Communication is critical in open source projects as most interactions occur through written communication channels. It is important to understand the various communication channels, their purposes and norms. When communicating, one must consider tone, being appropriate and sensitive to different groups. Common communication acts in open source include inquiring, paraphrasing and acknowledging. Establishing communication policies helps set ground rules and guidelines for welcoming newcomers and handling issues.
This document discusses effective communication in open source projects. It covers the importance of communication, common communication channels used in open source like emails and documentation, and tips for appropriate tone and sensitivity when communicating. Key points include:
- Communication is critical in open source as projects rely entirely on written exchanges.
- Channels have different purposes, features, and norms that should be understood.
- Tone and sensitivity are important to avoid offense, and issues like rudeness, assumptions, and casual bias should be avoided in communications.
Mona Diab: Computational Modeling of Sociopragmatic Language Use in Arabic an...Sina Institute
The document discusses computational modeling of sociopragmatic language use in Arabic and English social media. It outlines several interesting sociolinguistic phenomena that can be observed in social media texts, such as the existence of multiple viewpoints, influencers, and disputed topics. The approach involves identifying relevant language uses in the text and correlating them with linguistic constructions to gain an understanding of social constructs and relations.
Midwest km pugh conversational ai and ai for conversation 190809Katrina (Kate) Pugh
Conversational AI (chat bots) is here to stay, and it's teaching us a lot about transactions, human language patterns, and the limits of computer-human interaction. But what about AI for Conversation? Can we learn from the Conversational AI research and improve how human-to-human conversation works? Where can we use pattern recognition and predictive analytics to improve how we are present as managers, coaches, analysts, family members or diplomats?
1999-UIST-Alternative interfaces for chatMarc Smith
This document summarizes the results of a study comparing a standard chat interface to an alternative "status client" interface. The status client displayed real-time typing status and last messages of users. While users preferred the status client, the study found little difference in correction turns or total turns between the interfaces. The status client did reduce out-of-order turns in the chat history by encouraging users to wait for responses before posting new messages. More research is needed to understand the impacts of alternative chat interfaces.
SIP theory proposes that while computer-mediated communication lacks nonverbal cues, people can still develop close relationships through CMC given enough time. It posits that CMC users rely on verbal cues and self-disclosure in text to convey relational messages. Experimental evidence supports this idea, finding that relationships formed through CMC can become as intimate as those formed in person, if CMC users have an extended period of time to communicate and anticipate future interactions.
Social Information Processing (SIP) Theory suggests that online relationships require more time to develop than face-to-face relationships. Developed by Joseph Walther in 1992, SIP Theory states that people form impressions of others online through the content of messages, without nonverbal cues. While early research predicted interpersonal conflicts online, more recent research finds that information is exchanged more slowly online, reducing risks. The theory also suggests that online relationships can become as intimate as offline relationships over time due to self-selected self-presentation and idealization of partners.
Walther's Social Information Processing Theory proposes that even without nonverbal cues, users of computer-mediated communication (CMC) like email and instant messaging can develop strong relationships over time. The theory argues that CMC users rely on the content and timing of messages to understand each other and form impressions, rather than facial expressions and body language. Walther believes relationships formed exclusively through CMC can become as intimate as those developed in person, given enough anticipated future interaction between parties.
Applying Science to Conversational UX DesignRaphael Arar
Virtual agents are back, and they're everywhere! Their user interfaces tend to be simply those of instant messaging... or none at all. Thus the user experience resides more in the sequencing of bits of natural language than in that of menus or screens. Although everyone knows how to engage in human conversation, creating an app that behaves like one requires a technical knowledge of the mechanics of human conversation. While Conversational UX Design is still a nascent discipline, formal models from Conversation Analysis offer a scientific foundation for design. This session from SXSW 2017 provided design principles and models for creating conversational UX.
This document discusses effective communication in open source projects. It covers the importance of communication, common communication channels used in open source like emails and documentation, and tips for appropriate tone and sensitivity when communicating. Key points include:
- Communication is critical in open source as projects rely entirely on written exchanges.
- Channels have different purposes, features, and norms that should be understood.
- Tone and sensitivity are important to avoid offense, and issues like rudeness, assumptions, and casual bias should be avoided in communications.
Mona Diab: Computational Modeling of Sociopragmatic Language Use in Arabic an...Sina Institute
The document discusses computational modeling of sociopragmatic language use in Arabic and English social media. It outlines several interesting sociolinguistic phenomena that can be observed in social media texts, such as the existence of multiple viewpoints, influencers, and disputed topics. The approach involves identifying relevant language uses in the text and correlating them with linguistic constructions to gain an understanding of social constructs and relations.
Midwest km pugh conversational ai and ai for conversation 190809Katrina (Kate) Pugh
Conversational AI (chat bots) is here to stay, and it's teaching us a lot about transactions, human language patterns, and the limits of computer-human interaction. But what about AI for Conversation? Can we learn from the Conversational AI research and improve how human-to-human conversation works? Where can we use pattern recognition and predictive analytics to improve how we are present as managers, coaches, analysts, family members or diplomats?
1999-UIST-Alternative interfaces for chatMarc Smith
This document summarizes the results of a study comparing a standard chat interface to an alternative "status client" interface. The status client displayed real-time typing status and last messages of users. While users preferred the status client, the study found little difference in correction turns or total turns between the interfaces. The status client did reduce out-of-order turns in the chat history by encouraging users to wait for responses before posting new messages. More research is needed to understand the impacts of alternative chat interfaces.
