Skip to main content

Home/ Politically Minded/ Group items tagged sourcing

Rss Feed Group items tagged

Skeptical Debunker

Big Content condemns foreign governments that endorse FOSS - 0 views

  • University of Edinburgh law lecturer Andres Guadamuz wrote a blog entry this week highlighting some particularly troubling aspects of the IIPA's 301 recommendations. The organization has condemned Indonesia and several other countries for encouraging government adoption of open source software. According to the IIPA, official government endorsements of open source software create "trade barriers" and restrict "equitable market access" for software companies. The profound absurdity of this accusation is exacerbated by the fact that Indonesia's move towards open source software was almost entirely motivated by a desire to eliminate the use of pirated software within the government IT infrastructure. It's important to understand that Indonesia has not mandated the adoption of open source software or barred government agencies from purchasing proprietary commercial software. The Indonesian government issued a statement in 2009 informing municipal governments that they had to stop using pirated software. The statement said that government agencies must either purchase legally licensed commercial software or switch to free and open source alternatives in order to comply with copyright law. This attempt by Indonesia to promote legal software procurement processes by endorsing the viability of open source software has apparently angered the IIPA. In its 301 recommendations for Indonesia, the IIPA demands that the government rescind its 2009 statement. According to the IIPA, Indonesia's policy "weakens the software industry and undermines its long-term competitiveness" because open source software "encourages a mindset that does not give due consideration to the value to intellectual creations [and] fails to build respect for intellectual property rights." The number of ways in which the IIPA's statements regarding open source software are egregiously misleading and dishonest are too numerous to count. The IIPA seems to have completely missed the fact that there is a very robust ecosystem of commercial software vendors in the open source software market and that open source software is at the heart of some of the most popular consumer electronics products that are sold in the United States. It has clearly become an important part of the US software economy and increasingly serves as an enabler of innovation and technological progress. In light of the profitability of Red Hat and other open source leaders, it seems absurd to contend that open source software adoption will weaken the software industry or reduce its competitiveness. In fact, the emergence of open source software has contributed to creating a more competitive landscape in the software industry by offering alternative business models that enable smaller companies to gain traction against the dominant incumbent players. The IIPA's position is profoundly hypocritical, because many parts of the US government, including the Department of Defense, have issued their own memos endorsing open source software adoption. The IIPA's disingenuous move to equate open source software with piracy reeks of desperation. The BSA and other IIPA members are likely losing sleep over open source software because that development model and approach to licensing will empower developing countries to build their own domestic IT industries, eliminating the need for them to tithe to American software giants. It's another failing of the 301 review, which Big Content wants used to coerce other countries into adopting ever-more-stringent copyright laws.
  •  
    In accordance with US trade law, the Office of the US Trade Representative (USTR) is required to conduct an annual review of the status of foreign intellectual property laws. This review, which is referred to as Special 301, is typically used to denounce countries that have less restrictive copyright policies than the United States. The review process is increasingly dominated by content industry lobbyists who want to subvert US trade policy and make it more favorable to their own interests. We have already noted the targeting of Canada for its supposedly lax copyright laws, but that is not the only nation drawing the ire of Big Content. One of the organizations that plays a key role in influencing the Special 301 review is the International Intellectual Property Alliance (IIPA), a powerful coalition that includes the RIAA, the MPAA, and the Business Software Alliance (BSA). The IIPA, which recently published its official recommendations to the USTR for the 2010 edition of the 301 review, has managed to achieve a whole new level of absurdity.
Muslim Academy

Islamic education Importance and sources - 0 views

  •  
    Islamic education is important to act like a complete Muslim. There are many sources which could be used for getting education in Islam. Muslims must have proper information about Islam in order to act on its teachings in an effective manner. There are many sources these days which could be used in order to get education about Islam. This education will clear many points about Islam and the users would be able to compare Islam with many other religions. There are many religions which are followed by different people in different parts of the world. Islamic education is important for spreading Islam in an effective manner. After getting education in Islam it could be compared with other religions for making a good decision. There are many types of facilities in Islam which are helpful for the followers.
thinkahol *

