Category: Technology (page 1 of 35)

My blog was without an ‘LMS isn’t dead’ post, so I thought I’d write one.

Back in November 2007, Martin Weller, a Professor at the Open University wrote that, in his opinion, the VLE/LMS is dead – “but we’ll probably take five years to realise it”. It’s been almost a decade since his post, and there has been plenty more written about the LMS. In fact, Google returns almost 20,000 results for the search term “LMS is dead”, and just recently Jim Groom wrote a widely-shared and commented-upon post about it.

Yet, it seems, the truth is that the LMS is not going away anytime soon. Why is that? Why have the alternative solutions mentioned in Martin’s post withered and died while the LMS lives on? Why would anyone in 2017 use an LMS? Curiously, the answers are right there in the post from 10 years ago:

  • Authentication
  • Convenience
  • Support
  • Reliability
  • Monitoring

Meanwhile, the reasons Martin gives in that post for moving away from an LMS have largely been negated by developments over the last ten years. Here’s his original list of the benefits of using a ‘small pieces, loosely joined’ approach instead of an LMS:

  • Better quality tools
  • Modern look and feel
  • Appropriate tools
  • Cost
  • Avoids software sedimentation
  • Disintermediation happens

Back when he wrote this post, I would have agreed with all of Martin’s points, envisioning a future filled with users merrily skipping between platforms into the sunset. I’ve learned a lot since then, and it’s pretty clear that a ‘small pieces, loosely joined’ is unlikely to ever happen. The LMS market is growing, not shrinking.

My reason for thinking about all this is because I’ve just started doing some work with Totara, an organisation I first came across back in 2012 when they built the Open Badges functionality for Moodle. Since then, while their code remains open source, they’ve ‘forked’ from the Moodle codebase. They’ve also got Totara Social, an ‘enterprise social network’ platform.

Interestingly, Totara are in the process of removing ‘LMS’ from their branding. That doesn’t mean that the concept of the learning management system is dead. No. What’s happening here is that the term ‘LMS’ has become a ‘dead metaphor’. It no longer does any useful work.

To quote myself, elsewhere:

The problem is that people will, either purposely or naïvely, use human-invented terms in ‘incorrect’ ways. This can lead to exciting new avenues, but it also spells the eventual death of the original term as it loses all explanatory power. A dead metaphor, as Richard Rorty says, is only good as the ‘coral reef’ on which to build other terms.

A learning management system, in essence, is a digital space to support learning. It doesn’t particularly matter what you call it so long as it:

  1. Has the functionality you require
  2. Costs what you can afford
  3. Is reliable

The reason I’ve accepted this piece of work with Totara is because they tick all of my boxes around their approach to this space. They’re innovative. They’re open source. They’ve got a sustainable business model. I’m looking forward to helping them with developing a workable vision and strategy around their community that fits with their pretty unique partner network approach.

As regular readers will be aware, and as betrayed by the introduction to this post, my background is in formal and informal learning. The Learning & Development (L&D) space is relatively new to me, so if you’ve got tips on people to follow, places to hang out, and things to read, please do let me know!

Photo by Jon Sullivan used under a Creative Commons BY-NC licence.

Why I’ve just ditched my cloud-based password manager

TL;DR: I’ve ditched LastPass in favour of LessPass. The former stores your passwords in the cloud and requires a master password. The latter uses ‘deterministic password generation’ to keep things on your own devices.

Although I’ve used LastPass for the past six years, I’ve never been completely happy with it. There have been breaches, and a couple of years it was acquired by LogMeIn, a company not exactly revered in terms of trust and customer service. Their ’emergency break-in’ feature makes me feel that my passwords are just one serious hack or government request away.

I read Hacker News on pretty much a daily basis and I’m particularly interested in the underlying approaches to technology that change over time. There are certain assumptions and habits of mind that come to be questioned which lead to different, usually better, solutions to certain problems. Today, the issue of cloud-based password managers was again on the front page.

