Hyperlinks – Reservocation http://reservocation.com/ Mon, 27 Jun 2022 00:25:20 +0000 en-US hourly 1 https://wordpress.org/?v=5.9.3 https://reservocation.com/wp-content/uploads/2021/07/icon-2021-07-30T111851.286-150x150.png Hyperlinks – Reservocation http://reservocation.com/ 32 32 Government use of political campaign tool ‘regrettable’ but not ‘meaningful’, Ombudsman findings reveal https://reservocation.com/government-use-of-political-campaign-tool-regrettable-but-not-meaningful-ombudsman-findings-reveal/ Mon, 27 Jun 2022 00:25:20 +0000 https://reservocation.com/government-use-of-political-campaign-tool-regrettable-but-not-meaningful-ombudsman-findings-reveal/ The South Australian Ombudsman found that the use of the NationBuilder campaign tool by the former Prime Minister’s office was “inadvertent” and any information collected “most likely could not be used in a way significant”. Key points: Ombudsman findings reveal NationBuilder tool should not have been used The South African Liberal Party used NationBuilder as […]]]>

The South Australian Ombudsman found that the use of the NationBuilder campaign tool by the former Prime Minister’s office was “inadvertent” and any information collected “most likely could not be used in a way significant”.

The use of NationBuilder was the subject of several exclusive ABC stories last year, which revealed that visitors to official government websites were redirected via a link referencing the Liberal Party’s NationBuilder.

The Campaign Tool can be used to build a database of individual profiles by collecting email addresses and phone numbers, and tracking a user’s behavior on third-party websites.

Former prime minister Steven Marshall denied at the time that the link redirects were collecting data, and an investigation by the state privacy committee later concluded it was “likely” the government did not facilitate the collection of unauthorized data from users of the government website.

Ombudsman Wayne Lines launched his own inquiry last October, to determine whether there was “sufficient evidence” of maladministration or misconduct to warrant an investigation.

In a statement on Monday, Lines said “employees from various agencies” had copied and pasted hyperlinks from press releases “without understanding the potential implications”.

SA Premier Steven Marshall has approved exploratory drilling on Lake Torrens.(ABC News: Michael Clements)

He said the former prime minister’s office ‘inadvertently’ continued to use his media email distribution list, run by the SA Liberal Party’s NationBuilder, once he formed government in March 2018.

“Although it appears that clicking on the relevant hyperlinks produced some form of data which was then sent to the NationBuilder platform, the data itself was a mixture of data from separate users,” a- he declared.

“Given this…it was highly plausible that these hyperlinks were copied and pasted by public officials who had no knowledge or understanding of the implications of the data.

“It would be very difficult to assess whether the data was used.”

a woman in a blazer smiling in a garden
Cybersecurity expert, Dr. Vanessa Teague.(ABC News: Kyle Harley)

Mr Lines has engaged Dr Vanessa Teague, a cybersecurity expert from the Australian National University’s College of Engineering and Computing, to provide advice on the technology.

He said that “noting the expert advice” he did not believe it was in the public interest to take further action.

But he said the use of a NationBuilder email distribution list by the former prime minister’s office was “regrettable” and “created the perception that public information is being used for partisan political purposes”.

“The South Australian Public Sector Code of Conduct recognizes that one of the four pillars of public service is impartiality from political influence,” he said.

“The Ministerial Code of Conduct also requires ministers to adhere to conventions of public service neutrality, respect that the public service is a public resource, and refrain from asking public servants to work on partisan political issues.

“I have issued this statement to raise awareness and remind all political parties of the importance that government resources are not used, or appear to be used, for partisan political purposes.”

The software served a purpose

South Australia Liberal Opposition Leader David Speirs said it would not be in the public interest to go ahead with an inquiry.

“The ombudsman basically said there was nothing else to look at here and there were no concerns arising from it,” he said.

“The hyperbole and the anger and the exaggerated mispronunciations of (Labour MP) Tom Koutsantonis, saying this was the biggest problem, that there was hidden criminal behavior here, that this was corruption at the highest level – quite clearly this has all turned into hyperbole.

Mr Speirs said the software ‘served a purpose for the Liberal Party in opposition’ and had been transferred to the government.

Asked if the use of the campaign tool should have been transferred to the government after the 2018 election, Mr Speirs replied: “It is what it is.”

“It was a system that worked for us at the time…the ombudsman said there was nothing wrong with it,” he said.

“It’s a fair comment, and I’m sure all political parties will take a look at it and make sure they have their houses in order.”

South Australian Prime Minister Peter Malinauskas said the government would ensure that all of the mediator’s recommendations are carefully considered.

Job , updated

]]>
Blockchain Service: In Apparent First, Lawyers Sign Legal Documents Using an NFT | Proskauer – mind your own business https://reservocation.com/blockchain-service-in-apparent-first-lawyers-sign-legal-documents-using-an-nft-proskauer-mind-your-own-business/ Wed, 22 Jun 2022 21:29:32 +0000 https://reservocation.com/blockchain-service-in-apparent-first-lawyers-sign-legal-documents-using-an-nft-proskauer-mind-your-own-business/ A fundamental element of due process is notice, a requirement that all parties are notified that a legal action could alter their legal rights or duties. Most defendants will be served in person by a bailiff. But when the defendant is inaccessible in this way, some creativity may be required, especially when defendants are only […]]]>

A fundamental element of due process is notice, a requirement that all parties are notified that a legal action could alter their legal rights or duties. Most defendants will be served in person by a bailiff. But when the defendant is inaccessible in this way, some creativity may be required, especially when defendants are only traceable by their actions on the blockchain, an instrument famous in part for its ability to keep its users private. After nearly $8,000,000 of its funds were hacked, Liechtenstein-based cryptocurrency exchange LCX AG reportedly traced some of its stolen digital assets to different digital wallets. LCX AG was able to freeze the funds, but with no name sewn into the digital wallet, it still lacked a name and place to take legal action. At least he lacked a physical place. But if LCX AG knew the location of the wallet, it might be able to serve as a virtual location.

