JacketFlap connects you to the work of more than 200,000 authors, illustrators, publishers and other creators of books for Children and Young Adults. The site is updated daily with information about every book, author, illustrator, and publisher in the children's / young adult book industry. Members include published authors and illustrators, librarians, agents, editors, publicists, booksellers, publishers and fans. Join now (it's free).
Login or Register for free to create your own customized page of blog posts from your favorite blogs. You can also add blogs by clicking the "Add to MyJacketFlap" links next to the blog name in each post.
Viewing: Blog Posts Tagged with: Internet, Most Recent at Top [Help]
Results 1 - 25 of 335
How to use this Page
You are viewing the most recent posts tagged with the words: Internet in the JacketFlap blog reader. What is a tag? Think of a tag as a keyword or category label. Tags can both help you find posts on JacketFlap.com as well as provide an easy way for you to "remember" and classify posts for later recall. Try adding a tag yourself by clicking "Add a tag" below a post's header. Scroll down through the list of Recent Posts in the left column and click on a post title that sounds interesting. You can view all posts from a specific blog by clicking the Blog name in the right column, or you can click a 'More Posts from this Blog' link in any individual post.
Acho que o que vou dizer vai parecer algo incrível para alguns, mas é perfeitamente possível debater online SEM:
– agredir verbalmente o colega; – usar falácias relacionando coisa alguma com coisa nenhuma; – usar expressões vagas como "sementes do mal" , "defensores dos manos", "bandido bom é bandido morto", "coxinha", "esquerdopata", "feminazi"; – fazer ameaças, revelando a própria maldade, tipo: "espero que matem alguém de sua família", "espero que lhe estuprem", "torço pra que aconteça com você"; – usar referências de baixa credibilidade como Olavo de Carvalho, revista Veja, pregacões de pastores-vindilhões; – usar argumentos religiosos como se todo mundo fosse obrigado a seguir a mesma religião (que, aliás, tampouco seguem de fato); – ser preguiçoso e responder com memes prontos quando não sabe o que dizer; – GRITAR (tira o dedo do capslock); Ou sentar o dedo no potássio (kkkkk) – como diria o Leandro Karnal.
The Federal Trade Commission has just sent a press release touting its first successful action against a failed Kickstarter campaign.
The FTC’s mission is to protect consumers from false or misleading advertising, and as part of its new FinTech program the agency is developing new strategies for curbing deceptive practices online. Target #1: The Doom That Came to Atlantic City, a crowdfunded vaporware boardgame that netted more than $122,000 for its would-be creator.
Anyone planning to start a Kickstarter campaign might want to consider what the FTC found wrong with this failed campaign and the penalties imposed in the resulting settlement. And if you’re wondering what this case could mean for the future, the FTC is hosting a Twitter chat with its attorneys today (Thursday, June 11) from 2-3pm.
In its first case involving crowdfunding, the Federal Trade Commission has taken legal action against the deceptive tactics of a project creator who raised money from consumers to produce a board game through a Kickstarter campaign, but instead used most of the funds on himself. The defendant has agreed to a settlement that prohibits him from deceptive representations related to any crowdfunding campaigns in the future and requires him to honor any stated refund policy….
According to the FTC’s complaint, Chevalier represented in his Doom campaign on Kickstarter.com that if he raised $35,000, backers would get certain rewards, such as a copy of the game or specially designed pewter game figurines. He raised more than $122,000 from 1,246 backers, most of whom pledged $75 or more in the hopes of getting the highly prized figurines. He represented in a number of updates that he was making progress on the game. But after 14 months, Chevalier announced that he was canceling the project and refunding his backers’ money.
Despite Chevalier’s promises he did not provide the rewards, nor did he provide refunds to his backers. In fact, according to the FTC’s complaint, Chevalier spent most of the money on unrelated personal expenses such as rent, moving himself to Oregon, personal equipment, and licenses for a different project.
Under the settlement order, Chevalier is prohibited from making misrepresentations about any crowdfunding campaign and from failing to honor stated refund policies. He is also barred from disclosing or otherwise benefiting from customers’ personal information, and failing to dispose of such information properly. The order imposes a $111,793.71 judgment that will be suspended due to Chevalier’s inability to pay. The full amount will become due immediately if he is found to have misrepresented his financial condition.
This case is part of the FTC’s ongoing work to protect consumers taking advantage of new and emerging financial technology, also known as FinTech. As technological advances expand the ways consumers can store, share, and spend money, the FTC is working to keep consumers protected while encouraging innovation for consumers’ benefit.
Light occupies a central place in our understanding of the world both as a means by which we locate ourselves in nature and as a thing that inspires our imagination. Light is what enables us to see things, and thus to navigate our surroundings. It is also a primary means by which we learn about the world – light beams carry information about the constituents of the universe, from distant stars and galaxies to the cells in our bodies to individual atoms and molecules.
On our first date, my husband-to-be asked what I did for a living. I told him I was a school librarian. "Well there's a profession that will be obsolete in twenty years," he chuckled. I did not chuckle. I did marry him and twenty five years later I am still waiting for his prediction to come true.
OK, I admit that twenty five years ago I never dreamed that I would have a phone that could help me find my way around the zillion streets of Atlanta named "Peachtree." Or a device that could download hundreds of books, cutting down considerably on overweight luggage fees. My 1989 school library had computers, but they were little more than fancy typewriters. Who knew that entering the right search words on my jazzy little laptop could find pictures of the battleships my father-in-law served on in WWII? Or the history of the long demolished amusement park of my childhood, the genesis of The Roller Coaster Kid? Yes, Craig was right...I could access all that information without setting foot in a library.
But yet there are still libraries. In my neck of the woods, it appears that most people are there for free computer time and to check out videos. If I am there, it is to do research. Guess what? Not everything is available on the Internet. At least not for free. When I wrote Jimmy's Stars and Yankee Girl I spent months reading newspapers from WWII and the 1960's....on microfilm machines. While there are a good number of old periodicals available online these days, they never seem to be the ones I need or there is a hefty fee to join a database. All the branch libraries in my immediate area were built in the last 15 years and don't have microfilm machines. But if I need one, all I have to do is go downtown to the main library.
The library is a source of professional literature such as Library Journal or Publisher's Weekly. Usually they are kept in the librarians' work area, but they have always let me read them on the premises if I ask. There are also databases and reference materials that I can't find anywhere else...at least not for free.