From the linked article:

When passwords are stored, they must be encrypted and then retrieved later when needed. Storage, of any type, is a burden. Users are required to backup stored passwords and synchronize them across devices and implement measures to protect the stored passwords or at least log access to the stored passwords for audit purposes. Unless backups occur regularly, if the encrypted password file becomes corrupt or is deleted, then all the passwords are lost.

Users must also devise a “master password” to retrieve the encrypted passwords stored by the password management software. This “master password” is a weak point. If the “master password” is exposed, or there is a slight possibility of potential exposure, confidence in the passwords are lost.


I believe that password management should only occur locally on end use devices, not on remote systems and not in the client web browser.

Remote systems are outside the user’s control and thus cannot be trusted with password management. These systems may not be available when needed and may not be storing or transmitting passwords correctly. Externally, the systems may seem correct (https, etc.) but behind the scenes, no one really knows what’s going on, how the passwords are being transmitted, generated, stored, or who has access to them.

It’s pretty difficult to argue against these two points. Having felt uneasy for a while, I knew it was time to do something different. It was time to ditch LastPass.

I looked at a couple of different solutions: the one proposed by the author of the above quotations (too complex to set up), as well as one which looked promising, but now seems to be unsupported. In the end, I decided upon LessPass, which has been recommended to me by a few people this year.

How is LessPass different from LastPass? This gif from their explanatory blog post is helpful:


All of this happens in the browser, without your data being transmitted anywhere else.

Basically, you enter the following:

  1. Name of the site or thing for which you need a password
  2. Your username
  3. A secret passphrase

…and, from these three pieces of information, LessPass generates a password that you can then copy using complex algorithms and entropy stuff that I don’t understand.


The fact that I don’t understand it is fine, because there are people who do, and the code is Open Source. It can be inspected for bugs and vulnerabilities — unlike the proprietary solution provided by LastPass.

The options button to the bottom-right of the LessPass window gives the user advanced options such as:

  • Length of password
  • Types of character to include in the password
  • Increment number (if you’re forced to rotate passwords regularly)

My favourite LessPass feature, though, solves a nagging problem I’ve had for ages. If you have a long passphrase, then sometimes it can be very easy to mistype it. You don’t want to reveal your obfuscated passphrase to the world, so how can you be sure that you’ve typed it correctly?


Simple! LessPass adds an emoji triplet to the right of the secret passphrase box. You’ll notice that changes as you type and, when you finish, it should always look the same. If it doesn’t, then you’ve mistyped your passphrase.

I’ll be making the transition from LastPass to LessPass over the next few weeks. It’s not as simple as just exporting from one database into another, as the whole point of doing this is that there is no one place that someone can hoover up my passwords.

So my plan of action is:

  1. Every time I use a service, create a new password using LessPass.
  2. Delete existing password in LastPass.
  3. Rinse and repeat until most of my passwords are generated via LessPass.
  4. Delete my LastPass account.
  5. Celebrate my higher levels of personal security.

Questions? Ask away in the comments section!

Photo: Crypt by Christian Ditaputratama under a CC BY-SA license

Friends don’t let friends use Facebook

Facebook, on the other hand, only offers its users a forum to connect and share information. Facebook’s income derives from selling targeted advertising to be delivered to those same users, based on preferences the site has learned from their comments, friends, and preferences. It has no goods or services to sell, and its users don’t buy anything. Thus, its only product to take to market is, in fact, its users’ data. (source)

I don’t use Facebook. You shouldn’t either.

I scraped the trackers on these sites and I was absolutely dumbfounded. Every time someone likes one of these posts on Facebook or visits one of these websites, the scripts are then following you around the web. And this enables data-mining and influencing companies like Cambridge Analytica to precisely target individuals, to follow them around the web, and to send them highly personalised political messages. (Jonathan Albright, source)

Personalised advertising isn’t useful. It’s invasive, and it’s used to build a profile to manipulate you and your ‘friends’.