A New York County court agreed and issued this order:

ORDERED that. . ., plaintiff’s attorneys, must serve a copy of this show cause order, together with a copy of the documents on which it is based, no later than June 8, 2022, on the person or persons controlling the address [i.e., defendant’s digital wallet] via an Ethereum-based special-purpose token (the service token) delivered – air-dropped – into the address. The service token will contain a hyperlink (the Service Hyperlink) to a website created by [Plaintiff’s attorneys], in which the plaintiff’s lawyers must publish this show cause order and all the documents on which it is based. The Service Hyperlink will include a mechanism to track when a person clicks on the Service Hyperlink. Any such service shall constitute good and sufficient service for the purposes of jurisdiction under New York law over the person or persons controlling the address. . . .

In other words, LCX AG sent a non-fungible token (“NFT”) or “Service Token” to the digital wallet where its allegedly stolen funds were found, containing a hyperlink to the court order of show cause and other legal documents. (The actual process on the blockchain is recorded here and the NFT hyperlink directs here.) The hyperlink had a mechanism for the sender to see if it had been clicked. The court approved this as adequate service for the purposes of obtaining jurisdiction over the defendants. This is apparently the first time someone has been served via blockchain. And it apparently succeeded as attorneys for the defendants filed notices to appear in the case.

Although unique, such a service is likely to remain rare, at least for now. Currently, New York law defaults to physical service of defendants and only allows waivers where such service is “impracticable.” But perhaps it will spark a discussion about whether in-person service, which has been the norm for so long, should be supplemented or even replaced by electronic means of service, whether through sophisticated means like blockchain, or simpler means like email.

[View source.]

]]>
The Modern Attachment: How to Handle Hyperlinked Documents in Emails | Kilpatrick Townsend & Stockton LLP https://reservocation.com/the-modern-attachment-how-to-handle-hyperlinked-documents-in-emails-kilpatrick-townsend-stockton-llp/ Tue, 21 Jun 2022 17:26:20 +0000 https://reservocation.com/the-modern-attachment-how-to-handle-hyperlinked-documents-in-emails-kilpatrick-townsend-stockton-llp/ Most organizations and law firms have some sort of document management system that houses documents. These document management systems typically provide a way to organize documents by project or subject, keep previous versions of documents, and track who has accessed the documents. Additionally, they allow users to send a link to a document directly from […]]]>

Most organizations and law firms have some sort of document management system that houses documents. These document management systems typically provide a way to organize documents by project or subject, keep previous versions of documents, and track who has accessed the documents. Additionally, they allow users to send a link to a document directly from the document management system, ensuring that all recipients receive the same most up-to-date version and, often most importantly in terms of efficiency, ensuring that only one person works on a draft document at a time. When we email links to these documents, the document itself is not attached to the email; instead, a hyperlink to the document where it is hosted on the document management system is attached.

As an eDiscovery professional, my next thought is….how do we manage these links in discovery? Are we required to collect them separately (and if they are relevant, wouldn’t they anyway)? Is there a way to collect the actual document via the link and keep it connected to the parent email? And what about documents stored in collaborative workspaces or cloud-based document and meeting platforms? And further, have we appropriately addressed these hyperlinked documents and other so-called “modern attachments” in our standard ESI agreements?

Although the use of hyperlinked documents is still a developing area of ​​eDiscovery, attorneys should consider discussing the production of modern attachments during discovery-related negotiations. Additionally, attorneys should determine, based on the client’s data systems and data management practices, whether it makes sense to include modern attachment language in an ESI agreement. to make sure there are no problems down the road.

Should modern attachments be treated the same as traditional attachments and produced together as a family with the parent email? At least one court has considered this issue, and its decision sheds new light on how we can deal with hyperlinked attachments in our own cases.

Nichols vs. Noom, Inc.., No. 1:20-CV-03677-LGS-KHP (SDNY May 6, 2021)

Trial Judge Katharine Parker of the United States District Court for the Southern District of New York denied a motion for reconsideration, finding that the hyperlinked documents in an email are not traditional attachments and do not require that the defendants incur the costs and time necessary to produce them with the parent’s email. Two important factors influenced the decision: (1) there was no agreement between the parties or the court as to whether the hyperlinked documents are traditional attachments; and (2) it would have been unduly burdensome and disproportionate to require the Respondent to produce all hyperlinked documents as attachments.

The magistrate had previously ordered the defendant to provide Bates numbers to the hyperlinked documents since the plaintiffs could not locate the recordings in the production. The plaintiffs sought to clarify the prior order after realizing that some custodians had a habit of sending hyperlinks to documents rather than attaching the documents to emails. To make matters worse, the defendant used a harvesting tool for its cloud-based document storage platform that did not make the “filepath” metadata field available. The plaintiffs had previously agreed to allow the defendant to use the collection tool. Essentially, requesters could receive hundreds of emails with hyperlinked documents that they might not be able to find elsewhere in the production without the file path metadata.

The plaintiffs asked the defendant to use a different collection tool to allow the hyperlinked documents to be produced as attachments to their parent emails and provided summary evidence showing that the defendant would incur less than $5,000 in additional charges. The defendant objected, arguing that the tool would cause redundancy in document production, increase costs and delay the production of its documents.

