In honor of the last day of the 2013 US Open of Surfing taking place in Huntington Beach, CA July 20-28, 2013, let’s look at the height, weight, foot size, and arm length of one pro surfer, Australian Owen Wright.
(Indoek created this image above of “The Anatomy Of Owen Wright”.)
The impression I have is that most male pro surfers seem to be between 5’7″ and 5’9″ and weigh between 150-160 pounds. As you can see from Owen Wright’s statistics above, his height, weight, and arm span put him the league of U.S. football or basketball players. Yet, look at the snippet below of his ASP pro tour statistics.
ASP World Rankings
The question then becomes, how has he succeeded when his physical stature might make him not suitable for pro surfing?
The video below examines that question.
I found this video entertaining. It was informative, and yet fun, too. I thought the authors created a brilliant video that merges science and information.
What do you think? Does physical stature always determine excellence in a particular sport? Would you like to be examined like a laboratory specimen?
This week is the 2013 US Open of Surfing in Huntington Beach, CA. In honor of this annual event, I thought I’d post the Surfer’s Code of Ethics.
What? Surfers have ethics? Believe it or not — yes. Most surfers try to stick to a certain set of guidelines when riding waves in a line up, especially a crowded one. Note that I said, “most”. In one word, it’s about Respect.The various authors of the three sets of the Surfer Code of Ethics, below, summarize what it means to show respect.
Surfrider Foundation’s – The Surfer’s Code
- Respect the beach, ocean and others
- The surfer closest to the peak has the right of way
- First to his or her feet has priority
- Stay out of the way of riders on waves
- If in doubt, don’t paddle out
- Be aware of currents, jetties and other surfers
- Hold on to your board
- Clean up after yourself and others less thoughtful
- Always aid another surfer in trouble
- Share the water, your knowledge and your stoke
- Give Respect To Gain Respect
A Surfer’s Code by Shaun Tomson – from the book “Surfer’s Code”
- I Will Never Turn My Back on the Ocean
- I Will Paddle Around the Impact Zone
- I Will Take the Drop with Commitment
- I Will Never Fight a Rip Tide
- I Will Paddle Back Out
- I Will Watch Out for Other Surfers
- There Will Always Be Another Wave
- I Will Always Ride into Shore
- I Will Pass Along My Stoke
- I Will Catch a Wave Every Day (even in my mind)
- I Will Honor the Sport of Kings
Nat Young’s Code of Ethics – Give Respect To Gain Respect
- Right of Way: Furthest inside, closest to the peak.
- Do Not: Drop in or Snake.
- Paddling Out: Paddle Wide. Caught inside stay in the white water.
- Remember to Communicate: First to feet or on the wave. Call Communicate (Left or Right)
- Always: Surf with Your Ability. No big waves until ready. Take off with commitment. Paddle hard.
- Danger: Do not let go of your board, it’s a danger to others.
I first came across the Surfer’s Code of Ethics via Louise Southerden. I loved the drawing she included in her book, called, “Tribal Law”, which I have posted below. This image is an initiative by the Vasse Leeuwin Community Health Service in Australia, and is supported by the Surfrider Foundation and Surfing West Australia. I thought it was a great way to portray a great deal of information in a small amount of space. I like the hand drawn aspect to it, too.
My next encounter with the Surfer’s Code of Ethics came when I attended Witch’s Rock Surf Camp in Tamarindo, Costa Rica last March 2013. Joe Walsh, founder of the surf camp, has summarized what us students learn at the camp in a great blog post on surf etiquette. I love the stick drawings. If you are new to surfing, I’d suggest you read his post if you’d like to learn in greater detail how to handle yourself in a line up.
For you non-surfers out there, are there any surprises in this code? For you surfers out there, are there any codes that you would disagree with? Which ones do you find easy to do or hard to do?
Update, 21 August 2013: Silverback Surfers posted “The Best Drop-in Excuses (When Saying Sorry Simply Isn’t Good Enough)“. Love it. Do you have any favorite drop-in excuses you’d like to post, either on their blog or this?
Do you really need someone to tell you what the best music for you to listen to is while working? Probably not. (Unless it is your boss or coworkers, because you listen to your music without earphones!)
