<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Universities on Sebastian Spicker</title>
    <link>https://sebastianspicker.github.io/tags/universities/</link>
    <description>Recent content in Universities on Sebastian Spicker</description>
    <image>
      <title>Sebastian Spicker</title>
      <url>https://sebastianspicker.github.io/og-image.png</url>
      <link>https://sebastianspicker.github.io/og-image.png</link>
    </image>
    <generator>Hugo -- 0.160.0</generator>
    <language>en</language>
    <lastBuildDate>Wed, 28 Jan 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://sebastianspicker.github.io/tags/universities/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Your Encryption Keys Are in Virginia: On BitLocker, the FBI, and Why European Universities Need Sovereign Software</title>
      <link>https://sebastianspicker.github.io/posts/public-money-public-code/</link>
      <pubDate>Wed, 28 Jan 2026 00:00:00 +0000</pubDate>
      <guid>https://sebastianspicker.github.io/posts/public-money-public-code/</guid>
      <description>Microsoft confirmed this week that it hands BitLocker encryption keys to the FBI on receipt of a valid legal order. Windows 11 uploads them to your Microsoft account by default, without asking. For European universities that handle research data, student records, and HR information under GDPR, this is not an abstract concern. It is a structural problem. The answer is not a technical workaround. It is sovereign, publicly funded, openly licensed software — and a principle that the EU has articulated but not consistently practised: public money, public code.</description>
      <content:encoded><![CDATA[<h2 id="the-story">The Story</h2>
<p>Last week Microsoft confirmed, in response to reporting by TechCrunch and
others, that it had handed BitLocker recovery keys for three laptops to
the FBI following a valid court order. The underlying case was a fraud
investigation in Guam. The laptops were encrypted with BitLocker — the
full-disk encryption built into Windows, which many institutions and
individuals rely on as their primary protection against unauthorised
data access.</p>
<p>The mechanism is simple and was not widely known. When you set up a
modern Windows device and sign in with a Microsoft account, BitLocker
automatically uploads your recovery key to Microsoft&rsquo;s cloud. No
prominent notification. No opt-in. The key sits there, associated with
your account, accessible to Microsoft. When a US court issues a lawful
order, Microsoft complies. Redmond confirmed this is policy, not an
exception.</p>
<p>Bruce Schneier&rsquo;s <a href="https://www.schneier.com/blog/archives/2026/02/microsoft-is-giving-the-fbi-bitlocker-keys.html">response</a>
was characteristically direct: &ldquo;The lesson here is that if you have
access to keys, eventually law enforcement is going to come.&rdquo; Jennifer
Granick at the ACLU called remote key storage in this configuration
&ldquo;quite dangerous,&rdquo; particularly given that the same mechanism is
available to any government that can issue a Microsoft-compatible legal
order — not only the US Department of Justice.</p>
<p>That last point is the one European institutions should be reading
carefully.</p>
<hr>
<h2 id="why-this-is-a-european-problem">Why This Is a European Problem</h2>
<p>The CLOUD Act — the US Clarifying Lawful Overseas Use of Data Act,
passed in 2018 — allows US law enforcement to compel US-based companies
to produce data held on servers anywhere in the world. If your
university stores its BitLocker recovery keys in a Microsoft account,
and Microsoft is a US company, the geographic location of the servers
those keys sit on does not limit a US court&rsquo;s reach. The keys are in
Virginia, legally, wherever the hardware is.</p>
<p>This is not speculation. It is the explicit structure of US digital law.
