Mobile Social Networks

Something is still missing in the world of mobiles and social networks.

I strongly believe in the power of social networks in development, be they online or offline. They create communities of practice from the local to the global level, which promotes better understanding of what a best practice is versus what is just a good theory that doesn't reliably work. You also have amazing, unprecedented access through mobile phones and SMS.

But there's nothing solidly connecting the two (unless I'm missing something?)

It's Raining OLPC TCOs (1 of 4)

Update: Hello readers from Alanna's post on the OLPC at UNDispatch - You should check my original article on the OLPC TCO - written back in 2006 - over at OLPCNews.com.

If you poke around enough on the Laptop.org wiki, you find a few interesting corners. Linked from their work in creating a training and reference document for OLPCCorps, a link to an Excel spreadsheet to calculate OLPC-specific costs for a deployment, which has been created and maintained by OLPC's John Watlington

Social Networks (including Facebook) and Technology Transfer

In Social Networks (not Facebook) and Development I covered the relevance of local social networks and social capital / trust for successful, long-term community and economic development.

Finding, engaging an empowering local social networks is the first step. I believe connecting these networks to the global communities of interest and practice on the Internet can provide a multiplier effect.

In the recent Technology Salon on Malawian health ICT systems, it was discussed how hiring recent Malawian college grads and connecting them to the global community of open source coders gave them an immense resource to draw on as they began their work; and they were soon contributing as peers and mentors to other programmers around the world.

That's power, and that's the 21st century version of technology transfer.

Social Networks (not Facebook) and Development

World-wandering BoingBoing editor Xeni Jardin writes about a video from the "What Would the Poor Say: Debates in Aid Evaluation," NYU conference, where Leonard Wantchekoz presents on the importance of trust in development:

Video: "If You Don't Trust People You Know, It's Over."Leonard Wantchekon on the Lack of Intra-Community Trust in Benin from DRI on Vimeo.

Beyond Crowdsourcing

I am weary of the term "crowdsourcing." Now, I'm not against the concept. I think small, bite-sized acts of service and kindness can make huge differences in the right situations. Indeed, it's the social-benefits business model of The Extraordinaries, and is at the core of what Yochai Benkler means when he discusses the power of "peer production" in The Wealth of Networks:

People began to apply behaviors they practice in their living rooms or in the elevator — "Here, let me lend you a hand," or "What did you think of last night’s speech?" — to production problems that had, throughout the twentieth century, been solved on the model of Ford and General Motors. The rise of peer production is neither mysterious nor fickle when viewed through this lens. It is as rational and efficient given the objectives and material conditions of information production at the turn of the twenty-first century as the assembly line was for the conditions at the turn of the twentieth.

But the term "crowdsourcing" itself is outdated. It presumes that there's some central organization doing the sourcing (paralleling "outsourcing"), and it seems to get applied in all sorts of roles where that's not relevant.

Packets, Please: Government monitoring and #IranElection

Wired reminds us that we can rail against and complain about the intrusive, privacy-destroying and free-speech-threatening monitoring that Iran has been employing against the protestors over the past few months, but we have to remember two things. First, US and European companies provided the hardware and software to Iran for them to do this. Second - our own government does the same thing, and we should stop it.

Regarding the first problem, bipartisan Senators are proposing a ban on government contracts to companies caught selling such technology to Iran, and it's technically illegal for US companies anyhow (which might not be stopping everyone, and appears to be using Secure Computing's (now McAfee) SmartFilter according to the Open Net Initiative's testing.

The answer for "I don't get Twitter"

The next time somebody cracks wise about Twitter, points to the vast numbers of Twitter Orphan Accounts, or otherwise belittles it, I will point them to this Twitter Blog posting:

A critical network upgrade must be performed to ensure continued operation of Twitter. In coordination with Twitter, our network host had planned this upgrade for tonight. However, our network partners at NTT America recognize the role Twitter is currently playing as an important communication tool in Iran. Tonight's planned maintenance has been rescheduled to tomorrow between 2-3p PST (1:30a in Iran).

As much as I fear what happens after the honeymoon with SMS and social media under repressive governments, currently they provide an amazing tool for immediate news even during crisis, citizen voice and discussion.

Update: The State Department is now involved; http://ac360.blogs.cnn.com/2009/06/16/state-department-to-twitter-keep-… :

By necessity, the US is staying hands off of the election drama playing out in Iran, and officials say they are not providing messages to Iranians or “quarterbacking” the disputed election process.

But they do want to make sure the technology is able to play its sorely-needed role in the crisis, which is why the State Department is advising social networking sites to make sure their networks stay up and running for Iranians to use them and helping them stay ahead of anyone who would try to shut them down.

Academic view on secure communication in repressive regimes

iRevolution has a good, academic-style breakdown of challenges and communication technologies for use to communicate securely within repressive regimes:

http://irevolution.wordpress.com/2009/06/15/digital-security/

It covers a lot of ground, balancing ease of use against level of security, and is looking for input!