured data streaming in social media. * Such data are bank data (details of the bank account holders) or data in e-commerce wherein customers data is required for a transaction. Earlier there used to data storage issues, but with big data analytics this problem has been solved. Big data stores data in clusters across machines, also helping the user on how to access and analyse that data. * Velocity: Data is streaming in at unprecedented speed and must be dealt with in a timely manner. RFID tags, sensors and smart metering are driving the need to deal with...

Words: 973 - Pages: 4

Premium Essay

Knbs Data

...KNBS DATA DISSEMINATION AND ACCESS POLICY November 2012 VISION A centre of excellence in statistics production and management MISSION To effectively manage and coordinate the entire national statistical system to enhance statistical production and utilization Herufi House, Lt. Tumbo lane P.O. Box 30266 – 00100 GPO Nairobi, Kenya Tel: +254-20-317583/86/88,317612/22/23/51 Fax: +254 – 20-315977 Email: info@knbs.or.ke Web: www.knbs.or.ke i WI-83-1-1 Preface Kenya National Bureau of Statistics (KNBS) is the principal agency of the Government for collecting, analysing and disseminating statistical data in Kenya. KNBS is the custodian of official statistical information and is mandated to coordinate all statistical activities, and the National Statistical System (NSS) in the country. Official statistics are data produced and disseminated within the scope of the Statistical Programme of the National Statistical System (NSS) in compliance with international standards. To achieve this mandate, KNBS strives to live up to the aspirations of its vision; to be a centre of excellence in statistics production and management. Chapter Four on The Bill of Rights section 35 of the new constitution in Kenya gives every citizen right of access to information held by the State. This policy document strives to provide a framework for availing statistical information to the public in conformity with this bill and government’s open data initiative. This...

Words: 3544 - Pages: 15

Free Essay

Data Information

...Data and Information Summary HCI/520 11/18/2013 Data and Information Summary Today we live in a world where data is a critical resource. Information is also a critical resource and consists of data that is processed into meaningful information for the purpose of organizations and users. Collected data is stored into what is known as databases where it is organized into potentially valuable information. Data also known as Raw data is a stream of facts that are not organized or arranged into a form that people can understand or use (Gillenson, Ponniah, Kriegel, Trukhnov, Taylor, Powell, & Miller, 2008) . Raw Data are facts that have not yet been processed to reveal their meaning (Gillenson, Ponniah, Kriegel, Trukhnov, Taylor, Powell, & Miller, 2008). For example when AT&T wireless ask their clients to participate in a survey about the products they have purchased or how was their customer service experience the data collected is useful but not until the raw data is organized by combining it with other similar data and analyzed into meaningful information. Information is the result of processing raw data to reveal its meaning (Coronel, Morris, & Rob, 2010). Data processing can be as simple as organizing data to reveal patterns or as complex as making forecasts or drawing inferences using statistical modeling (Gillenson, Ponniah, Kriegel, Trukhnov, Taylor, Powell, & Miller, 2008). Both data and information are types of knowledge which share similarities...

Words: 538 - Pages: 3

Free Essay

Bad Data

...Bad Data AMU DEFM420 Big Data refers to volume, variety and velocity of available data. The issue with that is that any emphasis is put on volume or quantity of data. The quantity is a very vague element of Big Data, there is no precise requirements to purely volume based data. What should be considered in big data, the complexity and depth of the data? If the content of data is deep and containing detailed information it holds more purpose. When we analyzes data we as a culture prefer less to review but of more importance. I would rather read two pages of relevant data then read one hundred pages that contain 3 pages of data. This is a factor of human nature but also a business factor. The majority of what we do in government work is time sensitive. We operate on a system of end dates. With time being a factor wasting time on Big Data that isn’t always pertinent is a waste. While in cases of no time limit, having the full three V’s of big data is acceptable and may in the end give more accurate information after spending excessive time sorting through the information mainly the volume portions. Is the system of Big Data wrong? No it is not wrong but the concept is too vague. For different situations data needs to be limited. Others not so much so it gives us a system and collection of information that is in some cases excessive for the need. It is a double edged sword. There are other aspects of Big Data collections useful in contracting offices...