The European Court of Justice has repeatedly ruled that certain US
surveillance frameworks are incompatible with GDPR — the invalidation
of Privacy Shield in <em>Schrems II</em> (2020) being the most prominent
example. But court rulings about data transfer frameworks do not
automatically change the operational reality for an institution whose
laptops are running Windows with default settings.</p>
<p>European universities hold exactly the kinds of data that make this
a real rather than a theoretical concern:</p>
<ul>
<li><strong>Research data</strong>: medical studies, clinical trials, interviews with
human subjects, social science datasets — all subject to strict
ethical and legal protections</li>
<li><strong>Student records</strong>: academic performance, personal circumstances,
disciplinary proceedings</li>
<li><strong>HR data</strong>: employment contracts, salary records, health information,
union activity — particularly sensitive under German and EU labour
law</li>
<li><strong>Correspondence and draft documents</strong>: research in progress, grant
applications, peer review material</li>
</ul>
<p>If the disk holding any of this is encrypted with BitLocker, and the
recovery key has been uploaded to a Microsoft account by default, the
encryption provides less protection than it appears to. The key is
accessible to a foreign state with a court order. That state is not
party to GDPR.</p>
<hr>
<h2 id="the-structural-problem">The Structural Problem</h2>
<p>The BitLocker story is one instance of a larger pattern. It is not that
Microsoft behaved unusually or maliciously — it complied with a lawful
order in its home jurisdiction, as it is legally required to do. The
problem is structural: <strong>when an institution depends on a closed-source,
US-headquartered platform for its critical infrastructure, the
institution has delegated control over its own data to an entity whose
legal obligations lie elsewhere.</strong></p>
<p>This applies beyond encryption. It applies to email (Exchange Online,
Outlook), document storage (SharePoint, OneDrive), communication
(Teams), identity management (Azure Active Directory), and any service
that runs through a Microsoft account or Azure tenant. For each of these:
the data is subject to Microsoft&rsquo;s terms, and Microsoft is subject to
US law.</p>
<p>The same argument applies, with different specifics, to Google Workspace
and any other US-headquartered platform. The issue is not that these
companies are bad actors. It is that their legal accountability and the
legal accountability of European public institutions point in
incompatible directions, and the institutions mostly have not noticed.</p>
<hr>
<h2 id="what-sovereign-software-looks-like">What Sovereign Software Looks Like</h2>
<p>The alternative is not paranoia and air-gapped servers. It is a
coherent strategy for institutional digital infrastructure that is
based on software the institution controls.</p>
<p>In Germany, this conversation has a name and a project. <strong>OpenDesk</strong>
— developed under the aegis of the federal and state governments —
is a stack of open-source tools (Nextcloud, Collabora Online, Matrix/
Element, Jitsi, Keycloak, Open-Xchange) assembled into an integrated
workspace alternative to Microsoft 365. The <em>Souveräner Arbeitsplatz</em>
(sovereign workspace) concept behind it is exactly what the BitLocker
story illustrates: if the software is open, the keys stay in your
institution, and no foreign court can reach them via a warrant served
on a US company.</p>
<p>Several German states and federal agencies have been piloting OpenDesk.
The city of Munich&rsquo;s earlier experiment with Linux (LiMux) and its
eventual rollback to Windows is the cautionary tale here — not because
open source failed, but because the transition was not supported
seriously enough over time, and the incumbent vendor&rsquo;s lobbying was.
The BitLocker story is a reminder of what is at stake in that political
negotiation.</p>
<p>The FSFE&rsquo;s <strong>&ldquo;Public Money? Public Code!&rdquo;</strong> campaign has articulated
the principle cleanly: software developed with public funding should
be released as open-source software. The argument is not only about
freedom as an abstract value. It is about the practical consequence of
being locked into a proprietary platform: your institution loses the
ability to audit what the software does, to modify it to meet your
requirements, to host it where your data protection law applies, and to
switch providers without losing access to your own data.</p>
<hr>
<h2 id="what-i-do-and-why">What I Do, and Why</h2>
<p>I work at a publicly funded institution. The software I build for
institutional contexts — campus infrastructure, workforce management,
archival systems, alert systems — is public.</p>
<p>Not because I am ideologically committed to open source as a movement,
but because the alternative is incoherent. If I build tooling for a