The court found the defendant’s argument persuasive and dismissed the motion for reconsideration. Citing the Sedona Principles, the court found that the plaintiffs had failed to demonstrate that all of the hyperlinked materials were relevant or necessary, and further, that imposing the demand for production of all of the hyperlinked materials on the defendant would be unduly burdensome and not proportionate. Further, the court found that the plaintiffs’ assertion that the new tool would only cost $5,000 was not credible and that the plaintiffs failed to adequately address the alleged delay in producing documents. Further, the court found that the plaintiffs failed to address the issue when discussing the ESI agreement and the pre-discovery process. Finally, the court had previously established a mechanism for plaintiffs to request information about a “reasonable number” of hyperlinked documents from defendants and found that plaintiffs had successfully used this mechanism to strike the appropriate balance.

What the complainants could have done differently

Clearly, Plaintiffs should have determined if and how Defendant would produce hyperlinked materials earlier in the discovery process and include instructions in the ESI Agreement. However, in the absence of negotiation on this language, here are some steps that the applicants could have taken differently.

  • The plaintiffs could have demanded that the defendant produce file path metadata for all documents collected from the cloud-based documents platform. The plaintiffs were aware of the hyperlinking problem during the exploratory conference, but did not realize its extent until later. The plaintiffs could have asked the judge to order the defendant to produce the file paths immediately upon becoming aware of the problem. Although some discovery took place, it is more likely that the magistrate would have ordered production of this information in the early stages of discovery.
  • Plaintiffs could have provided credible and thorough contradictory evidence regarding the time and costs imposed by using the new tool in court. If the tool was rather inexpensive and simple to use, and the collection time was minimal, the court might have agreed that the defendants should use it.
  • Finally, because there was a mechanism for requesting documents, the plaintiffs could have requested hyperlinked documents from the defendant using this mechanism. The defendant agreed to provide Bates numbers to a “reasonable number” of hyperlinked documents that the plaintiffs could not find. The plaintiffs could have employed the strategy of requesting all key hyperlinked documents and forcing the defendant to file a motion with the magistrate that the number of documents was unreasonable. The plaintiffs could then have presented the magistrate with the total number of emails containing hyperlinked documents and the number of documents he requested in an effort to show that the requests were reasonable.

How to deal with hyperlinked documents?

This question depends on a multitude of factors and ultimately will likely be decided on a case-by-case basis. However, it should be emphasized that specific language about the use of hyperlinked materials must be included in the custody interview questions and, if applicable, in the ESI agreement.

Of course, how to handle hyperlinked attachments may be a topic worth discussing with opposing counsel prior to the initial pre-trial conference. If opposing counsel seems confused, you may need to urge him to ask his own client or key custodians about his practice of using hyperlinked materials and how best to collect them so that the link between the parent email and the hyperlinked attachment remains. If you find that hyperlinked attachments are becoming a common problem in your cases, you can add language to your standard ESI agreement that explains how hyperlinked documents should be handled and that if they cannot be produced with their parent email, at a minimum, file path metadata must be produced so that you can match them with their parent email.

Factors to consider
  • Production of file path metadata
    • Make sure opposing counsel uses a tool that will include file path metadata in any document collection.
    • Discuss the collection tool that will be used, then discuss limitations with your internal eDiscovery team or vendor.
  • The tool used for collecting
    • Decide which collection tool will be most appropriate to use and advise opposing counsel why your choice is best suited for the job.
      • A specialized harvesting tool may be required if hyperlinked documents are to be treated as traditional attachments.
      • Discuss with the customer why a specialized tool may be needed and how its use could save them time and money in the long run.
    • For the most part, stand-alone documents will need to be collected separately. One exception is Office 365, which is able to extract linked documents with the collected email as long as the linked document is in Sharepoint.
      • If your client or opposing party uses Office 365, discuss the collection process and whether related documents will be automatically collected.
  • Proportionality of time and cost
    • Consider the proportionality of time and cost for any request and be able to explain why the request is necessary and not unduly burdensome.
    • Come to the discovery conference prepared with credible evidence regarding the additional costs and time that may be incurred.
]]>
National Youth Band in first Hyperlink – 4barsrest https://reservocation.com/national-youth-band-in-first-hyperlink-4barsrest/ Mon, 20 Jun 2022 18:20:03 +0000 https://reservocation.com/national-youth-band-in-first-hyperlink-4barsrest/ Britain’s National Youth Brass Band will perform the world premiere of Peter Graham’s “Hyperlink” at the Royal College of Music. Britain’s National Youth Brass Band will perform the world premiere of Peter Graham’s last great composition, “Hyperlink”, at a special 70th anniversary celebration concert at London’s Royal College of Music in August. Under the direction […]]]>

Britain’s National Youth Brass Band will perform the world premiere of Peter Graham’s “Hyperlink” at the Royal College of Music.

Britain’s National Youth Brass Band will perform the world premiere of Peter Graham’s last great composition, “Hyperlink”, at a special 70th anniversary celebration concert at London’s Royal College of Music in August.

Under the direction of guest conductor Martyn Brabbins, music director of the English National Opera, the group will present an eclectic program entitled “Nature, Places, and Celebration”.

Table’s center

The centerpiece will be the work of Peter Graham which will also serve as the test for the Championship Section Final of the 2022 Great Britain National Championships at the Royal Albert Hall in October.

The group will also be joined by the famous British soprano singer Nardus Williams who will perform a selection of Cantelouble’s magnificent “Chansons d’Auvergne”.

Concert:

National Youth Brass Band of Great Britain
Conductor: Martyn Brabbins
Soloist: Nardus Williams
royal academy of music
Saturday August 6 (7:00 p.m.)

