<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:creativeCommons="http://backend.userland.com/creativeCommonsRssModule" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:docs="http://schemas.google.com/docs/2007" xmlns:georss="http://www.georss.org/georss" xmlns:gml="http://www.opengis.net/gml" xmlns:itms="http://phobos.apple.com/rss/1.0/modules/itms/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:twitter="http://api.twitter.com" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">
  <channel>
    <title>WSISBlogs.org</title>
    <link>http://feed.informer.com/widgets/KMGBDLD4GD</link>
    <description>WSISBlogs.org</description>
    <copyright>Respective post owners and feed distributors</copyright>
    <pubDate>Tue, 09 Jul 2013 07:43:02 +0000</pubDate>
    <generator>Feed Informer http://feed.informer.com/</generator>
    <atom:link href="http://feed.informer.com/digests/IYBLRCIH6O/feeder" rel="self" type="application/rss+xml"/>
    <language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>WSISBlogs.org</itunes:subtitle><item>
      <title>Dutch Podcast Awards</title>
      <link>http://buziaulane.blogspot.com/2023/10/dutch-podcast-awards.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:4d77d098-07e2-f101-d0e1-68f62dbfda52</guid>
      <pubDate>Fri, 27 Oct 2023 12:58:18 +0000</pubDate>
      <description>      &lt;!--[if gte mso 9]&gt;
 
  
 
&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;
 
  Normal
  0
  
  
  
  
  
  
  21
  
  
  false
  false
  false
  
  NL
  X-NONE
  AR-SA
  
   
   
   
   
   
   
   
   
   
  
  
   
   
   
   
   
   
   
   
   
   
   
  
&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;
 
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
</description>
    </item>
    <item>
      <title>A belated Market Garden Memorial Flight</title>
      <link>http://buziaulane.blogspot.com/2023/10/a-belated-market-garden-memorial-flight.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:c7844ac3-5df4-d2b6-6bc5-0e5f09de8bff</guid>
      <pubDate>Mon, 16 Oct 2023 06:44:42 +0000</pubDate>
      <description>It is now 78
years ago, October 1944, that I sat
safely in the belly of my mam. Today October 15, 2023, I sat safely in the
belly of a Dakota DC3, the Princess Amalia, of the Dutch Dakota Association for
a belated Market Garden Memorial Flight to Nijmegen and Arnhem. 

Recently a
grandson found out that the Dutch Dakota Association was organising Memorial
Market Garden Flights in September. We </description>
    </item>
    <item>
      <title>VR-augmented Dutch Digital Art app </title>
      <link>http://buziaulane.blogspot.com/2023/08/vr-augmented-dutch-digital-art-app.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:18a21f00-16f4-c489-d497-a416aa21c22b</guid>
      <pubDate>Tue, 22 Aug 2023 13:59:43 +0000</pubDate>
      <description>
			
						
							
		
		More art in public spaces is soon to be seen in the Dutch new town of Almere. DDAMA's (Dutch Digital Art Museum Almere) digital art tour app offers opportunities for artists and for local and global use. Moreover, it makes art accessible to more people outside the physical museum.The operation of the VR-augmented Dutch Digital Art app is similar to Pokémon Go: using the </description>
    </item>
    <item>
      <title> Dutch theologian and poet Huub Oosterhuis passed away</title>
      <link>http://buziaulane.blogspot.com/2023/04/dutch-theologian-poet-huub-oosterhuis.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:579fef35-b9d9-22d1-4b9c-1949e994c8ef</guid>
      <pubDate>Mon, 10 Jul 2023 08:30:13 +0000</pubDate>
      <description>On Easter Day, theologian and poet Huub Oosterhuis passed away at the age of 89.I had the pleasure of arranging the rights for a selection of his prayers and poems for the English anthology Times of Life for the Paulist Press in New York. The selection is from the Dutch language collections Hoe ver is de nacht and Dan zal ik leven. The translation is by N.D. Smith (Norfolk UK).Publisher: Paulist </description>
    </item>
    <item>
      <title>Oral history of the Battle of Arnhem</title>
      <link>http://buziaulane.blogspot.com/2023/06/oral-history-of-battle-of-arnhem.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:e4846c69-1d67-7d6e-1abe-ab7330816776</guid>
      <pubDate>Wed, 21 Jun 2023 14:12:06 +0000</pubDate>
      <description>&lt;!--[if gte mso 9]&gt;
 
  
 
&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;
 
  Normal
  0
  
  
  
  
  
  
  21
  
  
  false
  false
  false
  
  NL
  X-NONE
  AR-SA
  
   
   
   
   
   
   
   
   
   
  
  
   
   
   
   
   
   
   
   
   
   
   
  
&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;
 