university with public funds and keep it closed, I have produced a
private asset with public money, duplicated by every institution that
builds the same thing independently, inspectable by nobody, and
ultimately dependent on my continued willingness to maintain it or
hand it over. None of those outcomes serve the institutions I am
building for.</p>
<p>Here is what that looks like in practice:</p>
<p><strong><a href="https://github.com/sebastianspicker/zammad-ticket-archiver">zammad-ticket-archiver</a></strong> —
automated archival of Zammad support tickets as cryptographically
signed PDFs, with RFC 3161 timestamps for non-repudiation. Built for
institutions that need legally defensible audit trails of their
helpdesk operations. The signing infrastructure is self-hosted; no
external party holds the keys.</p>
<p><strong><a href="https://github.com/sebastianspicker/alarm-broker">alarm-broker</a></strong> —
a silent panic alarm broker for campus facilities. Receives emergency
triggers from hardware devices (Yealink keys), distributes
notifications via Zammad, SMS, and Signal, with acknowledgment
tracking and escalation scheduling. Runs locally, logs to
self-hosted PostgreSQL; no external dependency for the alarm path.</p>
<p><strong><a href="https://github.com/sebastianspicker/campus-app-kit">campus-app-kit</a></strong> —
a React Native / Expo starter for university mobile applications,
with a pluggable Node.js backend designed for institutional data
sources (room booking, events, schedules). The architecture separates
institution-specific connectors (which institutions keep private) from
the shared foundation (which is public). Any university can take it
and build on it without starting from scratch.</p>
<p><strong><a href="https://github.com/sebastianspicker/cueq">cueq</a></strong> — an integrated
workforce management system for German universities under TV-L
(the collective agreement for public sector employees in the German
states). Handles time recording, shift planning, absence management,
payroll export, and GDPR-compliant audit trails. Built around NestJS
and Next.js, with a PostgreSQL backend and Honeywell terminal
integration. The HR data stays on the institution&rsquo;s own infrastructure.</p>
<p>These are all boring. They are not research contributions; they are
plumbing. But plumbing is what holds institutions together, and the
question of who controls the plumbing — and under whose legal
jurisdiction — is exactly the question the BitLocker story makes
visible.</p>
<hr>
<h2 id="the-principle">The Principle</h2>
<p>Public money, public code. If an institution funded by public money
develops software for its own operations, that software should be
released under an open licence, inspectable, forkable, and deployable
by any institution with the same needs.</p>
<p>The corollary: institutions funded by public money should prefer
software that is itself openly licensed, auditable, and deployable
on infrastructure the institution controls. Not as a blanket ban on
proprietary tools where they are genuinely the best option, but as a
starting presumption that shifts the burden of justification.</p>
<p>The BitLocker story is not a story about Microsoft doing something
wrong. It is a story about the logical consequence of a procurement
decision that was made without asking &ldquo;and what happens when a US
court sends a subpoena?&rdquo; That question was available in 2018 when the
CLOUD Act passed, in 2020 when <em>Schrems II</em> was decided, and before
both. It is still available now, for every institution that has not
yet asked it.</p>
<hr>
<p><em>The FSFE &ldquo;Public Money? Public Code!&rdquo; campaign is at
<a href="https://publiccode.eu/">publiccode.eu</a>. The OpenDesk project is at
<a href="https://opendesk.de/">opendesk.de</a>. The original TechCrunch reporting
on the BitLocker handover is at
<a href="https://techcrunch.com/2026/01/23/microsoft-gave-fbi-a-set-of-bitlocker-encryption-keys-to-unlock-suspects-laptops-reports/">techcrunch.com</a>.</em></p>
]]></content:encoded>
    </item>
    <item>
      <title>The Invisible Entrance Fee: On Privilege, Education, and the Institutions That Reproduce Both</title>
      <link>https://sebastianspicker.github.io/posts/privilege-and-education/</link>
      <pubDate>Tue, 20 Aug 2024 00:00:00 +0000</pubDate>
      <guid>https://sebastianspicker.github.io/posts/privilege-and-education/</guid>
      <description>Education is supposed to be the great equaliser. The evidence says otherwise. Bourdieu called it decades ago: schools reproduce the social order they pretend to transcend. Privilege is the entrance fee that nobody admits is being charged.</description>
      <content:encoded><![CDATA[<p>There is a persistent story that education systems tell about themselves: that they are meritocratic. That talent, effort, and intelligence are what determine outcomes. That the playing field, if not perfectly level, is at least aspiring toward levelness. That a good enough student from any background can succeed.</p>