SIP theory proposes that while computer-mediated communication lacks nonverbal cues, people can still develop close relationships through CMC given enough time. It posits that CMC users rely on verbal cues and self-disclosure in text to convey relational messages. Experimental evidence supports this idea, finding that relationships formed through CMC can become as intimate as those formed in person, if CMC users have an extended period of time to communicate and anticipate future interactions.
Social Information Processing (SIP) Theory suggests that online relationships require more time to develop than face-to-face relationships. Developed by Joseph Walther in 1992, SIP Theory states that people form impressions of others online through the content of messages, without nonverbal cues. While early research predicted interpersonal conflicts online, more recent research finds that information is exchanged more slowly online, reducing risks. The theory also suggests that online relationships can become as intimate as offline relationships over time due to self-selected self-presentation and idealization of partners.
Walther's Social Information Processing Theory proposes that even without nonverbal cues, users of computer-mediated communication (CMC) like email and instant messaging can develop strong relationships over time. The theory argues that CMC users rely on the content and timing of messages to understand each other and form impressions, rather than facial expressions and body language. Walther believes relationships formed exclusively through CMC can become as intimate as those developed in person, given enough anticipated future interaction between parties.
Applying Science to Conversational UX DesignRaphael Arar
Virtual agents are back, and they're everywhere! Their user interfaces tend to be simply those of instant messaging... or none at all. Thus the user experience resides more in the sequencing of bits of natural language than in that of menus or screens. Although everyone knows how to engage in human conversation, creating an app that behaves like one requires a technical knowledge of the mechanics of human conversation. While Conversational UX Design is still a nascent discipline, formal models from Conversation Analysis offer a scientific foundation for design. This session from SXSW 2017 provided design principles and models for creating conversational UX.
This document discusses reasons for conflict in communities and strategies for resolving conflicts. It notes that clashes of personalities, disenfranchisement, and disruptive individuals can all lead to conflict. Specific examples are provided of conflicts that arose in two open source projects due to misunderstandings, disagreements over policies, and perceived undermining of leadership. The document emphasizes the importance of understanding the root causes of conflicts, countering antagonism with evidence rather than labeling people, and focusing on unblocking projects rather than lingering disagreements if a conflict has escalated. Successful resolution requires participant-driven processes, principled negotiation, and restorative justice.
Las poleas se fabrican en diferentes diámetros estándar para adaptarse a diversas aplicaciones. Los diámetros más comunes son de 2, 3, 4, 5, 6, 8, 10 y 12 pulgadas. El material más usado para fabricar poleas es el acero, aunque también se usa el aluminio, plástico y madera.
This document provides an overview of free and open source software (FOSS). It discusses the history and definitions of free and open source, how FOSS licensing works, and three common FOSS licenses: the GNU General Public License v2, Modified BSD License, and Mozilla Public License v2. The document traces the origins of FOSS to the 1970s and the work of Richard Stallman and the Free Software Foundation in the 1980s. It also discusses the founding of the Open Source Initiative in the late 1990s and key differences between free and open source perspectives.
This document discusses leadership in open source software projects. It begins by defining leadership as demonstrating responsibility for ensuring work gets done, rather than attaining formal roles. Good leadership involves growing a project's social capital. The document then examines leadership attributes like fairness and listening skills. It also discusses leadership styles, mentoring, and communications. Mentoring is presented as an important part of leadership, helping others develop skills through experiences. The key to leadership communications is acts like summarizing, acknowledging, and unblocking others' work.
Communities form for social and practical reasons. They allow people to feel a sense of belonging and to build social capital by sharing ideas, skills, and collaborating on goals. Communities can be interest-based, practice-based, or circumstance-based. Successful communities often contain subgroups that focus on specific interests, practices, or circumstances. Diversity within communities is important, both in surface characteristics and deep skills/personalities. Open source projects function best as interest-based communities that encourage diverse participation.
Leveling the playing field for open source in education and public sectorosswatch
This document discusses leveling the playing field between open source and proprietary software in education and public sector institutions in the UK. It notes that over 90% of higher education institutions and 75% of further education institutions have policies that consider open source software as an option for procurement. However, open source is only equally considered alongside closed source options 25% of the time. The document provides resources for informing, suggesting, challenging, and contributing to the discussion around open source adoption policies.
Creating a level playing field for open source software options in IT selecti...osswatch
This document discusses creating a level playing field for open source software in IT selection and procurement. It begins by defining free and open source software, noting open source refers to licensing while open development promotes community engagement. The benefits of open source include lower total cost of ownership, risk management through sustainability, and meeting user needs. Case studies show cost savings from migrations to open source. The document then discusses policy approaches like being agnostic, giving equal consideration, or preferential treatment to open source. It outlines processes for selection and procurement, including deep engagement, paid discovery stages, unbundling solutions, and evaluating sustainability. The goal is an effective procurement process that delivers sustained value and meets user needs.
This document discusses different models of project governance for open source software projects. It describes governance as establishing roles and processes for decision making. Key governance models discussed include the benevolent dictatorship model, where a single leader has final say, and the meritocratic model, where leadership roles are earned based on contributions and respect. The document also contrasts more closed, hierarchical models like the Cathedral approach with more open, participatory models like the Bazaar. Ubuntu is presented as striving to balance control and open contribution. Effective communication of a project's governance model is important for managing contributor expectations.
This document contains a leadership style survey to help assess a leader's dominant leadership style. It describes three main leadership styles: authoritative, participative, and delegative. For each statement, respondents rate their agreement on a 5-point scale. Their scores are then totaled in each of the three columns to identify their strongest style. The document provides descriptions of each style and when they are most appropriate to use. It aims to help leaders understand their natural tendencies and when different styles may be warranted.
