Apples that are neither green nor easy to digest.

Submitted by Jon on Fri, 04/22/2011 - 09:25

A few weeks back, I saw this show, "The Agony and the Ecstasy of Steve Jobs" at the Woolly Mammoth. It's by Mike Daisey, and is a work of non-fiction, describing his experiences infiltrating electronics factories in China (read a bit about that at ABC News, and watch the embedded TechCrunch interview. It's playing in Seattle soon, and might come back to DC eventually. It is absolutely worth watching. It perfectly captures the Apple fanboy, and technology enthusiasts in general, and will have you howling with laughter at you see yourself in his portrayals of these characters. By the end, however, you may not want to touch your iPhone. Or buy one. Or consider the conditions under which it was made.

To add on to that, Apple just got named as the least green tech company by GreenPeace, focusing primarily on their coal-powered data centers. Facebook came in second, while Yahoo, Google and Amazon were praised for their use of clean energy.

Rebuilding cell networks in Libya

Submitted by Jon on Fri, 04/22/2011 - 09:14

Via MobileActive, I got to reading this article at the WSJ.

Unsurprisingly, the Libyan cell network is built to be Tripoli-centric, "giving him and his intelligence agents full control over phones and Internet" according to the WSJ. If that's not a stark reminder of the challenges of using SMS and mobiles in human rights work that I've been concerned about, I don't know what is.

The brilliant response here has been to wrest control over segments of the Libyan mobile network. This has taken some outside effort, external government support, and massive funding - it is, at least for now, successful at creating an independent domestic network with limited external access:

A team led by a Libyan-American telecom executive has helped rebels hijack Col. Moammar Gadhafi's cellphone network and re-establish their own communications.

The new network, first plotted on an airplane napkin and assembled with the help of oil-rich Arab nations, is giving more than two million Libyans their first connections to each other and the outside world after Col. Gadhafi cut off their telephone and Internet service about a month ago.

That March cutoff had rebels waving flags to communicate on the battlefield. The new cellphone network, opened on April 2, has become the opposition's main tool for communicating from the front lines in the east and up the chain of command to rebel brass hundreds of miles away.

The Jasmine Revolution

Submitted by Jon on Tue, 04/19/2011 - 10:16

This is brilliant, and a bit funny. Until some innocent person taking a stroll is killed for insurgency.

A long quote from this blog by way of Warren Ellis and BoingBoing, emphases mine:

In summary, several Chinese language, but overseas based, websites have been blogging on the creation of a ‘Jasmine Revolution’ in China. This has been motivated, of course, by events in MENA, and the timing has been significant because it has coincided with two important political conferences in Beijing, but it appears to have no real-world substance whatsoever, to have begun as a hoax at best, and to exist only in cyberspace, and cyberspace outside China at that. But the interesting bit is the real world effect it is having inside China, and the momentum it is generating.

Reminder: ICT4D@SXSW Happy Hour: Monday 5pm @ The Ginger Man

Submitted by Jon on Thu, 03/10/2011 - 20:21

When I asked the Ginger Man if they could host a crazy crowd of ICT4D and mobile4dev geeks rolling in to network and share stories from the frontlines of technology and development, they replied simply, "bring it."

I forward that sentiment on to you. If you hack, build, or implement tools all the way from water pumps to LED lanterns to OLPCs to citizen journalism software, bring your best toy, story, or idea for how technology can support global development, promote equality, and topple authoritarian regimes.

RSVP here, but attendance will be governed by the space we have available:

Bonus: Learn about the upcoming Ashoka/Changemakers collaborative competition on building sustainable models supporting access, freedom of speech, information quality and privacy! You can read the background on our googly adventure.

Monday, March 12 starting at 5pm at The Ginger Man (301 Lavaca)

ICT4D Happy Hour during SXSW

Submitted by Jon on Mon, 02/07/2011 - 20:25

Register now at - only 20 RSVPs available until we nail down a venue!

ICT4Dev Happy Hour at SXSW2010 In Austin for SXSWi? A Geek? (ok, granted) Interested in changing the world? Building off of last year's amazing ICT4D meetup during SXSW, we're back at it this year with the second annual ICT4D Happy Hour: Geeks, Drinks, and Doing Good. We're also planning more than a day in advance this time (wow!).