Still, Sonos’ Working Jams: What Music Should You Listen to on the Job is a cute decision tree. I listen to Jazz, Classical, & Ambient when I am writing or doing other work on the computer. The author of this decision tree recommends those genres for my work type. I listen to Trance when I am coding or scripting. I do like synchronicity, even if it between what I already know and the advice from some random infographic I found online!
What music do you like to listen to while you are working? Does this chart reflect your choices?
But do you really understand how the Internet works?
ThinkStudy has provided an excellent overview of how the Internet works.
Would you have presented any of the information in this video differently? Were you surprised by any information provided in this video?
Only if it is accurate.
Gizmodo recently released this detailed version of the Internet’s history, but there are some glaring errors. Where is Vannevar Bush’s Memex from 1945? What about the invention of the personal computer and the mouse? You cannot use the Internet if you do not have a computer.
Can you spot a few other things that “should” be mentioned in this infographic?
As for me, Internet history means one thing, and one thing only. The hamster dance. :)
Have you ever wondered what makes one person successful, and another unsuccessful? Is it simply intelligence, economic background or educational level?
Tribby writes that “success” is really about someone’s attitude and behavior.
In case you find it difficult to read, here are the success and failure indicators mentioned in the image above, as text.
Have a sense of gratitude
Accept responsibility for their failures
Keep a journal
Talk about ideas
Want others to succeed
Share information and data
Keep a “to-be” list
Keep a “to-do/project” list
Set goals and develop life plans
Give other people credit for their victories
Operate from a transformational perspective
Have a sense of entitlement
Hold a grudge
Blame others for their failures
Watch TV everyday
Say they keep a journal but really don’t
Talk about people
Secretly hope others fail
Horde information and data
Don’t know what they want to be
Fly by their seat of their pants
Never set goals
Think they know it all
Take all the credit of their victories
Operate from a transactional perspective
What do you think of MaryEllen Tribby’s success indicators? The unsuccessful indicators? Do you agree or disagree with her assessment?
How would you compare or contrast her indicators with the dictionary definition of success?
Finally, since none of us are perfect, which indicators from the right “unsuccessful” side do you need to let go of? Which indicators on the left “successful” side do you need to add or increase?
How can you convey the history behind a national holiday in a way that is engaging and fun, both to children and adults?
If you are Schoolhouse Rock, you teach this information via animation and catchy songs.
What do you think of this version of the history behind The Declaration of Independence?
I wish you a fun and safe 4th of July.
What famous parts of history have librarians documented and placed online, that, prior to the Internet and digital libraries, were obscure and difficult to access for the average person? One example is an authentic recording of the U.S. Confederate “Rebel Yell” from the American Civil War.
July 1st to 3rd, 2013 marks the 150 anniversary of The Battle of Gettysburg. The National Park Service has several events planned to commemorate this battle. It is an important battle because it turned the tide of the war, and the Confederates eventually lost the war to Union forces. Casualties were high on both sides. The Union had about 23,000 dead, wounded, or missing. The Confederate forces had between 20,000 to 25,000 dead, wounded or missing.
Like the Battle of Gettysburg, people have recorded many parts of the history of the conflict between the North and the South, either on paper as written history, or via audio or video. Other portions have been lost to history. One famous part of the War Between the States is the Rebel Yell. Members of the Confederate Army were famous for their Rebel Yell. When Union forces heard the Rebel Yell, it often brought them feelings of terror and panic.
But…how many people have heard an authentic Rebel Yell from an actual Confederate soldier?
Not many living today, I’m certain.
However, thanks to the digital librarians at The Library of Congress and The Smithsonian, you can hear an authentic recording of the Rebel Yell, as given by Confederate veterans. In the 1930s, some people recorded Confederate Veterans giving a Rebel Yell. This video is below.
WBT Radio of Charlotte, NC archived another example of the Rebel Yell given by Pvt. Thomas N. Alexander of the 37th North Carolina Troops in 1935, when he was about 90 years old. (You’ll have to go to the page to listen to the Rebel Yell. Unfortunately, I have not figured out how to embed an audio file of that type.)
Did the Rebel Yell sound like you imagined it would? If you heard that sound en masse from enemy soldiers, would it strike fear in your heart?
The reason we have a somewhat vague definition of metadata is because the context of how someone or some organization uses the data/metadata defines whether it is either data or metadata.