Words: 325 - Pages: 2

Premium Essay

Data Management

...University Data Management March 18, 2014 Data partitioning is a tool that can help manage the day-to-day needs of an organization. Each organization has unique values that drive business. All organizations have policies and processes that are influenced by their environment and industry. The use of data partitioning can help productivity by recognizing the need to categorize data to tailor unique needs. This approach does require some effort. To transition to a new database approach, organizations need to assess the pros and cons of a database transition. The scale of an organization’s database may be the one factor that drives an adoption of this approach. Data partitioning has been developed to address issues that traditional database queries have created. One main problem that partitioning was created to solve is the performance of database queries. According to Alsultanny (2010), “System performance is one of the problems where a significant amount of query processing time is spent on full scans of large relational tables. Partitioning of the vertical or horizontal partitioning or a combination of both is a reliable way of solving the problem” (p.273). By separating queries into either horizontal or vertical processes, the user can avoid delays and strains on a database. This saves time which can be used to improve the productivity an organization has towards their day-to-day operations. Large-scale databases receive the most benefits from partitioning. Data partitioning...

Words: 1572 - Pages: 7

Free Essay

Data & Information

...able to function without data, information and knowledge. Data, information and knowledge are different from one another, yet there are interrelated to each other. Data Data are unprocessed raw facts which can be either qualified and or quantified. It explains phenomenal refer to statistical observations and other recordings or collections of evidence (Chaim Zins, 2007, p.480). Data can be in numbers or text. For example, temperature currency, gender, age, body weight. Figure 1, is example of data recorded in Microsoft Excel data sheet. Figure 1 Information The outcome of data processing is information. Figure 2 expresses the process of how data is being transformed to information. Data which is the input when being processed such as organized, examined, analyzed, summarized it gives the output as information. Information is processed data which gives explicit meaning to its readers. Based on Figure 1 data, after processed them, gives you the information of the percentage of a group of 24 youth, the number of times they eat fast food in a week as shown in Figure 3. Figure 3 show that youth in their twenties eats fast food at least once a week there are even a small number of them (4.1%) takes fast food almost every day (6 times/ week). It gives the information about the demand of fast food among youth in their twenties. Figure 3 The average age of this group also can be obtained from the data in the excel data sheet in Figure 4. Figure...

Words: 285 - Pages: 2

Free Essay

Big Data

...Lecture on Big Data Guest Speaker Simon Trang Research Member at DFG RTG 1703 and Chair of Information Management Göttingen University, Germany 2014 The City City of Göttingen • Founded in the Middle Ages • True geographical center of Germany • 130,000 residents Chair of Information Management Lecture on Big Data at Macquarie University 2 2 The University Georg-August-Universität Göttingen (founded in 1737) • • • • One of nine Excellence Universities in Germany 13 faculties, 180 institutes 26,300 students (2013) 11.6% students from abroad (new entrants: approximately 20%) • 13,000 employees (including hospital and medical school), including 420 professors • 115 programs of study from A as in Agricultural Science to Z as in Zoology are offered (73 bachelor / 22 master programs) Chair of Information Management Lecture on Big Data at Macquarie University 3 “The Göttingen Nobel Prize Wonder” Over 40 Nobel prize winners have lived, studied, and/or lived, studied or/and researched 41 Prize researched at the University of Göttingen, among them… at the University of Göttingen, among them… • • • • • • • • • • • • • • Max von Laue, Physics, 1914 Max von Laue, physics, 1914 Max Planck, physics, 1918 Max Planck, Physics, 1918 Werner Heisenberg, physics, 1932 Werner Heisenberg, Physics, 1932 Otto Hahn, chemistry 1944 Otto Hahn, Chemistry 1944 Max Born, physics, 1954 Max Born, Physics, 1954 Manfred Eigen, chemistry, 1967 Manfred Eigen, Chemistry, 1967 Erwin...