I have had the good fortune to have worked in a university library which gave me access to all kinds of information not found in a public library. My library allowed the public to use the collection for a nominal yearly fee. As an employee I had free reign, but even if I hadn't, I would have paid the fee. It's something to investigate.
I could go on forever about the information that you will find only in a library....but why tell you? Check it out yourself. By the way, my husband has had to finally admit that libraries and librarians are not obsolete or likely to become so any time soon.
For many of you, by now your little ones will be well and truly back into the school routine. Apart from the usual school-related requirements, you may have also restocked your return-to-school library, determined to share the educational and emotional journey your child is embarking on, perhaps for the first time. You will find some […]
The title is from this fascinating article from the NewYorker, which gave me much food for (rambling) thoughts about words and reality, libraries and the Internet, memories and memorials.
In it, the writer attacks the myth that what’s online stays online forever. Instead, she says, the Internet is intrinsically ephemeral. Unlike books, the Internet cannot be catalogued because it lacks the dimension of time; online, it’s always today. Academic and legal footnotes and references to books and documents (those painstaking page numbers, edition, publish date) have been replaced by web links. But what happens when those links no longer exist? The evidence disappears, the original source vanishes; anything could be true.
Anyone who says we no longer need libraries because ‘it’s all online’ should read this article. It isn’t all online. Some of it might have been, yesterday, but that’s no guarantee that it will be today. Or it might look like what was there yesterday is still there today, but in fact it could have been completely rewritten since yesterday, and you’d never know.
Funnily enough, I spent most of yesterday hunting for an online article about some Russian legislation, adopted in October last year, that retroactively legalises pro-Russian authorities in Crimea from February 2014 when Crimea, according to Russian law, was legally part of Ukraine. From a legal point of view, Russia rewrote history with that bit of legislation.
The article, as far as I can see, is no longer on the Internet. It disappeared, and history is rewritten.
I know, history is always rewritten, that’s whathistory is; a constant interrogation of the evidence from yesterday, viewed through the inescapable prism of today. But what if the evidence from yesterday no longer exists? What if it’s been written over, or just disappeared?
Two years ago I visited the museum of political history in St Petersburg. It used to be called the museum of the revolution (there you go, history rewritten). It’s full of fascinating exhibits, but the one that struck me most was a catalogue of exhibits that weren’t there.
It was a fat, handwritten ledger, open on a page listing all the documents and artefacts relating to Trotsky which had been removed in the late 1920s, when Trotsky was ‘rewritten’ as an enemy of the people. The museum staff had got rid of the historical evidence, yet they had kept a carefully catalogued record of the evidence that no longer existed. I really wonder why they did that. Despite orders to rewrite the past did they too believe, like the Internet librarians, that ‘our job is memory’?
Is that really what a library is – a repository of memory? As someone who uses libraries all the time as a reader and as a writer (just got my PLR statement, hurrah!) I started to wonder, do we write books, fact and fiction, because at least part of our job is memory?
Libraries are repositories of facts and interpretations of facts to make versions of history, but they are also a storehouse for imaginary worlds and other people’s memories. We write things down so as not to forget them. We record them and we transform them through language, through fancy, through characters, into (in the best books) something unforgettable.
Do we write (do we read) to remember, or to be remembered?
This is my last post for ABBA, for the moment anyway. Its been a privilege to contribute alongside such wonderful fellow writers, and a huge thank you to the administrators who keep it running. If you’re interested, you can follow my blog, updated mostly about Ukraine and Crimea affairs these days. Thanks for reading!
Diana Gabaldon wrote the first book of her eight book Outlander Series in the early 90’s, so I am sure many of you have already read these books by now. But if you haven’t read them I highly recommend that you do. The first book sat on my book shelf for two years before I picked it up to read in October. This series is hands down the Best Adult book(s) I read this year! The only problem is that each book is at least 1100 words in length, so each one is like reading three YA novels.
Outlander – Book 1
Dragonfly In Amber – Book 2
Voyager – Book 3
Drums Of Autumn – Book 4
Gone Girl by Gillian Flynn – Great voice
Influx by Daniel Suarez – Has anyone read this book. I am almost half way through reading and I haven’t started to enjoy it yet. Does it get better?
Into the Still Blue by Veronica Rossi – The third book of one of my favorite series.
Deep Betrayal by Anne Greenwood Brown – The third book of one of my favorite series.
Pretties by Scott Westerfeld – The second book of the Uglies Series – one of my favorite series
Specials by Scott Westerfeld – The third book of the Uglies Series – one of my favorite series.
Infinite Sea by Rick Yancey – second book in 5th Wave Series
Contemporary YA Standalone Novels
We Were Liars by E Lockhart – Great voice
Pandemic by Yvonne Ventresca - thoroughly enjoyed this book
Panic by Lauren Oliver – Love everything she writes.
Before I Fall – by Lauren Oliver – Love everything she writes.
Flat Out Love by Jessica Park – Jessica proves that self-published books can be great.
Life As We Knew It by Susan Beth Pfeffer
Giver by Lois Lowry – 1994 Newbery Medal winner
Middle Grade Novels
Wheels of Change by Darlene Beck-Jacobson – Hits all the things that people look for in a perfect middle grade book.
The Junction of Sunshine and Lucky by Holly Schindler – on Darlene Beck Jacobson’s recommendation – another well-written and enjoyable book.
Cirque du Freak: Vampire Mountain by Darren Shan – Book Four – This series is great for kids who love to be scared. 12 books to this series.
Lined up on my nightstand for 2015 so far
The Young Elites by Marie Lu – bought this book because I loved her legend series.
Atlantia by Ally Condie - bought this book because I enjoyed her Matched Series.
Paradox by Ammi Joan Paquette – bought this book because I wanted to read something written by Joan.
Fangirl by Rainbow Rowell – bought because of the reviews.
Eleanor & Park by Rainbow Rowell – bought because of the reviews.
Where’d You Go Bernadette? by Maria Semple – bought because of the reviews.
Ocean at the End of the Lane by Neil Gaiman – bought because it was written by Neil
The light Between Oceans by M.I. Stedman – bought because of the reviews.
The Goldfinch by Donna Tartt – bought because it won the Pulitzer Prize.
The Martian by Andy Weir – bought because of Goodreads reviews.
Red Rising by Piece Brown – Bought because of reviews.
End of Days by Susan Ee – Coming out May 12th 2015 – Pre-ordered because it is the third book in the Angel Series, which I loved.
