Author Archives: mattbrandeburg

Digital Divide: Lessons Learned, All Clichés Aside

When summarizing the most specific lesson I can take away from this class this semester, it is without a doubt the implications of the Digital Divide.  From the first introduction of the concept, I found literature framing the topic in a way I had no previously considered; the Digital Divide was and is more than groups being left out of the latest technological trends (as I had always understood it), but also the story of groups being left behind of the global economy in general.  In other words, this was not just a social exclusion, or consumerism exclusion, but an economic exclusion at a very fundamental level.

I find the use of ICTs in combatting this tragedy as something that I will take with me into the future.  In all areas of international development, it is important to frame projects in a way that promotes equality to all.  For ICT4D, combatting the Digital Divide is a way to achieve greater equality across multiple areas.  I will take to heart the success stories, from fishermen in India using SMS to improve market efficiencies to everyday citizens benefiting from mobile banking using MPESA in Kenya.  The Digital Divide is all around us, but the ICT technologies we have today can help us leapfrog these challenges in smart, dignifying ways.  This is the ultimate lesson I will take with me into a future with international development.

 

I am interested to see if in the future we can focus more on the political economy of ICT4D, or the implication of other fields in general.  In other words, if we are highlighting business, banking, and industry over all throughout the semester, can we bring in tools from other disciplines for one day and understand how they measure success and if there is a connection with what ICT4D interventions achieve in developing countries.  In other words, can there be a day to take a multidisciplinary approach to some of the achievements of ICT4D discussed throughout the semester?  These are things I would like to have considered for future semesters.

 

Advertisements

FAA Comments on In-Plane Cybersecurity

In our most recent class, the subject of cybersecurity took a particularly dramatic turn when the topic turned to in-plane security with regards to malicious software apps on smartphones.  The app in question is a particular piece of code written by Hugo Teso, a german security consultant, and unveiled at a security conference two weeks ago.  As Gizmodo, a popular gadget blog writes on the subject, the app demonstrated “could falsify data and adjust the heading, altitude, and speed of an entire airplane.”  The potential for this app are frightening indeed; that is, if the application worked as advertised.

Upon further review, the app appears to be, for the time being, unable to replicate its results on live aircraft.  The exploits appear to only be valid in the training version of the plane management software.  As the same Gizmodo article points out, the Federal Aviation Administration dismissed the application’s claims rather quickly.  The FAA contends:

[A] German information technology consultant has alleged he has detected a security issue with the Honeywell NZ-2000 Flight Management System (FMS) using only a desktop computer. The FAA has determined that the hacking technique described during a recent computer security conference does not pose a flight safety concern because it does not work on certified flight hardware.

Elaborating on why the certified flight hardware was immune to the exploit, the European Aviation Safety Administration, or EASA, reports that the training software lacks the overwriting protections that the certified software used in-flight have installed.  In short, it seems that the software was written with enough forward thinking redundancies, authenticators, and other security features that the software is ahead of the present threat.

The question remains however how the software will react in the future to these threats.  This exploit, though done as a proof of concept rather than with explicit malicious intent, nevertheless has been let out of the proverbial bag.  As planes gain wifi and other networking capabilities, how long will these current software protections be sufficient?  What this ordeal teaches us, more than that our planes are presently safe from these types of attacks, is that we must continue to develop software with forward-thinking security in order to ensure our safety in the 21st century.


Forums for Failure, Fanfare and Felicitations: Pecha Kucha Edition

This week’s class addressed the role of public forums for developing best practices and learning from project mistakes.  The two biggest examples covered were the FAILFare and the Dutch Institute of Brilliant Failures.  These groups provide outlets for positively critiquing projects and help facilitate the dialogue necessary for future successes.

That said, forums like FAILFaire are not exclusive to the field of international development.  One such forum which has spread across the globe and appeals to a variety of fields is Pecha Kucha. The format is simple: 20 slides, 20 seconds per slide.  The presentations are often humorous, the space is often a bar in order to promote “thinking and drinking”. These characteristics of Pecha Kucha combine to create a very casual setting amongst peers that allows for honest, unguarded dialogue on successes and failures.

The event can be educational in other interesting ways when you consider its unique format.  The setting appeals to millennials as it is fast-paced, high-energy, and to the point.  This is key, the 20 seconds per slide rule, as it keeps the presenter from beating around the bush or otherwise obfuscating his or her failures.  The informality of it all, combined with its directness, is why the collaborative atmosphere can lead to real assessment and learning.  I highly suggest everyone reading this blog to find out the next Pecha Kucha in their city and give it a try.

The next Pecha Kucha event scheduled for New Orleans is May 2nd; however, no official information has been made public at this time, so it may be postponed indefinitely. 


Criticism Waged From “Bamako”: Development in a Neoliberal World

For this module, one of the assigned readings was on the Zapatista movement in Mexico.  In this article, the movement is placed within a context of anti-globalization protests in the 1990s. As Mark Gelsomino cites in “The Zapatista Effect: Information Communication Technology Activism and Marginalized Communities”:

Anti-World Trade Organization (WTO) protests in Seattle, Genoa and Quebec drew hundreds of thousands of protesters invested in resisting a neo-liberalist conception of globalization. Unfortunately, the “anti-globalization” tag is something of a misnomer. By large, these groups are not against globalization itself, but rather the version of globalization that is driven by unfettered commoditization (3).

