These are my slides from the Unabomber panel at Rutgers and at SXSW.
The SXSW presentation is written up here: http://www.nbcnews.com/technology/technolog/tech-vs-society-why-unabomber-still-makes-us-think-1C8780230
Prof. Vibhuti Patel on Economics of Gender & Development, CDE, SNDTWU, MumbaiVIBHUTI PATEL
GE has drawn heavily from all mainstream disciplines and innumerable social movements
of the last three decades. GE provides insights to examine budgets of Government
Organisations (GOs) and Non-Government Organisations (NGOs) from the point of view of
gender justice. Priority areas being women’s education, health and nutrition, skill
development, accounts, financial and commercial viability , legal standing, asset and
corpus building. GE contextualizes day to day survival struggles of women in the family ,
in the households, in the community and in the micro, meco and macro economy with the perspective of power relations which control women and girl children’s sexuality, fertility and labour.
Prof. Vibhuti Patel on Economics of Gender & Development, CDE, SNDTWU, MumbaiVIBHUTI PATEL
GE has drawn heavily from all mainstream disciplines and innumerable social movements
of the last three decades. GE provides insights to examine budgets of Government
Organisations (GOs) and Non-Government Organisations (NGOs) from the point of view of
gender justice. Priority areas being women’s education, health and nutrition, skill
development, accounts, financial and commercial viability , legal standing, asset and
corpus building. GE contextualizes day to day survival struggles of women in the family ,
in the households, in the community and in the micro, meco and macro economy with the perspective of power relations which control women and girl children’s sexuality, fertility and labour.
Gender equality and women's empowerment Grupo Areté
Asignatura: Historia de los países de habla inglesa / History of english-speaking countries.
✏ Título: Gender equality and women's empowerment
#ODS 5: Igualdad de género / #SDG 5: Gender equality
By: Lidia Ramírez López
“Gender equality is more than a goal in itself. It is a precondition for meeting the challenge of reducing poverty, promoting sustainable development and building good governance.”
- Kofi Annan
How do we raise our boys? Which impact does it have on their emotional and physical health? Which initiatives exist to challenge the traditional vision of masculinity?
Discussion about gender inequalities theories. Which helps the student to gather knowledge about those theorists also their theories in their academic and also in their practical life knowledge.
The Politics of Changing Men: Masculinities and Mens Health - Finian Murray
IPH, Open, Conference, Belfast, Northern, Ireland, Dublin, Titanic, October, 2014, Health Public
Meaning of organizational conflict
Characteristics of organizational conflict
Reasons for organizational conflict
Level of conflict
Level of performance
Contains
a.Statistics-1
b. SAS-1
c. Statistics-2
d. Market Research
e. MS Excel
f. SAS-2
g. Data Audit & Data Sanitization
h. SQL
i. Model Building
j. HR
Gender equality and women's empowerment Grupo Areté
Asignatura: Historia de los países de habla inglesa / History of english-speaking countries.
✏ Título: Gender equality and women's empowerment
#ODS 5: Igualdad de género / #SDG 5: Gender equality
By: Lidia Ramírez López
“Gender equality is more than a goal in itself. It is a precondition for meeting the challenge of reducing poverty, promoting sustainable development and building good governance.”
- Kofi Annan
How do we raise our boys? Which impact does it have on their emotional and physical health? Which initiatives exist to challenge the traditional vision of masculinity?
Discussion about gender inequalities theories. Which helps the student to gather knowledge about those theorists also their theories in their academic and also in their practical life knowledge.
The Politics of Changing Men: Masculinities and Mens Health - Finian Murray
IPH, Open, Conference, Belfast, Northern, Ireland, Dublin, Titanic, October, 2014, Health Public
Meaning of organizational conflict
Characteristics of organizational conflict
Reasons for organizational conflict
Level of conflict
Level of performance
Contains
a.Statistics-1
b. SAS-1
c. Statistics-2
d. Market Research
e. MS Excel
f. SAS-2
g. Data Audit & Data Sanitization
h. SQL
i. Model Building
j. HR
Answer all questions.Define strain theory Why is it a structu.docxYASHU40
Answer all questions.
Define strain theory? Why is it a structural issue?