We'll gather on Monday, March 14, 2011, starting around 5pm for a happy hour at a downtown watering hole (Hopefully the Gingerman like last year). Bring your favorite ICT4D toys (OLPCs, solar-powered GSM thingamajiggers, mHealth diagnostics and other gizmos) and your best ideas and inspiring innovations to talk about while sharing drinks with your colleagues from across the street and around the world.

#Ubuntu Tips: Amazon MP3 Downloads

Submitted by Jon on Sat, 02/05/2011 - 11:18

So, Amazon now forces you to use their download tool. Which seems silly. But they offer a Linux version, which is nice. But it only is built for 32 bit architectures. Which is unfortunate. There's a way around that, however! Thanks to the efforts of these two, the handy getlibs tool, and the fact you can turn back time and get previous copies of libraries, it takes only a few minutes to get downloading. I've put their tools together into this script, after the jump:

Support Property Rights

Submitted by Jon on Thu, 01/06/2011 - 11:21

Ashoka's Changemakers is running a global competition with the Omidyar Network to source the most innovative approaches for providing property rights to those who lack them around the world.

If you're reading my blog, you probable understand the importance of being able to define and claim your ownership of property - it affects the stability of your living situation, your ability to qualify for (micro)finance, and your ability to even get a job by having a "real" address. Not to mention the obvious personal dignity values of having a place you can call your home, and the hands-down value in women's land ownership in stabilizing communities.

Vote Now! As part of our competition process we let the world decide who among our finalists have the best ideas, giving everyone the ability to crown the winners. So go and read the ideas of the semi-finalists, create an account and vote for your favorites at

Ubuntu and HDMI

Submitted by Jon on Thu, 12/23/2010 - 18:07

Lazywebs, here is an answer.  Having problems with a black/blank/undetected screen on your HDMI out in Ubuntu?  Using x86_64 and Nvidia?  Here's two tricks I discovered.  I'm failing at being a good netizen and digging up the tens of various threads on similar problems, creating/remembering/resetting my accounts and posting my solution there, but hopefully the magic of google will lead fellow lost souls here.   If none of this makes any sense, get back to your eggnog. In a (successful!) attempt to hook my Lenovo y550 laptop running Ubuntu 10/Maverick Meercat to my parents 720p HD TV via the HDMI port, I encountered an unusual (this used to work fine!) number of errors, and a lot of dead ends.  The first being finding an HDMI cable out here. After a grueling run through the various big-box stores, selling the damned thing for $40 and waay up (they cost under $6 on, I peeked into the neighborhood A/V shop near my cousins' (two cousins, one shop) western-ware store.  He gave me a fair price for an unbagged, ~1m cable: free.  I love small town economies where customer referral and satisfaction are more important that 10 cents of profit.  

Five thoughts on WikiLeaks

Submitted by Jon on Wed, 12/08/2010 - 21:02

We are also supporting the development of new tools that enable citizens to exercise their rights of free expression by circumventing politically motivated censorship. We are providing funds to groups around the world to make sure that those tools get to the people who need them in local languages, and with the training they need to access the internet safely. [ ... ] We want to put these tools in the hands of people who will use them to advance democracy and human rights, to fight climate change and epidemics, [...]

Great ideals, sure, but what about WikiLeaks? Who in this day and age would vocally and publicly support tools that would "[circumvent] politically motivated censorship" when these crazies could be terrorists being censgored by a friendly government, or when their "free speech rights" could be potentially tied to copyrighted material?

Those were the words of Secretary Clinton, speaking earlier this year Hat-tip to BoingBoing. Kinda less relevant today, huh?

WikiLeaks has changed political discourse, and quite possibly the path of the Internet's evolution. I can't claim to have completely digested my own views on this, but here's a start, and some links to a lot of great thoughtwork on the situation.