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
</description>
    </item>
    <item>
      <title>The Amsterdam Digital City registerd in UNESCO Memory of the World</title>
      <link>http://buziaulane.blogspot.com/2023/05/the-amsterdam-digital-city-registerd-in.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:8e1204de-badd-58a9-b2b0-8e4de6ab475e</guid>
      <pubDate>Wed, 07 Jun 2023 05:43:13 +0000</pubDate>
      <description>The Digital City (DDS) was recently added by Unesco to the international Memory of the World register. This list includes cultural and historical documents and archives of global importance. The regstration of The Digital City is the first time of a digital item, i.c. an online community, in the UNESCO Memory of the World.With the Memory of the World programme and specifically the register, 
</description>
    </item>
    <item>
      <title>   Archive Dutch game magazine Power Unlimited on USB stick</title>
      <link>http://buziaulane.blogspot.com/2023/05/archive-dutch-game-magazine-power.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:d875f91d-7038-21c6-76c4-acef9a6ec1f4</guid>
      <pubDate>Sun, 14 May 2023 10:40:51 +0000</pubDate>
      <description>The Dutch video
game magazine Power Unlimited is digitising its 30-year archive and is
offering this archive for sale to its fans. Power
Unlimited is
celebrating its 30th anniversary. The first edition of the magazine appeared in
July 1993. Over the years, the magazine, which now appears ten times a year,
has grown into the largest games magazine in the Benelux. The archive, consisting of almost
</description>
    </item>
    <item>
      <title>Tears from heaven...</title>
      <link>http://buziaulane.blogspot.com/2022/12/tears-from-heaven.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:7ade7018-ea97-581a-5357-a99b046b24ff</guid>
      <pubDate>Sat, 31 Dec 2022 15:10:40 +0000</pubDate>
      <description>When the Dutch radio news service interrupted regular programmes on the last day of 2022 for the obituary of the retired pope, Benedict XVI, it rained in the Netherlands.Benedict XVI was averse to tradition. The only tradition he broke with as pope was his retirement. Otherwise, as pope, he was a fanatical guardian of tradition and the doctrine of faith.Before taking office as pope, he was, among</description>
    </item>
    <item>
      <title>Dutch vintage PC auctioned for 3.100 euro</title>
      <link>http://buziaulane.blogspot.com/2022/08/dutch-vintage-pc-auctioned-for-3100-euro.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:a93bab47-07ba-69c2-7c8c-dde737a29ec0</guid>
      <pubDate>Fri, 26 Aug 2022 18:53:00 +0000</pubDate>
      <description> The illustration is of a Holborn 6500 and not of a Holborn 6110, which is up for auction. Catawiki organised an auction of vintage computer objects last week.  This new section at Catawiki of vintage computer objects differs from the other offered computer objects of common portable computers and tablets. The vintage objects on offer come from the eighties and nineties. They are so far old </description>
    </item>
    <item>
      <title>First .nl novel in LHBT+ collection National Dutch Library</title>
      <link>http://buziaulane.blogspot.com/2022/08/first-nl-novel-in-lhbt-collection.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:9a85cfbd-94c4-7b26-7473-c90003989500</guid>
      <pubDate>Sat, 06 Aug 2022 10:46:48 +0000</pubDate>
      <description>The Internet and the Dutch web have been important media for the emancipation of gay and lesbian people and/or transgender people in the Netherlands. The KB has therefore built up a special web collection of lhbt+ websites between 2018 and 2022. The abbreviation "lhbt+" stands for lesbian, gay, bisexual, transgender and the sign "+" for all other possible sexual and gender identities of people </description>
    </item>
    <item>
      <title>Exhibition Water-Polder-Weerwater in new city Almere (The Netherlands)</title>
      <link>http://buziaulane.blogspot.com/2022/06/exhibition-water-polder-weerwater-in.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:1c3349a5-66d6-16dd-06cd-cc33d336f6a9</guid>
      <pubDate>Sat, 02 Jul 2022 08:47:00 +0000</pubDate>
      <description>Press release The Almere
City Archives Department has put together the exhibition Water-Polder-Weerwater
(lake in the center of the city).  By
means of photographs, design sketches and letters from the collection of the
city archive, the special history of the polder, Almere and the Weerwater is
told. The exhibition, in Dutch and English, especially for Floriade visitors,
can be seen from July </description>
    </item>
    <item>
      <title>Growth Dutch new town Almere seen from the clouds</title>
      <link>http://buziaulane.blogspot.com/2022/06/growth-dutch-new-town-almere-seen-from.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:5eb00de4-10ab-891f-a573-4b85e8a03e82</guid>
      <pubDate>Thu, 16 Jun 2022 09:08:38 +0000</pubDate>
      <description>This book
is about the new town Almere in The Netherlands. This city does not count its
age in centuries, but in less than 50 years. The first eight families got keys to
their cabin chalets in 1975 and the 400 first occupants received their keys to
the constructed houses in 1976. It is a city that arose from the water, when in
1964 the construction of dykes began and in 1968 the polder Zuidelijk </description>
    </item>
    <item>
      <title>Pioneering Dutch IRMA app points the way for new European digital identity</title>
      <link>http://buziaulane.blogspot.com/2022/05/pioneering-dutch-irma-app-points-way.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:163acc93-51db-84f4-e1c4-96f7ff350298</guid>
      <pubDate>Tue, 31 May 2022 14:23:17 +0000</pubDate>
      <description>
                                    Users keep full control of their personal data
                            
        
    
            
                            
                        
                                                                                                
            
            
            
        
    

        
        
        
            
</description>
    </item>
    <item>
      <title>The algorithmic beauty of plant</title>
      <link>http://buziaulane.blogspot.com/2022/05/the-algorithmic-beauty-of-plant.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:31207efd-e49b-2199-ac2b-22763f7310a7</guid>
      <pubDate>Sun, 29 May 2022 18:05:17 +0000</pubDate>
      <description>Wednesday,
June 1, 2022 from 19 - 21 hours in DDAMA (Dutch Digital Art Museum Almere)
opening of two new exhibitions that are related to the theme of the Floriade:
The algorithmic beauty of plants and Glitched Lovescapes. In the Euro-tower
(now Rabo) next to Almere CS, Landdrostdreef 124, 2nd floor, 1314 SK Almere
(The Netherlands).

DDAMA has
been around for more than five years and is like a </description>
    </item>
    <item>
      <title>Towards a Digital Culture in local and regional newspapers in Finland</title>
      <link>http://buziaulane.blogspot.com/2022/04/towards-digital-culture-in-local-and.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:588b8201-cb51-79fd-96b1-ac1d02906dc8</guid>
      <pubDate>Mon, 11 Apr 2022 15:27:44 +0000</pubDate>
      <description>The publishing sector has been struggling to reach a digital culture
over the years. Especially the newspapers are in a transfer situation going
from paper to a hybrid situation to digital first. Especially for local and
regional newspapers this has been a battle. 

Marja Heinonen, a Finnish consultant, has written a report on the route
towards a digital culture in the Finnish regional newspaper </description>
    </item>
    <item>
      <title/>
      <link>http://buziaulane.blogspot.com/2021/11/dutch-mediamonitor-2021-tipping-point.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:2a3fe70a-acb4-c337-37bb-2e974f64f243</guid>
      <pubDate>Wed, 10 Nov 2021 15:09:17 +0000</pubDate>
      <description> Dutch Media
Monitor 2021Tipping point in digitization of media use and media
concentration



The advent
of the coronavirus and the associated measures have greatly affected our
society. Our media behavior has also changed substantially. In particular, we
used more media because we were at home more. We also consulted more news media
brands because we wanted to stay well informed. We have &lt;img src="http://feeds.feedburner.com/~r/Buziaulane/~4/l2EmunBoZq8" height="1" width="1" alt=""/&gt;</description>
    </item>
    <item>
      <title>7 August 1980: First Dutch public online service</title>
      <link>http://buziaulane.blogspot.com/2021/08/7-august-1980-first-dutch-public-online.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:44d55d5b-f93a-4ea5-9260-8b171b5393c0</guid>
      <pubDate>Sat, 07 Aug 2021 13:00:17 +0000</pubDate>
      <description> &amp;lt;!--[if gte mso 9]&amp;gt;
 
  
 
