Skip to main content

Home/ Memedia/ Group items tagged Programming

Rss Feed Group items tagged

feng37

Obama's support for the FISA "compromise" - Glenn Greenwald - Salon.com - 0 views

shared by feng37 on 22 Jun 08 - Cached
  • This bill doesn't legalize every part of Bush's illegal warrantless eavesdropping program but it takes a large step beyond FISA towards what Bush did. There was absolutely no reason to destroy the FISA framework, which is already an extraordinarily pro-Executive instrument that vests vast eavesdropping powers in the President, in order to empower the President to spy on large parts of our international communications with no warrants at all. This was all done by invoking the scary spectre of Terrorism -- "you must give up your privacy and constitutional rights to us if you want us to keep you safe" -- and it is Obama's willingness to embrace that rancid framework, the defining mindset of the Bush years, that is most deserving of intense criticism here.
  • Beyond that, this attitude that we should uncritically support Obama in everything he does and refrain from criticizing him is unhealthy in the extreme. No political leader merits uncritical devotion -- neither when they are running for office nor when they occupy it -- and there are few things more dangerous than announcing that you so deeply believe in the Core Goodness of a political leader, or that we face such extreme political crises that you trust and support whatever your Leader does, even when you don't understand it or think that it's wrong. That's precisely the warped authoritarian mindset that defined the Bush Movement and led to the insanity of the post-9/11 Era, and that uncritical reverence is no more attractive or healthy when it's shifted to a new Leader.
  •  
    This bill doesn't legalize every part of Bush's illegal warrantless eavesdropping program but it takes a large step beyond FISA towards what Bush did. There was absolutely no reason to destroy the FISA framework, which is already an extraordinarily pro-Executive instrument that vests vast eavesdropping powers in the President, in order to empower the President to spy on large parts of our international communications with no warrants at all. This was all done by invoking the scary spectre of Terrorism -- "you must give up your privacy and constitutional rights to us if you want us to keep you safe" -- and it is Obama's willingness to embrace that rancid framework, the defining mindset of the Bush years, that is most deserving of intense criticism here.
Qien Kuen

鏘鏘三人行20081113 - 视频 - 在线观看 - 土豆网 - 0 views

  •  
    这一期专门谈中国目前出租车司机的悲惨境况
feng37

Digital Resistance and the Orange Revolution « iRevolution - 0 views

  • Maidan was a group of tech-savvy pro-democracy activists who used the Internet as a tool to support their movement. Maidan in Ukranian means public square and Maidan’s website features the slogal “You CAN chnage the world you live in. And you can do it now. In Ukraine.”
    • feng37
       
      买单?
  • The main activity of Maidan was election monitoring and networking with other pro-democracy organizations around Eastern Europe.
  • “websites cannot produce an activist organization.”
  • ...16 more annotations...
  • it was crucial for Maidan to frequently host real world meetings as their membership base increased. The human element was particularly important. This explains why Maidan encouraged users to disclose their identity whenever possible.
  • The community benefited from centralized leadership that developed the organization’s culture, controlled its assets and provided the strategy to achieve desired goals. The Maidan experience thus demonstrates a hybrid organization.
  • Pora, meaning “It’s Time” in Ukranian, was a well-organized group of  pro-democracy volunteers that “emerged as an information sharing campaign and during the elections morphed into coordinators of mass protest centered around tent cities in towns throughout Ukraine. The grassroots movement took its inspiration from Serbia’s Otpor movements as well as “older civic movements in Hungary and Czechoslovakia.”
  • “the active use of modern communication systems in the campaign’s management,” and “mobile phones played an important role for mobile fleet of activists.”
  • “a ssytem of immedate dissemination of information by SMS was put in place and proved important.” In addition, “some groups provided the phones themselves, while others provided SIM cards, and most provided airtime.”
  • roviding rapid reporting in a way that no other medium could. As tent cities across the Ukraine became the sign of the revolution,
  • The news feed from the regions [became] vitally important. Every 10 to 15 minutes another tent city appeared in some town or other, and the fact was soon reported on the air.
  • While the government certainly saw the Internet as a threat, the government had not come to consensus regarding the “legal and political frameworks it would use to silence journalists that published openly on this new medium.”
  • many online journalists unlike mainstream journalists were free from the threat of defamation charges.
  • one of the earliest examples of what Steven Mann calls “sousveillance,” meaning, “the monitoring of authority figures by grassroots groups, using the technologies and techniques of surveillance.”
  • Technology certainly does not make possible a direct democracy, where everyone can participate in a decision, nor representative democracy where decision makers are elected; nor is it really a one-person-one-vote referendum style democracy. Instead it is a consultative process known as ‘rough consensus and running code.’
  • the real power of traditional media. Natalia Dmytruk worked for the Ukraine’s state-run television news program as an interpreter of sign language for the hearing-impaired. As the revolution picked up momentum, she decided she couldn’t lie anymore and broke from the script with the following message: I am addressing everybody who is deaf in the Ukraine. Our president is Victor Yushchenko. Do not trust the results of the central election committee. They are all lies. . . . And I am very ashamed to translate such lies to you. Maybe you will see me again…
  • “Dmytruk’s live silent signal helped spread the news, and more people began spilling into the streets to contest the vote.”
  • itizen journalists and digital activists participated in civil resistance trainings across the country, courtesy of Otpor. The use of humor and puns directed at the regime is a classic civil resistance tactic.
  • one of key reasons that explains the success of the revolution has to do with the fact that “the protesters were very well trained and very good at protesting… very, very good.”
  • Digital activists need to acquire the tactical and strategic know-how developed over decades of civil resistance movements. Otherwise, tactical victories by digital activists may never translate into overall strategic victory for a civil resistance movement.
feng37