Proof of Forever by Lexa Hillyer – Coming out June 2nd 2015. Pre-order because it is written by Lexa.
Do you have a book that you thoroughly enjoyed? I’d love to hear about the book and why you loved it.
My technophobic wife has taken an increasing shine to internet shopping.
Point, click, receive, wrap… Point, click, receive, wrap…
At this point, you might be thinking this is another husband-rant about all of the clicking activity and the bill that will come due in January. Well, that may be a subject for another post (I hope the title changes), but right now I’m trying to wrap my mind around the amount of email spam that her clicking has brought us. You see, we share an email account. Mistake? Maybe… but it has worked thus far.
Here is the problem, cleaning my inbox is the one thing I’m OCD about. I need it to be current or I lose focus. At work, I churn through emails faster than a Gopher on balsa-wood. If I can answer it immediately, it is gone. If it makes me mad, gone. If it is ambiguous and may not pertain to me, whoops, I hit delete. My inbox is squeaky-clean. The one at work, that is.
The shared inbox at home gets bogged down in December with order confirmations, shipping information, and advertisements. Oh the advertisements. Did I mention my wife is a technophobe? So, while she has mastered the checkout function of two hundred seventy-four websites, I can’t convince her that they won’t think any less of her if she unchecks the little box that says, “Would you like us to send you an ungodly amount of emails that are irrelevant, obnoxious, and likely to cause enmity between husband and wife?”
I should be working a second job to prepare for the aforementioned bill, but I spend my December trying to unsubscribe from every mailing list known to mankind. Only they lie to you when they allow you to hold the illusion that leaving them is an option. It’s a web of deceit – an impossibility. You cannot be removed from mailing lists. “You have been removed from our mailing list. We are sorry to see you go” is a lie from the bowels of the earth.
What the little button should say is, “Thank you for verifying your existence, I will now torture you every fifteen minutes with a blinking email reminder of your incompetence.”
After trying unsuccessfully to remove our email address from yet another list, I marched to the den, bowed out my chest, and sternly gave my wife an ultimatum!
“Either you learn to uncheck the subscribe button, or we are changing our email address!”
Women don’t like ultimatums.
Of course, our email address remains the same and though wounded and alone, I am off to fight a MailChimp.
Children have become heavy new media users. Empirical data shows that a number of children accessing the internet – contrary to the age of users – is constantly increasing. It is estimated that about 60% of European children are daily or almost daily internet users, and therefore, by many they are considered to be “digital natives”.
However, in our view, the use of this “digital natives” concept is misleading and poorly founded, and is based on the assumption that children are quick to pick up new technologies. A recent EU Kids Online study invalidates this assumption. The study shows that even though children actively surf on various online applications, they lack digital skills such as bookmarking a website, blocking unwanted communications, and changing privacy settings on social networking sites. Many children are not capable of critically evaluating information and changing filter preferences.Interestingly, the lack of skills to perform specific tasks while being online does not impinge on children’s beliefs in their abilities – 43% of surveyed children believe to know more about the internet than their parents. At the moment, no correlation between this proclaimed self-confidence and their actual understanding of how internet works can be done due to the lack of data. Nevertheless, it is worth questioning whether, and to what extent, it is reasonable to expect that children understand the implications of their behaviour and what measures could mitigate children’s online risks in the most efficient and effective way.
It is probably closer to the truth to say that, in terms of privacy and data protection awareness, children are anything but “digital natives”.
Indeed, children’s actions online are being recorded, commercialised and serve for the purposes of behavioural advertising without them actually realising. This media illiteracy is tackled by awareness raising campaigns and policy measures on domestic and EU levels. However, it seems that these measures only partially address the challenges posed by children’s online engagement.
The European Commission (EC) seems to be in favour of legislative measures providing for a stronger legal protection of children’s personal data in the online environment. In Article 8 of the proposal for the General Data Protection Regulation, the EC introduces verifiable parental (or custodian) consent that would serve as a means of legitimising the processing of a child’s personal data on the internet.
Article 8 of the proposal foresees that parental consent would be required in cases where the processing operations entail personal data of children under the age of 13. The age of 13 would be the bright-line from which the processing of children’s personal data would be subjected to fewer legal constraints.
In practice, this would divide all children into two groups; children that are capable to consent (i.e. 13-18 year olds) to the processing of their personal data and children that are dependent on parental approval of their online choices (i.e. 0-13 year olds). Drawing such a strict line opposes the stages of physical and social development. Also, it requires the reconsideration of the general positive perception of the proposed parental consent from a legal point of view. In particular, it is necessary to evaluate whether the proposed measure is proportionate and whether it coincides with the human rights framework.
In a recent article published in the International Data Privacy Law Journal, we have analysed the proposal to distinguish between children younger and older than 13 years and found many practical and principled objections. Apart from the practical objections, which are often self-evident (e.g. what about the protection of children in the age group from 13 to 18 year old? How to ensure the enforcement of the proposed parental consent?), there are several fundamental problems with the proposed 13 years-rule.
The bright-line rule, which would require data controllers to obtain parental consent before processing personal data of children aged under 13, seems to be incompatible with the notion of evolving capacities. The proposed measure is based on the assumption that from the age of 13 all children are able to provide an independent consent for the processing of their personal data in the online environment. The proposed Article 8 ignores the fact that every child develops at a different pace and that the introduction of parental consent does not ensure more guidance regarding online data processing. We also regret that Article 8 in its current form doesn’t foresee a way in which children could express their own views regarding the data processing operation; the responsibility to consent would rest exclusively with a parent or a legal guardian. This set-up opposes the idea of children’s participation in the decision-making process that concerns them, an idea anchored in the UN Convention on the Rights of the Child (UNCRC) and that is recognised by both the EU and its Member States.
Finally, our analysis suggests that children’s rights to freedom of expression and privacy may be undermined, if the proposed parental consent is introduced. As a result of Article 8, children’s access to information could become limited and dependent on parents. Also, the scope of their right to privacy would shrink as parents would be required to intervene in children’s private spaces (e.g. gaming accounts) to make informed choices. Therefore, it can be observed that the introduction of parental consent contradicts the key principles of human rights law enshrined in the UNCRC.
Featured image credit: Student on iPod at school. Photo by Brad Flickinger. CC-BY-2.0 via Flickr.
