{"id":150,"date":"2010-06-21T10:32:18","date_gmt":"2010-06-21T14:32:18","guid":{"rendered":"http:\/\/sites.scranton.edu\/tag\/?p=150"},"modified":"2010-06-21T10:32:18","modified_gmt":"2010-06-21T14:32:18","slug":"computer-control","status":"publish","type":"post","link":"https:\/\/sites.scranton.edu\/tag\/2010\/06\/21\/computer-control\/","title":{"rendered":"Computer control"},"content":{"rendered":"<p>Last week Brian Croxall from Clemson University wrote a <a href=\"http:\/\/chronicle.com\/blogPost\/Taking-Control-of-Your\/24834\/\" target=\"_blank\">post<\/a> for <a href=\"http:\/\/chronicle.com\/blog\/ProfHacker\/27\/\" target=\"_blank\">ProfHacker<\/a> about faculty needing to have control over their own computer resources.\u00a0 An excerpt:<\/p>\n<blockquote><p>Now I have nothing against IT Staff. In my interactions with them at the two schools where I&#8217;ve taught, they have been helpful and friendly. But relying on another person to adjust the tools that <em>I<\/em> need for <em>my<\/em> research is never efficient, and it suggests that researchers or teachers are not in a position to judge what is best for them. (I&#8217;ve been told, for instance, that I could not install specialized software we were using in class on a classroom&#8217;s podium computer because it would deviate from the standard software set.) If the computer is the equivalent of laboratory equipment&#8211;and for many in the humanities, it is the only &#8220;laboratory equipment&#8221; we have&#8211;then we should have control over its use.<\/p><\/blockquote>\n<p>Any thoughts? Is this an issue for you on our campus? Post to the comments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week Brian Croxall from Clemson University wrote a post for ProfHacker about faculty needing to have control over their own computer resources.\u00a0 An excerpt: Now I have nothing against IT Staff. In my interactions with them at the two schools where I&#8217;ve taught, they have been helpful and friendly. But relying on another person [&hellip;]<\/p>\n","protected":false},"author":80,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[485,494],"tags":[669,679],"class_list":["post-150","post","type-post","status-publish","format-standard","hentry","category-announcements","category-security-2","tag-security","tag-standard-user-accounts"],"_links":{"self":[{"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/posts\/150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/users\/80"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/comments?post=150"}],"version-history":[{"count":0,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/posts\/150\/revisions"}],"wp:attachment":[{"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/media?parent=150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/categories?post=150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/tags?post=150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}