Tickets:

https://www.eventbrite.co.uk/e/70th-anniversary-celebration-concert-tickets-333693294627

]]>
5,000 young Africans targeted in digital marketing by Hyperlink Africa – Bright Tenbil https://reservocation.com/5000-young-africans-targeted-in-digital-marketing-by-hyperlink-africa-bright-tenbil/ Sat, 18 Jun 2022 10:23:34 +0000 https://reservocation.com/5000-young-africans-targeted-in-digital-marketing-by-hyperlink-africa-bright-tenbil/ In an attempt to build a resilient African continent with resourceful youth, Hyperlink Africa trains African youth in essential digital marketing skills to boost the African economy. “However, Ghana and most African countries are rapidly adapting to the new media revolution, and there is a need to train more young people in the field of […]]]>

In an attempt to build a resilient African continent with resourceful youth, Hyperlink Africa trains African youth in essential digital marketing skills to boost the African economy.

“However, Ghana and most African countries are rapidly adapting to the new media revolution, and there is a need to train more young people in the field of digital marketing where young men and women would contribute in building new media. ‘a vibrant continent,’ said Mr. Bright Tenbil, Founder of Hyperlink Africa pointed out.

According to him, digital marketing plays a major role in the development of the African economy, and as part of supporting young people in Africa, Hyperlink Africa launched the Africa Digital Marketing Youth training in February to equip young people in marketing for free. digital.

The training, which started in February, was held over two days at Ghana Tech Lab in Accra with more than 20 participants in Accra, he said.

He noted that 3 other editions were hosted online with more participants from Rwanda, Kenya, Zambia, Nigeria and Ghana, where these editions took over 200 participants through the basics of digital marketing with certification .

The program had hosts like Abdul Rahman Latif; Digital Marketing at MTN Ghana, Ameyaw Debrah; Renowned blogger, Ibukun Onitiji; Head of Digital for Nestlé Central and West Africa, Bright Tenbil; CEO of Hyperlink Africa, Rhoda Odoi; Hypernet CEO, Shepherd Mottey; SEO Expert and Kobby Kyei; Blogger, reiterated Mr. Tenbil.

Some areas of training highlighted by the program include introduction to digital marketing, digital marketing in the corporate world, SEO basics, starting a digital marketing agency, digital marketing strategies and other topics related to digital marketing.

The main curator of the project; Bright Tenbil shared how the training had an impact on the participants. In a review of feedback, most participants rated the training and an excellent initiative of Hyperlink Africa.

He assured clients that the monthly training promises to have more equipped facilitators in the next session, and mentioned that any young person looking to improve their digital marketing skills could join the next session via hyperlinkafrica.com/adm.

Send your news to newsghana101@gmail.com and via WhatsApp to +233 244244807
Follow Ghana News on Google New

]]>
FTC Digital Advertising Guidelines Open for Public Comment https://reservocation.com/ftc-digital-advertising-guidelines-open-for-public-comment/ Thu, 16 Jun 2022 20:26:42 +0000 https://reservocation.com/ftc-digital-advertising-guidelines-open-for-public-comment/ Related practices and jurisdictions On June 3, 2022, the Federal Trade Commission announced that it was seeking public comment on its 2013 guidelines, “.com Disclosures: How to Make Effective Disclosures in Digital Advertising” (the “Guidelines”). The FTC said it was updating the Guide to better protect consumers from deceptive practices online, particularly because some companies […]]]>

On June 3, 2022, the Federal Trade Commission announced that it was seeking public comment on its 2013 guidelines, “.com Disclosures: How to Make Effective Disclosures in Digital Advertising” (the “Guidelines”). The FTC said it was updating the Guide to better protect consumers from deceptive practices online, particularly because some companies have interpreted the current version of the Guide to “justify practices that mislead consumers online.” . For example, the FTC explains that companies have falsely claimed that they can avoid liability under FTC law by placing required information behind hyperlinks. The updated Guide will cover issues such as advertising on social networks, in video games, in virtual reality environments and on mobile devices and applications, as well as the use of dark models, interface designs manipulative user, multi-party sales agreements, hyperlinks and online disclosures.

In its request for information, the FTC submitted the following questions for public comment:

  • “What issues arise from current or emerging online technologies, activities or features, such as sponsored and promoted advertising on social media platforms or otherwise, the use of in-game advertising content, or the use of dark pattern in digital advertising, should be addressed in a revised guidance document Why and how to address them?

  • What issues raised by new laws or regulations should be addressed in a revised guidance document? Why and how to treat them?

  • What research or other information regarding the online marketplace, online advertising techniques, online consumer behavior or mobile consumer behavior should staff consider when revising their guidance document on online advertising?

  • What research or other information regarding the effectiveness of disclosures – and, in particular, online disclosures – should staff consider?

  • What specific types of online disclosures, if any, raise unique issues that should be addressed in a revised guidance document separate from a discussion of general disclosure requirements?

  • What guidance in the .com Disclosures document is obsolete or unnecessary?

  • What orientations should be clarified, broadened, strengthened or limited?

  • How can the guidance on the use of hyperlinks be clarified to provide better guidance on the appropriate use of hyperlinks and how hyperlinks should be labeled?

  • Do the guidelines adequately explain how to make qualifying disclosures when consumers need to navigate multiple web pages to make a purchase? If not, how should the guidelines be changed?

  • The guidelines state that when designing space-restricted ads, “disclosures can sometimes be effectively communicated to consumers if they are made clearly and prominently on the website to which the ad links.” Should these guidelines be changed, and if so, how? Should the guidance document specify when a disclosure on a marketer’s website may and may not be sufficient to prevent a representation in a prior communication to the website from being misleading?

  • Do the boards adequately address advertising on mobile devices? If not, how should the guidelines be changed?

  • Should the guidance document address issues unique to specific audiences or demographics regarding seeing, hearing or understanding disclosures? If so, how should the guidelines be changed? Should such guidelines address micro-targeted ads, and if so, how should they do so?

  • Should the guidance document address issues that have arisen from multi-party sales agreements in internet commerce such as (1) established online sellers providing a platform for other businesses to market and sell their products online, (2) website operators being compensated for referring consumers to other websites offering products and services, and (3) other affiliate marketing agreements? If so, how should the guidelines be changed?