Using personality targeting, Facebook posts can attract up to 63 percent more clicks and 1,400 more conversions. (source)

There’s several pretty scary implications to where this could take us by 2020:

  1. Public sentiment as high-frequency trading — algorithms compete to sway the opinions of the electorate / consumers.
  2. Personalized, automated propaganda — not just lies by politicians, but auto-generated lies created by bots who know which of your ‘buttons’ to press.
  3. Ideological filter matrices — what happens when all of the other ‘people’ in your Facebook group are actually bots?

So, not only will I not use Facebook, but (like Dave Winer and John Gruber) I won’t link to it. Nor will I accept organisations that I’m part of setting up Facebook groups ‘for convenience’ or using a Facebook page in lieu of a website.

 Facebook is designed from the ground up as an all-out attack on the open web. (John Gruber)

The web is a huge force for good. We shouldn’t let inertia and a lack of digital skills turn it into a series of walled data mine.

Get a blog. If your ideas have any value put them on the open web. (Dave Winer)

From a business point of view, you’re mad to put all of your eggs in once basket. Get a website. Facebook’s content is, by design, not indexed by search engines. It’s invisible to search engines.

Look, I get that I’m the nut who doesn’t want to use Facebook. I’m not even saying don’t post your stuff to Facebook. But if Facebook is the only place you are posting something, know that you are shutting out people like me for no good reason. Go ahead and post to Facebook, but post it somewhere else, too. Especially if you’re running a business.


It’s 2017. There are a million ways to get a web site set up inexpensively that you can easily update yourself. Setting up a Facebook page and letting your web site rot, or worse, not even having a web site of your own, is outsourcing your entire online presence. That’s truly insane. It’s a massive risk to your business, and frankly, stupid. (source)

I feel more strongly about Facebook’s threat to the web than I did about Microsoft’s Internet Explorer at the turn of the millennium. Scarily, it looks like Twitter might be going the same way. I blame venture capital and invasive advertisnig.

Individual actions build up to movements. Resist. Find alternatives. Don’t be a boiled frog.

Header image based on an original by rodrigo

3 reasons I’ll not be returning to Twitter

This month I’ve been spending time away from Twitter in an attempt to explore Mastodon. I’ve greatly enjoyed the experience, discovering new people and ideas, learning lots along the way.

I’ve decided, for three reasons, that Twitter from now on is going to be an ‘endpoint’, somewhere I link to my thoughts and ideas. It’s the way I already use LinkedIn, for example, and the way I used to use Facebook — until I realised that the drawbacks of being on there far outweighed any benefits. This model, for those interested, is known as POSSE: Publish (on your) Own Site, Syndicate Elsewhere.

There’s three main reasons I came to this decision:

1.  Social networks should be owned by their users

Last week, at Twitter’s 2017 Annual Meeting of Stockholders, there was a proposal to turn the service into a user-owned co-operative. It failed, but these kinds of things are all about the long game. You can find out more about the movement behind it here.

However, it’s already possible to join a social network that’s owned by its users. I’m a member of, which is an instance of Mastodon, a decentralised, federated approach to social media. I’m paying $3/month and have access to a Loomio group for collective decision-making.

I imagine some people reading this will be rolling their eyes, thinking “this will never scale”. I’d just like to point out a couple of things. First, services backed by venture capital can grow rapidly, but this doesn’t necessarily mean they’re sustainable. Second, because Mastodon is a protocol rather than a centralised service, it can provide communities of practice  within a wider ecosystem. In that sense, it’s a bit like Open Badges.

2. Twitter’s new privacy policy

Coming into effect on 15th June 2017, Twitter is bringing in a new privacy policy that signals the end of their support of Do Not Track. Instead, they have brought in ‘more granular’ privacy settings.

The Electronic Frontier Foundation is concerned about this:

Twitter has stated that these granular settings are intended to replace Twitter’s reliance on Do Not Track. However, replacing a standard cross-platform choice with new, complex options buried in the settings is not a fair trade. Although “more granular” privacy settings sound like an improvement, they lose their meaning when they are set to privacy-invasive selections by default. Adding new tracking options that users are opted into by default suggests that Twitter cares more about collecting data than respecting users’ choice.