U.S. Fears Threat of Cyberspying at Olympics - WSJ.com - 0 views

  • The spy tactics include copying information contained in laptop computers at airport checkpoints or hotel rooms, wirelessly inserting spyware on BlackBerry devices, and a new technique dubbed "slurping" that uses Bluetooth technology to steal data from electronic devices. In addition to cybersecurity threats in other countries, "so many people are going to the Olympics and are going to get electronically undressed," said Joel Brenner, the government's top counterintelligence officer. He tells of one computer-security expert who powered up a new Treo hand-held computer when his plane landed in China. By the time he got to his hotel, a handful of software programs had been wirelessly inserted.
  •  
    Yeah, copying hard drives at the border, that would be America who does that and not China.
isaac Mao

Solidot | "极限编程"控制凤凰号火星着陆探测器 - 0 views

  • “这是一次极限编程(Extreme Programming)挑战。我们只有2到3天时间去设计,之后每一天的计划都很精确的。我们要安排20到30种次序,每种50行代码,设备之间并不是孤立的,也就是你不仅需要让仪器按次序工作,还要让它们共同工作。”程序员们使用C编程语言,在Linux 操作系统上编写他们的程序。凤凰号登陆探测器将在火星夏天工作3个月左右,之后温度降至华氏零下170度,机器将会被冻僵。
number5

Python 核心编程第二版 | Nicholas Ding - 0 views

  • 《Python 核心编程》第二版总算要出了,这本是一个振奋人心的消息,毕竟有超过 10 位以上的 Python 爱好者一起合作翻译了这本书,能够翻译完这本长达 1000 页的 Python 巨著,这是非常不容易的。
  • 最早是在 《Core Python Programming》(中文第二版)有奖书评活动 看到这个消息的,里面的链接指向 CPUG 的推广页,打开就能看到清风同学帅气的照片了 :D。不过仔细一看译者却另有其人,封皮上赫然写着“宋吉广”,但这本书可是 CPUG 组织翻译的啊,为什么译者却另有其人了呢?
  • 看一下 China-pub 中此书的序言部分,可以很有意思的看到贡献者列表,但正是这些贡献者们完成了本书超过 90% 以上的翻译任务。
  •  
    窃取开源社区劳动成果的人可耻!
Kenyth Zeng

90后非主流鄙视80后 - 视频 - 在线观看 - 土豆网 - 0 views

    • Kenyth Zeng
       
      作为一个80后,我哭笑不得:D,只能说每个人都有曾经幼稚的时候,不管几0后。
isaac Mao

波斯小昭的蛇舞 - 0 views

  •  波斯小昭的蛇舞波斯小昭的蛇舞  我很喜欢这个蕙心兰质的女子。
yuancheng

Propaganda | Berkeley Institute of Design - 29 views

  • It acknowledges that design in the era of ubiquitous technologies means not only technical innovation, but deep understanding of behavior
  • This compels a new approach to design that is partly technical, but also deeply social and humanist.
  • Understanding activity means understanding values, needs, lifestyle, mythologies, aesthetics, social and cultural norms, and individual and social psychology
  • ...4 more annotations...
  • Context-aware and ambient systems.
  • Location-based services (LBSes) and LB collaborative systems.
  • The Master’s degree will comprise a core program of six courses and two or more optional courses.
  • Design grapples with the impossible complexity of everyday human action, and shines light on a path that can lead to better quality of life.
1 - 14 of 14
Showing 20 items per page