&amp;lt;![endif]--&amp;gt;&amp;lt;!--[if gte mso 9]&amp;gt;
 
  Normal
  0
  
  
  21
  
  
  false
  false
  false
  
  NL
  X-NONE
  X-NONE
  
   
   
   
   
   
   
   
   
   
  
  
   
   
   
   
   
   
   
   
   
   
   
  
&amp;lt;![endif]--&amp;gt;&amp;lt;!--[if gte mso 9]&amp;gt;
 
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
&lt;img src="http://feeds.feedburner.com/~r/Buziaulane/~4/oDTTkCczyIg" height="1" width="1" alt=""/&gt;</description>
    </item>
    <item>
      <title>Talking to machines in their language</title>
      <link>http://buziaulane.blogspot.com/2021/07/blog-post.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:21c09851-2b3c-baff-8d77-47ac3245048d</guid>
      <pubDate>Thu, 29 Jul 2021 08:08:59 +0000</pubDate>
      <description>Just like to refer you to the following blog of David Worlock, pointing into the upcoming direction of scientific publishing. Where tax and legal publishing took the road of delivering software to their readers, this blog reduces a scientific article to a signboard, while stressing scientific data as the new gold of scientific publishing. https://www.davidworlock.com/2021/07/&lt;img src="http://feeds.feedburner.com/~r/Buziaulane/~4/eMvWrfC-Qwg" height="1" width="1" alt=""/&gt;</description>
    </item>
    <item>
      <title>First Dutch online (.nl) novel surfaced</title>
      <link>http://buziaulane.blogspot.com/2020/06/first-dutch-online-nl-novel-surfaced.html</link>
      <source url="http://buziaulane.blogspot.com">Buziaulane</source>
      <guid isPermaLink="false">urn:uuid:4d56d35e-f4bc-cd8d-94f8-8f8629285ac2</guid>
      <pubDate>Sun, 28 Jun 2020 14:29:29 +0000</pubDate>
      <description>On 10 March, the web archivist of the Koninklijke Bibliotheek (KB) placed a call on Twitter for a copy of the first Dutch-language novel, Roes der Zinnen, published on the Internet in 1994. The novel is no longer available on the internet, but would still be available on a floppy disk. A search for the floppy disc was short-lived, as it was stored in my private E-media collection (CJB). A search </description>
    </item>
    <item>
      <title>Looking at 2016</title>
      <link>http://www.edwardpopoola.com/2015/12/28/looking-at-2016/</link>
      <source url="http://www.edwardpopoola.com/blog">Jangbalajugbu-Homeland Stories</source>
      <guid isPermaLink="false">urn:uuid:bc4b2131-fa52-7873-dfaf-3d9f5bd0dcf3</guid>
      <pubDate>Mon, 28 Dec 2015 13:59:35 +0000</pubDate>
      <description>1. Opportunity to think more (Desirable Difficulty) Malcolm Gladwell in his book &amp;#8220;David &amp;#038; Goliath&amp;#8221; talks about the concept of desirable difficulties. The conclusion was that we tend to think and excel more when faced with more difficult challenges. In the research Malcolm referenced, students that were given Cognitive Reflection Test (CRT) performed better when [&amp;#8230;]</description>
    </item>
    <item>
      <title>USSD 101 part 2</title>
      <link>http://www.edwardpopoola.com/2015/12/28/ussd-101-part-2/</link>
      <source url="http://www.edwardpopoola.com/blog">Jangbalajugbu-Homeland Stories</source>
      <guid isPermaLink="false">urn:uuid:69d3642e-aaf9-0329-c0c4-32be07c0d009</guid>
      <pubDate>Mon, 28 Dec 2015 13:25:06 +0000</pubDate>
      <description>Brief Overview of  Traffic within the Core Network In the previous post, Part 1 of this series, we were able to breakdown the USSD MMI code.  Taking this further, we will look at how the Mobile Network handles our request. Between your Mobile phone and the Telecom operator&amp;#8217;s USSD Gateway, there are numerous components, including the radio and [&amp;#8230;]</description>
    </item>
    <item>
      <title>Kolab Now: Learn, live, adapt in production</title>
      <link>http://blogs.fsfe.org/greve/?p=715</link>
      <source url="http://www.fsfe.org/en/fellows/greve/freedom_bits">freedom bits</source>
      <guid isPermaLink="false">urn:uuid:3075977e-b4a1-0f31-7db9-6342a495e184</guid>
      <pubDate>Mon, 24 Aug 2015 08:13:05 +0000</pubDate>
      <description>Kolab Now was first launched January 2013 and we were anxious to find out: If someone offered a public cloud service for people that put their privacy and security first. A service that would not just re-sell someone else&amp;#8217;s platform &amp;#8230; &lt;a href="http://blogs.fsfe.org/greve/?p=715"&gt;Continue reading &lt;span class="meta-nav"&gt;&amp;#8594;&lt;/span&gt;&lt;/a&gt;</description>
      <content:encoded>&lt;p&gt;&lt;a href="https://kolabnow.com"&gt;Kolab Now&lt;/a&gt; was first launched January 2013 and we were anxious to find out: If someone offered a public cloud service for people that put their privacy and security first. A service that would not just re-sell someone else&amp;#8217;s platform with some added marketing, but &lt;a href="http://opensource.com/business/13/8/four-steps-cloud-providers"&gt;did things right&lt;/a&gt;. Would there be a demand for it? Would people choose to pay with money instead of their privacy and data? These past two and a half years have provided a very clear answer. Demand for a secure and private collaboration platform has grown in ways we could have only hoped for.&lt;/p&gt;
&lt;p&gt;&lt;img class="aligncenter size-full wp-image-731" src="http://blogs.fsfe.org/greve/files/2015/08/Kolab-Now-fb-cover-image.jpg" alt="" width="851" height="315" /&gt;&lt;/p&gt;
&lt;p&gt;To stay ahead of demand we have undertaken a significant upgrade to our hosted solution that will allow us to provide reliable service to our community of users both today and in the years to come. This is the most significant set of changes we&amp;#8217;ve ever made to the service, which have been months in the making. We are very excited to unveil these improvements to the world as we complete the roll-out in the coming weeks.&lt;/p&gt;
&lt;p&gt;From a revamped and simplified sign-up process to a more robust directory&lt;br /&gt;
service design, the improvements will be visible to new and existing users&lt;br /&gt;
alike. Everyone can look forward to a significantly more robustness and&lt;br /&gt;
reliable service, along with faster turnaround times on technical issues. We&lt;br /&gt;
have even managed to add some long-sought improvements many of you have been&lt;br /&gt;
asking for.&lt;/p&gt;
&lt;h2&gt;The road travelled&lt;/h2&gt;
&lt;p&gt;Assumptions are the root of all evil. Yet in the absence of knowledge of the future, sometimes informed assumptions need to be made. And sometimes the world just changes. It was February 2013 when MyKolab was launched into public beta.&lt;/p&gt;