Dr. Daniel G. Nocera - YouTube - 0 views

  •  
    The supply of secure, clean, sustainable energy is arguably the most important scientific and technical challenge facing humanity in the 21st century. Rising living standards of a growing world population will cause global energy consumption to double by mid-century and triple by the end of the century. Even in light of unprecedented conservation, the additional energy needed is simply not attainable from long discussed sources these include nuclear, biomass, wind, geothermal and hydroelectric. The global appetite for energy is simply too much. Petroleum-based fuel sources (i.e., coal, oil and gas) could be increased. However, deleterious consequences resulting from external drivers of economy, the environment, and global security dictate that this energy need be met by renewable and sustainable sources. The dramatic increase in global energy need is driven by 3 billion low-energy users in the non-legacy world and by 3 billion people yet to inhabit the planet over the next half century. The capture and storage of solar energy at the individual level personalized solar energy drives inextricably towards the heart of this energy challenge by addressing the triumvirate of secure, carbon neutral and plentiful energy. This talk will place the scale of the global energy issue in perspective and then discuss how personalized energy (especially for the non-legacy world) can provide a path to a solution to the global energy challenge. Daniel G. Nocera is the Henry Dreyfus Professor of Energy at the Massachusetts Institute of Technology, Director of the Solar Revolutions Project and Director of the Eni Solar Frontiers Center at MIT. His group pioneered studies of the basic mechanisms of energy conversion in biology and chemistry. He has recently accomplished a solar fuels process that captures many of the elements of photosynthesis outside of the leaf. This discovery sets the stage for a storage mechanism for the large scale, distributed, deployment of solar energy. He has b
thinkahol *

Open-source governance - Wikipedia, the free encyclopedia - 0 views

  •  
    Open-source governance is a political philosophy which advocates the application of the philosophies of the open-source and open-content movements to democratic principles in order to enable any interested citizen to add to the creation of policy, as with a wiki document. Legislation is democratically opened to the general citizenry. The concept behind democracy, that the collective wisdom of the people as a whole is a benefit to the decision-making process, is applied to policy development directly
thinkahol *

WikiLeaks - 0 views

shared by thinkahol * on 05 Jan 11 - Cached
  •  
    WikiLeaks is a non-profit media organization dedicated to bringing important news and information to the public. We provide an innovative, secure and anonymous way for independent sources around the world to leak information to our journalists. We publish material of ethical, political and historical significance while keeping the identity of our sources anonymous, thus providing a universal way for the revealing of suppressed and censored injustices.
thinkahol *

Newly leaked documents show the ongoing travesty of Guantanamo - Glenn Greenwald - Salo... - 0 views

  •  
    Numerous media outlets -- The New York Times, The Washington Post, The Guardian, The Telegraph, and NPR, among others - last night published classified files on more than 700 past and present Guantanamo detainees. The leak was originally provided to WikiLeaks, which then gave them to the Post, NPR and others; the NYT and The Guardian claim to have received them from "another source" (WikiLeaks suggested the "other source" was Daniel Domscheit-Berg, a former WikiLeaks associate who WikiLeaks claims took, without authorization, many WikiLeaks files when he left). The documents reveal vast new information about these detainees and, in particular, the shoddy and unreliable nature of the "evidence" used (both before and now) to justify their due-process-free detentions. There are several points worth noting about all this:
thinkahol *

Climate of Fear: Jim Risen v. the Obama administration - Glenn Greenwald - Salon.com - 0 views