This document provides guidelines for writing an inquiry-based argumentative paper. Students are asked to choose a topic within a community of practice and argue a stance on that topic. They must consider the discourse practices and values of both their own community and their target audience. The paper should have a clear thesis, contribute new insights, use sources effectively, and negotiate any tensions between conflicting discourse practices. Three drafts are required to be submitted by certain deadlines. The final paper must be 5-7 pages long using MLA or IEEE citation style and incorporating at least 5 sources, 3 of which must be peer-reviewed.
This document provides instructions for an essay assignment on discourse communities. Students are asked to identify the discourse communities they belong to, and analyze how these communities use language and share knowledge. They should also discuss whether they had to change their language to participate, and if the communities produce written documents. The document outlines expectations for formatting, citations, references, and participation in weekly discussion questions.
This document provides links and descriptions for purchasing assistance with various homework assignments and courses in subjects like English, communication, and healthcare. It offers immediate access to completed assignments, exams, and homework solutions without registration. The pages provide pricing and descriptions for assignments on topics ranging from goal setting and data presentation to literary analysis and nursing skills.
This document provides links and descriptions for purchasing assistance with various homework assignments and courses in subjects like English, communication, and healthcare. It offers immediate access to completed homework, exams, essays, and other works. Users can obtain help with goals for improving communication skills, data analysis presentations, and other academic tasks.
This document provides guidelines for proper online behavior, or "netiquette", for online class discussions. It outlines best practices for expressing emotions without offending others, using proper spelling, punctuation and formatting in posts, being respectful and on-topic in discussions, and strategies for effective problem solving and decision making as a group. Following netiquette guidelines promotes a supportive learning environment and avoids hurt feelings or arguments that hinder the learning process.
The document discusses technical writing for consultants, covering topics such as composing, revising, creating effective sentences, and appropriate word choice. It provides principles for composing documents, including assessing the situation and reader, establishing focus, and drafting and revising. Specific tips are given for developing effective sentences, choosing precise wording, and applying these skills to proposals, technical studies, and correspondence. Mastering these composition and language skills can help consultants increase persuasiveness, approval rates, and client satisfaction.
Training and DevelopmentFinal ProjectNow its your turn! Below.docxTakishaPeck109
Training and Development
Final Project
Now it's your turn! Below is all the information given on a training program needed, called Effective Communication. You are a trainer in the given situation. Submit all of the following:
1.
Training Needs Assessment (refer to previous assignment DST Systems for assessment template)
2.
Written Paper
3.
Powerpoint Presentation
Instructions for Paper
·
Write at least 500 words (approximately 2 pages) using Microsoft Word in APA style, see example below.
·
Use font size 12 and 1” margins.
·
Include cover page and reference page.
·
At least 80% of your paper must be original content/writing.
·
No more than 20% of your content/information may come from references.
·
Use at least three references from outside the course material, one reference must be from EBSCOhost. Text book, lectures, and other materials in the course may be used, but are not counted toward the three reference requirement.
·
Cite all reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) in the paper and list on a reference page in APA style.
References must come from sources such as, scholarly journals found in EBSCOhost, CNN, online newspapers such as, The Wall Street Journal, government websites, etc. Sources such as, Wikis, Yahoo Answers, eHow, blogs, etc. are not acceptable for academic writing.
Instructions for PowerPoint Presentation
Create a PowerPoint presentation and record yourself presenting the response to the assignment. The presentations should be a minimum of six minutes in length and include at least 10 slides.
The requirements below must be met for your presentation to be accepted and graded:
·
Design and format each slide for a presentation, see example below.
·
Include a cover slide and reference slide (these slides do not count toward the 10 slide requirement).
·
Use at least three references from outside the course material, preferably from EBSCOhost. Text book, lectures, and other materials in the course may be used, but are not counted toward the three reference requirement.
·
Identify sources on slides that contain reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) and list them on a reference slide.
References must come from sources such as, scholarly journals found in EBSCOhost or on Google Scholar, government websites and publications, reputable news media (e.g. CNN, The Wall Street Journal, New York Times) websites and publications, etc. Sources such as, Wikis, Yahoo Answers, eHow, blogs, etc. are not acceptable for academic writing.
A detailed explanation of how to cite a source using APA can be found here (
link
).
Download a PowerPoint example
here
Situation:
Tim Smith the IT manager comes to you and says "My project coordinators are in a slump; they just are not producing their usual caliber of work. I need to find out what the problem is. No one on the project team knows what is going on. The c.
Do the words 'open source' scare you (or your boss)? Do you want to contibute but don't know how? Did an angry person reply to your email scolding you for top-posting? This talk is for you! It will cover various real world relevant aspects of open source communites and projects, as well as put to rest various bits of FUD (fear, uncertainty, and doubt) that vendors may throw around. It'll cover best practices for interaction and contributing to open source projects and their communities (specific to archival, and also a more general foundation) on issue trackers, mailing lists, etc., with confidence, so that everyone can benefit.
The document provides information about a technical communication class. It summarizes key points from several chapters:
1) It analyzes the intended audience for a set of questions - ranging from ages 17-60s, with an intermediate level of expertise and at least an 11th grade education.
2) It discusses important concepts like rhetoric, constructive conflict, and selecting appropriate software programs for technical documents.
3) It provides examples of capabilities of word processing software and considerations for communicating effectively online through social media and varying audiences/cultures.