It’s also worth noting that Twitter talks about privacy in terms of ‘sharing’ data, rather than its collection. They’ll soon be invasively tracking users around the web, just like Facebook. Why? Because they need to hoover up as much data as possible, to sell to advertisers, to increase the value of their stock to shareholders. Welcome to the wonders of surveillance capitalism.

3. Anti-individualism

There’s a wonderful interview with Adam Curtis on Adam Buxton’s podcast, parts of which I’ve found myself re-listening to over the past few days. Curtis discusses many things, but the central narrative is about the problems that come with individualism underpinning our culture.

We’re all expected to express how individual we are, but the way that we do this is through capitalism, meaning that we end up living in an empty, hollow simulacrum, mediated by the market. Guy Debord had it right in The Society of the Spectacle. It also reminds me of this part of Monty Python’s Life Of Brian . “Yes, we’re all individuals.”


So, in my own life, I’m trying to rectify this by advocating for a world that’s more co-operative, more sustainable, and more focused on collective action rather than the glorification of individuals.

To be clear: I’ll get around to replying to Twitter direct messages, but I am no longer looking to engage in conversation either in public or private on that platform. I’ve updated my self-hosted Twitter archive and am considering using the open source Cardigan app to delete my tweets before May 2017 to prevent data-mining.

Image CC BY-NC Miki J.

Some thoughts on Keybase, online security, and verification of identity

I’m going to stick my neck out a bit and say that, online, identity is the most important factor in any conversation or transaction. That’s not to say I’m a believer in tying these things to real-world, offline identities. Not at all.

Trust models change when verification is involved. For example, if I show up at your door claiming to be Doug Belshaw, how can I prove that’s the case? The easiest thing to do would be to use government-issued identification such as my passport or driving license. But what if I haven’t got any, or I’m unwilling to use it? (see the use case for CheapID) In those kinds of scenarios, you’re looking for multiple, lower-bar verification touchstones.

As human beings, we do this all of the time. When we meet someone new, we look for points of overlapping interest, often based around human relationships. This helps situate the ‘other’ in terms of our networks, and people can inherit trust based on existing relationships and interactions.

Online, it’s different. Sometimes we want to be anonymous, or at least pseudo-anonymous. There’s no reason, for example, why someone should be able to track all of my purchases just because I’m participating in a digital transaction. Hence Bitcoin and other cryptocurrencies.

When it comes to communication, we’ve got encrypted messengers, the best of which is widely regarded to be Signal from Open Whisper Systems. For years, we’ve tried (and failed) to use PGP/GPG to encrypt and verify email transactions, meaning that trusted interactions are increasingly taking place in locations other than your inbox.

On the one hand, we’ve got purist techies who constantly question whether a security/identity approach is the best way forward, while on the other end of the spectrum there’s people using the same password (without two-factor authentication) for every app or service. Sometimes, you need a pragmatic solution.


I remember being convinced to sign up for when it launched thanks to this Hacker News thread, and particularly this comment from sgentle:

Keybase asks: who are you on the internet if not the sum of your public identities? The fact that those identities all make a certain claim is a proof of trust. In fact, for someone who knows me only online, it’s likely the best kind of trust possible. If you meet me in person and I say “I’m sgentle”, that’s a weaker proof than if I post a comment from this account. Ratchet that up to include my Twitter, Facebook, GitHub, personal website and so forth, and you’re looking at a pretty solid claim.

And if you’re thinking “but A Scary Adversary could compromise all those services and Keybase itself”, consider that an adversary with that much power would also probably have the resources to compromise highly-connected nodes in the web of trust, compromise PKS servers, and falsify real-world identity documents.

