Browse Source

updating the slugs of section 2

master
manetta 4 years ago
parent
commit
d8990396dd
  1. 2
      content/Section 2 - Harm in Computational Infrastructures/2-introduction-seda.md
  2. 2
      content/Section 2 - Harm in Computational Infrastructures/3-question-1.md
  3. 2
      content/Section 2 - Harm in Computational Infrastructures/4-question-2.md
  4. 2
      content/Section 2 - Harm in Computational Infrastructures/5-question-3.md
  5. 2
      content/Section 2 - Harm in Computational Infrastructures/6-question-4.md
  6. 2
      content/Section 2 - Harm in Computational Infrastructures/7-question-5.md

2
content/Section 2 - Harm in Computational Infrastructures/2-introduction-seda.md

@ -1,5 +1,5 @@
Title: Introduction: Seda Gürses Title: Introduction: Seda Gürses
Slug: 01-s2-introduction Slug: 02-s2-introduction
Date: 2020-11-01 12:01 Date: 2020-11-01 12:01
Summary: Seda Gürses, computational infrastructures & *POTs (Protective Optimization Technologies)* Summary: Seda Gürses, computational infrastructures & *POTs (Protective Optimization Technologies)*

2
content/Section 2 - Harm in Computational Infrastructures/3-question-1.md

@ -1,5 +1,5 @@
Title: Question 1: What are computational infrastructures? Title: Question 1: What are computational infrastructures?
Slug: 02-s2-question-1 Slug: 03-s2-question-1
Date: 2020-11-01 12:02 Date: 2020-11-01 12:02
Summary: A video contribution by Seda Gürses. Summary: A video contribution by Seda Gürses.

2
content/Section 2 - Harm in Computational Infrastructures/4-question-2.md

@ -1,5 +1,5 @@
Title: Question 2: What are elements that shape (or are shaped by) computational infrastructures? Title: Question 2: What are elements that shape (or are shaped by) computational infrastructures?
Slug: 03-s2-question-2 Slug: 04-s2-question-2
Date: 2020-11-01 12:03 Date: 2020-11-01 12:03
Summary: A video contribution by Seda Gürses. Summary: A video contribution by Seda Gürses.

2
content/Section 2 - Harm in Computational Infrastructures/5-question-3.md

@ -1,5 +1,5 @@
Title: Question 3: How can we understand the harm caused by computational infrastructures and the systems which deploy them? Title: Question 3: How can we understand the harm caused by computational infrastructures and the systems which deploy them?
Slug: 04-s2-question-3 Slug: 05-s2-question-3
Date: 2020-11-01 12:04 Date: 2020-11-01 12:04
Summary: A video contribution by Seda Gürses. Summary: A video contribution by Seda Gürses.

2
content/Section 2 - Harm in Computational Infrastructures/6-question-4.md

@ -1,5 +1,5 @@
Title: Question 4: What interventions are possible to mitigate or eliminate this harm? Title: Question 4: What interventions are possible to mitigate or eliminate this harm?
Slug: 05-s2-question-4 Slug: 06-s2-question-4
Date: 2020-11-01 12:05 Date: 2020-11-01 12:05
Summary: A video contribution by Seda Gürses. Summary: A video contribution by Seda Gürses.

2
content/Section 2 - Harm in Computational Infrastructures/7-question-5.md

@ -1,5 +1,5 @@
Title: QUESTION 5: What kind of limitations do you see in the realisation of these interventions? Title: QUESTION 5: What kind of limitations do you see in the realisation of these interventions?
Slug: 06-s2-question-5 Slug: 07-s2-question-5
Date: 2020-11-01 12:06 Date: 2020-11-01 12:06
Summary: A video contribution by Seda Gürses. Summary: A video contribution by Seda Gürses.

Loading…
Cancel
Save