Hiaasen, Carl. 2014. Skink - No Surrender. New York: Knopf. (Advance Reader Copy) Skink - No Surrender is Carl Hiaasen's first foray into YALit, and he's making his entrance in a big way, employing Skink —the outrageous and outlandish character from his adult novels.
In keeping with his customary practice of setting books in Florida's great outdoors (Hoot, Flush, Scat, Chomp), Skink No Surrender begins on a Florida beach where Richard finds Skink buried in the sand—on the hunt for turtle egg poachers. Though at first taken aback by the one-eyed, cammo-wearing giant of a man with buzzard beaks braided into his beard, Richard soon finds out that he is the ex -Florida governor and a force to be reckoned with - even if he is presumed to be dead.
All kinds of wild rumors got started, and some of them turned out to be true. According to one Wikipedia entry, the ex-governor became a wandering hermit of the wilderness, and over the years he'd been a prime suspect in several "acts of eco-terrorism." Interestingly, he'd never been arrested or charged with any serious crimes, and it seemed to me that the targets of his anger were total scumbags, anyway. The web article included interviews with a few witnesses who'd supposedly encountered Clinton Tyree by chance. They said he'd lost an eye, and was going by the name of "Skink." They had differing opinions about whether or not he was nuts. The most recent entry quoted the governor's closest friend, a retired highway patrol trooper named Jim Tile, who said: "Clint passed away last year int he Big Cypress Swamp after a coral snake bit him on the nose. I dug the grave myself. Now, please let him rest in peace." Except the man was still alive.
An unlikely pair, Skink and Richard team up to find Richard's cousin, Malley, who has run off with (or been kidnapped by) a young man she met online.
An intense hunt takes the two across the swamps in search of Malley and a dangerous impostor. Suspenseful and very funny at the same time, Skink No Surrender presents a case for Internet safety, bird habitat conservation, and the value of family, but you'll be havimg so much fun that you won't even notice!
Now that the Internet has been with us for over 25 years, what are we to make of all the concerns about how this new medium is affecting us, especially the young digital natives who know more about how to maneuver in this space than most adults?
Although it is true that various novel media platforms have invaded households in the United States, many researchers still focus on the harms that the “old” media of television and movies still have on youth. The effects of advertising on promoting the obesity epidemic highlight how so much of those messages are directed to children and adolescents. Jennifer Harris noted that children ages 2 to 11 get nearly 13 food and beverage ads every day while watching TV, and adolescents get even more. Needless to say, many of these ads promote high-calorie, low-nutrition foods. Beer is still heavily promoted on TV with little concern about who is watching, and sexual messages are rampant across both TV and movie screens. None of this is new, but the fact that these influences remain so dominant today despite the powerful presence of new media is testament enough that “the more things change, the more they stay the same.”
When it comes to the new media, researchers are more balanced. Sonia Livingston from the UK reported on a massive study done in Europe that found a lot of variation in how countries are dealing with the potential harms on children. But when all was said and done, she concluded that the risks there were no more prevalent than those that kids have confronted in their daily lives offline. What has changed there is the talk about the “risks,” without much delving into whether those risks actually materialize into harms. Many kids are exposed to hurtful content in this new digital space, but many also learned how to cope with them.
2013 E3 – XBOX ONE Killer Instinct B. Uploaded by – EMR -. CC-BY-2.0 via Flickr.
The perhaps most contentious of the new media influences is the emergence of video gaming, either via the Internet or on home consoles. The new DSM-5, which identifies mental disorders for psychiatrists, suggests that these gaming activities can become addictive. Research summarized by Sara Prot and colleagues suggests that about 8% of young people exhibit symptoms of this potential disorder. At the same time, we still don’t know whether gaming leads to the symptoms or is just a manifestation of other problems that would emerge anyway.
Aside from the potential addictive properties of video games, there is considerable concern about games that invite players to shoot and destroy imaginary attackers. Many young men play these violent video games and some of them are actually used by the military to prepare soldiers for battle. One could imagine that a young man with intense resentment toward others could see these games as a release or even worse as practice for potential harmdoing. The rise in school shootings in recent years only adds to the concern. The research reviewed by Prot is quite clear that playing the games can increase aggressive thoughts and behavior in laboratory settings. What remains contentious is how much influence this has on actual violence outside the lab.
On the positive side, other researchers have noted how much good both the old and new media can provide to educators and to health promoters. It is helpful to keep in mind that many of the concerns about the new media may merely reflect the age old wariness that adults have displayed regarding the role of media in their children’s behavior. In a recent review of the effects of Internet use on the brain, Kathryn Mills of University College London pointed out that even Socrates was skeptical of children learning to write because it would reduce their need to develop memory skills. Here again, the more things change, the more they remain the same.
Daniel Romer is the Director of the Adolescent Communication and Health Institutes of the Annenberg Public Policy Center. He directs research on the social and cognitive development of adolescents with particular focus on the promotion of mental and behavioral health. His research is currently funded by the National Cancer Institute and the National Institute on Drug Abuse. He regularly serves on review panels for NIH and NSF and consults on federal panels regarding media guidelines for coverage of adolescent mental health problems, such as suicide and bullying. He is the author of Media and the Well-Being of Children and Adolescents.
Subscribe to the OUPblog via email or RSS.
Subscribe to only psychology articles on the OUPblog via email or RSS.
As soon as humanity began its quest for knowledge, people have also attempted to organize that knowledge. From the invention of writing to the abacus, from medieval manuscripts to modern paperbacks, from microfiche to the Internet, our attempt to understand the world — and catalog it in an orderly fashion with dictionaries, encyclopedias, libraries, and databases — has evolved with new technologies. One man on the quest for order was innovator, idealist, and scientist Paul Otlet, who is the subject of the new book Cataloging the World. We spoke to author Alex Wright about his research process, Paul Otlet’s foresight into the future of global information networks, and Otlet’s place in the history of science and technology.
What most surprised you when researching Paul Otlet?
Paul Otlet was a source of continual surprise to me. I went into this project with a decent understanding of his achievements as an information scientist (or “documentalist,” as he would have said), but I didn’t fully grasp the full scope of his ambitions. For example, his commitment to progressive social causes, his involvement in the creation of the League of Nations, or his decades-long dream of building a vast World City to serve as the political and intellectual hub of a new post-national world order. His ambitions went well beyond the problem of organizing information. Ultimately, he dreamed of reorganizing the entire world.
What misconceptions exist regarding Paul Otlet and the story of the creation of the World Wide Web itself?