This reminds me of a film little known to American audiences yet profound on its indictments on global financial institutions and neoliberal development policy: Bamako.  In this 2006 film, the “unfettered commoditization” of globalization is put on trial as a Malian backyard becomes a courtroom for the citizens of Bamako against the International Monetary Fund.  The central question of this film revolves around value and self-worth:  why is the fate of countries determined by how much they export? According to the citizens of Mali in this film, this statistic bears little relevance with what occurs within a country’s borders.

At one point in the film, a Malian declares the services they were forced to develop did not make them better off.  Instead of free healthcare they were forced to privatize the industry and charge fees for services.  They learned how to do business like in the West: “pay or die”.  A few minutes later, the character declares “we must civilise globalization.”  Unrestrained capitalism, or “unfettered commoditization” is the beast the actor argues must be tamed.

It is important when promoting development projects that we consider the specific lessons we are presenting to foreign countries.  We must not teach them “pay or die”, we must approach the world in a more humane capacity.  We must understand the culture of a target country and not deprive them of a critical service in the process of promoting our goals.  While “Bamako” takes a rather one-sided stance, it holds valuable advice for the Western audience.

The movie ends with a quote by Amié Césaire: “My ear to the ground, I hear tomorrow pass.” There is much need in the world, but let us not promote false hope or continue in our history of broken promises.  There is already too much of that for the world to bear, lest we find ourselves on trial next.


The Gods Must Be Crazy: A Recap of 2012’s “Tablets Without Teachers” Experiment

In the fall of 2012, the internet started buzzing about a daring new experiment by One Laptop Per Child (OLPC). In “two remote Ethiopian villages” where the local children not only had never seen a computer but were illiterate as well, OLPC dropped a box full of their new XO tablets in the middle of the village and recorded the results via the tablets’ memory chips.  The Ethiopian experiment proved to be quite interesting indeed.

The boxes were taped shut and came without any instructions.  Within four minutes, one child got the box open, pulled out a tablet, and turned it on.  After five days, the average number of daily apps used by each child was 47.  In two weeks time, these illiterate children were singing their ABCs.  In one village, after five months, one tablet was hacked and running Android.  Best of all, the cameras were disabled in the XO software natively; however, by using Android, this particualrly motivated child got his camera to activate–then quickly hacked the other childrens’ tablets to do the same.  Every tablet was customized–even though software prevented them from originally doing this.  The kids took the tablets and made them their own.

Still not impressed?

After several months, the kids in both villages were still heavily engaged in using and recharging the machines, and had been observed reciting the “alphabet song,” and even spelling words. One boy, exposed to literacy games with animal pictures, opened up a paint program and wrote the word “Lion.”

The gods must be crazy.


Morocco National ICT Resources

National ICT Strategy:

 Digital Morocco 2013: The National Strategy for Information Society and Digital Economy

  • Also known as: Maroc Numeric (French Version)
  • Last Updated: 21 June 2010
  • Published by: Ministry of Industry, Trade, and New Technologies.
  • Language: English

Programme eGouvernement (Newest supplement to Maroc Numeric 2013)

  • Last Updated: 19 January 2011
  • Published by: Ministry of Industry, Trade, and New Technologies
  • Language: French

Government Links:

Non-Government Resources:


The Lost Decade: Ten Years of Retrospect on Gender and ICT

A little more than ten years ago, the famed Geeta Rao Gupta published an article on Foreign Policy as a continuation of her work published just prior in the International Feminist Journal of Politics.  The title of her article? ‘Till Technology Do Us Part.  The article strikes a depressing tone as it angrily demands from global governments why policies that benefit women have yet to be established when it comes to ICT and the work force.

The conclusion of the article is simple:

[Previous reserch concludes] that maximizing the benefits of technology for female workers requires building on women’s “experiential knowledge,” providing women with flexible vocational training that considers nontraditional job opportunities, and ensuring that the state takes greater responsibility for protecting vulnerable workers.

This conclusion comes from an impressive collection of data where “nongovernmental organizations (NGOs), academic researchers, and policymakers from Bangladesh, China, India, Indonesia, Korea, Malaysia, Sri Lanka, and Vietnam [were used] to examine the ‘problems and possibilities’ that technology poses for women workers.”  Interviews on the ground described cases such as this one where “hand loom weavers in India reported feelings of uselessness and despair because their skills were rendered obsolete by technologically skilled workers.”  There lies the rub, and why the previous conclusion was not how the article actually ends.  Instead, the author continues in her conclusion with the following caveat:

Unfortunately, without a concrete political strategy spelling out the how, who, what, and where, such objectives remain unobtainable. A realistic strategy should identify the individuals and institutions that would implement these recommendations, assess the costs and benefits to the state and to employers, and outline the specific steps at the local, national, and international level needed to translate well-intentioned rhetoric into reality.

Ten years later, and those concerete strategies do not appear to have been formulated. (If they have, dear reader, please post some recomended points of research in the comment section bellow.)  Further, the author implores countries to examine the health risks associated with high-tech work: not just repetitve stress injuries like carpal tunnel but psychological damages and negative externalities like loom weavers lament above.  While the promise of incorporating technology into the working lives of women may make for a great political soundbite, even ten years out there has yet to be a credible response to this criticism.