Hint
: So, people are taught to want things via culture/mass media, yes! But, how do they get things (materialism)? What happens to people who want things but there is no ladder to reach things. What do they do? They want the goals, the cars, money, etc., they accept the goals, but they have to “innovate” that is, go around the ladder because there is no ladder, to reach the goals. And, others have many advantages to get things, so for them, not as much structural strain? The ladder is already there for them. Money, social class, inheritance, is there so, no need to go around the ladder.
Again, the strain comes from the culture putting it out there to want things, but,
no way
to get there for many. Except go around the system
In what ways does do strain theories explain the behavior of street gangs?
Which version of strain theories would best explain the overrepresentation of of homicides in inner-city areas?
According to general strain theory , what factors would likely lead to criminal behavior?
According to Robert K. Merton there are 5 individual modes of adaptation to structural stress, not all of them deviant. People respond to this structural stress in different ways. Explain in detail each of these 5 individual modes of adaptation.
DO NOT
merely list these modes, but
EXPLAIN EACH ONE
.
Thinking about your own life, what sorts of negative strains have you experiences? How did you deal with them? (negative strain=negative relationships one cannot escape from. Such as when adolescents cannot leave a relationship if they experiences them as “noxious.” And, if they try to escape from a bad situation they may then be arrested for truancy or running away)
Below are
some ideas
to think about
concerning
strain theory
......for example:
K. Cohen
1 Lower class Americans embrace the middle class ethic
2 Socialization of the lower class hinders their ability to compete
3 Decreased ability to compete produces strain
4 Increased strain produces identification with delinquent subculture
5
The delinquent subculture
Identification with delinquent subculture produces delinquent behavior
Cloward and Ohlin
Success ethic is a prized possession of all Americans
Opportunities for success are not distributed equally through the class structure
Blocked opportunities produce strain
Strain produces delinquent subcultures
1) criminal subculture
2) conflict subculture
3) retreatist subculture
Delinquent subcultures produce delinquent behavior?
Impact on social policy?
1) Mobilization for Youth
2) War on Poverty (heroic theme)
Adequacy of Strain Theory- conceptually
determinism
class
American dream
school failure
sense of strain
delinquent subculture
.
WATCH this presentation here: https://www.youtube.com/watch?v=HLBoiSbl9GM
This hour will include a definition of Extreme Abuse (EA) with examples divided into three categories: Pedophile-Porn Rings (PPR’s), Occult-Themed Abuse (commonly called “Ritual” or “Ritualized” Abuse), and Deliberate Trauma or Technical-Based Dissociation (DT-TBD), sometimes referred to as “Mind Control.” Practitioners will be given a tool for self-care when working with these extraordinary, yet often intense, clients.
Participants will be able to:
Define the four characteristics of Extreme Abuse (EA).
Name three categories of Extreme Abuse (EA).
Identify five strategies for practitioner self-care when working with EA survivors.
Ever wondered what Martin Luther King Jr, Katniss Everdeen, and Harry Potter have in common? They're all Guardians of The Good Life! They each intervene to improve situations. Now you can learn how to be more heroic in your own life by taking this free hero training!
http://www.theherotrainingschool.com
Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)Werner Sattmann-Frese
This PowerPoint presentation has been created for and presented at the University of Human Unity Summer School at Auroville in January 2016. It forms a part of the Integral Paradigm of Knowledge (IPK) seminar series. I am grateful to Rod Hemsell and Vladimir Yatsenko for inviting me to present at UHU Savitri Bhavan.
Ashford 3 - Week 2 - QuizQuestion 1. 1. What does Tom .docxwildmandelorse
Ashford 3 : - Week 2 - Quiz
Question 1. 1. What does Tom Regan say about the cruelty/kindness approach to animal ethics? (Points : 1)
The best way to explain animal ethics is in terms of our obligation to be kind and not cruel to animals
It is inadequate because it is possible to do wrong while being kind, and it is possible to do wrong without being deliberately cruel
It has no relevance to animal ethics because animals are cruel to each other
You have to be cruel to be kind, in the right measure
Question 2. 2. What does Peter Singer say about the history of liberation movements?