&lt;p&gt;Our expectation was that a public cloud service oriented on full business collaboration focusing on privacy and security would primarily attract small and medium enterprises between 10 and 200 users. Others would largely elect to use the available standard domains. So we expected most domains to be in the 30 users realm, and a handful of very large ones.&lt;/p&gt;
&lt;p&gt;That had implications for the way the directory service was set up.&lt;/p&gt;
&lt;p&gt;&lt;img class="alignright size-large wp-image-716" style="line-height: 24px;font-size: 16px" src="http://blogs.fsfe.org/greve/files/2015/08/MyKolab-Car-1024x745.jpg" alt="" width="384" height="279" /&gt;&lt;/p&gt;
&lt;p&gt;In order to provide the strongest possible insulation between tenants, each domain would exist in its own zone within the directory service. You can think of this as o dedicated installations on shared infrastructure instead of the single domain public clouds that are the default in most cases. Or, to use a slightly less technical analogies, between serial houses or apartments in a large apartment block.&lt;/p&gt;
&lt;p&gt;So we expected some moderate growth for which we planned to deploy some older hardware to provide adequate redundancy and resource so there would be a steady show-case for how to deploy Kolab into the needs of Application and Internet Service Providers (ASP/ISP).&lt;/p&gt;
&lt;p&gt;Literally on the very day when we carried that hardware into the data centre did Edward Snowden and his revelations become visible to the world. It is a common quip that assumptions and strategies usually do not outlive their contact with reality. Ours did not even make it that far.&lt;/p&gt;
&lt;p&gt;After nice, steady growth during the early months, MyKolab.com took us on a wild ride.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://blogs.fsfe.org/greve/files/2015/08/MyKolabcom-StorageUsed.png"&gt;&lt;img class="aligncenter size-full wp-image-722" src="http://blogs.fsfe.org/greve/files/2015/08/MyKolabcom-StorageUsed.png" alt="" width="802" height="449" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Our operations managed to work miracles with the old hardware in ways that often made me think this would be interesting learning material for future administrators. But efficiency only gets you so far.&lt;/p&gt;
&lt;p&gt;Within a couple of months however we ended up replacing it in its entirety. And to the largest extent all of this was happening without disruption to the production systems. New hardware was installed, services switched over, old hardware removed, and our team also managed to add a couple of urgently sought features to Kolab and deploy them onto MyKolab.com as well.&lt;/p&gt;
&lt;p&gt;What we did not manage to make time for is re-work the directory service in order to adjust some of the underlying assumptions to reality. Especially the number of domains in relation to the number of users ended up dramatically different from what we initially expected. The result of that is a situation where the directory service has become the bottleneck for the entire installation – with a complete restart easily taking in the realm of 45 minutes.&lt;/p&gt;
&lt;p&gt;In addition, that degree of separation translated to more restrictions of sharing data with other users, sometimes to an extent that users felt this was lack of a feature, not a feature in and of itself.&lt;/p&gt;
&lt;p&gt;Re-designing the directory service however carries implications for the entire service structure, including also the user self-administration software and much more. And you want to be able to deploy this within a reasonable time interval and ensure the service comes back up better than before for all users.&lt;/p&gt;
&lt;h2&gt;On the highway to future improvements&lt;/h2&gt;
&lt;p&gt;So there is the re-design, the adaptation of all components, the testing, the migration planning, the migration testing and ultimately also the actual roll-out of the changes. That&amp;#8217;s a lot of work. Most of which has been done by this point in time.&lt;/p&gt;
&lt;p&gt;The last remaining piece of the puzzle was to increase hardware capacity in order to ensure there is enough reserve to build up an entire new installation next to existing production systems, and then switch over, confirm successful switching, and then ultimately retire the old setup.&lt;/p&gt;
&lt;p&gt;That hardware has been installed last week.&lt;/p&gt;
&lt;p&gt;So now the roll-out process will go through the stages and likely complete some time in September. That&amp;#8217;s also the time when we can finally start adding some features we&amp;#8217;ve been holding back to ensure we can re-adjust our assumptions to the realities we encountered.&lt;/p&gt;
&lt;p&gt;For all users of &lt;a href="https://kolabnow.com/"&gt;Kolab Now&lt;/a&gt; that means you can look forward to a much improved service resilience and robustness, along with even faster turnaround times on technical issues, and an autumn of added features, including some long-sought improvements many of you have been asking for.&lt;/p&gt;
&lt;p&gt;Stay tuned.&lt;/p&gt;
</content:encoded>
    </item>
    <item>
      <title>Your opportunity for a front row seat: The economics of the Roundcube Next Indiegogo Campaign</title>
      <link>http://blogs.fsfe.org/greve/?p=695</link>
      <source url="http://www.fsfe.org/en/fellows/greve/freedom_bits">freedom bits</source>
      <guid isPermaLink="false">urn:uuid:95090899-d06d-2e6f-0d70-dc7af3785524</guid>
      <pubDate>Wed, 05 Aug 2015 08:51:07 +0000</pubDate>
      <description>Bringing together an alliance that will liberate our future web and mobile collaboration was the most important motive behind our launching the Roundcube Next campaign at the 2015 Kolab Summit. This goal we reached fully. There is now a group &amp;#8230; &lt;a href="http://blogs.fsfe.org/greve/?p=695"&gt;Continue reading &lt;span class="meta-nav"&gt;&amp;#8594;&lt;/span&gt;&lt;/a&gt;</description>
      <content:encoded>&lt;p&gt;&lt;a href="http://blogs.fsfe.org/greve/files/2015/08/Screenshot_11.png"&gt;&lt;img class="alignright size-full wp-image-704" src="http://blogs.fsfe.org/greve/files/2015/08/Screenshot_11.png" alt="" width="172" height="195" /&gt;&lt;/a&gt;Bringing together an alliance that will &lt;a href="http://venturebeat.com/2015/06/24/massive-open-source-email-collaboration-platform-roundcube-beats-indiegogo-funding-goal/"&gt;liberate our future web and mobile collaboration&lt;/a&gt; was the most important motive behind our launching the &lt;a href="http://igg.me/at/roundcubenext"&gt;Roundcube Next campaign&lt;/a&gt; at the 2015 Kolab Summit. This goal we reached fully.&lt;/p&gt;
