The purpose of this project was to create a wireless trigger for the Mamiya RB67. I accomplished this by designing a 3D printed bracket for the servo motor and a hotshoe mount for the Arduino board and an RF Receiver....continue
News coverage, twitter comments, and interviews have featured people from all walks of life describing the current pandemic through language we typically with armed conflicts. Covid-19 is our enemy, we must forgo peace time luxuries to support those fighting on the front lines. It’s a compelling and easily understood narrative which has been reinforced by decades of participation in various conflicts around the world. We’ve internalized these scripts, sets, and the roles we’re expected to ...continue
Recognizing privacy as essential for both the well-being of individuals and our communities has only become more urgent as technological innovation continues to erode the distinction between our private and public lives. Unfortunately, the bond between privacy and the individual is often glossed over, framed as an opaque black box which undermines our ability to recognize its importance. It is essential that we understand how privacy enables meaningful human expression granting both individuals and groups the opportunity embrace and cultivate our shared human nature.
Article 1(1) of the 1954 Convention relating to the Status of Stateless Persons defines statelessness as a person “who is not considered a national by any State under the operation of its law” (United Nations 1954:3). Hannah Arendt describes two significant harms stateless individuals must contend with. The first relates to the legal or political nature of the deprivation where individuals become rightless as a consequence of not belonging to an internationally recognized political ...continue
I am not responsible for any damages or issues you may encounter while attempting the following, do it at your own risk and on hardware you own or for which you have permission. There’s a lot of information out there already on how to bypass BIOS passwords which includes shorting but what I didn’t find were which EEPROM pins I needed to short on the particular motherboard found within my Thinkpad Model. Many ...continue
Photo: HLS Historical and Special Collections The recognition of privacy as essential for both the well-being of individuals and the multiplicity of networks we constitute has only become more urgent as technological innovation continues to erode the distinction between our private and public lives. Unfortunately, the bond between privacy and the individual is often glossed over, framed a black box which undermines the ability and will necessary for its defense. Understanding how the expectation of ...continue
I completed the second part of the summary and edited the original article which you can check out here.
I’ve also stated working on and adding graphics/illustrations to existing work like this one. I’ll be working on some more detailed infographics in the future, should be a good way to quickly convey information in a compelling manner.
Photo: Cover of Law, John and Annemarie Mol, eds. 2006. Complexities: social studies of knowledge practices. Durham, NC: Duke University Press. How we engage with complexity is shaped by our understanding of its structure which in turn frames our ability to communicate those challenges simply and effectively. Complexity is quick to reveal itself when moving between the simple and the complex, an observation not lost on application security professionals who create policy documents establishing an organization’s ...continue
Just Information Warfare, Mariarosaria Taddeo (2016) 35: 213. https://doi.org/10.1007/s11245-014-9245-8
In her article “Just Information Warfare”, Mariarosaria Taddeo uses an ethical analysis of information warfare to bridge an ontological gap emerging from the information revolution and the unique capabilities Information Warfare enables which theories like Just War Theory are not equipped handle adequately (JWT). The article is organized in two parts, the first describes information warfare emphasizing its unique characteristics which provoke equally unique problems when JWT is applied to information warfare. The second part introduces Information Ethics and the four principles on which provide its foundation which is then applied to Just War Theory whose product is used to establish three principles of Just Information Warfare which overcomes the ethical issues posed when JWT is applied to information warfare without consideration for its unique attributes. ...continue
In his article, The Internet and Democratic Discourse: Exploring The Prospects of Online Deliberative Forums Extending the Public Sphere, Lincoln Dahlberg explores through a case study how a deliberative model of democracy can overcome economic, structural, and social challenges in order to extend the public sphere using a criteria established by Jurgen Habermas....continue