  •  
    [Barring unforeseen events, I'm going to leave this post at the top of the page for today and tomorrow, as I think the events it examines, rather in detail and at length, are vitally important and merit much more attention than they've received] The Obama DOJ's effort to force New York Times investigative journalist Jim Risen to testify in a whistleblower prosecution and reveal his source is really remarkable and revealing in several ways; it should be receiving much more attention than it is.  On its own, the whistleblower prosecution and accompanying targeting of Risen are pernicious, but more importantly, it underscores the menacing attempt by the Obama administration -- as Risen yesterday pointed out -- to threaten and intimidate whistleblowers, journalists and activists who meaningfully challenge what the government does in secret. The subpoena to Risen was originally issued but then abandoned by the Bush administration, and then revitalized by Obama lawyers.  It is part of the prosecution of Jeffrey Sterling, a former CIA agent whom the DOJ accuses of leaking to Risen the story of a severely botched agency plot -- from 11 years ago -- to infiltrate Iran's nuclear program, a story Risen wrote about six years after the fact in his 2006 best-selling book, State of War.  The DOJ wants to force Risen to testify under oath about whether Sterling was his source.
Ian Schlom

School Closings: How Administrations Decide - 0 views

  •  
    This is a good source for me. Since it's an interview with an official in DC about the school closings and how the school administrations are making these decisions. Abstract of Audio: Many parents and teachers in the nation's cities are disappointed by a long list of school closings. But when enrollment is low and costs are high, administrators face tough decisions. Host Michel Martin speaks to the Chancellor of Washington D.C.'s public schools, Kaya Henderson, about how school systems weigh these difficult choices.
Muslim Academy

The Arabic as Muslim language - 0 views

  •  
    Arabic is considered as Muslim language in many parts of the world. Teachings of Islam are issued in Arabic and many people are learning this language for getting the main information about Islam in an effective manner. In order to live and work in a Muslim country it is important to learn language of that country. In many Muslim countries Arabic is a main language. People are communicating in Arabic and doing dealings through this language. If you are willing to visit a Muslim country in which Arabic is a main language then you must learn that Muslim language. Those people who are visiting to Muslim countries can learn Arabic in an effective manner as there is a good atmosphere for them. It is good to learn Arabic before visiting such country in which Arabic is a main language. There are many sources of learning Arabic. There are online courses which could be used for learning Arabic in an effective manner. Academies are offering language courses for those who are willing to learn Arabic.
Muslim Academy

Anti U.S. protests in Pakistan - 0 views

  •  
    Series of protests took place all over the world and didn't spare Pakistan - Muslim country. Muslims around the country came up with huge anger and disappointment against the making of anti-Islam film. In many other parts of the world, protests captured huge attention of the international media as U.S. embassies were burnt and stormed. For instance, Egypt, Syria, Yemen etc. Muslims gathered in a great number and raised their voice against the making of the film. In some parts of the world, U.S. flag had been burnt and replaced with a black flag having words written on it as "There is no God but God, and Mohammad is his messenger" A small budget movie named "innocence of the Muslims" was made by an individual of California and put over the internet. This movie didn't get any attention until the subtitles were poste din Arabic and sent to the Egyptian journalists. Movie made humiliates the sentiments of the Muslims as it tried to shun the image of beloved Prophet (peace and blessings upon him). Movie made touches the themes of paedophilia and homosexuality. In Pakistan, security measured were tightened by the local police and made sure no violence hit and destroy U.S. embassy. Recently, violence hit the security of the U.S. embassies in many Muslim countries. Many U.S. embassies such as in Egypt, Libya, Yemen were stormed by the protestors greatly. The brazen attack on the U.S embassy also killed an American; the angry souls were tickled by "video linked to Florida pastor Terry Jones, whose public burning of the Koran in 2010 led to deadly protests in Afghanistan. The film reportedly mocks the prophet Muhammad." as per the sources.
thinkahol *

Daily Kos: I See What Occupy Vancouver Did There...And It's Brilliant - 0 views

  •  
    The media's latest attempt to undercut the message of Occupy movements all across the globe is by touting the "cost" of these protests. Many sources are reporting that Occupy movements are costing cities hundreds of thousands of dollars in police overtime because apparently it takes an entire precinct to make sure that 50 people don't sleep through the night. When an internal city memorandum stated that Occupy Vancouver had cost its city nearly a million dollars in taxpayer money, the organizers did something brilliant: they broke down the cost of what they were doing for the city of Vancouver.
thinkahol *