It’s temptingly easy to overstate Otlet’s importance. Despite his remarkable foresight about the possibilities of networks, he did not “invent” the World Wide Web. That credit rightly goes to Tim Berners-Lee and his partner (another oft-overlooked Belgian) Robert Cailliau. While Otlet’s most visionary work describes a global network of “electric telescopes” displaying text, graphics, audio, and video files retrieved from all over the world, he never actually built such a system. Nor did the framework he proposed involve any form of machine computation. Nonetheless, Otlet’s ideas anticipated the eventual development of hypertext information retrieval systems. And while there is no direct paper trail linking him to the acknowledged forebears of the Web (like Vannevar Bush, Douglas Engelbart, and Ted Nelson), there is tantalizing circumstantial evidence that Otlet’s ideas were clearly “in the air” and influencing an increasingly public dialogue about the problem of information overload – the same cultural petri dish in which the post-war Anglo-American vision of a global information network began to emerge.
What was the most challenging part of your research?
The sheer size of Otlet’s archives–over 1,000 boxes of papers, journals, and rough notes, much of it handwritten and difficult to decipher–presented a formidable challenge in trying to determine where to focus my research efforts. Fortunately the staff of the Mundaneum in Mons, Belgium, supported me every step of the way, helping me wade through the material and directing my attention towards his most salient work. Otlet’s adolescent diaries posed a particularly thorny challenge. On the one hand they offer a fascinating portrait of a bright but tormented teenager who by age 15 was already dreaming of organizing the world’s information. But his handwriting is all but illegible for long stretches. Even an accomplished French translator like my dear friend (and fellow Oxford author) Mary Ann Caws, struggled to help me decipher his nineteenth-century Wallonian adolescent chicken scratch. Chapter Two wouldn’t have been the same without her!
Photograph of Paul Otlet, circa 1939. Reproduced with permission of the Mundaneum, Mons, Belgium.
How do you hope this new knowledge of Otlet will influence the ways in which people view the Internet and information sites like Wikipedia?
I hope that it can cast at least a sliver of fresh light on our understanding of the evolution of networked information spaces. For all its similarities to the web, Otlet’s vision differed dramatically in several key respects, and points to several provocative roads not taken. Most importantly, he envisioned his web as a highly structured environment, with a complex semantic markup called the Universal Decimal Classification. An Otletian version of Wikipedia would almost certainly involve a more hierarchical and interlinked presentation of concepts (as opposed to the flat and relatively shallow structure of the current Wikipedia). Otlet’s work offers us something much more akin in spirit to the Semantic Web or Linked Data initiative: a powerful, tightly controlled system intended to help people make sense of complex information spaces.
Can you explain more about Otlet’s idea of “electronic telescopes” – whether they were feasible/possible, and to what extent they led to the creation of networks (as opposed to foreshadowing them)?
One early reviewer of the manuscript took issue with my characterization of Otlet’s “electric telescopes” as a kind of computer, but I’ll stand by that characterization. While the device he described may not fit the dictionary definition of a computer as a “programmable electronic device” – Otlet never wrote about programming per se – I would take the Wittgensteinian position that a word is defined by its use. By that standard, Otlet’s “electric telescope” constitutes what most of us would likely describe as a computer: a connected device for retrieving information over a network. As to whether it was technically feasible – that’s a trickier question. Otlet certainly never built one, but he was writing at a time when the television was first starting to look like a viable technology. Couple that with the emergence of radio, telephone, and telegraphs – not to mention new storage technologies like microfilm and even rudimentary fax machines – and the notion of an electric telescope may not seem so far-fetched after all.
What sorts of innovations would might have emerged from the Mundaneum – the institution at the center of Otlet’s “World City” – had it not been destroyed by the Nazis?
While the Nazi invasion signalled the death knell for Otlet’s project, it’s worth noting that the Belgian government had largely withdrawn its support a few years earlier. By 1940 many people already saw Otlet as a relic of another time, an old man harboring implausible dreams of international peace and Universal Truth. But Otlet and a smaller but committed team of staff soldiered on, undeterred, cataloging the vast collection that remained intact behind closed doors in Brussels’ Parc du Cinquantenaire. When the Nazis came, they cleared out the contents of the Palais Mondial, destroying over 70 tons worth of material, and making room for an exhibition of Third Reich art. Otlet’s productive career effectively came to an end, and he died a few years later in 1944.
It’s impossible to say quite how things might have turned out differently. But one notable difference between Otlet’s web and today’s version is the near-total absence of private enterprise – a vision that stands in stark contrast to today’s Internet, dominated as it is by a handful of powerful corporations.
Otlet’s Brussels headquarters stood almost right across the street from the present-day office of another outfit trying to organize and catalog the world’s information: Google.
On the Internet, terrorists can find a wide-open playground for particularly sophisticated violence. I have no doubt that the people at the US Department of Defense, when they brought about the inception of the Internet, never thought in their worst nightmares that come 2013, every terrorist splinter group would boast a website and that all the advantages of the Internet would be at the service of terrorists for organizing, planning, and executing their attacks on innocent people.
The Internet helps terror groups in a variety of activities: recruiting members, establishing communication, attaining publicity, and raising funds. Terror organizations direct their messages to their various audiences over the net with great sophistication. The primary audience is the central core of activists, who use the website as a platform for information about various activities. Messages are disguised by pre-agreed codes, and if you’re unfamiliar with the codes, you won’t understand what’s being talked about.
By means of such encoded messages, a global network of terror can operate with great efficiency. It can manage its affairs like an international corporation: the leader passes instructions to various operations officers around the world, and they pass instructions onward to their subordinates. Using the Internet for information transfer, the organization can create a compartmentalized network of activists who cannot identify one another. Even if one cell is exposed, the damage to the overall network is minimal. Ironically, that survivability was exactly the factor that guided the US Department of Defense when it set up the Internet in anticipation of a doomsday scenario.
The second audience that the terror websites speak to is the general community of supporters. Messages for them are open, not disguised, and the operational side is toned down a little. At the site for the general public, the focus is on negative messages regarding the terror organization’s target, and on legitimizing attacks against it without going into specifics. The site presents history in a way that suits its agenda, and often it tries to attract legitimate contributions for its activities by concealing them behind various charitable fronts.
