{"id":809,"date":"2006-07-20T17:54:25","date_gmt":"2006-07-20T22:54:25","guid":{"rendered":"http:\/\/blogs.terrorware.com\/geoff\/2006\/07\/20\/diyit-talk-outline\/"},"modified":"2006-07-20T17:54:25","modified_gmt":"2006-07-20T22:54:25","slug":"diyit-talk-outline","status":"publish","type":"post","link":"https:\/\/blogs.terrorware.com\/geoff\/2006\/07\/20\/diyit-talk-outline\/","title":{"rendered":"DIYIT talk outline"},"content":{"rendered":"<p>Here&#8217;s the outline for the workshop that Andrew and I did at PIX Fest.<\/p>\n<ul>\n<li>Introduction\/Background<\/li>\n<li>Politics<\/li>\n<ul>\n<li>What role should technology play in my organizing\/activism?<\/li>\n<li>Is technology exclusionary ?<\/li>\n<ul>\n<li>Age<\/li>\n<li>Class<\/li>\n<li>Gender<\/li>\n<li>Geography<\/li>\n<\/ul>\n<li>Computers are bad?<\/li>\n<\/ul>\n<li>Mechanics<\/li>\n<ul>\n<li>Knowledge Hierarchies (Consolidation)<\/li>\n<li>Role segregation<\/li>\n<li>Staying relevant<\/li>\n<li>Sustainability<\/li>\n<li>Project\/Task Management<\/li>\n<li>Understanding Risks<\/li>\n<li>Tools<\/li>\n<\/ul>\n<li>Networking<\/li>\n<ul>\n<li>Groups with common needs leading to common solutions<\/li>\n<li>Working collectively<\/li>\n<ul>\n<li>In a community<\/li>\n<li>Decentralized<\/li>\n<\/ul>\n<\/ul>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Here&#8217;s the outline for the workshop that Andrew and I did at PIX Fest. Introduction\/Background Politics What role should technology play in my organizing\/activism? Is technology exclusionary ? Age Class Gender Geography Computers are bad? Mechanics Knowledge Hierarchies (Consolidation) Role segregation Staying relevant Sustainability Project\/Task Management Understanding Risks Tools Networking Groups with common needs leading&hellip; <a class=\"more-link\" href=\"https:\/\/blogs.terrorware.com\/geoff\/2006\/07\/20\/diyit-talk-outline\/\">Continue reading <span class=\"screen-reader-text\">DIYIT talk outline<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-809","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4wnIz-d3","_links":{"self":[{"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/posts\/809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/comments?post=809"}],"version-history":[{"count":0,"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/posts\/809\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/media?parent=809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/categories?post=809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.terrorware.com\/geoff\/wp-json\/wp\/v2\/tags?post=809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}