&lt;p&gt;There is now a group of some of the leading experts for messaging and collaboration in combination with service providers around the world that has embarked with us on this unique journey:&lt;/p&gt;
&lt;p align="center"&gt;&lt;a href="https://www.bhosted.nl/"&gt;bHosted&lt;/a&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;a href="http://contargo.net/"&gt;Contargo&lt;/a&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;a href="https://cpanel.net/"&gt;cPanel&lt;/a&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;a href="https://www.fastmail.com/"&gt;Fastmail&lt;/a&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;a href="https://sandstorm.io/"&gt;Sandstorm.io&lt;/a&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;a href="https://sys4.de/en/"&gt;sys4&lt;/a&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;a href="http://www.tucows.com/"&gt;Tu&lt;/a&gt;&lt;a href="http://www.tucows.com/"&gt;cows&lt;/a&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;a href="https://www.transip.nl/"&gt;TransIP&lt;/a&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;a href="https://www.xs4all.nl/"&gt;XS4ALL&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The second objective for the campaign was to get enough acceleration to be able to allow two, three people to focus on Roundcube Next over the coming year. That goal we reached partially. There is enough to get us started and go through the groundwork, but not enough for all the bells and whistles we would have loved to go for. To a large extent that&amp;#8217;s because we would have a lot of fantasy for bells and whistles.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://blogs.fsfe.org/greve/files/2015/08/Screenshot_12.png"&gt;&lt;img class="aligncenter size-full wp-image-703" src="http://blogs.fsfe.org/greve/files/2015/08/Screenshot_12.png" alt="Roundcube Next - The Bells and Whistles" width="601" height="658" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;But perhaps it is a good thing that the campaign did not complete all the way into the stretch goals.&lt;/p&gt;
&lt;p&gt;Since numbers are part of my responsibility, allow me to share some with you to give you a first-hand perspective of being inside an Indiegogo Campaign:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;dl&gt;
&lt;dd&gt;
&lt;table width="637" cellspacing="0" cellpadding="4"&gt;
&lt;col width="340" /&gt;
&lt;col width="182" /&gt;
&lt;col width="89" /&gt;
&lt;tbody&gt;
&lt;tr valign="top"&gt;
&lt;td bgcolor="#ffcc99" width="340"&gt;Roundcube Next Campaign Amount&lt;/td&gt;
&lt;td width="182"&gt;
&lt;p align="right"&gt;$103,541.00&lt;/p&gt;
&lt;/td&gt;
&lt;td width="89"&gt;
&lt;p align="right"&gt;100.00%&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr valign="top"&gt;
&lt;td bgcolor="#ffcc99" width="340"&gt;Indiegogo Cost&lt;/td&gt;
&lt;td width="182"&gt;
&lt;p align="right"&gt;&lt;span style="color: #ff0000"&gt;-$4,141.64&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td width="89"&gt;
&lt;p align="right"&gt;4.00%&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr valign="top"&gt;
&lt;td bgcolor="#ffcc99" width="340"&gt;PayPal Cost&lt;/td&gt;
&lt;td width="182"&gt;
&lt;p align="right"&gt;&lt;span style="color: #ff0000"&gt;-$4,301.17&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td width="89"&gt;
&lt;p align="right"&gt;4.15%&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr valign="top"&gt;
&lt;td bgcolor="#ffcc99" width="340"&gt;&lt;strong&gt;Remaining Amount&lt;/strong&gt;&lt;/td&gt;
&lt;td width="182"&gt;
&lt;p align="right"&gt;&lt;strong&gt;$95,098.19&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td width="89"&gt;
&lt;p align="right"&gt;&lt;strong&gt;91.85%&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/dd&gt;
&lt;/dl&gt;
&lt;p&gt;So by the time the money was in our PayPal account, we are down 8.15%.&lt;/p&gt;
&lt;p&gt;The reason for that is simple: Instead of transferring the complete amount in one transaction, which would have incurred only a single transaction fee, they transferred it individually per contribution. Which means PayPal gets to extract the per transaction fee. I assume the rationale behind this is that PayPal may have acted as the escrow service and would have credited users back in case the campaign goal had not been reached. Given our transactions were larger than average for crowd funding campaigns, the percentage for other campaigns is likely going to be higher. It would seem this can even go easily beyond the 5% that you see quoted on a variety of sites about crowd funding.&lt;/p&gt;
&lt;p&gt;But it does not stop there. Indiegogo did not allow to run the campaign in Swiss Franc, and PayPal forces transfers into our primary currency, resulting in another fee for conversion. On the day the Roundcube Next Campaign funds were transferred to PayPal, &lt;a href="http://www.xe.com/currencytables/?from=USD&amp;amp;date=2015-07-08"&gt;XE.com&lt;/a&gt; lists the exchange rate as 0.9464749579 CHF per USD.&lt;/p&gt;
&lt;table width="662" cellspacing="0" cellpadding="4"&gt;
&lt;col width="260" /&gt;
&lt;col width="127" /&gt;
&lt;col width="169" /&gt;
&lt;col width="71" /&gt;
&lt;tbody&gt;
&lt;tr valign="top"&gt;
&lt;td bgcolor="#ffcc99" width="260"&gt;&lt;/td&gt;
&lt;td bgcolor="#ffcc99" width="127"&gt;
&lt;p align="right"&gt;&lt;strong&gt;USD&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td bgcolor="#ffcc99" width="169"&gt;
&lt;p align="right"&gt;&lt;strong&gt;CHF&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td bgcolor="#ffcc99" width="71"&gt;
&lt;p align="right"&gt;&lt;strong&gt;% of total&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr valign="top"&gt;
&lt;td bgcolor="#ffcc99" width="260"&gt;&lt;strong&gt;Roundcube Next Campaign Amount&lt;/strong&gt;&lt;/td&gt;
&lt;td width="127"&gt;
&lt;p align="right"&gt;$103,541.00&lt;/p&gt;
&lt;/td&gt;
&lt;td width="169"&gt;
&lt;p align="right"&gt;SFr. 97,998.96&lt;/p&gt;
&lt;/td&gt;
&lt;td width="71"&gt;
&lt;p align="right"&gt;100.00%&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr valign="top"&gt;
&lt;td bgcolor="#ffcc99" width="260"&gt;&lt;strong&gt;Remaining at PayPal&lt;/strong&gt;&lt;/td&gt;
&lt;td width="127"&gt;
&lt;p align="right"&gt;$95,098.19&lt;/p&gt;
&lt;/td&gt;
&lt;td width="169"&gt;
&lt;p align="right"&gt;SFr. 90,008.06&lt;/p&gt;
&lt;/td&gt;
&lt;td width="71"&gt;
&lt;p align="right"&gt;91.85%&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr valign="top"&gt;
&lt;td bgcolor="#ffcc99" width="260"&gt;&lt;strong&gt;Final at bank in CHF&lt;/strong&gt;&lt;/td&gt;
&lt;td width="127"&gt;
&lt;p align="right"&gt;&lt;strong&gt;$92,783.23&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td width="169"&gt;