This document discusses reasons for conflict in communities and strategies for resolving conflicts. It notes that clashes of personalities, disenfranchisement, and disruptive individuals can all lead to conflict. Specific examples are provided of conflicts that arose in two open source projects due to misunderstandings, disagreements over policies, and perceived undermining of leadership. The document emphasizes the importance of understanding the root causes of conflicts, countering antagonism with evidence rather than labeling people, and focusing on unblocking projects rather than lingering disagreements if a conflict has escalated. Successful resolution requires participant-driven processes, principled negotiation, and restorative justice.
Las poleas se fabrican en diferentes diámetros estándar para adaptarse a diversas aplicaciones. Los diámetros más comunes son de 2, 3, 4, 5, 6, 8, 10 y 12 pulgadas. El material más usado para fabricar poleas es el acero, aunque también se usa el aluminio, plástico y madera.
This document provides an overview of free and open source software (FOSS). It discusses the history and definitions of free and open source, how FOSS licensing works, and three common FOSS licenses: the GNU General Public License v2, Modified BSD License, and Mozilla Public License v2. The document traces the origins of FOSS to the 1970s and the work of Richard Stallman and the Free Software Foundation in the 1980s. It also discusses the founding of the Open Source Initiative in the late 1990s and key differences between free and open source perspectives.
This document discusses leadership in open source software projects. It begins by defining leadership as demonstrating responsibility for ensuring work gets done, rather than attaining formal roles. Good leadership involves growing a project's social capital. The document then examines leadership attributes like fairness and listening skills. It also discusses leadership styles, mentoring, and communications. Mentoring is presented as an important part of leadership, helping others develop skills through experiences. The key to leadership communications is acts like summarizing, acknowledging, and unblocking others' work.
Communities form for social and practical reasons. They allow people to feel a sense of belonging and to build social capital by sharing ideas, skills, and collaborating on goals. Communities can be interest-based, practice-based, or circumstance-based. Successful communities often contain subgroups that focus on specific interests, practices, or circumstances. Diversity within communities is important, both in surface characteristics and deep skills/personalities. Open source projects function best as interest-based communities that encourage diverse participation.
Leveling the playing field for open source in education and public sectorosswatch
This document discusses leveling the playing field between open source and proprietary software in education and public sector institutions in the UK. It notes that over 90% of higher education institutions and 75% of further education institutions have policies that consider open source software as an option for procurement. However, open source is only equally considered alongside closed source options 25% of the time. The document provides resources for informing, suggesting, challenging, and contributing to the discussion around open source adoption policies.
Creating a level playing field for open source software options in IT selecti...osswatch
This document discusses creating a level playing field for open source software in IT selection and procurement. It begins by defining free and open source software, noting open source refers to licensing while open development promotes community engagement. The benefits of open source include lower total cost of ownership, risk management through sustainability, and meeting user needs. Case studies show cost savings from migrations to open source. The document then discusses policy approaches like being agnostic, giving equal consideration, or preferential treatment to open source. It outlines processes for selection and procurement, including deep engagement, paid discovery stages, unbundling solutions, and evaluating sustainability. The goal is an effective procurement process that delivers sustained value and meets user needs.
This document discusses different models of project governance for open source software projects. It describes governance as establishing roles and processes for decision making. Key governance models discussed include the benevolent dictatorship model, where a single leader has final say, and the meritocratic model, where leadership roles are earned based on contributions and respect. The document also contrasts more closed, hierarchical models like the Cathedral approach with more open, participatory models like the Bazaar. Ubuntu is presented as striving to balance control and open contribution. Effective communication of a project's governance model is important for managing contributor expectations.
This document contains a leadership style survey to help assess a leader's dominant leadership style. It describes three main leadership styles: authoritative, participative, and delegative. For each statement, respondents rate their agreement on a 5-point scale. Their scores are then totaled in each of the three columns to identify their strongest style. The document provides descriptions of each style and when they are most appropriate to use. It aims to help leaders understand their natural tendencies and when different styles may be warranted.
This document provides guidelines for writing an inquiry-based argumentative paper. Students are asked to choose a topic within a community of practice and argue a stance on that topic. They must consider the discourse practices and values of both their own community and their target audience. The paper should have a clear thesis, contribute new insights, use sources effectively, and negotiate any tensions between conflicting discourse practices. Three drafts are required to be submitted by certain deadlines. The final paper must be 5-7 pages long using MLA or IEEE citation style and incorporating at least 5 sources, 3 of which must be peer-reviewed.
This document provides instructions for an essay assignment on discourse communities. Students are asked to identify the discourse communities they belong to, and analyze how these communities use language and share knowledge. They should also discuss whether they had to change their language to participate, and if the communities produce written documents. The document outlines expectations for formatting, citations, references, and participation in weekly discussion questions.
This document provides links and descriptions for purchasing assistance with various homework assignments and courses in subjects like English, communication, and healthcare. It offers immediate access to completed assignments, exams, and homework solutions without registration. The pages provide pricing and descriptions for assignments on topics ranging from goal setting and data presentation to literary analysis and nursing skills.
This document provides links and descriptions for purchasing assistance with various homework assignments and courses in subjects like English, communication, and healthcare. It offers immediate access to completed homework, exams, essays, and other works. Users can obtain help with goals for improving communication skills, data analysis presentations, and other academic tasks.
This document provides guidelines for proper online behavior, or "netiquette", for online class discussions. It outlines best practices for expressing emotions without offending others, using proper spelling, punctuation and formatting in posts, being respectful and on-topic in discussions, and strategies for effective problem solving and decision making as a group. Following netiquette guidelines promotes a supportive learning environment and avoids hurt feelings or arguments that hinder the learning process.