1) Maybe this is the world we want. Long discussions about the value of a hegemonic global political system and its values on stability (at the cost of human rights, generally speaking) aside, the USA's political power is in flux right now, and possibly fading out. Do we want another superpower to emerge and dominate the world? USA, for all our foibles, has some strong ideals around democratic rule and human rights. We don't always practice those, but they're at least core to our political discourse. A truly multipolar world needs global-level democracy, and it's tools like wikileaks that begin to create that. Well, that, and a roving band of crypto-anarchists who get pissed off at this ham-handedness and decide to take the websites of mastercard and visa down. And Wikipedia. And torrent-sharing sites. Any tool that's good at promoting human rights in repressive regimes is also good at enabling dissidents, whistleblowers, pedophiles, and people swapping mp3 files. You don't get to pick and choose who uses these things, and trying to do so destroys their value immediately. These tools also lend themselves towards mob rule, so we need to choose our next steps carefully. As a side note, if you really disapprove of harshly, externally-enforced transparency of what you consider private details, then I really hope you're not reading this from a link on Facebook.

2) It's OK to be a Voltaire here. While not technically his own words, he certainly held and espoused the concept: "I disapprove of what you say, but I will defend to the death your right to say it." Wikileaks is being, well, over the top and careless in what it's releasing. The Collateral Murder video seems pretty clearly whistleblowing. The cable leaks are un-aimed. Clay Shirky summed this up solidly:

I am conflicted about the right balance between the visibility required for counter-democracy and the need for private speech among international actors. Here’s what I’m not conflicted about: When authorities can’t get what they want by working within the law, the right answer is not to work outside the law. The right answer is that they can’t get what they want. [...]

Over the long haul, we will need new checks and balances for newly increased transparency — Wikileaks shouldn’t be able to operate as a law unto itself anymore than the US should be able to. In the short haul, though, Wikileaks is our Amsterdam. Whatever restrictions we eventually end up enacting, we need to keep Wikileaks alive today, while we work through the process democracies always go through to react to change. If it’s OK for a democracy to just decide to run someone off the internet for doing something they wouldn’t prosecute a newspaper for doing, the idea of an internet that further democratizes the public sphere will have taken a mortal blow.

It's OK, if not strongly encouraged, to be not a big fan of WikiLeaks, but still supportive of their right to exist and disseminate "leaked" information. Would the US be upset if this was a leak of internal Chinese diplomatic ramblings, or North Korea, or Iran -- or would we be chalking another success up for "the little guy" in the global struggle for democracy and freedom of speech? We're all sovereign States here, at some level, there should be at least an illusion of equal rights among States.

3) Don't be Grand Moff Tarkin. Yeah, a Star Wars reference for good measure. The actual reference is to some parting advice from Leia on his tough stance around the use of force to put down rebels; "The more you tighten your grip, Tarkin, the more star systems will slip through your fingers." As an anonymous commenter on the BoingBoing story above said;

I think you misunderstood what she said. The attacks are the tool. Just look at the effect its had on wikileaks. Its gone from being hosted on a single server with rather unsafe DNS etc to being mirrored over 1000 times across the world!

Truely this government is driving the development of anti-censorship tools and increasing the power of free speech online.

This is the first of many problems of this sort, and here we are showing off all the tricks in our playbook. Over at Crooked Timber, Henry puts it more succinctly:

The US response to Wikileaks has been an interesting illustration of both the limits and extent of state power in an age of transnational information flows. The problem for the US has been quite straightforward. The Internet makes it more difficult for states (even powerful ones such as the US) to control information flows across their own borders and others. [The jurisdictional problems of the Internet] makes it much harder for the US and other actors to use the traditional tools of statecraft[...]

However, there is a set of tools that states can use to greater effect. The Internet and other networks provide some private actors with a great deal of effective transnational power. Banks that operate across multiple jurisdictions can shape financial flows between these jurisdictions.

The Internet has this amazing and annoying problem that's baked pretty deeply in to its architecture - it is designed to move information as efficiently as possible. This makes censorship attempts backfire every time. Somehow, no one has learned this.