<p>This story is not supported by the evidence.</p>
<p>The relationship between socioeconomic background and educational outcomes is one of the most replicated findings in social science. PISA data from Germany consistently show one of the steepest socioeconomic gradients in the OECD — the correlation between parental education and student performance is higher here than in most comparable countries. This is not a recent finding. It has been stable for decades. The system produces it reliably, which means the system is, in some meaningful sense, designed to produce it — even if no individual actor intended that design.</p>
<p>Understanding why requires a different vocabulary than the one most educational institutions use about themselves.</p>
<h2 id="bourdieus-three-capitals">Bourdieu&rsquo;s Three Capitals</h2>
<p>Pierre Bourdieu spent much of his career developing an account of how social inequality reproduces itself through culture and education. The core concept is capital — but not only the economic kind.</p>
<p>Bourdieu (1986) distinguishes three forms:</p>
<p><strong>Economic capital</strong> is material resources: money, assets, time purchased through money. This is the most visible form of advantage. Wealthier families can pay for tutoring, for better-resourced schools, for the unpaid internships that build CVs, for the years of postgraduate study that increasingly function as the entrance requirement for professional careers.</p>
<p><strong>Cultural capital</strong> is more subtle. It includes dispositions, skills, and knowledge that are valued by educational institutions and professional fields — but valued in a way that tends to favour those who acquired them at home, in childhood, before formal education began. The ease with which a student navigates a seminar. The familiarity with the tacit conventions of academic writing. The sense that the university is, broadly, a place made for people like you. These are not things that are explicitly taught; they are things that are transmitted, Bourdieu argues, through families whose own cultural capital aligns with what the institution expects.</p>
<p><strong>Social capital</strong> is networks: the web of relationships that provide information, referrals, opportunities, and vouching. Who you know, in the flattest possible terms.</p>
<p>All three reinforce each other. Economic capital can be converted into cultural capital through education and into social capital through exclusive networks. Cultural capital eases access to prestigious institutions, which build social capital. The system is not static, but it has a strong gravitational pull toward reproduction.</p>
<p>Bourdieu and Passeron (1977) developed this into a theory of education as <em>reproduction</em>: the function of educational institutions is not primarily to transmit knowledge but to legitimate the transmission of social position from one generation to the next. The process is misrecognised — by students, teachers, and institutions — as meritocracy. This misrecognition is essential to the function. If it were transparent, it would lose its legitimising power.</p>
<h2 id="the-hidden-curriculum">The Hidden Curriculum</h2>
<p>Philip Jackson (1968) coined the term <em>hidden curriculum</em> for everything that schools teach that is not in the official syllabus. How to sit still. How to wait your turn. How to speak to authority. How to navigate institutions, read implicit expectations, manage bureaucracies. How to understand that your job is to demonstrate competence within a form that someone else has set.</p>
<p>For students whose home culture aligns with the institutional culture, the hidden curriculum is invisible. They already know it; it requires no effort; it is simply how things are. For students whose home culture diverges, it is a second curriculum that must be decoded while simultaneously managing the official one.</p>
<p>Lareau (2003) documented this in careful ethnographic detail. Middle-class families engage in what she calls <em>concerted cultivation</em> — a mode of child-rearing that practises precisely the dispositions valued by educational institutions: articulate self-advocacy with adults, a sense of entitlement to ask questions and seek explanations, activities structured around developing discrete skills. Working-class and poor families, in her study, more often practised <em>accomplishment of natural growth</em> — providing security, affection, and freedom without the institutional structuring. Neither is better parenting. But one of them is what the school expects.</p>
<p>The child who arrives at school already knowing how to talk to teachers, how to present themselves, how to advocate for their own needs, has a significant advantage that is invisible in the transcript. It does not appear as &ldquo;privilege&rdquo;; it appears as &ldquo;ability&rdquo; or &ldquo;maturity&rdquo;. The institutional category does the misrecognising work.</p>