  • Should the guidance document address issues that have arisen with respect to advertising that appears in VR or the Metaverse, and, if so, how should these issues be addressed?

  • What additional issues or principles relating to online advertising should be addressed in the guidance document?

  • What other changes, if any, should be made to the guidance document? »

The public may provide comments on these matters until August 2, 2022. Instructions on how to submit comments can be found in the FTC’s Request for Information.

Copyright © 2022, Hunter Andrews Kurth LLP. All rights reserved.National Law Review, Volume XII, Number 167

]]>
Take ownership of your professional learning with Twitter https://reservocation.com/take-ownership-of-your-professional-learning-with-twitter/ Mon, 13 Jun 2022 05:55:44 +0000 https://reservocation.com/take-ownership-of-your-professional-learning-with-twitter/ When the COVID-19 pandemic hit, many of us struggled to figure out how to keep learning. At the time, I was an associate professor in an undergraduate teacher education program and had only ever taught in person. I was in desperate need of resources, guidance, and anything that could help with the quick transition to […]]]>

When the COVID-19 pandemic hit, many of us struggled to figure out how to keep learning. At the time, I was an associate professor in an undergraduate teacher education program and had only ever taught in person. I was in desperate need of resources, guidance, and anything that could help with the quick transition to distance learning. One of the first places I turned to for help was Twitter. There I found an amazing community of brilliant and caring professors, faculty developers, educational technology specialists and others who guided me through this difficult transition by sharing their expertise on teaching online, their experiences adapting courses for distance education and their resources to support students. They also shared diverse perspectives that resonated with me, stories that inspired me, questions that prompted me to reflect on my teaching practices and policies, and insights that helped me grow both on both professionally and personally. Since then, I have also brought my own unique ideas and resources to the conversation. These experiences have shown me that leveraging Twitter as a professional learning network can be transformational for a person’s ongoing learning and growth.

What is a Professional Learning Network (PLN)?

Trust and Prestridge (2021) define Professional Learning Networks (PLNs) as “uniquely cultured systems of people, spaces, and tools that help educators improve their teaching and learning” (1). Unpacking this definition further, Krutka, Carpenter and Trust (2017) explain that PLNs often include people from diverse backgrounds, engaging with each other in a variety of the spaces (online, face-to-face or both) when they share and get tools (such as ideas, strategies, and resources) for continued professional growth (247).

Research shows that PLNs have many benefits. Trust, Carpenter and Krutka (2017) conducted a qualitative study with 151 higher education professionals to explore their experiences with PLNs. Faculty members and other study professionals reported that their PLN:

  • Helped them learn new ideas and skills related to their field/discipline
  • Exposed them to innovative teaching strategies and educational technology tools
  • Inspired them to adapt their teaching practices
  • Enabled them to connect and collaborate with others around the world
  • Encouraged them to share their experiences, expertise and resources with others
  • Transformed the way they perceived their professional role
  • introduced them to new professional opportunities

Twitter 101

One of the most frequently used platforms for online PLNs is Twitter. On Twitter, educators communicate with each other via tweets (short messages of up to 280 characters). Tweets can include media, such as photos, videos, GIFs, and links. They also often include hashtags, which are keywords/phrases preceded by the “#” symbol that are used to organize tweets. For example, common hashtags used by higher education professionals include #highered, #facdev, and #onlinelearning. Following hashtags is a great way to see what others are saying or sharing about a topic.

How can I use Twitter as PLN?

1. Create a Twitter account
The first step to leveraging Twitter as a PLN is to create an account. This will include creating a Twitter ID (or username) and writing a brief bio. In your biography, be sure to highlight your professional background and areas of interest or expertise. For example, my Twitter handle is @drtolunoah, and my bio mentions my experience as a faculty developer, educational technology specialist, and speaker.

2. follow others
It is important to follow a diverse group of people and organizations in your PLN. You can search for other people by name or username, or you can use keywords to find people with similar interests and backgrounds. Twitter also provides suggestions based on the people you follow. Plus, you can see who’s following the people you’re already following. If you want additional ideas for who to follow on Twitter, you can download this Twitter PLN Bingo game.

3. Interact with tweets
When you follow people and organizations on Twitter, you’ll see their tweets appear in your timeline. A great way to connect with others is to read and interact with their tweets by liking, replying, or retweeting (i.e. reposting tweets to your followers).

4. Share your story
You can share your unique ideas on Twitter if you feel comfortable. This can strengthen your bond with your PLN by engaging in mutually beneficial ways. For example, you can tweet:

  • Books or articles you recommend
  • Teaching strategies that have worked well for you
  • Educational resources
  • Testimonials from a university conference
  • Encouragement or support for fellow educators
  • Questions you would like feedback on
  • Answers to questions from others
  • Reflections on your teaching policies/practices
  • Reflections on trends in higher education
  • Upcoming educational meetings
  • Photos or videos of student projects (with their consent and without revealing personal information, of course!)
  • …and much more!

5. Join the conversation
Another way to improve your use of Twitter as a PLN is to participate in Twitter chats. A Twitter chat is a conversation on a specific topic that takes place at a specified date and time. For example, the popular #edtechchat takes place on Mondays at 5:00 p.m. PT. Discussions on Twitter generally follow a question-and-answer format, with a host posting a question every few minutes and participants responding with their answers. Whenever the host or attendees tweet, they include the question or answer number in their tweet (eg Q1 or A1) along with a specified hashtag (eg #edtechchat) so that everyone everyone can follow the conversation. There are dozens of active Twitter chats each week. You can also host your own Twitter chat! Just let your followers know the date and time of the chat, the questions you’ll be asking (so they can anticipate), and the unique hashtag that will be used for the conversation.