&lt;p align="right"&gt;&lt;strong&gt;SFr. 87,817.00&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td width="71"&gt;
&lt;p align="right"&gt;&lt;strong&gt;89.61%&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;So now we&amp;#8217;re at 10.39% in fees, of which 4% go to Indiegogo for their services. A total of 6.39% went to PayPal. Not to mention this is before any t-shirt is printed or shipped, and there is of course also cost involved in creating and running a campaign.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;$4,141.64 &lt;/strong&gt;we paid to Indiegogo are not too bad, I guess. Although their service was shaky and their support non-existent. I don&amp;#8217;t think we ever got a response to our repeated support inquiries over a couple of weeks. And we experienced multiple downtimes of several hours which were particularly annoying during the critical final week of the campaign where we can be sure to have lost contributions.&lt;/p&gt;
&lt;p&gt;PayPal&amp;#8217;s overhead was &lt;strong&gt;$6,616.27&lt;/strong&gt; – the equivalent of another Advisor to the Roundcube Next Campaign. That&amp;#8217;s almost 60% more than the cost for Indiegogo. Which seems excessive and is reminding me of one of Bertolt Brecht&amp;#8217;s &lt;a href="http://www.quotehd.com/quotes/bertolt-brecht-quote-what-is-the-robbing-of-a-bank-compared-to-the-founding-of"&gt;more famous&lt;/a&gt; quotes.&lt;/p&gt;
&lt;p&gt;But of course you also need to add the effort for the campaign itself, including preparation, running and perks. Considering that, I am no longer surprised that many of the campaigns I see appear to be marketing instruments to sell existing products that are about to be released, and less focused on innovation.&lt;/p&gt;
&lt;p&gt;In any case, Roundcube Next is going to be all about innovation. And &lt;a href="https://kolabsystems.com/"&gt;Kolab Systems&lt;/a&gt; will continue contribute plenty of its own resources as we have been doing for Roundcube and Roundcube Next, including a world class Creative Director and UI/UX expert who is going to join us in a month from now.&lt;/p&gt;
&lt;p&gt;We also remain open to others to come aboard.&lt;/p&gt;
&lt;p&gt;The advisory group is starting to constitute itself now, and will be taking some decisions about requirements and underlying architecture. Development will then begin and continue up until well into next year. So there is time to engage even in the future. But many decisions will be made in the first months, and you can still be part of that as Advisor to Roundcube Next.&lt;/p&gt;
&lt;p&gt;It&amp;#8217;s not too late to be part of the Next. Just drop a message to &lt;a href="mailto:contact@kolabsystems.com"&gt;contact@kolabsystems.com&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://blogs.fsfe.org/greve/files/2015/08/Screenshot_131.png"&gt;&lt;img class="aligncenter size-full wp-image-706" src="http://blogs.fsfe.org/greve/files/2015/08/Screenshot_131.png" alt="" width="627" height="421" /&gt;&lt;/a&gt;&lt;/p&gt;
</content:encoded>
    </item>
    <item>
      <title>Applying the most important lesson for non-developers in Free Software through Roundcube Next</title>
      <link>http://blogs.fsfe.org/greve/?p=687</link>
      <source url="http://www.fsfe.org/en/fellows/greve/freedom_bits">freedom bits</source>
      <guid isPermaLink="false">urn:uuid:5becefd9-e322-d3f1-ef6f-ecd380f1419d</guid>
      <pubDate>Thu, 02 Jul 2015 08:01:04 +0000</pubDate>
      <description>Software is a social endeavour. The most important advantage of Free Software is its community. Because the best Open Source is built by a community of contributors. Contribution being the single most important currency and differentiation between users and community. &amp;#8230; &lt;a href="http://blogs.fsfe.org/greve/?p=687"&gt;Continue reading &lt;span class="meta-nav"&gt;&amp;#8594;&lt;/span&gt;&lt;/a&gt;</description>
      <content:encoded>&lt;p&gt;Software is a social endeavour. The most important advantage of Free Software is its community. Because the best Open Source is built by a community of contributors. Contribution being the single most important currency and differentiation between users and community. You want to be part of that community at least by proxy because like any community, members of our community spend time together, exchange ideas, and create cohesion that translates into innovation, features, best practices.&lt;/p&gt;
&lt;p&gt;We create nothing less than a common vision of the future.&lt;/p&gt;
&lt;p&gt;By the rules of our community, anyone can take our software and use it, extend it, distribute it. A lot of value can be created this way and not everyone has the capabilities to contribute. Others choose not to contribute in order to maximise their personal profits. Short of actively harming others, egoism, even in its most extreme forms, is to be accepted. That is not to say it is necessarily a good idea for you to put the safeguarding of your own personal interests into the hands of an extreme egoist. Or that you should trust in their going the extra mile for you in all the places that you cannot verify.&lt;/p&gt;
&lt;p&gt;That is why the most important lesson for non-developers is this: Choose providers based on community participation. Not only are they more likely to know early about problems, putting them in a much better position to provide you with the security you require. They will also ensure you will have a future you like.&lt;/p&gt;
&lt;p style="text-align: center"&gt;&lt;a href="http://blogs.fsfe.org/greve/files/2015/07/hta9hsarl5r4itdvttwt.png"&gt;&lt;img class="size-medium wp-image-689 aligncenter" src="http://blogs.fsfe.org/greve/files/2015/07/hta9hsarl5r4itdvttwt-300x199.png" alt="" width="300" height="199" /&gt;&lt;/a&gt;Developers know all this already, of course, and &lt;a href="http://www.networkworld.com/article/2942161/opensource-subnet/kicking-google-out-of-my-life-part-4-goodbye-gmail.html"&gt;typically apply it&lt;/a&gt; at least subconsciously.&lt;/p&gt;
&lt;p&gt;Growing that kind of community has been one of the key motives to launch &lt;a href="http://roundcube.net/next"&gt;Roundcube Next&lt;/a&gt;, which is now coming close to closing its phase of bringing together its key contributors. Naturally everyone had good &lt;a href="http://venturebeat.com/2015/06/24/massive-open-source-email-collaboration-platform-roundcube-beats-indiegogo-funding-goal/#"&gt;reasons to get involved&lt;/a&gt;, as recently covered on Venturebeat.&lt;/p&gt;
&lt;p&gt;Last night &lt;a href="http://sandstorm.io/"&gt;Sandstorm.io&lt;/a&gt; became the single &lt;a href="https://blog.sandstorm.io/news/2015-07-01-roundcube-next.html"&gt;greatest contributor to the campaign&lt;/a&gt; in order to build that better future together, for everyone. Over the past weeks, many other companies, some big, some small, have done the same.&lt;/p&gt;
