October 31, 2012
In an editorial entitled “Why we can’t solve big problems” in the MIT Technology Review Jason Pontin does more than consider ‘big problems’, his piece leads to broader thinking as to what are ‘big problems’, and what problems science can actually deal with. With a background of the billions of dollars and the hundreds of thousands of people employed in the US space programme as an example of an earlier ‘big problem’, and transfers into the contrasting role of the relatively trivial developments funded by venture capitalism in today’s world. The conclusion is that there isn’t the political will, supported by the wider public,to solve these ‘big problems’ or even to attack some of the smaller ones that make them up. As Pontin accepts many of the problems are resolvable in technological terms but the harder problems are the social and political background ones that will allow us to direct resources at their solution.
Whilst I accept much of what Pontin says I do not believe problem resolution is anywhere near that straightforward. Even small problems that appear resolvable through the technological lens suddenly create other issues when attacked. Curing diseases brings more mouths to feed, which brings famine, sorting out famine increases the population and land and water requirements, and no amount of technology can control the elemental forces of the weather, earthquakes and unknown disasters to come. Yes, politicians and policy are an answer to some ‘big problems’ but we cannot entirely control planetary destiny.
June 19, 2012
A blog piece from the MIT Technology Review dated 31 May 2012 entitled ‘There is No Digital Divide’ may generate some thinking. Mims exemplifies a lack of iPad or broadband being a block on social mobility as current examples of being on the wrong side of the current ‘digital divide’. He picks up on a piece in the New York Times by Gawker – “Wasting Time is New Divide in Digital Era” purporting that the lower social orders waste their time on the Internet, along with a response by Jessie Daniels that claimed he’d missed the point.
Daniels argues that the term ‘digital divide’ hasn’t what the social sciences describe as suitable current ‘frame’ or set of references or definition. Once upon a time it meant no desktop computer but these days we have mobile phones capable of much more. We’re using ‘affluent white men’ as a standard, whilst other communities, which may be seen as poor or different in racial or sexuality terms employ technology but in a different manner. These communities still need ‘digital fluency’ or ‘digital entitlement’ but it shouldn’t necessarily be approached in the same angle as a ‘affluent white man’ would employ the medium.
A key example is that adolescents need assistance in discerning ‘cloaked’ sites from reliable ones, and good information sources from bad ones, and Daniels believes this is quite easy to teach, but is different from the skill set a more affluent grouping might require. She then goes on to promote Howard Rheingold’s new book ‘Net Smart’, and suggests it should be included in training plans for schools.
I suspect there is some truth here but a lack of broadband in some areas is still creating a massive separation when it comes to potential economic development or even people just doing their homework. Framing is necessary, but so is infrastructure.
June 2, 2012
A really insightful piece in the MIT Technology Review of 21 May 2012 entitled ‘IBM Faces the Perils of “Bring Your Own Device”‘ by Brian Bergstein should be compulsory reading for all those considering a BYOD approach. Encouraging staff to use their own PC’s or ‘phones was originally seen by some beancounters and bosses as a way of reducing capital expenditure. It also permitted those same bosses to play with the latest toys without being seen to be affect the procurement policy. IBM have recognised the potential pitfalls.
To prevent issues many organizations allowing BYOD install a ‘sandbox’ to prevent incursion into their secure networks. IBM has gone a little further and some of the measures include:
- barring various apps including Dropbox
- configuring devices so that they can be wiped remotely if lost
- disable public file transfer apps
Unfortunately. as those in government immediately identified, it caused problems with the security policy. If, as in the UK, one had to pay regard to the CESG guidelines, one was immediately contravening them. In the private sector there is less compulsion to honour the ‘spooks’ but there are still best practice guidelines to adhere to. IBM’s CIO feels they are being conservative in theeir measures, I believe they are just taking care of IBM’s data.
If this was the public sector, these should be average measures, especially when one considers the size of the Information Commissioner’s fines these days. So, taking into account the costs of securing personal devices, is it any cheaper to permit them and lock them down?
December 20, 2011
In the supposed season of goodwill to all (bah-humbug), what a better topic to deal with than ‘evil crowdsourcing’, a term I’ve lifted directly from the MIT Technology Review and an article entitled ‘Hidden Industry Dupes Social Media Users – Paying people to influence discussions in social media is big business in China and the U.S. published on December 12, 2011 by Tom Simonite. As increasing attention is paid by government to the content of social media, particularly in terms of improving services and developing policy (e.g. Crowdsourcing Closer Government Scrutiny), what more cynical suggestion could there be than that it is already being corrupted by people being paid to promote particular items. This is probably no worse than the old practice of prospective MP’s bribing the electorate with barrels of beer but to me it does rather ring of subliminal television messages or the tricks that Derren Brown plays upon people to make them think come up with the right answer!
So when collating your social media comments – beware!