(Points : 1)
They tend to become narrower in scope … zeroing in on the exact class that deserves moral consideration.
They tend to become wider in scope … with people learning to apply moral principles to groups previously not considered.
They tend to become more discriminatory … giving fewer and fewer rights to the less privileged.
They tend to discover that the original concepts in the past were superior and it is a mistake to veer from traditional wisdom.
Question 3. 3. According to Tom Regan, which of the following should compel us to accept the equal rights of animals? (Points : 1)
Sentiment – our feelings for the welfare of animals
Law – legal regulations requiring us to respect the rights of animals
Reason – this theory has the best reasons on its side
Religion – the laws of God mandate human compassion
Question 4. 4. Which of the following makes it difficult to calculate the utility of an act (Points : 1)
the time frame of the consequences
disagreements about the meaning of pleasure or happiness
determining what constitutes the greatest good
all of the above
Question 5. 5. What does Singer say about other philosophers’ attempts to argue that only humans have moral worth? (Points : 1)
That they give a good way to determine who has rights in a way that includes all humans and no animals
That they all say that animals should have rights too
That they come up with unjustified methods to include all humans while excluding all animals from moral consideration
That animals do not have rights because they are not as smart as humans are
Question 6. 6. Peter Singer’s “basic principles of equality” applied to animals means: (Points : 1)
Animals should be given all the same rights as human beings.
Animals are not entitled to not all the same rights but to an equal consideration of interests.
Animals should not be given the same moral consideration because they are do not have the same power to reason as humans.
Animals do not have rights unless they can demonstrate the same abilities as humans.
Question 7. 7. According to Mill, utilitarian morality holds that: (Points : 1)
If each individual strives to maximize their own happiness, the happiness of all will follow.
Each individual is required to sacrifice their own individual happiness for the happiness of all.
With the right social arrangements and education, individuals can come .
Similar to What Can We Learn from the Unabomber?: Nothing. (20)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Peter Ludlow
Most work in epistemology (the theory of knowledge) focusses on how individuals can acquire knowledge and eliminate error. But recently attention has been turned to how groups acquire knowledge and eliminate error. In this talk I take up the question of how groups can maximize knowledge acquisition in hostile environments -- for example, when they are the targets of irregular warfare.
Digital humanities: Narrative GuidancePeter Ludlow
There are two approaches to the digital humanities. According to the first approach, digital technologies are applied to the humanities. According to the second, the humanities become a resource for digital technologies. In this talk I explore the idea that narrative and narrative understanding can guide digital technology.
Julian Assange has offered an interesting theory about the nature of conspiracies, in which they are not some guys sitting around a mahogany table, but rather are the product of network theory. We explain his ideas for how conspiracies thus form and how they are defeated.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
From its roots in culture jamming, we look at the early days of hacktivism from the early manifesto by The Mentor to the exploits of The Electronic Disturbance Theater, The Electrohippies, the Hong Kong Blondes, et.
Hacktivism 7: Epistemology and irregular warfarePeter Ludlow
Epistemology typically focusses on how individuals can maximize knowledge, but when we look to group knowledge we must also consider forces that seek to undermine our knowledge. This talk explores those threats and offers ways groups can armor themselves against such threats.
Repairs and extends David Lewis' theory of "Truth in Fiction" to handle cases of fan fiction. Also discusses post-colonial literature and archonic fiction.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
15. 1. Why the Unabomer Manifesto
is Weak
1). The bulk of the argument is an ad hominem
attack
16. 1. Why the Unabomer Manifesto
is Weak
1). The bulk of the argument is ad hominem
attack
2). The argument relies on the genetic fallacy
17. 1. Why the Unabomer Manifesto
is Weak
1). The bulk of the argument is ad hominem
attack
2). The argument relies on the genetic fallacy
3). The argument from evolution is NOT SOUND
19. On the ad hominem and genetic
fallacies
What role do they play in the manifesto?
20. On the ad hominem and genetic
fallacies
What role do they play in the manifesto?
The Unabomber uses them to dismiss
arguments that we can use government or
activism to restrain technology.