6. Manage resources
Educators on Twitter often share innovative teaching strategies and resources that you might want to save. One tool that can streamline the curation process is Tweetdeck. With Tweetdeck, you can display multiple Twitter feeds at the same time. Each feed is organized in a column. For example, you can add a List column, where you can display tweets from a specific group of people (e.g. “Faculty Developers”). Or, you can add a search column, where you can display tweets on a specific search item or hashtag (eg, “rating” or #ungrading). The List and Search columns are automatically updated as new tweets are posted, making it easy to keep track of the latest posts. You can also add a Collection column, where you can save your favorite tweets on a specific topic. Collections you curate in Tweetdeck can also be shared with others.

Tweetdeck not only works well for organizing tweets, but also for participating in Twitter chats. For example, you can add a search column for a Twitter chat hashtag so you can easily track all questions and answers. You can also add a Collection column to save your favorite tweets from chat.

seven. Consider your PLN
Reflection is an essential part of teaching, and this also applies to PLNs. Krutka, Carpenter, and Trust (2017) provide a useful framework that prompts educators to analyze the people, spaces, and tools that make up their PLN. Useful questions from the framework include: “Which people or perspectives are my PLN missing?”, “What spaces have I not yet engaged in that could be beneficial?” and “What new tools will I seek to advance my student learning?” (Krutka, Carpenter, and Trust 2017, 249). Engaging in ongoing reflection on these and other questions from the framework can be helpful to continue to build your PLN experience over time.

Conclusion

Using Twitter as a PLN lets you take ownership of your professional learning by exploring topics of interest with educators around the world, anytime, anywhere. If you want to know more, you can download this PLN, Twitter and Tweetdeck resource guide. It includes QR codes and hyperlinks to PLN research articles and resources on using Twitter and Tweetdeck.


Tolulope (Tolu) Noah, EdD, is the Educational Learning Spaces Coordinator at California State University, Long Beach (CSULB). Previously, she was a Senior Professional Learning Specialist at Apple and an Associate Professor in the School of Education at Azusa Pacific University (APU). Tolu has been recognized for her teaching effectiveness by receiving the 2019 Teaching Faculty Excellence Award at APU, and she is a regular speaker at teaching and learning conferences. You can connect with Tolu on Twitter at @drtolunoah or through their website, www.tolunoah.com.

References

Krutka, Daniel G., Carpenter, Jeffrey Paul and Torrey Trust. 2017. “Enriching Professional Learning Networks: A Framework for Identification, Reflection, and Intention.” Technical trends 61: 246-252. https://link.springer.com/article/10.1007/s11528-016-0141-5

Trust, Torrey, Carpenter, Jeffrey Paul, and Daniel G. Krutka. 2017. “Overcoming Silos: Professional Learning Networks in Higher Education.” Internet and higher education 35:1-11. https://www.sciencedirect.com/science/article/pii/S1096751617301380

Trust, Torrey and Sarah Prestridge. 2021. “The Interplay of Five Elements of Influence on Educators’ PLN Actions.” Teaching and teacher training 97:1-12. https://www.sciencedirect.com/science/article/pii/S0742051X2031386X?via%3Dihub



Post views:
530

]]>
When is the Airdrop? New Approach for Anonymous Crypto Defendants Service | Akin Gump Strauss Hauer & Feld LLP https://reservocation.com/when-is-the-airdrop-new-approach-for-anonymous-crypto-defendants-service-akin-gump-strauss-hauer-feld-llp/ Wed, 08 Jun 2022 23:29:51 +0000 https://reservocation.com/when-is-the-airdrop-new-approach-for-anonymous-crypto-defendants-service-akin-gump-strauss-hauer-feld-llp/ Blockchain – Crypto Theft – Alternative Service on Anonymous Defendants Jurisdictions around the world are seeing a marked increase in civil cases related to crypto theft, fraud, and misrepresentation. However, a major stumbling block for plaintiffs is how to serve court documents on anonymous defendants of unknown nationality. A recent case in the United States […]]]>

Blockchain – Crypto Theft – Alternative Service on Anonymous Defendants

Jurisdictions around the world are seeing a marked increase in civil cases related to crypto theft, fraud, and misrepresentation. However, a major stumbling block for plaintiffs is how to serve court documents on anonymous defendants of unknown nationality. A recent case in the United States has set an interesting precedent in dealing with this issue that will likely be reflected in other jurisdictions. The New York State Supreme Court has ordered that documents be served on the anonymous person(s) controlling an Ethereum address by means of a “service token” airdropped into the address (the “Service Token”) . The service token contained a hyperlink to a website where the court documents were posted.

Facts of the case

Plaintiff, LCX AG (“Claimant”), a Liechtenstein-based virtual currency exchange, brought an action for theft of virtual assets against 25 anonymous defendants “John Doe” (“Defendants”). The alleged theft resulted from a hack of one of Plaintiff’s digital wallets, with Defendants transferring approximately US$8 million in virtual assets (the “Stolen Assets”).

Defendants then took numerous steps to obscure the resulting transaction trail, including transferring the stolen assets to Tornado Cash, a mixing service that effectively “washes” crypto assets by breaking the chain link between source addresses. and destination.

Despite these measures, the plaintiff was able to trace the stolen assets through expert tracing services. US$1.3 million of the stolen assets ended up being stored in the cryptocurrency stablecoin known as USD Coin (“USDC”) at a single address on the Ethereum blockchain (the “Address”). The controller of the address was unknown to the applicant.

Center Consortium LLC (CCL) is the entity that governs the USDC protocol and has the power to block individual Ethereum addresses from sending and receiving USDC, a practice known as “blacklisting”. CCL was added as a non-interested party.

Plaintiff, concerned that defendants could sell or transfer the remaining USDC at any time, sought a preliminary injunction and temporary restraining order (1) restraining defendants from disposing of the stolen assets, including those held at the address, and (2) instructing CCL to block the address.