4) Shooting the messenger is a fast way to being uninformed. Disabling, hobbling, and otherwise subjecting tools to political will is a very dangerous path. Amazon has a great business around providing "elastic" computing and hosting services to companies, and I'm going to bet that anyone using Amazon's services is re-examining their hosting choices right about now. Breaking the DNS system to take the main wikileaks site off the web -- I'm sure that sounded like a brilliant idea, and it's going to reignite a debate around the US's control of huge swaths of the DNS system, and probably make that power very difficult to enact both politically and technically. Again, the trust in what was considered a trusty tool has been eroded, and anyone working on hot-button issues is going to take extra care such that they have secondary systems to provide future resiliency against a similar attack. Beyond the points made in (3), we're hurting normal business that trusts these services to be reliable. Ethan Zuckerman has a good Q&A about this at the Columbia Journalism Review

5) Don't forget the real story. Did Julian Assange actually commit a crime in the US? He's not a citizen, he didn't do any of this in the US, and he's not the one who stole the classified documents. And he hasn't been charged with a crime (in the US, yet). Are we really pursuing someone for re-broadcasting already leaked, classified documents? That worked so well with the Pentagon Papers.

Hey, at least we live in interesting times.

#PulseCamp : Building a vital stats monitor for the world

Submitted by Jon on Mon, 12/06/2010 - 11:24

My brain was pretty close to silly putty by the end of last week. It was been snapping back and forth, rubber-band-like, between microscopic, tightly focused, gnarled and tricky use cases up to their connection to the UN Global Pulse project - a global, systems-changing project.

Sketching out the architecture. This might take more post-its.

The Global Pulse, at scale, is... well, the more time I spend on it the less I'm sure I know what it specifically is. In effect, it is a massive data coordination system which helps visualization and tracking of anomalys and trends. The dream is to predict crises and improve prevention. This is easily thought of in detecting disease outbreaks through various data-connected behavior changes (increase in usage of oral rehydration salts as evidenced by stock-outs in health clinics reported in a nationa health information system could indicate a cholera problem). Its most valuable use case seems to be at the national level, but there would also (obviously) be a global level to track larger trends across countries and regions. And country-level offices could peer together with other Pulse installations, bring in global baseline data, and so on. It keeps going deeper and deeper in every direction possible.

Accepting the insanely complicated data and architecture questions, how do you even find the right data (whether it's well-formatted or a pile of paper), and connect it in and pull out solid anomaly tracking and generate useful, predictive guesses on trends. That's the key in the next stage of the Pulse - starting in one country. This PulseLab will be able to grok the local context and know the right data to plug in.

The trick for the data and architecture part has also been faced. Implementation will not be easy, by any means, but the goal of the architecture is to re-use and re-cycle as many existing tools as possible to slurp in data (both chunky databases and firehoses of live streaming data), standardize it, and then create a set of manipulation and visualization tools to help reveal trends and test hypotheses. This will likely take the form of a set of toyboxes of data sources, data transformation tools, apps (input/output to other useful systems like mappers, charting, Ushahidi, etc.), and a recipe box of how others have chained these together for specific data-digging goals. This recipe and the hypothesis testing tool (the "hunch" ) will likely compete to be the core social object of the system, with aid and government officials trading hunches and recipes (and recipes to support hunches, hunches based on recipe results...).

A potential Global Pulse Product-in-a-box for an end user

There is a lot up in the air, and a lot still to congeal as development of this tool and the architecture gets moving. The (amazingly well-facilitated) process which went from thinking through users, their requirements, common underlying system-level requirements and speccing those out was fantastic. It encouraged a lot of different and conflicting views around the product's end form to come to a loose consensus (and a better, more flexible product outline!).

If you're saying it can't be done, you're almost right. The first iterations will be limited and possibly fragile, relying on low-hanging data fruit instead of difficult to "harvest" data exhaust. Privacy issues abound, both on personal levels and at government security levels. Trust me when I say that the room was stock full of mind-bogglingly smart people who have dealt with the real worlds of development and reconstruction work, and these obstacles are being worked through by people who realize that lives and livelihoods are at stake in some of the privacy questions.

Here are summary notes from each day: One (Term of the Day: "Data Exhaust"), Two (TotD: "Data Esperanto"), and Three (TotD: "Contextualized Cartography"), as well as a solid overview of the project, and the call to action leading in to last week's workshop. A great writeup of the event is at by MIT's Nadav Aharony.


User login

© Jon Camfield
Comments or Questions? Contact me
Privacy Statement | Disclaimer