I think absolutism in security is counterproductive. Keybase is definitionally less secure than, say, meeting in person and checking that the person has access to all the accounts you expect, which is itself less secure than all of the above and using several forms of biometric identification to rule out what is known as the Face/Off attack.

The fight isn’t “people use Keybase” vs “people go to key-signing parties”, the fight is “people use Keybase” vs “fuck it crypto is too hard”. Those who need the level of security provided by in-person key exchanges still have that option available to them. In fact, it would be nice to see PKS as one of the identity proof backends. But for practical purposes, anything that raises the crypto floor is going to do a lot more good than dickering with the ceiling.

Since the Trump inauguration, I’ve seen more notifications that people are using Keybase. My profile is here: Recently, cross-platform apps for desktop and mobile devices have been added, mearning not only can you verify your identity across the web, but you can chat and share files securely.

It’s a great solution. The only word of warning I’d give is don’t upload your private key. If you don’t know how public and private keys work, then please read this article. You should never share your private key with anyone. Keep it to yourself, even if Keybase claim it will make your life easier.

To my mind, all of this fits into my wider work around Open Badges. Showing who you are and what you can do on the web is a multi-faceted affair, and I like the fact that I can choose to verify who I am. What I opt to keep separate from this profile (e.g. my gamertag, other identities) is entirely my choice. But verification of identity on the internet is kind of a big deal. We should all spend longer thinking about it, I reckon.

Main image: Blondinrikard Fröberg

So it turns out that you can pretty much do whatever you like on your own website

Last week, Audrey Watters blocked and Genius on her website. These two tools allow a ‘layer’ to be added to websites for annotation and discussion that can’t necessarily be controlled by the person who owns that site.

Blocking annotation tools does not stop you from annotating my work. I’m a fan of marginalia; I am. I write all over the books I’ve bought, for example. Blocking annotations in this case merely stops you from writing in the margins here on this website.

My first reaction? Audrey can do whatever she likes. Just as when she removed the ability to comment on her site a few years back, I didn’t understand the decision at first, but then it kind of made sense. Either way, it’s her site, and she can do whatever she wants.

So far, so why-are-you-even-writing-a-post-about-this?  Discussions on Twitter, Mastodon, Slack, and elsewhere show that this is a live issue. So, naturally I’ve been thinking about it. I have to say that I agree with Mike Caulfield’s sentiments:

My take (of course) is that annotation works best through a system of copies. Anyone should be able to annotate a copy of your work. But it’s not clear to me that people have the right to piggyback on the popularity of an address that you’ve worked your butt off to promote. It’s not clear to me that they should get to annotate the master file. This has always been the problem with comments as well — they work best on small sites, and go bad when they give users a much larger platform than they have earned. As with everything online, the phenomenon is gendered as well.

It seems what Audrey is doing is protecting her ‘means of production’ from what she considers to be an active assault from those who wish to piggyback on the success of her work. Some people have questioned how that works with the explicitly ‘open’ stance that Audrey takes. However, I think any perceived tension between her move and open licensing goes away when we think of some other examples.

Here’s three:

  1. Pokémon Go — this location-based, augmented reality game used some people’s residences as ‘gyms’ where characters in the game did battle. This caused real-world issues. Most people thought that random strangers pulling on to their drive to play games was an infringement of their civil liberties.
  2. Google Street View — this service involves a car mounted with 360° cameras taking photographs to improve Google’s mapping service. Faces were blurred out, but this wasn’t good enough for Germany’s stringent privacy laws. They’ve been prevented from capturing images at least once, especially when people are on their own property.
  3. Robots.txt — this text file that website owners can include in the root folder of their domain specifies what web crawlers can and cannot do. If you say that you don’t want your site to be indexed, then search engines and other aggregation engines should (legally?) comply.

Using these as touchstones, it seems fair enough for someone to insist that you create a copy of their work to be able to annotate it. As Mike Caulfield hints at, giving people the ability to comment on the master document seems like a privilege rather than a right.