<h2 id="privilege-as-invisible-to-those-who-have-it">Privilege as Invisible to Those Who Have It</h2>
<p>Peggy McIntosh (1989) wrote what became one of the most cited — and most contested — essays in education: &ldquo;White Privilege: Unpacking the Invisible Knapsack&rdquo;. Her core observation is structural: privilege is the absence of disadvantage, and absences are invisible to those who live inside them. You do not notice the ease with which you move through a system that was designed for people like you, any more than you notice breathing.</p>
<p>This is not an accusation. It is a description of a structural feature with consequences for self-understanding.</p>
<p>My background is in physics; I now work in universities, having grown up in a household with books and educated parents and the background assumption that higher education was something that people like us did. I was not aware of most of this as an advantage while it was happening, because it did not feel like an advantage — it felt like normal. The awareness came later, with effort, and it remains incomplete.</p>
<p>The invisible entrance fee is what you have already paid, in cultural capital, before you walk through the door. The institution does not ask about it explicitly. It simply rewards those who have it and attributes the reward to merit.</p>
<h2 id="what-this-means-for-accessibility">What This Means for Accessibility</h2>
<p>The previous post in this series argued that full accessibility — <em>Barrierefreiheit</em> — is structurally impossible in a society organised as ours is; that the honest goal is <em>Barrierearmut</em>, the ongoing reduction of barriers. The connection to privilege is direct.</p>
<p>Barriers to education are not only physical. They include the cultural distance between the home environment and the institutional culture. They include not knowing that office hours exist and are meant for you, not just for students with problems. They include the inability to identify as &ldquo;the kind of person who does a PhD&rdquo; because you have never met anyone who did one. They include the exhaustion of navigating a system that requires you to translate yourself at every step, while your better-resourced peers spend that cognitive energy on the actual work.</p>
<p>None of these barriers appear on an accessibility audit. They are not visible from inside the institution looking out. They require actively listening to people whose experience differs from the institutional default, and then being willing to revise the default rather than add an exception.</p>
<p>The PISA gradient in Germany is a measurement of accumulated, unreduced barriers. It is not a measurement of the distribution of talent or effort. The system is producing the outcome; the students are receiving the label.</p>
<h2 id="the-meritocracy-problem">The Meritocracy Problem</h2>
<p>Meritocracy is an appealing concept and a damaging ideology when taken seriously. The appeal: rewards should go to those who earn them, and earning should depend on effort and ability rather than inherited position. This is genuinely better than aristocracy.</p>
<p>The problem: in a society with steep inequality in the distribution of cultural, economic, and social capital, &ldquo;merit&rdquo; is not a neutral measurement. It is a measurement of the match between a person&rsquo;s accumulated resources and the demands of the institution. Calling that match &ldquo;merit&rdquo; names the outcome without naming the process that produced it.</p>
<p>Michael Young, who invented the word &ldquo;meritocracy&rdquo; in 1958, intended it as a satire. His book <em>The Rise of the Meritocracy</em> depicted a dystopia in which the illusion of fairness made inequality more entrenched, not less, because it stripped the legitimacy from those who were left behind. If outcomes are fair, then failure is your fault. The ideology provides the institutional absolution; the individuals bear the moral weight of structural disadvantage.</p>
<p>This is precisely the dynamic that Bourdieu&rsquo;s theory of misrecognition describes. The student from a poorly resourced background who does not reach the outcomes of their better-resourced peer is seen — by themselves, by teachers, by the institution — as less talented or less motivated, rather than as navigating a steeper gradient with fewer tools.</p>
<h2 id="what-institutions-can-actually-do">What Institutions Can Actually Do</h2>
<p>The structural critique is not an argument for fatalism. Institutions can do things that matter.</p>
<p>They can make the hidden curriculum visible — explicitly teaching what is usually assumed. That means orientation programmes that actually explain institutional culture, not just procedures. It means academic writing support that is not remedial but normative. It means mentoring that connects first-generation students with people who understand the landscape.</p>