Some of these sites sell souvenirs with the terror organization’s logo, as if it were a sports team. Thus fans can buy scarves or shirts that give them a strengthened sense of identification with the terror organization. The site allows visitors to join discussions, and in some cases it also tries to attract people from the community of true believers into the community of activists. Of course such a process is undertaken with much caution in order that spies not infiltrate the organization. When new volunteers are recruited, there is a great advantage to enlisting people who don’t fit the terrorist stereotype, since such people can serve as couriers without immediately arousing suspicion. On the other hand, the less the new volunteer belongs to the community from which the terror organization sprang, or resembles a member of that community, the greater the suspicion of untrustworthiness. So such a new volunteer will be performing under close watch, or will be assigned to a one-time task that is to end in the grave.
The third audience is the group to be terrorized. In addressing this group, the organization has the objective of arousing fear, and it publicizes its terror operations in order to “win” the audience to the idea that each of them, including their family and closest friends, is likely to be the next terror victim. This baleful message is accompanied by an ultimatum to the audience: if all its demands are not met, the terror organization will make good on all its threats. The terror organization will try to show that because it’s fighting for absolute justice and has no mercy as it makes its way to that goal, it’s unstoppable. It immortalizes its terrorism in well-concocted documentary films that portray successes among its deadly operations, and by documenting executions performed on camera.
Examining the way that terror organizations address their audiences over various channels, we can see that most terror organizations deploy a rather impressive public-relations corps. Many terror organizations, not satisfied with a website alone, expand onto social networks and use other net-based avenues such as e-mail, chats, and forums.
The language of terror is quite interesting. Terrorists lay all the blame on the other party, which they label the aggressor while they present themselves as the real victims who speak in the name of human rights and who champion the oppressed. Take for example the international terror organizations. They explain that terror is the only method they have for striking back defensively at the imperialist aggressor. The terror organizations delegitimize their opponents and describe their enemy as the ultimate aggressor, a perpetrator of criminal actions such as genocide, slaughter, and massacres. Sometimes the fight is considered part of a continuing religious war and the messages bear a religious aura. For instance, a jihad with the prophet Muhammad as the commander in chief, in charge of the courageous legions that the organization represents.
Terror organizations tend to describe their murderous activities as self-defense by a persecuted underdog. They ignore the human side of their victims and use the psychological tool of dehumanization against the opponent, defining it as a group that has no human face. Thus for example, after the attack on the Twin Towers and the Pentagon on 11 September 2001, the Al Qaeda organization completely ignored the thousands of murdered people and chose to focus on the indignities that the capitalist Americans had wreaked, and were continuing to wreak, and on the importance of the Twin Towers as a symbol of the western world’s decadence.
Over two years ago, before The Only Ones came out, I did a countdown of 99 things (books, movies, art, places, etc.) that inspired it. It was a fun way to revisit some stuff I was actively thinking about when I wrote the book, as well as some stuff I didn’t realize influenced me until I had some time to reflect.
Well, it’s 99 days until The Riverman hits shelves and I figured, why not do it all again? So, without further ado, here is my list of #99inspirations that I’ll be counting down daily on Twitter. This doesn’t represent all of my favorite things (sorry, no bright copper kettles and warm woolen mittens here), though it does include some stuff that I truly love. And hopefully it sparks some conversation about the stuff you love and the stuff that leaks into your creations.
One of the most prominent features of jurisdictional rules is a focus on the location of actions. For example, the extraterritorial reach of data privacy law may be decided by reference to whether there was the offering of goods or services to EU residents, in the EU.
Already in the earliest discussions of international law and the Internet it was recognised that this type of focus on the location of actions clashes with the nature of the Internet – in many cases, locating an action online is a clumsy legal fiction burdened by a great degree of subjectivity.
I propose an alternative: a doctrine of ‘market sovereignty’ determined by reference to the effective reach of ‘market destroying measures’. Such a doctrine can both delineate, and justify, jurisdictional claims in relation to the Internet.
It is commonly noted that the real impacts of jurisdictional claims in relation to the Internet is severally limited by the intrinsic difficulty of enforcing such claim. For example, Goldsmith and Wu note that:
“[w]ith few exceptions governments can use their coercive powers only within their borders and control offshore Internet communications only by controlling local intermediaries, local assets, and local persons” (emphasis added)
However, I would advocate the removal of the word ‘only’. From what unflatteringly can be called a cliché, there is now a highly useful description of a principle well-established at least 400 years ago.
The word ‘only’ gives the impression that such powers are of limited significance for the overall question, which is misleading. The power governments have within their territorial borders can be put to great effect against offshore Internet communications. A government determined to have an impact on foreign Internet actors that are beyond its directly effective jurisdictional reach may introduce what we can call ‘market destroying measures’ to penalise the foreign party. For example, it may introduce substantive law allowing its courts to, due to the foreign party’s actions and subsequent refusal to appear before the court, make a finding that:
that party is not allowed to trade within the jurisdiction in question;
debts owed to that party are unenforceable within the jurisdiction in question; and/or
parties within the control of that government (e.g. residents or citizens) are not allowed to trade with the foreign party.
In light of this type of market destroying measures, the enforceability of jurisdictional claims in relation to the Internet may not be as limited as it may seem at a first glance.
In this context, it is also interesting to connect to the thinking of 17th century legal scholars, exemplified by Hugo de Groot (better known as Hugo Grotius). Grotius stated that:
“It seems clear, moreover, that sovereignty over a part of the sea is acquired in the same way as sovereignty elsewhere, that is, [...] through the instrumentality of persons and territory. It is gained through the instrumentality of persons if, for example, a fleet, which is an army afloat, is stationed at some point of the sea; by means of territory, in so far as those who sail over the part of the sea along the coast may be constrained from the land no less than if they should be upon the land itself.”
A similar reasoning can usefully be applied in relation to sovereignty in the context of the Internet. Instead of focusing on the location of persons, acts or physical things – as is traditionally done for jurisdictional purposes – we ought to focus on marketplace control – on what we can call ‘market sovereignty’. A state has market sovereignty, and therefore justifiable jurisdiction, over Internet conduct where it can effectively exercise ‘market destroying measures’ over the market that the conduct relates to. Importantly, in this sense, market sovereignty both delineates, and justifies, jurisdictional claims in relation to the Internet.