Court order

On June 2, 2022, the Supreme Court ordered the defendants to show cause why a preliminary injunction on the terms requested should not be issued (the “Show Cause Order”). Most interestingly, the plaintiff was ordered to serve a copy of the show cause order, along with all related documents, on:

“…the person or persons controlling the address via an Ethereum-based special purpose token (the service token) delivered – air-dropped – into the address. The service token will contain a hyperlink (the hyperlink service) to a website created by [Plaintiff’s attorneys], in which the plaintiff’s lawyers must publish this show cause order and all the documents on which it is based. The Service Hyperlink will include a mechanism to track when a person clicks on the Service Hyperlink. Any such service shall constitute good and sufficient service for the purposes of jurisdiction under New York law over the person or persons controlling the address (the “Service Order”). »

Discussion

Due to its virtual nature and anti-establishment underpinnings, the crypto space is filled with completely anonymous players. Often, in the event of theft or fraud involving a transfer of assets, the only identifier is the receiving entity’s wallet address. This creates significant problems in serving these anonymous defendants with court documents in a way that establishes a court’s jurisdiction. The service order is a proactive and innovative solution to this problem.

“Airdropping” is a process by which a digital token is sent to a wallet address. The wallet address controller cannot block the airdrop. In this way, an anonymous defendant can receive notice of legal proceedings, whether they want it or not.

In DIFC courts (and other common law courts with similar rules), a potential hurdle is that for a court to order service by other means, the court must be satisfied that the alternative means will carry the documents for the attention of the receiving party. The service token here was a hyperlink to a website, and it is the website that stores the documents to be served. If the portfolio controller never clicks on the link, have the documents been brought to their attention? Is the service effective in this scenario? This problem is particularly acute in the tech-savvy crypto space, where many avoid clicking on links for fear of hacking and theft of their virtual assets.

In order to circumvent this problem, a plaintiff may consider converting digital scans of Court documents into non-fungible tokens (“NFTs”) and airdropping the NFTs themselves. Arguably, this method means that the court documents were actually received at the address, and not simply linked. Evidence that the wallet is frequently used would also be helpful.

Overall, the New York State Supreme Court should be commended for tackling this difficult issue head-on and seeking to evolve the means of service to match technology. We expect to see similar requests for permission to serve via air-dropped tokens in jurisdictions around the world.

]]>
Amanda Todd received ‘blackmail and threatening’ messages, says her father https://reservocation.com/amanda-todd-received-blackmail-and-threatening-messages-says-her-father/ Wed, 08 Jun 2022 01:14:00 +0000 https://reservocation.com/amanda-todd-received-blackmail-and-threatening-messages-says-her-father/ Norman Todd tells court his daughter was shaken by several online posts: ‘She was scared and a bit panicked’ The story may contain disturbing content; reader discretion is advised. The Port Coquitlam student’s father, Amanda Todd, spoke in British Columbia Supreme Court in New Westminster this afternoon (Tuesday), reiterating his ex-wife’s testimony about concerns over […]]]>

Norman Todd tells court his daughter was shaken by several online posts: ‘She was scared and a bit panicked’

The story may contain disturbing content; reader discretion is advised.

The Port Coquitlam student’s father, Amanda Todd, spoke in British Columbia Supreme Court in New Westminster this afternoon (Tuesday), reiterating his ex-wife’s testimony about concerns over their late daughter’s use of social media.

Norman Todd told Judge Martha Devlin and the jury that Amanda had a personal laptop with a camera and a cell phone, and used her own computer, while living with him in Port Coquitlam and Maple Ridge.

Todd said he knew Amanda had posted singing videos on YouTube and that she knew she was a regular Facebook user. Her computer and cell phone were “a big priority for her”.

“She had a lot of friends but she was going through a lot of friends quickly” and had problems at her schools, he told the court on June 7. “Social media was very important to her. I knew she was chatting a lot online.

At one point, when he took away her access to technology, she left her home for her mother Carol Todd’s home in Port Coquitlam.

Yet Amanda also shared some disturbing messages she had received with him. “Someone was stalking her online, the pedophile,” Todd said, adding that the content was about Amanda exposing herself on digital platforms.

These messages, which were also shared with her friends and family, “blackmailed and threatened her. She was scared and a little panicked.

Todd said his daughter sent several messages online, which he reported to the RCMP, and he also received two or three messages in his inbox with hyperlinks showing his daughter topless.

During an RCMP visit, police recommended the parents ban Amanda from social media – a decision Todd called “difficult”.

“It was one of his ways of social activity,” he testified.

And Todd said when he cut her off from tech, “she freaked out.”

Still, his move from Port Coquitlam to Maple Ridge with Amanda allowed him to step away from bullying at Pitt River Middle School and enroll in a new school, Westview Secondary, as well as get a fresh start — far of the “pedophile”. Todd told the court.

“The number one reason [for the move] was the pedophile,” he told the court.

Aydin Coban, originally from the Netherlands, is being tried on five counts. On Monday June 6, he pleaded not guilty to:

  • extortion
  • import and distribute child pornography
  • possession of child pornography
  • communicate with the intention of attracting a child
  • stalking

None of the allegations are proven in court.

SCHOOL CHANGES

Todd testified that Amanda had trouble at Westview and Maple Ridge High Schools.

She struggled physically in February 2012. The following month she returned to live with her mother, he said.

const. Ryan Henley, the third Crown witness, told the jury that he was a youth resource officer in Maple Ridge in 2011 and during that time knew Amanda and the cases she was associated with.

He cited an incident in 2011 when a person named “Katie Hutchkins” emailed school administration at Westview Secondary, providing hyperlinks to her online activity and warning staff that he was their duty to report it to the authorities.