Gulf Oil Spill Effects On Wildlife - 0 views

  •  
    Scientists to study impact of gulf oil spill on marine food webs. Shells from oysters, clams, and periwinkles hold clues about the ways and rates at which harmful compounds from the spill are being incorporated into the Gulf's marine food web. New reports are surfacing every day about the immediate impacts of the Deepwater Horizon oil spill on Gulf Coast wildlife, especially as the oil reaches the sensitive marshlands along the coast. But how will these communities be affected over time? (Source: Science Magazine)
thinkahol *

t r u t h o u t | By US Deaths, as of Today, Afghanistan Is Obama's War - 0 views

  •  
    Five hundred seventy-five: That's how many US soldiers have lost their lives in the Afghanistan war since Barack Obama became president at noon on January 20, 2009, according to the icasualties.org web site, which tracks US soldiers' deaths using reports received from the Department of Defense - and which is widely cited in the media as a source of information on US deaths.
Levy Rivers

Tom Watson MP » Blog Archive » Power of Information: New taskforce and speech - 0 views

  • We commissioned Ed Mayo and Tom Steinberg to write the Power of Information report because we knew that information, presented in the right way, was a potent driver for improving public services and government.
  • Today I am going to offer two arguments that I think compliment the Prime Minister’s recent announcement on public service reform
  • Firstly, that freeing up data will allow us to unlock the talent British entrepreneurs. And secondly, engaging people - using the simple tools that bring them together - will allow the talents of all our people to be applied to the provision of public services.
  • ...20 more annotations...
  • The difference of course is that today we contend with what Richard Saul Wurman describes as a ‘tsunami of data’
  • My job is to make sure that government can benefit from this new thinking too. When we were first elected in 1997 people had a recipient relationship with data, they got what they were given when they were given it. It was static.
  • In scale, the spread of social media is comparable to the spread of telephones in the 1930’s to the 1950’s. Yet it’s happened in two years not 20.
  • As Clay Shirky would say, we’ve reached a point where technology is simple and boring enough to be socially useful and interesting.
  • Over 7 million electronic signatures have been sent, electronically, to the Downing Street petition website. 1 in 10 citizens have emailed the Prime Minister about an issue. The next stage is to enable e-petitioners to connect with each other around particular issues and to link up with policy debates both on and off Government webspace.
  • Only last week, the Prime Minister became the first head of Government in Europe to launch his own channel on Twitter, which I can tell you from experience, is extremely useful to his ministers at least
  • Richard is here tonight and I hope that after the formal proceedings you might like to share some of your own ideas with him. Richard is also joined by a number of other taskforce members. They’re all people with remarkable track records in this field. We’re lucky. The UK has some of the world’s leading talent.
  • And today the PM announced an initiative that would allow you to find your community Bobbies using your postcode.
  • The taskforce will bring its expertise to bare on existing initiatives to see if we can what we already do better
  • I want the taskforce to ensure that the COI and Cabinet Office produce a set of guidelines that adheres to the letter of the law when it comes to the civil service code but also lives within the spirit of the age. I’ll be putting some very draft proposals to the taskforce to consider later this week.
  • By bringing people onto the taskforce with the skills and experiences of people like Sally Russell we can move further and faster in this area.
  • Two weeks ago the Prime Minister signalled that we were moving public services to the next stage of reform. He said that we were not only going to, further enhance choice but also empower both the users of services and all the professionals who deliver them - to drive up standards for all.
  • Transformational government is about wrapping services around the citizen, not citizens around the services.
  • Last month DirectGov had over 7 million visitors. Peter is seeing the aggregate desires of millions of UK public service using citizens. I had half an hour with him a fortnight ago and came away with a dozen ideas as to how we can improve our public services.
  • I’m the Member of Parliament for West Bromwich East and I didn’t know about an important recycling initiative going on in my own patch. This information now means that a bag load of clothing for a small child and a habitat sofa are about given a second chance to give pleasure.
  • And much of that information has the potential to be reused in data mashups. Some of it already is, like Hansard on theyworkforyou, or Google Maps using Ordnance Survey data.
  • The Power of Information Report recognised that, and made recommendations to the Treasury. The Treasury, with the Department for Business, Enterprise and Regulatory Reform, published an independent economic study in the Budget and announced its intention to look at these issues during this spending review cycle.
  • It was this early open source approach that arguably fostered 500 years of Islamic scholarship in important fields like medicine, astronomy, lexicography, literature and science. In contrast, European data was stored in monasteries and did not foster easy knowledge transfer. As Gibbon wrote in the ‘Decline and fall of the Roman empire’ the ‘age of Arabian learning continued about five hundred years’ and was coeval with the darkest and most slothful period of European annals?
  • I believe in the power of mass collaboration. I believe that as James Surowiecki says the many are smarter than the few. I believe that the old hierarchies in which government policy is made are going to change for ever. I said that I don’t believe the post-bureaucratic age argument. It’s just old thinking, laissez faire ideas with a new badge. The future of government is to provide tools for empowerment, not to sit back and hope that laissez-faire adhocracy will suffice.
  • The irony that laying claim to the ownership of a policy on open source was lost to the poor researcher who had spent a day dissecting the speech. He’d been able to do so easily because it was freely available on my blog, a simple tool used for communicating information quickly and at nearly zero cost without the requirement to charge for access. The point is, who cares? It doesn’t matter who has the ideas. It’s what you do with them and how you improve on them that counts.
Skeptical Debunker