The advantage market destroying measures have over traditional enforcement attempts could escape no one. Rather than interfering with the business operations worldwide in case of a dispute, market destroying measures only affect the offender’s business on the market in question. It is thus a much more sophisticated and targeted approach. Where a foreign business finds compliance with a court order untenable, it will simply have to be prepared to abandon the market in question, but is free to pursue business elsewhere. Thus, an international agreement under which states undertake to only apply market destroying measures and not seek further enforcement would address the often excessive threat of arrests of key figures, such as CEOs, of offending globally active Internet businesses.
Professor Dan Jerker B. Svantesson is Managing Editor of the journal International Data Privacy Law. He is author of Internet and E-Commerce Law, Private International Law and the Internet, and Extraterritoriality in Data Privacy Law. Professor Svantesson is a Co-Director of the Centre for Commercial Law at the Faculty of Law (Bond University) and a Researcher at the Swedish Law & Informatics Research Institute, Stockholm University.
Combining thoughtful, high level analysis with a practical approach, International Data Privacy Law has a global focus on all aspects of privacy and data protection, including data processing at a company level, international data transfers, civil liberties issues (e.g., government surveillance), technology issues relating to privacy, international security breaches, and conflicts between US privacy rules and European data protection law.
I, too, immediately thought, "Wow!" when I saw it.
I, too, accepted the idea that it must be David Foster Wallace's copy of Ulysses, because, well ... you've heard of David Foster Wallace, right?
I'm teaching a course in literary analysis in the fall and so am collecting whatever images I can find of the ways (reasonable or absurd) that serious readers annotate what they read. I zoomed in on the image to see if I could figure out the logic (or illogic) of it. But the pages didn't look like Ulysses to me. Nor, for that matter, did the style of annotation resemble what we know of DFW's style from the books at the Ransom Center. I zoomed in, and though the resolution was quite low, I made out what seemed to be two names: Maureen O'Sullivan and, at the top, Robert Mitchum. It looked to me like a biography of Robert Mitchum.
I sent a Tweet to the person who originally posted this; I assumed he'd just been joking, as anything with a bunch of weird annotations could jokingly be called DFW's something-or-other. Though I don't know his motivations, this still seems the most likely explanation. That everybody immediately and without any research assumed it was true and not a joke was ... illuminating.
I continued to wonder what the book was, though, and why someone had ... decorated it ... in the way they had. I didn't have time to track it down, but Bibliokept did, and came up with some interesting stuff. Check out that link — it's a fun detective game.
The image is still compelling and fascinating, despite not being a book of DFW's nor a copy of Ulysses. In some ways, it's more impressive that it isn't a complex text like Ulysses, but just a popular biography of a movie star.
You’re writing about a particular place, but your description feels flat. What you want, instead, is for your reader to feel as though they are actually “there.” Time for a field trip? But maybe that’s not possible—it would take time and money, lots of both if the location is far away from you.
I’ve discovered another solution: the map program on my computer and in particular the satellite and street level views. Granted, they will not give you the sounds and smells of a place, nor how it will look in a variety of seasons and weathers. Yet a map program can provide you with a surprisingly useful amount of detail.
Here are two examples of how I have used this resource:
Those computer maps are likely less than ten years old. How much use could they be for a story set almost five hundred years ago? Answer: quite a bit. Part of my story is set in Quarley, a tiny village of thatched-roof cottages in Hampshire, England. I know for a fact that they are at least forty years old. Four hundred plus? Maybe not. But in that relatively flat countryside there is one high spot, Quarley Hill, and it would have been there at the time of my story. I’ve seen it in person, but before that, I had seen it on Google Maps, and had written about it:
By mutual agreement, we angled toward Quarley Hill, a bump in the landscape that was our one local claim to any sort of height. Trotting up and down it, Frydd declared, was the best way for Bonesy to regain his mountain legs.
Later in the same manuscript, the main character and her companion are riding west toward Wales. Obviously there’s a big difference between modern roads in the UK and those of Tudor England. But I compared a British Ordnance Survey Historical Map of ancient Britain (also a useful resource) with a modern Ordnance Survey map of the same area, and so had a good idea of the probable route my riders took. Going to the area on Google Maps and going to the street view gave me this detail:
The Salisbury Plain had been flat. Now we rode through rolling countryside. We were in a valley, with slopes rising up on either side of the road.
Chances are I may find the program useful in a possible future project to be set in medieval Scotland—find a modern road through a wild area (plenty of those in the Highlands!) , and see what there is to see.
(However, Google seems to have changed its map program slightly since I did that. Instead of being able to move a little person-on-foot icon to a road, the program shows me a selection of street-level pictures. But this ought to be helpful also.)
I’ve also used the map program capabilities in my freelance copyediting, but in a way that would be just as useful for my writing. The text in question was from a contemporary novel set in New York City, in a scene that was set on the roof of a major theatrical landmark, and concerning what the characters could see from there. From the map program, I was able to determine which of the details given were, in fact, visible from that location, and which ones were iffy or impossible.
Writer’s block about your setting? Call up your map program, tell it where you want to go, let it get you down on the ground, and see what inspires you.
I don't 'do' Snapchat, unlike my little sister (19 years old), but I love dreaming about the narrative possibilities it offers. A murder mystery, where the serial killer sends short Snapchat videos with clues every time s/he strikes...
yeah, the logo looks more like a Casper story
Anyway, I'll never write that story, but I do love literature that talks about new technology. In many ways, it's difficult to think of a contemporary social realistic story, especially for teenagers, which wouldn't include smartphones and apps - Facebook, Tumblr, 2048, Google Maps - as a solution to many of the traditional adventure plotlines (nope, sorry, you can't be actually lost; nope, sorry, you can't actually be bored waiting for your train; nope, sorry, you couldn't not have known that she was in a relationship (and it's complicated)).
But I like it even more when stories integrate technology in a non-gimmicky way - as an essential part of the plot, as the plot. Many such stories are realistic: it's impossible to keep track of stories that revolve around mystery blog-writers, from rom-coms to dramas. Others are supernatural, but even a fantastical story like iBoy by Kevin Brooks is based on very real features of contemporary smartphones.
New technology offers possibilities both for entirely new plots and for interesting spins on older plots. There's been a spate of YA novels recently that revolve around revenge porn - one of them, in France, is mine. Of course revenge porn existed before smartphones, but the order of magnitude is different now, and so are, therefore, narrative possibilities - especially regarding character development, and some central themes of YA literature, such as gossip or bullying.