21. On the ad hominem and genetic
fallacies
The ad hominem fallacy:
22. On the ad hominem and genetic
fallacies
The ad hominem fallacy:
Argument to the person
23. On the ad hominem and genetic
fallacies
The ad hominem fallacy:
Argument to the person
The genetic fallacy:
24. On the ad hominem and genetic
fallacies
The ad hominem fallacy:
Argument to the person.
The genetic fallacy:
Thinking that showing the source of a belief
falsifies the belief.
25. The Unabomber on “leftists”
7. When we speak of leftists in this article we
have in mind mainly socialists, collectivists,
"politically correct" types, feminists, gay and
disability activists, animal rights activists and the
like. But not everyone who is associated with
one of these movements is a leftist. What we
are trying to get at in discussing leftism is not so
much a movement or an ideology as a
psychological type.
26. 9. The two psychological tendencies that
underlie modern leftism we call "feelings of
inferiority" and "oversocialization.”
27. 10. By "feelings of inferiority" we mean not only
inferiority feelings in the strictest sense but a
whole spectrum of related traits: low self-
esteem, feelings of powerlessness, depressive
tendencies,defeatism, guilt, self-hatred, etc. We
argue that modern leftists tend to have such
feelings (possibly more or less repressed) and
that these feelings are decisive in determining
the direction of modern leftism.
28. 14. Feminists are desperately anxious to prove
that women are as strong as capable as men.
Clearly they are nagged by a fear that women
may NOT be as strong and as capable as men.
29. 15. Leftists tend to hate anything that has an
image of being strong, good and successful.
They hate America, they hate Western
civilization, they hate white males, they hate
rationality.
30. 17. Art forms that appeal to modern leftist
intellectuals tend to focus on sordidness, defeat
and despair, or else they take an orgiastic
tone, throwing off rational control as if there
were no hope of accomplishing anything
through rational calculation and all that was left
was to immerse oneself in the sensations of the
moment.
31. 18. Modern leftist philosophers tend to dismiss
reason, science, objective reality and to insist
that everything is culturally relative. …They are
deeply involved emotionally in their attack on
truth and reality. They attack these concepts
because of their own psychological needs.
32. 20. Notice the masochistic tendency of leftist
tactics. Leftists protest by lying down in front of
vehicles, they intentionally provoke police or
racists to abuse them, etc. These tactics may
often be effective, but many leftists use them
not as a means to an end but because they
PREFER masochistic tactics. Self-hatred is a
leftist trait.
39. Reviewing so far…
• These attacks are ad hominem
• They play a role in the genetic fallacy
40. Reviewing so far…
• These attacks are ad hominem
• They play a role in the genetic fallacy
• In any case, the psychological claims are
unsupported and very likely false.
41. The Core Argument
(1) Humans evolved under primitive, low-tech
conditions, over the past 2 million years.
(2) Lived in small autonomous groups (25-
50), amidst vast wilderness.
(3) Modern technological society is radically
different than this, and imposes
unprecedented stress on humanity and
nature.
42. Core Argument (cont.)
(4) Technological stress will only continue to
worsen:
The environment will become simplified,
manipulated, and contaminated.
Humanity will become either enslaved, genetically-
modified, or eliminated.
(5) Such a condition is undignified, abhorrent,
and profoundly dehumanizing.
(6) It is impossible to fix or reform the system,
so as to avoid these disastrous outcomes.
43. Core Argument (cont.)
THEREFORE: The system must end.
In fact, we have a moral obligation to end it.
45. The argument is not sound.
The fact that a situation is abhorrent does not
mean we have a moral obligation to
exterminate billions of people to end it.
46. The argument is not sound.
Furthermore, from the claim that people are
metaphorically “enslaved”, it does not follow
that the enslavement should end at any cost.
47. The argument is not sound.
Furthermore, from the claim that people are
metaphorically “enslaved”, it does not follow
that the enslavement should end at any cost.
From the fact that the species is at risk it doesn’t
follow that any action is justified.
48. For example
If we are going to starve if we don’t kill and eat
someone it doesn’t follow that we should kill
and eat someone.
49. For example
If we are going to starve if we don’t kill and eat
someone it doesn’t follow that we should kill
and eat someone.
It certainly doesn’t follow that we have a moral
obligation to kill and eat someone.