Leaked intelligence documents: Here's what Facebook and Comcast will tell the police ab... - 0 views

  • The "Facebook Subpoena/Search Warrant Guidelines" from the Cryptome site are dated 2008, so there's a chance they've been superseded. The document spells out how law enforcement and intelligence agenices should go about requesting information about Facebook users, and details what information is turned over. Following is what Facebook will turn over about you, taken verbatim from the guide: Types of Information Available User Neoprint The Neoprint is an expanded view of a given user profile. A request should specify that they are requesting a “Neoprint of used Id XXXXXX”. User Photoprint The Photoprint is a compilation of all photos uploaded by the user that have not been deleted, along with all photos uploaded by any user which have the requested user tagged in them. A request should specify that they are requesting a “Photoprint of user Id XXXXXX”. User Contact Info All user contact information input by the user and not subsequently deleted by the user is available, regardless of whether it is visible in their profile. This information may include the following: Name Birth date Contact e-mail address(s) Physical address City State Zip Phone Cell Work phone Screen name (usually for AOL Messenger/iChat) Website With the exception of contact e-mail and activated mobile numbers, Facebook validates none of this information. A request should specify that they are requesting "Contact information of user specified by [some other piece of contact information]". No historical data is retained. Group Contact Info Where a group is known, we will provide a list of users currently registered in a group. We will also provide a PDF of the current status of the group profile page. A request should specify that they are requesting "Contact information for group XXXXXX". No historical data is retained. IP Logs IP logs can be produced for a given user ID or IP address. A request should specify that they are requesting the "IP log of user Id XXXXXX" or "IP log of IP address xxx.xxx.xxx.xxx". The log contains the following information: * Script – script executed. For instance, a profile view of the URL http://www.facebook.com/profile.php?id=29445421 would populate script with "profile.php" * Scriptget – additional information passed to the script. In the above example, scriptget would contain "id=29445421" * Userid – The Facebook user id of the account active for the request * View time – date of execution in Pacific Time * IP – source IP address IP log data is generally retained for 90 days from present date. However, this data source is under active and major redevelopment and data may be retained for a longer or shorter period. Special Requests The Facebook Security Team may be able to retrieve specific information not addressed in the general categories above. Please contact Facebook if you have a specific investigative need prior to issuing a subpoena or warrant.
  • Comcast The Comcast document is labeled "Comcast Cable Law Enforcement Handbook," and is dated 2007, so there's a possibility that it, too, has been superseded. As with the other documents, it explains how law enforcement agenices can get information, and details what information is available. There's a great deal of detail in the 35-page document, which describes what Internet, phone, and television information will be turned over. For example, here's the IP information it will make available: Comcast currently maintains Internet Protocol address log files for a period of 180 days. If Comcast is asked to respond for information relating to an incident that occurred beyond this period, we will not have responsive information and can not fulfill a legal request. (Comcast can process and respond to preservation requests as outlined below in this Handbook.) As expected, Comcast will also turn over the emails, including attachments, of those who use Comcast's email service, but "In cases involving another entity’s email service or account, Comcast would not have any access to or ability to access customer email in response to a legal request." Information Comcast turns over to law enforcement agencies varies according to the request. For example, a grand jury subpoena will yield more information than a judicial summons, as you can see in the excerpt below. Comcast notes, though, that this is just a sample, and that "Each request is evaluated and reviewed on a case by case basis in light of any special procedural or legal requirements and applicable laws." So the examples "are for illustration only."