<p>They can audit their practices for whose default they assume. The timed closed-book exam was designed for a particular set of conditions; asking what it actually measures, and whether there are better instruments, is not lowering standards — it is interrogating what the standard is measuring.</p>
<p>They can diversify their faculty and staff, not as a cosmetic gesture but as a structural change in whose tacit knowledge is embedded in the institution. If the people who design the curriculum all navigated it from the same starting position, the curriculum will encode that starting position as normal.</p>
<p>They can name the entrance fee. Acknowledging that outcomes correlate with background, that this is a systemic feature and not a distribution of merit, is the first step toward taking institutional responsibility for the gradient rather than attributing it to the students.</p>
<p>None of this resolves the structural problem. The structural problem requires political change at scales well beyond any individual institution. But institutions are not passive. They can reduce the barriers they control, while being honest about the ones they do not.</p>
<h2 id="a-personal-note">A Personal Note</h2>
<p>I sit in institutional positions that this analysis would identify as advantaged. I teach in a university. I benefited from the gradient in ways I cannot fully account for. The point of naming this is not guilt; it is responsibility. Being advantaged by a system you did not design does not make you complicit in its worst outcomes — but it does make you responsible for using whatever institutional leverage you have to make the system less exclusive.</p>
<p>The connection to accessibility is this: both inaccessibility and privilege are about whose defaults are built into the system and who is required to adapt to defaults they did not set. Reducing barriers and interrogating privilege are the same project, approached from different angles.</p>
<p>Neither is completable. Both are necessary.</p>
<hr>
<h2 id="references">References</h2>
<ul>
<li>Bourdieu, P. (1986). The forms of capital. In J.G. Richardson (Ed.), <em>Handbook of Theory and Research for the Sociology of Education</em> (pp. 241–258). Greenwood Press.</li>
<li>Bourdieu, P. &amp; Passeron, J.C. (1977). <em>Reproduction in Education, Society and Culture</em>. Sage. (Original French edition 1970.)</li>
<li>Jackson, P.W. (1968). <em>Life in Classrooms</em>. Holt, Rinehart and Winston.</li>
<li>Lareau, A. (2003). <em>Unequal Childhoods: Class, Race, and Family Life</em>. University of California Press.</li>
<li>McIntosh, P. (1989). White privilege: Unpacking the invisible knapsack. <em>Peace and Freedom</em>, July/August, 10–12.</li>
<li>OECD (2023). <em>PISA 2022 Results (Volume I): The State of Learning and Equity in Education</em>. OECD Publishing.</li>
<li>Young, M. (1958). <em>The Rise of the Meritocracy</em>. Thames and Hudson.</li>
</ul>
]]></content:encoded>
    </item>
    <item>
      <title>Why Universities Need Their Own YouTube</title>
      <link>https://sebastianspicker.github.io/posts/educast-nrw-hochschul-youtube/</link>
      <pubDate>Tue, 05 Jul 2022 00:00:00 +0000</pubDate>
      <guid>https://sebastianspicker.github.io/posts/educast-nrw-hochschul-youtube/</guid>
      <description>In June 2022 I presented on educast.nrw at the Tag der Lehre at HfMT Köln. This is the longer argument behind that talk: why universities should not outsource their video infrastructure to commercial platforms, and what a better alternative looks like in practice.</description>
      <content:encoded><![CDATA[<p>In June 2022 I gave a presentation at the <em>Tag der Lehre</em> at the Hochschule für Musik und Tanz Köln on video-supported teaching with <a href="https://educast.nrw/de/">educast.nrw</a>. Presenting something to colleagues who already use ILIAS every day and are broadly skeptical of yet another platform is a useful discipline. You have to answer the obvious question fast: why should we care about this, when YouTube works fine?</p>
<p>The short answer is that YouTube does not work fine, for reasons that matter specifically to universities. The longer answer is what this post is about.</p>
<h2 id="what-is-wrong-with-youtube">What Is Wrong with YouTube</h2>
<p>YouTube is the world&rsquo;s dominant video platform. It is free to use, globally available, handles any file size, transcodes automatically, and comes with an audience of two billion logged-in users. For individual creators who want reach, it is genuinely hard to beat.</p>
<p>For universities it fails in at least three important ways.</p>