The document discusses technical writing for consultants, covering topics such as composing, revising, creating effective sentences, and appropriate word choice. It provides principles for composing documents, including assessing the situation and reader, establishing focus, and drafting and revising. Specific tips are given for developing effective sentences, choosing precise wording, and applying these skills to proposals, technical studies, and correspondence. Mastering these composition and language skills can help consultants increase persuasiveness, approval rates, and client satisfaction.
Training and DevelopmentFinal ProjectNow its your turn! Below.docxTakishaPeck109
Training and Development
Final Project
Now it's your turn! Below is all the information given on a training program needed, called Effective Communication. You are a trainer in the given situation. Submit all of the following:
1.
Training Needs Assessment (refer to previous assignment DST Systems for assessment template)
2.
Written Paper
3.
Powerpoint Presentation
Instructions for Paper
·
Write at least 500 words (approximately 2 pages) using Microsoft Word in APA style, see example below.
·
Use font size 12 and 1” margins.
·
Include cover page and reference page.
·
At least 80% of your paper must be original content/writing.
·
No more than 20% of your content/information may come from references.
·
Use at least three references from outside the course material, one reference must be from EBSCOhost. Text book, lectures, and other materials in the course may be used, but are not counted toward the three reference requirement.
·
Cite all reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) in the paper and list on a reference page in APA style.
References must come from sources such as, scholarly journals found in EBSCOhost, CNN, online newspapers such as, The Wall Street Journal, government websites, etc. Sources such as, Wikis, Yahoo Answers, eHow, blogs, etc. are not acceptable for academic writing.
Instructions for PowerPoint Presentation
Create a PowerPoint presentation and record yourself presenting the response to the assignment. The presentations should be a minimum of six minutes in length and include at least 10 slides.
The requirements below must be met for your presentation to be accepted and graded:
·
Design and format each slide for a presentation, see example below.
·
Include a cover slide and reference slide (these slides do not count toward the 10 slide requirement).
·
Use at least three references from outside the course material, preferably from EBSCOhost. Text book, lectures, and other materials in the course may be used, but are not counted toward the three reference requirement.
·
Identify sources on slides that contain reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) and list them on a reference slide.
References must come from sources such as, scholarly journals found in EBSCOhost or on Google Scholar, government websites and publications, reputable news media (e.g. CNN, The Wall Street Journal, New York Times) websites and publications, etc. Sources such as, Wikis, Yahoo Answers, eHow, blogs, etc. are not acceptable for academic writing.
A detailed explanation of how to cite a source using APA can be found here (
link
).
Download a PowerPoint example
here
Situation:
Tim Smith the IT manager comes to you and says "My project coordinators are in a slump; they just are not producing their usual caliber of work. I need to find out what the problem is. No one on the project team knows what is going on. The c.
Do the words 'open source' scare you (or your boss)? Do you want to contibute but don't know how? Did an angry person reply to your email scolding you for top-posting? This talk is for you! It will cover various real world relevant aspects of open source communites and projects, as well as put to rest various bits of FUD (fear, uncertainty, and doubt) that vendors may throw around. It'll cover best practices for interaction and contributing to open source projects and their communities (specific to archival, and also a more general foundation) on issue trackers, mailing lists, etc., with confidence, so that everyone can benefit.
The document provides information about a technical communication class. It summarizes key points from several chapters:
1) It analyzes the intended audience for a set of questions - ranging from ages 17-60s, with an intermediate level of expertise and at least an 11th grade education.
2) It discusses important concepts like rhetoric, constructive conflict, and selecting appropriate software programs for technical documents.
3) It provides examples of capabilities of word processing software and considerations for communicating effectively online through social media and varying audiences/cultures.
This document discusses key concepts related to how meaning is constructed through codes and conventions in media works. It begins by explaining that all media uses codes and conventions to communicate, though these are often invisible to audiences who have become accustomed to them. It then discusses how codes only work when shared by a culture and how cultural knowledge provides deeper understanding beyond just word meanings. The document also distinguishes between denotation, or literal meaning, and connotation, the implied cultural associations. It notes connotations can vary between cultures. Finally, it outlines three types of audience readings: preferred, negotiated, and oppositional, noting the latter two may relate more to audience social conditions than just the text structure.
Lessons from the Astropy Code of ConductKelle Cruz
Talk given on Oct 15, 2019 at the Inclusive Astronomy 2 conference held in at STScI in Baltimore, MD. Video is here: https://cloudproject.hosted.panopto.com/Panopto/Pages/Viewer.aspx?id=5bf2ea68-b046-4c13-9a4a-aaea00dae5f8
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. DOI:10.5281/zenodo.3515334.
The document provides guidelines for using social media and participating in an online academic network. It discusses key aspects like digital identity, netiquette, ethics, and using blogs, forums and other features. Guidelines include using your real name, writing respectfully, providing attribution for others' work, customizing blogs, managing comments, using tags and categories, and formatting documents with titles and licenses. The overall message is to engage collaboratively and share expertise while maintaining professionalism online.
A community manager serves as an advocate for an open source project, helping to promote and grow the community. Their responsibilities include maintaining communication channels, organizing events, motivating contributions, and addressing any issues that arise. While a valuable role, a community manager may face initial resistance from those who question the need for the position or are skeptical of an outsider. Transparency, working to involve others, and acknowledging limitations can help overcome challenges.
COM 295 Effective Communication/tutorialrank.comjonhson270
For more course tutorials visit
www.tutorialrank.com
Refer to the “Evaluating Data Quality” practice activity.