Perhaps those creating annotation engines should find a way to seek the domain owner’s permission? An easy way to do that would be to get them to add the necessary code to activate annotation (as we did with OB101), rather than make it a free-for-all…

Image CC BY-NC-SA Karl Steel

Why I’m not using Twitter next month

TL;DR I’m spending time experimenting with and exploring Mastodon during the month of May. You can connect with me at

Update: I’m now at, for reasons I expain here.

Back in 2011, when I’d just discovered Open Badges, I led a semester of learning on the concept. Sometimes it’s not enough to play around the edges; you have to jump in with two feet to understand what something’s about. That immersion confirmed my initial thoughts, and I’ve spent the last six years evangelising and advocating for digital credentials based on that particular open standard.

The same was true back in 2007 when I joined Twitter. I thought that this was something revolutionary, something that could not only change the way that professional development was done in schools (I was a classroom teacher at the time) but literally change the world. Unlike Open Badges, of course, Twitter is backed by a for-profit company that floated on the stock exchange a few years ago. It’s a ‘free’ service that requires on advertising to provide shareholder value.

It was easy to forget all that in the early days, as we were giddy with excitement, connecting with like-minded people around the world. Pre-IPO, Twitter seemed like the good guys, being seen as a key tool in people organising to overthrow repressive regimes. In those days, it was easy to use one of a number of Twitter clients, and to route your traffic around the world to avoid censorship. Now, not so much.

Last week, via Hacker News, I came across 8values, a 60-question quiz in the mould of Political Compass. My results are below:

Libertarian Socialism

While I’m aware that this isn’t the most rigorous of ‘tests’, it did set me off on an interesting path. As you can see at the top right of my results, I came out as favouring Libertarian Socialism. I was surprised, as libertarianism is something I usually explicitly argue against.

I decided to do some digging.

The Wikipedia article for Libertarian Socialism is pretty fascinating and, as you’d expect from that site, sends you off on all kinds of tangents via the numerous links in the text. Given that I had an upcoming transatlantic flight coming up, I decided to make use of Wikipedia’s Book Creator. Within five minutes, I had a 500-page PDF on everything from anarcho-syndicalism to the Zapatista Army of National Liberation.

To cut a long story short, my current thinking is that Mutualism seems to best describe my thinking. I’m re-reading Proudhon’s What is Property?. He’s a little naive in places, I think, but I like his style.

Anyway, this is all to say that we need to re-decentralise the Web. I wrote a few years ago about the dangers of newsfeeds that are algorithmically-curated by advertising-fuelled multinational tech companies. What we need to do is quickly replace our reliance on the likes of Facebook and Twitter before politicians think that direct digital democracy through these platforms would be a good idea.

Ethical Design

So I’m experimenting with Mastodon. It’s not radically different from Twitter in terms of look and feel, but it’s what’s under the hood that’s important. The above image from Aral Balkan outlines his approach to ‘ethical design’ — an approach ensures things look good, but also respects us as human beings.

Decentralised systems based on open standards are really our only hope against Venture Capital-backed ‘software with shareholders’. After all, any promising new startups that aren’t decentralised tend to get gobbled-up by the supermassive incumbents (see WhatsApp, Instagram). But to get to scale — which is important in this case, not for shareholder value, but for viability and network effects — people have to use these new platforms.

So that’s what I’m doing. During May, a month when my Twitter timeline will be full of UK General Election nonesense, I’m using Mastodon. The only things I’ll be posting to Twitter are links to things I’ve written. If you’d like to join me, head here, choose an ‘instance’ (I’m on and sign up. You can then add me: As in the early days of Twitter, one of the easiest ways to find good people to follow is to find ‘nodes’. I’ve found Anil Dash (@anildash) to a good starting point.

I look forward to seeing you there. It’s a learning experience for me, but I’m happy to answer any questions below!

Header image CC BY Eric Fischer

My sites are now hosted in the European Union

I host my websites through Reclaim Hosting. I’ve been with them for a few years now, ever since they were known as ‘Hippie Hosting’ and an offshoot of the amazing work done by Jim Groom and team at the University of Mary Washington’s Division of Teaching and Learning Technologies.