In this post, I’ll do my best to explain why if metadata is “data about data”, then metadata is also data.
I’ll use smart phone data and metadata as an example. Then, I’ll provide the context in which I think metadata does equal data, using my previous metadata analysis work. If you’d like a more detailed discussion of the general definition of metadata, please read a previous post on the topic.
Your smart phone leaves a trail behind you. This includes the time, date, and location for when you completed an action, your name, what language you speak, and the type of phone you have. It also provides your current location. Technologists sometimes refer to this trail as your digital exhaust or your digital footprint.
This trail becomes more visible if or when you Tweet or email a photo, for example. Not only are you sending a digital image of yourself (the data) over the Internet, but also, you are sending your metadata (the time, date, your name, your spoken language, your phone type, and your location).
Image above via The Wall Street Journal, June 15, 2013. Please click on the image to view a larger version.
Evan Perez and Siobhan Gorman at The Wall Street Journal recently wrote an excellent article called Phone Metadata Proves a Powerful Tool for NSA, Police that details what the government can find out, and how, just by tracing your cell phone metadata.
The typical smartphone user can give off a total of nearly 100 pieces of highly technical data through calls, texts and other activities, according to research by Tracy Ann Kosa, a digital-privacy expert at the University of Ontario. This information includes the time that phones make contact with cellphone towers, the direction of the tower with respect to the phone and the signal strength at the time.
Ms. Kosa said much of the data is “insignificant on its own.” But “every little piece counts,” she said. “Think of it like footsteps—or calories.”
The authors went on to describe how metadata provided a method for police to arrest two robbers. They also detail how metadata brought the extramarital affair between Paula Broadwell and General David Petraeus to the attention of the FBI…and, eventually the public. (I discussed the Broadwell-Patraeus metadata in a previous post.)
Perez and Gorman then explained under what legal auspices the National Security Agency (NSA) gathers metadata, and why the metadata the NSA gathers concerns privacy advocates. They wrote that location data, in particular, brings up issues of “unreasonable search and seizure”, which the authors of the Fourth Amendment of the U.S. Constitution banned. They close the article with a new term: dataveillance.
Dataveillance is “the ability to surveil people through their data trail”.
As we now know, the NSA is gathering metadata about people without a warrant targeted to a specific person, which the Justice Department considers legal because it is metadata.
The problem is, their analysts are using the metadata as data.
If the NSA is gathering metadata about U.S. citizens with the intent of analyzing it as data, they are, in fact, gathering data.
It is illegal to gather data about someone without a warrant that targets a specific individual. Why is it illegal? Because the U.S. Constitution’s Fourth Amendment provides protection against “unreasonable search and seizure”. That is, the Fourth Amendment guarantees U.S. citizens a certain right to privacy. Many people are angry because the NSA is using semantics — e.g., calling the data gathered “metadata” instead of “data” — to circumvent the U.S. Constitution’s restrictions against surveillance of U.S. citizens by their own government, even though the NSA gathers the data in the interests of U.S. national security.
As part of my master’s paper research in 2002, I gathered ~1 million metadata records exposed as the Dublin Core Metadata Element Set (DCMES). I gathered these records from 100 Data Providers (DPs) registered with the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). I wanted to understand which metadata elements DPs used and did not use.
The moment I gathered the metadata records to examine the DCMES usage, the DPs’ metadata became my data. I learned just as much from analyzing DP metadata usage as I would have learned from examining the actual content of the DCMES fields.
I am not saying I reached the same conclusions by examining the metadata as I would have reached by examining the content (data). I am saying that I learned just as much from analyzing the metadata as I would have learned by examining the content. It was a different type of analysis than content analysis, and yet it provided a lot of details to me that an examination of the content (data) would not have revealed. If an analyst examines metadata, then it may provide the analyst with a much faster, more quantitative analysis than a qualitative content analysis of the data will provide.
Therefore, it is my professional opinion that metadata does equal data, but it does depend on the context in which a person or organization gathers, uses, and/or analyzes the metadata. Because the NSA is gathering metadata with the intent of analyzing it as data for national security reasons, they are gathering data, not metadata.
In your opinion, do you think metadata can also be data? Do you think the Fourth Amendment to the U.S. Constitution should cover your metadata, and not just your data?