<p><strong>Data protection.</strong> When you upload a lecture or a concert recording to YouTube, the content, the metadata, and the viewing behaviour of your students go to Google&rsquo;s servers — which are predominantly in the United States. Under the GDPR, transferring personal data to third countries requires either an adequacy decision, standard contractual clauses with additional safeguards, or explicit informed consent. After the Schrems II ruling (Court of Justice of the EU, 2020), the adequacy of US-based data transfers became legally contested in a way that makes institutional YouTube use genuinely difficult for European universities. Using it for anything with identifiable students — which includes most teaching content — is a compliance problem.</p>
<p><strong>Platform logic.</strong> YouTube is designed to maximise watch time. Its recommendation algorithm is not neutral. It will recommend whatever comes after your lecture, and what comes after your lecture is not under your control. For educational content — especially sensitive material, or content that should remain in a defined pedagogical context — this is a real problem. The platform is not indifferent to what is hosted on it; it shapes how it is consumed.</p>
<p><strong>Institutional fragility.</strong> YouTube is free until it isn&rsquo;t. Platform terms change; monetisation policies change; content is demonetised or removed based on automated systems with imperfect appeal mechanisms. Building institutional infrastructure on a free commercial service is a bet that the commercial incentives of that service will remain aligned with your needs. That bet has a poor historical record.</p>
<p>None of this means that individual instructors should never use YouTube. It means that universities should not make YouTube their default institutional solution.</p>
<h2 id="educastnrw-a-cooperative-model">educast.nrw: A Cooperative Model</h2>
<p><a href="https://educast.nrw/de/">educast.nrw</a> is a project of the Digitale Hochschule NRW — a cooperative of North Rhine-Westphalian universities building shared digital infrastructure. The concept is a state-wide video service, run by universities for universities, for the recording, processing, management, and distribution of video content in teaching and research. The platforms calls itself &ldquo;Hochschul-YouTube&rdquo;, which is both accurate and slightly underselling what makes it different.</p>
<p>The HfMT Köln participates as a user institution, which is where I come in as the IT contact for setting it up on our end.</p>
<p>The technical foundation is <a href="https://opencast.org/">Opencast</a>, an open-source video management system developed by a consortium of universities. This matters: the software is auditable, the development direction is set by the institutions that use it rather than by advertising revenue, and the infrastructure runs on German servers that are explicitly GDPR-compliant. Licenses on uploaded content are freely choosable — CC-BY-SA is an option, which means the university&rsquo;s teaching materials can be open access if that is what the instructor wants.</p>
<h2 id="what-it-can-do">What It Can Do</h2>
<p>The feature set covers the actual use cases of a university, not the use cases of a content creator trying to build a following.</p>
<p><strong>Recording.</strong> The Opencast Studio browser app records in three modes: screen only, camera only, or screen and camera simultaneously as a synchronised multi-stream. That last option — <em>Presentation</em> and <em>Presenter</em> as separate streams, played back with the viewer switching focus between them, or as picture-in-picture — is the format that works for a lecture. You get the slides and the speaker in the same video, but the viewer can choose which to focus on. That flexibility is not something you get from a simple screen recording uploaded to YouTube.</p>
<p><strong>Multi-perspective video.</strong> For a music university this is the feature that changes things. A concert or a masterclass is not well-served by a single camera angle. The platform supports simultaneous recording from two camera perspectives — a wide shot and a detail shot, say, or a front view and a hands view for a piano performance. The viewer can switch between them in playback, or the institution can set a default presentation. This is infrastructure that makes the teaching use of concert recordings actually feasible, not just technically possible.</p>
<p><strong>Formats.</strong> Video up to 4K with adaptive bitrate streaming (the player adjusts automatically to the viewer&rsquo;s connection), audio up to broadcast quality (48kHz/16-bit, exceeding CD&rsquo;s 44.1kHz), with FLAC at up to 96kHz/24-bit in development. No file size limit. These specifications matter for music. A piano recording compressed to whatever YouTube decides to do with it is not the same as an uncompromised audio stream. The difference is audible.</p>
<p><strong>ILIAS integration.</strong> This is the practical hinge. Video that lives in a separate platform is video that students may or may not find. Video embedded directly in the ILIAS course page, in the learning module, at the point in the curriculum where it is relevant — that is video that is part of the course rather than adjacent to it. The integration between educast.nrw and ILIAS is direct: upload to the video platform, embed in ILIAS on pages, in learning modules, or as standalone video objects, all from within ILIAS.</p>