50. In addition…
There is also a missing premise in the step from this
premise:
“[if we don’t return to the conditions under which we evolved]
Humanity will become either enslaved, genetically-modified, or
eliminated.”
to the conclusion.
The system must end. In fact, we have a moral obligation to end it.
52. Two missing premises.
1) Evolution optimizes for freedom, dignity, genetic
stability, and survival of the species.
53. Two missing premises.
1) Evolution optimizes for freedom, dignity, genetic
stability, and survival of the species.
2) The only way to stay optimized is by being in the
conditions in which we evolved.
54. missing premise 1
Evolution optimizes for freedom, dignity, genetic
stability, and survival of the species,
so if we return to the conditions under which we
evolved we optimize for all these.
55. But that premise is false:
Evolution doesn’t optimize for
freedom, dignity, genetic stability, and survival
of the species.
56. But that premise is false:
Evolution doesn’t optimize for
freedom, dignity, genetic stability, and survival
of the species.
Evolution only cares about reproductive success.
57. But that premise is false:
Evolution doesn’t optimize for
freedom, dignity, genetic stability, and survival
of the species.
Evolution only cares about reproductive success.
1) It doesn’t care about freedom and dignity
58. But that premise is false:
Evolution doesn’t optimize for freedom, dignity,
genetic stability, and survival of the species.
Evolution only cares about reproductive success.
1) It doesn’t care about freedom and dignity
2) It doesn’t promise genetic stability
59. But that premise is false:
Evolution doesn’t optimize for
freedom, dignity, genetic stability, and survival
of the species.
Evolution only cares about reproductive success.
1) It doesn’t care about freedom and dignity
2) It doesn’t promise genetic stability
3) It doesn’t promise survival of the species
60. Missing premise 2
Is returning to the original evolving conditions
the only way to optimize?
61. Missing premise 2
Is returning to the original evolving conditions
the only way to optimize?
No, because that is what human factors
engineering is for. We engineer for people as
they are evolved.
62. Missing premise 2
Is returning to the original evolving conditions
the only way to optimize?
No, because that is what human factors
engineering is for. We engineer for people as
they are evolved.
And there are other ways…
63. KU’s Steve Illardi
How to reproduce hunter-gatherer psychology
1) omega-3 fatty acids
2) Exercise
3) Light exposure
4) Sleep
5) Social connectedness
6) Anti-ruminative behavior
74. 3. What is a Better Critique?
An Anarchist critique:
75. 3. What is a Better Critique?
An Anarchist critique:
Perhaps we are only alienated by technology
when those in power seize control of it.
76. 3. What is a Better Critique?
An Anarchist critique:
Perhaps we are only alienated by technology
when those in power seize control of it.
We are not alienated by technology
We are alienated from technology
77. 3. What is a Better Critique?
A hacktivist critique:
78. 3. What is a Better Critique?
A hacktivist critique:
We become alienated when the ability is to be
technological is kept from us!
79. We become alienated from technology when we
aren’t allowed to see and understand how it
works
80. We become alienated from technology when we
aren’t allowed to see and understand how it
works
–that is, alienation occurs when the ability to
understand and hack technology is withheld
from us.
82. How do we fix the misuse of
technology?
Put control of technology back in the hands of
everyone (not just those in power).
83. How do we fix the misuse of
technology?
Put control of technology back in the hands of
everyone (not just those the powerful).
Information wants to be free. Liberate it!
93. one victim
Thomas J. Mosser
• Advertising exec
• North Caldwell, NJ
• Age 50
• Wife, Susan
• Daughter, age 13
• Daughter, 15 months
94. From the NYT
Some neighbors said yesterday that it was only
luck that others were not injured by the bomb.
Mr. McKay said that he held a party for the
neighborhood on Friday night and that several
children wandered from the party to the
Mossers' house.
95. From the NYT
"They had half a dozen kids there with the bomb
sitting on the table," Mr. McKay said. "His wife
signed for the package on Friday and left it on
the table."
96. From the NYT
Robin xxx, 13, stayed over for the night and was
in the house with the Mossers and their
daughters when the explosion occurred. She
said she took the Mossers' daughter Kelly next
door after the blast.