Companies often talk about their commitment to customer service, but I’ve never known anything like that which receive from Reclaim Hosting. It’s insane. For example, in the last six months, amongst other things, they’ve:

  • Responded within a minute to a query about my wiki being down, and had fixed it for me within five minutes.
  • Worked with me to rectify a persistent spamming problem on my sites (that was my fault, not there’s)
  • Migrated my sites from US servers to ones based in the EU within 24 hours of me tweeting that I’d like them to do so.

On top of that, they charge me a very low price. I’m a huge fan, as you can tell.

The last of the bullet points is an important one as President Trump continues to rip up the good work carried out by his predecessors. For example, earlier this month, The Register reported on a joint letter sent by Human Rights watch and the ACLU which outlines in detail how Trump’s executive orders are underming the US-EU Privacy Shield. Bloomberg reckons that the EU are ready to pull out of it.

It’s 2017, so it seems strange to be talking about things that seemed more important in the early days of the web, such as where your server is located. But, of course, given the nationalist turn we’ve taken in the west, these things matter.

They matter because he location of your server is still of vital importance, despite recent protestations, that data in transit through the US makes it subject to US law. What you put on your own web space isn’t just the front end stuff that everyone sees, it’s the backend stuff as well — family photos, private emails, and the like.

Some people have asked why I’ve chosen to host my data in Germany, rather than in the UK. Well, for a start, I still consider myself as more European than British, despite ‘Brexit’. Second, Germany has stronger privacy laws than the UK (and certainly the US). Finally, and more pragmatically, it’s the EU option offered by Reclaim Hosting (mainly, I believe, because Digital Ocean offer block storage in that zone)

I perhaps spend more time thinking about these things than most, but that’s because it’s something I deem important. Ironically, most of my readers are in the US, so this move actually adds a few milliseconds to their page load times. Sorry about that…

Image CC BY Jeff Ddevjet

Preparing for ‘Story Hack’

Tomorrow, I’m helping facilitate Story Hack, a kind of book sprint at Gateshead Central Library. It’s part of a series of events funded by Arts Council England called STORY MODE:

Story Mode is a series of events that actively explore the role that Libraries play in their communities via a critical engagement with contemporary creative digital practices and how this activity can enable Libraries to grow in capacity and profile.

It presents new ways of working by presenting experiences and approaches from local, national and international practitioners. Story Mode events will connect Libraries to current engagement practices in contemporary visual, digital and narrative arts.

We’ll be using Sourcefabric’s Booktype platform to collaborate on during the day. Facilitators have been asked to curate relevant Creative Commons-licensed (or public domain) text for remixing, as well as to prepare a short, 15-minute talk about their work.

In terms of the focus of the day, we’ve been given the following prompt:

The advent of collaborative online platforms for journalists, writers and visual artists has had a profoundly disruptive effect upon the nature of traditional media and how we access it. This situation raises more questions than it answers. Questions like: Do digital platforms have the same aura and appeal as physical media? Does the truth matter anymore? Who should we give our attention to and why?

Thankfully, my network is filled with professionally-generous people. The following are just 10 of those whose work I can confidently and openly share with others in relation to the above prompt:

In terms of my own work, I’m going to use five links to describe what I’ve worked on over the last five years:


I’m going to learn a lot tomorrow, and see myself as much as a participant as I am a facilitator!

Image CC BY-NC Thomas Hawk

Safer Internet Day 2017 resources

Ironically enough, it was due to having to fix my hacked (and re-hacked) sites that has led to me posting these resources towards the end of Safer Internet Day 2017. Still, better late than never.

Today, I’ve been at the International School of Geneva, at the invitation of Richard Allaway. I ran three sessions with Years 10, 11, and 12, and then an after-school session with staff. You can find the slide decks I used below:

Many thanks to all involved — I had a great time, and some of the discussion was really thought-provoking!