&lt;p&gt;Together, we will be that community that will build the future.&lt;/p&gt;
</content:encoded>
    </item>
    <item>
      <title>Pushing fast forward: Roundcube Next.</title>
      <link>http://blogs.fsfe.org/greve/?p=676</link>
      <source url="http://www.fsfe.org/en/fellows/greve/freedom_bits">freedom bits</source>
      <guid isPermaLink="false">urn:uuid:07442686-a4cb-69a4-b4a6-cf7b6b6f5f75</guid>
      <pubDate>Tue, 19 May 2015 07:02:32 +0000</pubDate>
      <description>If you are a user of Roundcube, you want to contribute to roundcu.be/next. If you are a provider of services, you definitely want to get engaged and join the advisory group. Here is why. Free Software has won. Or has &amp;#8230; &lt;a href="http://blogs.fsfe.org/greve/?p=676"&gt;Continue reading &lt;span class="meta-nav"&gt;&amp;#8594;&lt;/span&gt;&lt;/a&gt;</description>
      <content:encoded>&lt;p&gt;&lt;a href="http://blogs.fsfe.org/greve/files/2015/05/card.png"&gt;&lt;img class="size-medium wp-image-681 alignleft" src="http://blogs.fsfe.org/greve/files/2015/05/card-298x300.png" alt="" width="298" height="300" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;If you are a user of Roundcube, you want to contribute to &lt;a href="http://roundcu.be/next"&gt;roundcu.be/next&lt;/a&gt;. If you are a provider of services, you &lt;strong&gt;definitely&lt;/strong&gt; want to get engaged and join the advisory group. Here is why.&lt;/p&gt;
&lt;p&gt;Free Software has won. Or has it? Linux is certainly dominant on the internet. Every activated Android device is another Linux kernel running. At the same time we see a shift towards “dumber” devices which are in many ways more like thin clients of the past. Only they are not connected to your own infrastructure.&lt;/p&gt;
&lt;p&gt;Alerted by the success of Google Apps, Microsoft has launched Office 365 to drive its own transformation from a software vendor into a cloud provider. Amazon and others have also joined the race to provide your collaboration platform. The pull of these providers is already enormous. Thanks to networking effects, economies of scale, and ability to leverage deliberate technical incompatibilities to their advantage, the drawing power of these providers is only going to increase.&lt;/p&gt;
&lt;p&gt;Open Source has managed to catch up to the large providers in most functions, bypassing them in some, being slightly behind in others. &lt;a href="http://www.kolab.org/"&gt;Kolab&lt;/a&gt; has been essential in providing this alternative especially where cloud based services are concerned. Its web application is on par with Office 365 and Google Apps in usability, attractiveness and most functions. Its web application is the only fully Open Source alternative that offers scalability to millions of users and allows sharing of all data types in ways that are superior to what the proprietary competition has to offer.&lt;/p&gt;
&lt;p&gt;Collaborative editing, chat, voice, video – all the forms of synchronous collaboration – are next and will be added incrementally. Just as &lt;a href="http://kolabsystems.com/"&gt;Kolab Systems&lt;/a&gt; will keep driving the commercial ecosystem around the solution, allowing application service providers (ASP), institutions and users to run their own services with full professional support. And all parts of Kolab will remain Free and Open, as well as committed to the upstream, according to best Free Software principles. If you want to know what that means, please take a look at Thomas Brüderlis account of how Kolab Systems &lt;a href="https://roundcubeinbox.wordpress.com/2013/03/11/the-kolab-story/"&gt;contributes to Roundcube&lt;/a&gt;.&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;em&gt;&lt;strong&gt;TL;DR:&lt;/strong&gt; Around 2009, Roundcube founder Thomas Brüderli got contacted by Kolab at a time when his day job left him so little time to work on Roundcube that he had played with the thought of just stepping back. Kolab Systems hired the primary developers of Roundcube to finish the project, contributing in the area of 95% of all code in all releases since 0.6, driving it its 1.0 release and beyond. At the same time, Kolab Systems carefully avoided to impose itself on the Roundcube project itself. &lt;/em&gt;&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;From a Kolab perspective, Roundcube is the web mail component of its web application.&lt;/p&gt;
&lt;p&gt;The way we pursued its development made sure that it could be used by any other service provider or ISV. And it was. Roundcube has an enormous adoption rate with millions of downloads, hundreds of thousands of sites and an uncounted number beyond the tens of millions. According to cPanel, &lt;a href="http://blog.cpanel.com/on-to-the-next/"&gt;62% of their users choose Roundcube&lt;/a&gt; as their web mail application. It&amp;#8217;s been used in a wide number of other applications, including several service providers that offer mail services that are more robust against commercial and governmental spying. Everyone at Kolab considers this a great success, and finds it rewarding to see our technology contribute essential value to society in so many different ways.&lt;/p&gt;
&lt;p&gt;But while adoption sky-rocketed, contribution did not grow in the same way. It&amp;#8217;s still Kolab Systems driving the vast majority of all code development in Roundcube along with a small number of occasional contributors. And as a direct result of the Snowden revelations the development of web collaboration solutions fragmented further. There are a number of proprietary approaches, which should be self-evidently disqualified from being taken serious based on what we have learned about how solutions get compromised. But there are also Open Source solutions.&lt;/p&gt;
&lt;p&gt;The Free Software community has largely responded in one of two ways. Many people felt re-enforced in their opinion that people just “should not use the cloud.” Many others declared self-hosting the universal answer to everything, and started to focus on developing solutions for the crypto-hermit.&lt;/p&gt;
&lt;p&gt;The problem with that is that it takes an all or nothing approach to privacy and security. It also requires users to become more technical than most of them ever wanted to be, and give up features, convenience and ease of use as a price for privacy and security. In my view that ignores the most fundamental lesson we have learned about security throughout the past decades. People will work around security when they consider it necessary in order to get the job done. So the adoption rate of such technologies will necessarily remain limited to a very small group of users whose concerns are unusually strong.&lt;/p&gt;