Imagine that you are a marketing specialist at a media company. Over the past few years, you have been researching how TV viewers use mobile phones and other devices while watching TV. You want to find out as much as you can about what other researchers, experts, and commentators
Argumentative Research EssayAssignment DescriptionIn upper lev.docxjewisonantone
Argumentative Research EssayAssignment Description
In upper level courses, you will often be asked to demonstrate your ability to converse with other scholars in your field. Your job is to make a claim about a debatable topic and to persuade the reader to accept your claim. Your paper must be written so that it is convincing even for a skeptical audience. In other words, be fair and unbiased when acknowledging what others say about your topic, but then prove why they are wrong using logical reasons and credible evidence. In this essay, you must synthesize various sources while persuading the reader to accept your viewpoint. You do not want to simply report what others are saying, but engage in a dialogue with them.
Your research paper MUST include the following:
· A clearly stated thesis in the introduction that articulates your position and what you want to argue in your paper
· Clear reasons with supporting evidence
· A synthesis of sources; do not simply summarize your source material, but show how they are connected and respond to them
· A fully-developed counterargument / opposing viewpoint with a fully-developed refutation. A fully-developed counterargument requires more than one sentence.
· A minimum of three credible and relevant sources
· A minimum of three pages in MLA format, not including the MLA Works Cited
· A Works Cited page in MLA format with corresponding in-text citations
Purpose and Learning Objectives
The purpose of this assignment is to practice persuasive writing and synthesis of sources. You will increase your critical thinking skills by analyzing yours and others’ assumptions, evaluating multiple perspectives, and developing a clear position. Writing, research, and eloquent written expression are vital for a successful future. You will express all of these skills in this assignment. This essay will be used as the English department assessment for the Texas Higher Education Coordinating Board’s mandated core curriculum assessment of Student Learning Outcomes (SLO). This essay will address the SLO objectives of critical thinking and written communication.
Your research paper should demonstrate the following learning objectives:
· Awareness of the audience to whom you are speaking
· Awareness of the purpose of your argument
· Ability to enter into a scholarly conversation
· Ability to write a qualified and narrow argumentative thesis statement
· Ability to synthesize information from various sources
· Ability to craft an argument with different types of relevant, credible, and detailed support
· Ability to research and identify academic sources
· Ability to summarize, paraphrase, and quote while citing correctly in MLA to avoid plagiarism
· Ability to converse in standard, academic English
Minimum Requirements
Length: Minimum three (3) pages not including the Works Cited page. Style: Essay needs to conform to MLA standards, including double spacing in Times New Roman font, and must include a Works Cited page .
Description Total Possible Score 6.00General ContentSubje.docxtheodorelove43763
Description:
Total Possible Score: 6.00
General Content/Subject Knowledge
Total: 2.10
Distinguished - Addresses all aspects of the prompt in accordance with the parameters of the discussion and demonstrates in-depth knowledge of the discussion topic.
Proficient - Addresses all aspects of the prompt in accordance with the parameters of the discussion and demonstrates knowledge of the discussion topic.
Basic - Addresses all aspects of the prompt in accordance with the parameters of the discussion and demonstrates basic knowledge of the discussion topic.
Below Expectations - Addresses all or most aspects of the prompt in accordance with the parameters of the discussion and demonstrates limited knowledge of the discussion topic.
Non-Performance - There is no initial discussion post, or the post does not address the discussion prompt at all.
Critical Thinking
Total: 1.50
Distinguished - Comprehensively explores the ideas, thoughts, and elements of the topic and provides relevant evidence and information that demonstrates all of the following as applicable to the discussion prompt: clarity, relevance, depth, breadth, use of information resources, and logic.
Proficient - Explores the ideas, thoughts, and elements of the topic and provides relevant evidence and information that demonstrates most of the following as applicable to the discussion prompt: clarity, relevance, depth, breadth, use of information resources, and logic.
Basic - Explores the ideas, thoughts, and elements of the topic and provides relevant evidence and information that demonstrates some of the following as applicable to the discussion prompt: clarity, relevance, depth, breadth, and use of information, and logic.
Below Expectations - Attempts to explore the ideas, thoughts, and elements of the topic and provide relevant evidence and information, but demonstrates few of the following as applicable to the discussion prompt: clarity, relevance, depth, breadth, use of information resources, and logic.
Non-Performance - There is no attempt to explore the ideas, thoughts, and elements of the topic and provide relevant evidence and information in either the original post or subsequent response posts within the discussion, or no post is present.
Written Communication
Total: 0.60
Distinguished - Displays clear control of syntax and mechanics. The organization of the work shows appropriate transitions and flow between sentences and paragraphs. Written work contains no errors and is very easy to understand.
Proficient - Displays control of syntax and mechanics. The organization of the work shows transitions and/or flow between sentences and paragraphs. Written work contains only a few errors and is mostly easy to understand.
Basic - Displays basic control of syntax and mechanics. The work is not organized with appropriate transitions and flow between sentences and paragraphs. Written work contains several errors, making it difficult to fully understand.
Below Expectations - Displays li.
Order #155610887 (status writer assigned) no title. just follow tssuser562afc1
The document provides instructions for a 5-page memorandum addressing the mayor of Rawson on a policy issue. It includes 5 files attached with guidelines and source materials. The memorandum is due October 2nd at 4:00 PM and must be in APA format, double spaced, with 1375 words and use a minimum of 7 sources. It should follow the instructions and guidelines provided in the attached files to write the memorandum as a policy brief for the mayor.