<p><strong>Access rights.</strong> The granularity here is what distinguishes it from any public platform. Each video can be set to: public (anyone on the internet), institution-wide (anyone logged in at the university), course-wide (only enrolled students in a specific course), individual (specific named people), or private (only the uploader). A graduation concert might be public. A practice session for student feedback might be course-only. A recording made for an individual student&rsquo;s reflection might be shared only with that student and their teacher. These are all normal use cases in a music university; they all require different settings; the platform handles all of them.</p>
<h2 id="use-cases-in-a-music-university">Use Cases in a Music University</h2>
<p>The general university use case — lecture recording, video tutorial, self-study module — applies at HfMT as much as anywhere. But a music and dance university has some specific ones.</p>
<p><strong>Concert recordings.</strong> HfMT Köln runs performances at both its Cologne and Wuppertal sites. Recording these and making them available to students, faculty, and selectively to the public used to mean someone had to manage files, find hosting, deal with YouTube&rsquo;s automated copyright detection flagging student performances of copyrighted repertoire, and explain to students why their graduation concert had been muted by an algorithm. The controlled platform makes all of this manageable.</p>
<p><strong>Stage presence as a reflective tool.</strong> Watching yourself perform is a standard part of performance training. It is uncomfortable, useful, and until recently required either dedicated recording equipment or the ad-hoc use of a phone propped against something. A proper recording infrastructure with controlled access — the student sees the video, their teacher sees the video, nobody else does — changes the pedagogical viability of this approach. The barrier to actually using video feedback in practice teaching drops substantially.</p>
<p><strong>Theory and practice.</strong> This is the institutional argument I made in the presentation and stand by: video infrastructure that works for a lecture also works for a concert. The same system that stores the introduction to music theory also stores the masterclass by a visiting artist. This is not incidental — it is the point of a shared infrastructure. You do not need to choose a platform for academic content and a different one for performance content. The platform works for both.</p>
<h2 id="the-argument-behind-the-argument">The Argument Behind the Argument</h2>
<p>There is a broader principle at work here that extends beyond video platforms. Public universities are funded by public money. The infrastructure they build with that money — software, platforms, data, content — should be under their control, governed by their values, and ideally available to other public institutions. The commercial platform model inverts this: you get free hosting in exchange for your data, your students&rsquo; attention, and your institutional dependence.</p>
<p>educast.nrw is an example of what the alternative looks like in practice: a cooperative of public institutions building shared infrastructure on open-source software, governed collectively, with data on European servers under European law. It is not perfect — the setup overhead is real, the user experience does not match YouTube&rsquo;s, and the feature roadmap (automatic subtitling, H5P support, livestreaming, annotation tools) is still catching up to what commercial platforms have had for years. But the model is right.</p>
<p>The question of who owns the video infrastructure of a university is the same question as who owns its email, its learning management system, its student data. The answer should be: the university, operating under law, answerable to its students and to the public that funds it.</p>
<hr>
<p><em>The slides from the Tag der Lehre 2022 presentation are available on request. For educast.nrw setup at HfMT Köln, contact the IT department.</em></p>
<hr>
<h2 id="links">Links</h2>
<ul>
<li><a href="https://educast.nrw/de/">educast.nrw</a></li>
<li><a href="https://opencast.org/">Opencast</a></li>
<li><a href="https://studio.opencast.org/">Opencast Studio</a></li>
<li><a href="https://tobira.opencast.org/">Tobira Videoportal</a></li>
<li><a href="https://github.com/opencast-ilias">opencast-ilias plugin (GitHub)</a></li>
</ul>
<hr>
<h2 id="changelog">Changelog</h2>
<ul>
<li><strong>2025-08-18</strong>: Corrected the capitalisation of &ldquo;OpenCast&rdquo; to &ldquo;Opencast&rdquo; throughout (matching the project&rsquo;s official spelling on opencast.org).</li>
</ul>
]]></content:encoded>
    </item>
  </channel>
</rss>