  • For those who worry about privacy, though, all of this information is small potatoes. The real worry is about the use of what are called pen registers or trap-and-trace devices, which essentially capture all of your Internet activity --- the Web sites you visits, the emails you send and receive, IM traffic, downloads, and so on. Here's what the document says about them: Pen Register / Trap and Trace Device Title 18 U.S.C. § 3123 provides a mechanism for authorizing and approving the installation and use of a pen register or a trap and trace device pursuant to court order. All orders must be coordinated prior to submission to Comcast. Law enforcement will be asked to agree to reimburse Comcast's reasonable costs incurred to purchase and/or install and monitor necessary equipment. See "Reimbursement," below.
  • ...2 more annotations...
  • As for your voice calls made via Comcast, here's what the company will turn over: Call Detail Records - Comcast maintains two years of historical call detail records (records of local and long distance connections) for our Comcast Digital Voice telephone service. This includes local, local toll, and long distance records. Comcast also currently provides traditional circuit-switched telephone service branded Comcast Digital Phone. Call detail records for this service are collected by AT&T and are available for approximately two years as well. To determine which type of service is involved, contact the Legal Demands Center—Voice and Video at 800-871-6298. Account Records - Account records are generally stored for approximately two years after the termination of an account. If the account has an outstanding balance due, records may be retained for a longer period of time. As with Internet information, what phone information will be turned over depends on the specific kind of legal request, and the examples "are for information only." Here's an excerpt:
  • And, as you would expect, there is the same pen register/trap-and-trace device language as in the section about the Internet. Oddly enough, it appears that when it comes to information about your television viewing habits, you have more privacy rights than you do when it comes to information about your Internet and voice use, because it can only be turned over in response to a court order, not a subpoena. Here's what the document has to say about TV information: Subscriber Account Identification and Related Records For subscribers to our cable television service, the Cable Act requires Comcast as a cable operator to disclose personally identifiable information to a governmental entity solely in response to a court order (and not, for example, a subpoena) or with the subscriber's express written consent. The Cable Act requires that the cable subscriber be afforded the opportunity to appear and contest in a court proceeding relevant to the court order any claims made in support of the court order. At the proceeding, the Cable Act requires the governmental entity to offer clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case. See 47 U.S.C. § 551(h). Why does the law give you more privacy protection over your television viewing habits than your Internet or phone use? I haven't a clue --- ask your congressman.
  •  
    Wonder what information Facebook and Comcast will turn over to police and intelligence agencies about you? Cryptome, the site that last week posted the leaked Microsoft "spy" manual, has posted company documents that purport to describe what those companies will reveal about you. As with the Microsoft document, the information is eye-opening.
1 - 20 of 52 Next › Last »
Showing 20 items per page