In my latest YA novel, Comme des images, there are snippets of Facebook conversations, YouTube comments, texts, emails - breaking up the narrative from time to time. Those are other voices, seemingly external to the plot, but actually crucial to it - because the existence of those hundreds of other voices is the very reason why the central event is so important: it isn't just there, it's also commented on, in the whole world.
Of course, you need to get those voices right, because it can just fail to ring true. Being friends on Facebook with teenagers of that age - in my case, my sister and all her friends - can help. I'm not sure I'd dare do it in English, where I'm not as familiar with the language used by teenagers. So does being very active on these platforms, or at least having an excellent understanding of them. I cringe when I read books in which it is clear that the author (either by themselves or pushed by an editor) has attempted to include some (generally gimmicky) references to apps, software, video games or device without knowing anything about it ("'I sent you a Twitter yesterday!' she chuckled.").
Hybrid texts where 'normal' narrative is sporadically broken by other types of discourse - from mock-tweets to mock-Wikipedia articles - can be highly sophisticated. There is immense value in harnessing the narrative possibilities that technological innovations offer us, not to be trendy; in part so that we continue to map, as faithfully as possible, the changes that are occurring in teenagers' lives, and make guesses as to how they might influence their personalities, their reactions, their tastes, their values. But it has literary and artistic value, too. Such uses are not - or shouldn't be - just a way of spicing up a dull, ordinary story: they can be the opportunity for intensely original, groundbreaking advances in storytelling, for YA literature and beyond. The only imperative is to avoid at all costs 'giving a message', 'warning' teenagers 'against' the 'dangers' of 'technology'. But frustratingly, in order to make them palatable to mediators, this pedagogical 'guarantee' is frequently used to qualify works which should instead be praised for being uncomfortable or unsettling, both ideologically and linguistically. Let's keep the unease, at all costs. Personally, in my double life - virtual, real, barely separated - saturated with a myriad different voices and worldviews, I have no patience for consensus and all the time in the world for controversy.
______________________________________________________________________ Clementine Beauvais writes books in both French and English. The former are of all kinds and shapes, and the latter a humour/adventure detective series, the Sesame Seade mysteries. She blogs here about children's literature and academia and is on Twitter @blueclementine.
Add a Comment
Let’s take a look at another feature that Amazon offers anyone who sells their books on their site.
Don’t miss out on using this feature. This is another reason why it is important to make sure your first chapter sings.
Personally for me to buy, I look over five things:
Price: I buy lots of ebooks that are offered at $1.99 or less, without having read anything about them.
Cover: I don’t buy books where I don’t like the cover, unless someone else said they were good. I guess I believe in first impressions.
Reviews: I read what book is about and a couple reviews. A few bad reviews don’t stop me from buying, since I’ve read many top-seller books that I thought were great that received a few terrible reviews.
Publisher: I check out who published the book. If it is from a well-known publisher, that could seal the deal right there.
Look inside: If I have not clicked the button to buy, I will “Look inside”. That’s when I put on my editor/agent hat and only give five minutes to the author to grab me before I make my decision. Sometimes the problem is that the book really grabs you and then you have to read the whole thing, even when the desk is piled with work and the kitchen needs to be clean. Many of those books have been self-published, so don’t stick your nose up at them or else you might missed something really good.
Here are some tips on using the “Look inside” feature.
1.Keep front matter to a minimum. You want to make sure the reader can get to the meat of the story quickly. This is also important to do this with the full ebook.
2.Amazon Reviews. Work hard to get as many as you can when you launch the book. This will help raise your ranking and buyers who have read the first pages will look at this, especially if you are self-published.
3.At the end of your book you should ask the reader to write a review. Stats show that this helps you increase your sales numbers.
4.Hot New Releases List on Amazon should be in the forefront of your mind when planning a launch. Talk to your publisher to see if they have planned your novels launch based on other similar books coming out. If there are too many it will hurt your chances of making the list. The list is only good for the first 30 days of a books release.
5.Making sure your blog followers know about your book and doing book tours can help get the word out. It’s nice to get the buzz going, but you need to make sure you keep the big guns for the launch date.
The wifi in my eldest daughter’s laptop died recently. Being the home’s Chief Technology Officer, I worked through the handy troubleshoot on the system which told me it was working perfectly. Of course, the inability to connect to the internet and the distraught look on my poor daughter’s face told me it wasn’t. No worries, I bought a USB dongle and she was up and running.
Little did I know that my trouble-shooting skills would soon be needed again. A week ago, she informed me that her dongle wasn’t working. Of course, at 11:15, my system was shut down, so I didn’t pay much attention and went to bed. When I awoke, I realized it wasn’t her computer – there was a wholesale internet outage in the house!
I think that is mentioned in Revelation, isn’t it? The Mark of the Beast and the inability to access High-Speed Wireless is in chapter 13, if I remember correctly. I looked outside and it didn’t appear the Battle of Armageddon had begun yet. A check of the beds told me the wife and kids were still here, so the rapture hadn’t left me behind (Whew!)
But I still had no internet.
This has happened before and I fixed it. What did I do? Oh yeah, I unplugged it and it rebooted itself. So I pulled the plug and let it regenerate. Unfortunately, the light blinking was still red long after power was restored. So I called my ever-helpful internet service provider and got stuck in the web of automated attendants who sound helpful, but are very patronizing. Don’t they know I am the CTO? That should give me some status, I would think.
My biggest problem wasn’t the self-righteous know-it-all computer voice on the other end of the phone, it was the fact that my cell phone service is spotty in the basement where the router resides. So I put the phone on speaker and listened as best I could. Like a rat pushing through a maze, I found the tech support cheese after seventeen minutes and the new, smarter sounding Tech Support Weenie voice tells me we are going to have to restart the system.
TSW: I will now tell you how to restart your system. This is a medium level procedure and will take approximately 3-5 minutes.
TSW: Can you see your internet router?
TSW: Please find the power cable on the back of the router and say yes when you’ve found it.
TSW: I didn’t understand you.
TSW: Trace the cable to the electric outlet. Unplug the cable and wait 10 seconds before plugging it back in.
Well, that’s what I did before, but okay
TSW: Did this solve your problem?
At that point, my spotty cell service affected my ability to clearly hear the next steps in the process. What I am pretty sure it said was for me to disconnect all cables, kick the box across the room, plug it back in and see if any lights were blinking. Repeat until no lights function.
After I hung up, I went to work early and left this note on the floor:
The good news, there is free wifi at the hotel, but I really wish they would call.