The document provides an overview of the evolution of computer-mediated communication over the past 20 years. It discusses how home computers have become vastly more powerful and how most people now engage in computer-mediated communication daily. It also outlines some key properties of electronic texts, such as plasticity, links, tagging, searches, templates, and footprints. The document examines different types of computer-mediated communication that have emerged, such as emails, web pages, online discussions, and provides questions to analyze how these examples make use of the identified electronic text properties.
Similar to TYPO3 Communications Workshop: Communications (20)
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
2. What I’ll be covering in this session
1.
2.
3.
4.
5.
Introduction
Communication channels
Tone, appropriateness and sensitivity
Communication acts
Communication policies and interventions
3. 1. Why is communication so critical
in OSS?
Consider this: the only thing
anyone knows about you on the
Internet comes from what you
write, or what others write about
you.
- Karl Fogel
4. An Open Source project
consists almost entirely
of a set of speech acts
conducted using the
medium of written
communication.
Written communication
must therefore be a
core competence for
anyone involved in a
project.
emails
forum posts
bug reports
chat bubbles
blog posts
screencasts
documentation
code comments
commit messages
5. Communication
• Theory in communications, particularly in
business, tends to focus on transmission,
encoding and feedback.
• Another way of understanding communication is
to look at it as how we construct shared
meaning (constructivism)
• When discussing communication we consider
both the medium (channel) and the message
(content)
7. Purpose
• Communication channels can be primarily
intended to be used for a particular purpose or
purposes
• Purpose can be communicated explicitly (e.g.
communication policies) or implicitly (e.g. follow
the tone and topic of prior conversations)
Mark Anderson: The Leadership Book
8. Inbound, Outbound
• Some communications channels are primarily
outbound, such as press releases and videos
• Some channels are primarily inbound, such as
feedback surveys
• Some are both, but primarily either inbound or
outbound
• Some are completely two-way, e.g. mailing lists
9. Private or public?
• Open Source community channels tend to be
public rather than private.
– There are often some private channels, for example
for handling security vulnerabilities.
• A common source of conflict in communities is
where it is unclear if a channel is public or
private
– Make sure policies are clearly understood
10. Affordances
Channels differ in affordance - that is, what they
support and encourage in their users
Differences in affordance occur in areas such as
time, richness, depth vs. brevity, and conveying
emotion
11. Norms and Conventions
• Channels often have norms. You often don’t
notice it until someone breaks them
– The multi-tweet
– The tl;dr email essay
• Norms can be established by convention or be
encoded into policies and rules
• Channels can also have more specific
conventions adopted by the community
12. The Conventions of Email
Reply styles
– Top Post
– Bottom Post
– Inline Reply/Interleaving
To trim or not to trim?
Attribution
Referencing and linking
– direct links
– numbered reference list
Some of the common
conventions for email
in open source
projects originated in
Usenet and other
channels that new
users will never
have experienced
13. Personal Preferences
To what extent is choice of channel subject to
personal preference?
Some users prefer forums to mailing lists, and
vice versa
– There seem to be some demographic differences
(by age and gender) and role differences
(developers vs. users)
15. The Meta Channel
• The way in which a project
communicates - both with itself
and the wider world - is critical to
its function.
• Sometimes its necessary to spend
effort discussing and improving
communications, although a risk is
that this "meta" communication
can be a distraction.
• In some cases there is a place for
this kind of discussion, in others it
interrupts the flow
16. Gardeners and Gatekeepers
• Gatekeepers are responsible for keeping
unwanted communications out of the channel,
e.g. managing subscriptions
• Gardeners are responsible for keeping the
channel content tidy, e.g. removing spam
17. Pulse
How do you know how a channel is being used?
-
Google analytics
Built-in monitoring tools
Google Webmaster Tools
Social metrics
19. 3. Tone, appropriateness and
sensitivity
We often
contradict an
opinion for no
other reason
than that we do
not like the
tone in which it
is expressed.
20. A simple rule
Don’t click “send” or “publish” if you have
any doubts about how the content will be
perceived.
Save a draft, or leave it on screen and walk away and do
something else for a while.
Very few online communications have to be done
immediately, and most will benefit from a few extra
minutes reflection.
Once you post something, its pretty likely to be
impossible to retract
21. Terseness
Terseness is a natural habit when
communicating often.
Not to be confused with brevity, which is usually
a desirable quality
Terse content can be interpreted as coldness or
lack of emotion
Most regular members of a community are
probably used to terseness, but be prepared to be
more verbose with newcomers
22. Adding context for newcomers
The elements that you tend to leave out of
communications are contextual information that is
shared in your community. However, for newcomers its
useful to put it back in.
Salutations “hi new-user-x”
Introductions “I manage this component”
Background “This is used for xyz”
Sign off “good luck and I hope this explanation helps”
Links and references
if you’re going for a RTFM-style reply, you should at least have the grace to
provide the link
23. Rudeness
• Recognising rudeness:
–
–
–
–
Ad hominem comments and insults
Deliberate ignorance “I didn’t read your post, but I think…”
Intentionally condescending comments
But criticism isn’t inherently rude, and directness should be
valued. However, consider using a “criticism sandwich”
• Dealing with rudeness:
– Interventions need to be timely, and douse the flames rather
than feed them. Be boring and repetitive if necessary.
– Don’t demand apologies
24. An example
“First, let's please cut down on the (potentially) ad hominem comments; for
example, calling J's design for the security layer "naive and ignorant of the basic
principles of computer security." That may be true or it may not, but in either
case it's no way to have the discussion. J made his proposal in good faith. If it
has deficiencies, point them out, and we'll fix them or get a new design. I'm sure
M meant no personal insult to J, but the phrasing was unfortunate, and we try to
keep things constructive around here.