“Obviously they have failed in their parenting yet again,” the email read, referring to Carol and Norm Todd, and saying hundreds of people had viewed her explicit video online.

“It will ruin his life if this continues,” the email warned.

The now-retired officer said he reported the email to Ridge-Meadows Detachment Major Crimes Section and forwarded it to Coquitlam RCMP for investigation.

The trial continues.

]]>
How to create a web scraping package to extract hyperlinks in 10 minutes using Python? https://reservocation.com/how-to-create-a-web-scraping-package-to-extract-hyperlinks-in-10-minutes-using-python/ Tue, 07 Jun 2022 13:31:45 +0000 https://reservocation.com/how-to-create-a-web-scraping-package-to-extract-hyperlinks-in-10-minutes-using-python/ In the current situation of web page design, we find pages associated with various hyperlinks. In short, hyperlinks means the webpage linked to other webpages where the link to the webpages will be given as words in underlined text where the viewers of the webpage can redirect to the needed link. So, this article introduces […]]]>

In the current situation of web page design, we find pages associated with various hyperlinks. In short, hyperlinks means the webpage linked to other webpages where the link to the webpages will be given as words in underlined text where the viewers of the webpage can redirect to the needed link. So, this article introduces a custom web scraper module created to extract various hyperlinks present in a webpage.

Contents

  1. Introduction to Web Scraping
  2. Creating a custom python file (py)
  3. Running custom python (py) file
  4. Summary

Introduction to web scraping

Web scraping is a process of lawfully collecting data or information in the required format from the web and Python offers extensive support for collecting data from the web by offering powerful and efficient modules and libraries.

There are various web scraping packages in python. Selenium, UrlLib and BeautifulSoup (bs4) are some of the modules to name a few. Among these popular modules available, a custom python package is implemented in this article using various built-in functions of BeautifulSoup to extract the hyperlinks present in a single web page.

Any python package implemented for web-based data collection must adhere to legal data collection by requesting data collection from particular web pages.

Creating a custom python file (py)

A custom python file can easily be created in google colab or in jupyter. Regarding colab, since it is one of the cloud-based work environments, we can start with an ipynb file first.

The first cells of the ipynb file should include the import instructions for the libraries required to perform the tasks. In this article, the custom web scraper is built using Beautiful Soup and the imported libraries for the same are shown below.

from bs4 import BeautifulSoup
import requests,re

After the required libraries are imported, a user defined function is created to send a request for the web page to collect data and it is stored in the variable. Later, from the variable, only the text of the request granted from the website will be accessible. The user defined function created for the same is shown below.

def original_htmldoc(url):
 response = requests.get(url) ## the get inbuilt function is used to send access request to the url
 return response.text ## text function is used to retrieve the text from the response

If needed, some print declarations and custom input declarations can be given as needed. The custom print statement used in the python webscrapping package is shown below.

print('Enter a url to scrape for links present in it')

A custom input has also been declared which allows the user to enter their own required web page link using the to input() operate as shown below.

url_to_scrape=input('Enter a website link to extract links')

The web page mentioned by the user is now passed to the user defined function given above to get a data collection request and the granted request is stored in a particular variable as shown below.

html_doc= original_htmldoc(url_to_scrape)

Now the html parser is used on top of the Beautiful Soup web scrapping python package to identify the hyperlinks present in the web page as shown below.

soup = BeautifulSoup(html_doc, 'html.parser')  ## html parser is used to identify the hyperlinks within the same web page

Now the parsed content of the web page is iterated through the find all() BeautifulSoup’s method to search the hyperlinks associated with the web page mentioned by the user and the hyperlinks are collected using the obtain() BeautifulSoup’s method for referral links present in the same web page. The corresponding code is shown below.

for link in soup.find_all('a',attrs={'href': re.compile("https://")}):  ## findall is used to obtain a list of various hyperlinks in the mentioned web page in form of a list

 print(link.get('href'))

The link entered when running the python file in the custom input function is shown below.

The generated output for the above mentioned link is shown below.

The generated output basically describes the various hyperlinks present in the aforementioned link entered by the user. So this python (py) file can be used as a module or an executable statement to run on different instances. Using the python (py) file in another working instance is explained below.

Running custom python (py) file

As mentioned earlier, the created custom python (py) file can now be run in a different job instance. In this article, the custom python file created was downloaded as a py file and uploaded to a working directory using Google Cloud Platform. The appearance of the python file in the working directory will be as shown below.

So once the custom python file is available, an ipynb file has been picked up in the same working directory. Initially the drive was mounted in the working environment by browsing to specify the path to the directory containing the python (py) file as shown below.

from google.colab import drive
drive.mount('/content/drive')

If the drive mount is successful, we will produce an output as shown below.

Now the command line utilities are specified as shown below to access the python file (py) directory.

!ln -s /content/gdrive/My Drive/ /mydrive
%cd /content/drive/MyDrive/Colab notebooks/Web_Scrapping

If the command line utilities are used appropriately as mentioned above, we will get output of the command line instructions for proper traversal to the python (py) file directory as shown below.

So, once the working directory is successfully traversed, we can run a python executable statement as shown below to get hyperlinks in any of the web pages required by the user.

!python link_extractor_py.py

When the above mentioned executable statement is executed in a particular cell of a python notebook, the command will ask the web page user to check the hyperlinks as shown below.

Now the user has to enter a webpage link in the blank space and the executable command will now be responsible for generating hyperlinks present in that particular webpage according to the logic present in the python (py) file. Some of the hyperlinks identified by the executable statement are shown below.

Summary

So this is how the article focuses on how to create a custom python (py) file using standard web scrapping python packages and then later run it in different instances or environments work and provide the user with the ability to view various hyperlinks present in a single web page. and access it appropriately with a single click to get the necessary information.

References

]]>