Words: 1847 - Pages: 8

Premium Essay

Data Gathering

...Four Basic Data Gathering Procedure Options Some students are not aware of the fact that they need to know some data gathering proceduretechniques when writing their research papers. Usually, they are simply concentrating on how to come with a good thesis statement, how to develop literature review or even how to cute reference materials. Let us now talk about the methods of data gathering since some research proposal examples do not even mention about this segment. There are different ways for you to conduct data gathering procedures. Usually, these ways are related to the same processes in statistics. Dissertation research methods are almost always related to data gathering so you really need to learn how to acquire your data for analysis. * Data mining – this procedure involves the search for published data from reputable sources. The process is simpler than other techniques but you need to make sure that the data is up to date. * Interviewing o this data gathering procedure involves a certain amount of time and effort investment. However, you can maximize the data that you can acquire form each respondents because you will personally acquire data from them. * Depending on your research paper topics, you can conduct surveying. If you wish to gather quick and raw data, this is the best medium for you. Prepare a set of questionnaire and then have your respondents fill them out. * Lab experiments – this type of data gathering procedure is intended if you wish...

Words: 267 - Pages: 2

Free Essay

Data Breaches

...Daniel Baxter Nico Ferragamo Han Vo Romilla Syed IT 110 8 December 2015 Data Breaches The Case In July of 2014 JPMorgan Chase, a multinational banking and financial services holding company was hacked. JPMorgan Chase is the largest bank in the United States, the sixth largest bank in the world, and the world’s third largest public company. Initial reports from JPMorgan Chase stated that the attack had only breached about one million accounts. Further details revealed that the hack breached the accounts of seventy-six million households (roughly two-thirds of the total number of households in the United States), and about seven million small businesses. While the hack began in July, it was not fully stopped until the middle of August, and it was not disclosed to the public until September. The hack is considered to be one of the most serious attacks on an American Corporation’s information systems and is one of the largest data breaches in history. JPMorgan Chase claims that the login information associated with the accounts (such as social security numbers and passwords) was not compromised, and the information that was stolen had not been involved in any fraudulent activities, however, the names, email addresses, physical addresses, and phone numbers on the accounts were taken by the hackers. The hack was believed to have been committed by a group of Russian hackers. It’s also believed to have been part of a large ring of attempted attacks on as many as nine banks and...

Words: 1557 - Pages: 7

Premium Essay

Primary Data vs Secondary Data

...Differences Between Primary Data vs Secondary Data -Submitted by Arvind Kartik SOURCES OF PRIMARY DATA Regardless of any difficulty one can face in collecting primary data; it is the most authentic and reliable data source. Following are some of the sources of primary data. Experiments Experiments require an artificial or natural setting in which to perform logical study to collect data. Experiments are more suitable for medicine, psychological studies, nutrition and for other scientific studies. In experiments the experimenter has to keep control over the influence of any extraneous variable on the results. Survey Survey is most commonly used method in social sciences, management, marketing and psychology to some extent. Surveys can be conducted in different methods. Questionnaire: It is the most commonly used method in survey. Questionnaires are a list of questions either an open-ended or close -ended for which the respondent give answers. Questionnaire can be conducted via telephone, mail, live in a public area, or in an institute, through electronic mail or through fax and other methods. Interview : It is a face-to-face conversation with the respondent. It is slow, expensive, and they take people away from their regular jobs, but they allow in-depth questioning and follow-up questions. The interviewer can not only record the statements the interviewee speaks but he can observe the body language or non-verbal communication such as face-pulling, fidgeting...

Words: 659 - Pages: 3

Free Essay

Big Data

...A New Era for Big Data COMP 440 1/12/13 Big Data Big Data is a type of new era that will help the competition of companies to capture and analyze huge volumes of data. Big data can come in many forms. For example, the data can be transactions for online stores. Online buying has been a big hit over the last few years, and people have begun to find it easier to buy their resources. When the tractions go through, the company is collecting logs of data to help the company increase their marketing production line. These logs help predict buying patterns, age of the buyer, and when to have a product go on sale. According to Martin Courtney, “there are three V;s of big data which are: high volume, high variety, high velocity and high veracity. There are other sites that use big volumes of data as well. Social networking sites such as Facebook, Twitter, and Youtube are among the few. There are many sites that you can share objects to various sources. On Facebook we can post audio, video, and photos to share amongst our friends. To get the best out of these sites, the companies are always doing some type of updating to keep users wanting to use their network to interact with their friends or community. Data is changing all the time. Developers for these companies and other software have to come up with new ways of how to support new hardware to adapt. With all the data in the world, there is a better chance to help make decision making better. More and more information...

Words: 474 - Pages: 2