Now, on to the proposal. I think M was right in saying that…”
- From Fogel, K. Producing Open Source Software
25. Creating a “criticism sandwich”
Start with the positive:
“Thanks for the patch, this is addressing a really useful
use case”
Go onto the negative:
“However, I noticed the code in the patch doesn’t
follow the project style guidelines, particularly around
comments. You need to correct this and resubmit the
patch.
Finish on a positive:
“Overall this is a great addition to the project, and I look
forward to receiving the resubmitted patch so I can
apply it to include in the next release”
26. Right message, wrong channel
Some of the worst examples of
miscommunication in open source fall into this
category
– The legal debate on the developer list.
– The build process debate on the board list.
– The personal-qualities-of-committer-x on the public
list…
– The policy debate via twitter
– The “scottmail”
– Any more?
27. Humour and sarcasm
Humor can be very culturally-specific and is a common
source of miscommunication.
Sarcasm is also quite difficult to convey online and is
easily misinterpreted.
Sticking an emoticon on the end of a sentence really
helps :)
Studies have shown people routinely overestimate
their ability to convey sarcasm (Kruger et al 2005)
31. Referring to groups
“As a general rule, it is good to remember that you
should only refer to a person by category when it
is relevant or necessary to the discussion at hand.
That is, you should ordinarily view people as
individuals and not mention their racial, ethnic, or
other status, unless it is important to your larger
purpose in communicating.”
American Heritage Book of English Usage
32. Avoiding Casual Sexism
• Avoid generic gender-specific pronouns in English
– Use roles and nouns instead when describing hypothetical
scenarios, e.g. “the user”
– Switch from first to second or third-person
– Switch from singular pronoun to article “his issue -> an issue”
(or the “singular they”)
– See also Klein (1993)
• Avoid stereotyping
– There is usually no need to explain or amplify a role based on
gender, e.g. “ a female developer”
• Be especially careful in policy documents and
communications that set the norms and conventions
34. Professions and Skills
The advice on groups applies equally well to professions
as to ethnicities and genders
Professional stereotyping
– “Even a tyre-fitter can use this”
– “Only a librarian would care about adding keywords”
Professional respect
– “Anyone can write documentation”
– “Developers have no social skills”
Playing up to a role
–“Speaking as an experienced developer, your code sucks”
–“I’m a manager and I wouldn’t put up with…”
35. Accessibility and Usability
Accessibility and usability often go together; if you
make the effort to make your content and
communications more accessible, you usually
help everyone.
For example if you use an image to communicate, provide text that
describes it - this is not only useful for users with visual
impairment, it makes your content more easily discovered,
summarized and reused.
37. Communicating Identity and
Presence
A common type of paraverbal communication is
how we communicate our presence online, or our
presentity
DeathDealer666
Perl Hacker and Evil Wizard
Member: peoplewhohatecheese
38. Presentities: risks and rules
• Presentities can convey the wrong message
regardless of what you actually say
• Presentities do not usually map onto real
identifies
• Presentities also have their own norms and
unwritten rules, and can also be subject to
policy
– For example, is it a community of individuals or
representatives of organisations?
40. Speech Acts
Speech acts are a way of categorising the content
of conversations
Inquiring
Paraphrasing
Acknowledging
Advocating
Summation
Decision
Unblocking
Reframing
Individual Follow Up
41. Unproductive Threads?
• Arguments that have been made already start being repeated,
as though the poster thinks no one heard them the first time.
• Increasing levels of hyperbole and involvement as the stakes
get smaller and smaller.
• A majority of comments coming from people who do little or
nothing, while the people who tend to get things done are silent.
• Many ideas discussed without clear proposals ever being made.
Karl Fogel, Producing OSS
43. Discussion Points
Which are the common speech acts in your
project community?
Which speech acts do you think are missing or
you’d like to see more of?
46. Welcoming newcomers
• Newcomers to a community can be easily put
off by the tone of responses.
– This is usually unintentional on the part of existing
community members (its hard not to be abrupt when
closing yet another duplicate bug report)
• Communities have come up with a number of
strategies for dealing with this issue
49. Greeters
• A "greeter" is someone who takes a role of responding
to newcomers to a community
• A greeter can also "reset" the tone of a conversation
early on if the inbound message could come across as
abrupt or aggressive.
• In most projects this is informally something done by
one of the community members (and doesn't even
have a particular name or role associated with it). In
some cases the community manager also performs the
"greeter" function. Some projects however have
created a specific role and even an identified greeter
team.
50. Resources
• David Eaves, Wiki's and Open Source: Collaborative
or Cooperative? http://eaves.ca/2007/02/05/wikis-and-opensource-collaborative-or-cooperative/
• Fogel, K, Producing Open Source Software
• Bacon, J. The Art of Community
• Kruger, J., Epley, N., Parker, J., & Ng, Z. (2005). Egocentrism
over email: Can we communicate as well as we think? Journal
of Personality and Social Psychology, 89, 925-936.
• Graen, G. B. (2003) Dealing with Diversity IAP
• Klein, J. (1993) Avoiding Sexist Language,
http://www.hamilton.edu/writing/writing-resources/avoidingsexist-language
Editor's Notes
David Cameron: “Hi rebekah, keep your head up, LOL DC”
Rebekah Brooks: “Thanks Dave, it doesn’t mean Lots of Love, it means Laugh Out Loud”