&lt;p&gt;These groups are often more exposed, more endangered, and more in need of protection and contribute to society in an unusually large way. So developing technology they can use is clearly a good thing.&lt;/p&gt;
&lt;p&gt;It just won&amp;#8217;t solve the problem at scale.&lt;/p&gt;
&lt;p&gt;To do that we would need a generic web application geared towards all of tomorrow&amp;#8217;s form factors and devices. It should be collaboration centric and allow deployment in environments from a single to hundreds of millions of users. It should enable meshed collaboration between sites, be fun to use, elegant, beautiful and provide security in a way that does not get into the users face.&lt;/p&gt;
&lt;p&gt;Fully Free Software, that solution should be the generic collaboration application that could become in parts or as a whole the basis for solutions such as &lt;a href="https://www.mailpile.is/"&gt;mailpile&lt;/a&gt;, which focus on local machine installations using extensive cryptography, intermediate solutions such as &lt;a href="https://mailinabox.email/"&gt;Mail-in-a-Box&lt;/a&gt;, all the way to generic cloud services by providers such as cPanel or Tucows. It should integrate all forms of on-line collaboration, make use of all the advances in usability for encryption, and be able to grow as technology advances further.&lt;/p&gt;
&lt;p&gt;That, in short, is the goal Kolab Systems has set out to achieve with its plans for &lt;a href="http://roundcu.be/next"&gt;Roundcube Next&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;While we can and of course will pursue that goal independently in incremental steps we believe that would be missing two rather major opportunities. Such as the opportunity to tackle this together, as a community. We have a lot of experience, a great UI/UX designer excited about the project, and many good ideas.&lt;a href="http://blogs.fsfe.org/greve/files/2015/05/components.png"&gt;&lt;img class="alignright size-medium wp-image-682" src="http://blogs.fsfe.org/greve/files/2015/05/components-300x200.png" alt="" width="300" height="200" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;But we are not omniscient and we also want to use this opportunity to achieve what Roundcube 1.0 has not quite managed to accomplish: To build an active, multi-vendor community around a base technology that will be fully Open Source/Free Software and will address the collaborative web application need so well that it puts Google Apps and Office 365 to shame and provides that solution to everyone. And secondly, while incremental improvements are immensely powerful, sometimes leapfrogging innovation is what you really want.&lt;/p&gt;
&lt;p&gt;All of that is what Roundcube Next really represents: The invitation to leapfrog all existing applications, as a community.&lt;/p&gt;
&lt;p&gt;So if you are a user that has appreciated Roundcube in the past, or a user who would like to be able to choose fully featured services that leave nothing to be desired but do not compromise your privacy and security, please contribute to pushing the fast forward button on &lt;a href="http://roundcu.be/next"&gt;Roundcube Next&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;And if you are an Application Service Provider, but your name is not Google, Microsoft, Amazon or Apple, Roundcube Next represents the small, strategic investment that might just put you in a position to remain competitive in the future. Become part of the advisory group and join the ongoing discussion about where to take that application, and how to &lt;a href="http://roundcu.be/next"&gt;make it reality, together&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
</content:encoded>
    </item>
    <item>
      <title>USSD 101</title>
      <link>http://www.edwardpopoola.com/2015/04/01/ussd-101/</link>
      <source url="http://www.edwardpopoola.com/blog">Jangbalajugbu-Homeland Stories</source>
      <guid isPermaLink="false">urn:uuid:db8ba19c-178a-85df-a94f-a2201ee19732</guid>
      <pubDate>Wed, 01 Apr 2015 08:30:55 +0000</pubDate>
      <description>There is an uptake in USSD services  in Nigeria and I thought to put something together as simple and as basic as possible. My hope is that, Nigerian developers can gradually look at disrupting the  Telecoms space. This post is targeted at the absolute beginner with no Teleco experience. What is USSD? USSD is Unstructured [&amp;#8230;]</description>
    </item>
    <item>
      <title>Key Update</title>
      <link>http://blogs.fsfe.org/greve/?p=649</link>
      <source url="http://www.fsfe.org/en/fellows/greve/freedom_bits">freedom bits</source>
      <guid isPermaLink="false">urn:uuid:f2336915-1bd6-87b3-0b21-daf8ce90de21</guid>
      <pubDate>Mon, 19 Jan 2015 11:42:03 +0000</pubDate>
      <description>I&amp;#8217;m a fossil, apparently. My oldest PGP key dates back to 1997, so around the time when GnuPG just got started &amp;#8211; and I switched to it early. Over the years I&amp;#8217;ve been working a lot with GnuPG, which perhaps isn&amp;#8217;t surprising. Werner Koch has been one of the co-founders of the Free Software Foundation Europe [...]</description>
      <content:encoded>&lt;div&gt;I&amp;#8217;m a fossil, apparently. My oldest PGP key dates back to 1997, so around the time when &lt;a href="http://www.gnupg.org"&gt;GnuPG&lt;/a&gt; just got started &amp;#8211; and I switched to it early. Over the years I&amp;#8217;ve been working a lot with GnuPG, which perhaps isn&amp;#8217;t surprising. Werner Koch has been one of the co-founders of the &lt;a href="http://www.fsfe.org"&gt;Free Software Foundation Europe (FSFE)&lt;/a&gt; and so we share quite a bit of a long and interesting history together. I was always proud of the work he did &amp;#8211; and together with &lt;a href="https://www.intevation.de/~bernhard/"&gt;Bernhard Reiter&lt;/a&gt; and others was doing what I could to try and support GnuPG when most people did not seem to understand how essential it truly was &amp;#8211; and even many security experts declared proprietary encryption technology acceptable. Bernhard was also crucial to start the more than 10 year track record of &lt;a href="http://kolab.org"&gt;Kolab&lt;/a&gt; development supporting GnuPG over the years. And especially the usability of GnuPG has always been something I&amp;#8217;ve &lt;a href="http://blogs.fsfe.org/greve/?p=634"&gt;advocated for&lt;/a&gt;. As the now famous &lt;a href="http://vimeo.com/56881481"&gt;video by Edward Snowden&lt;/a&gt; &lt;a href="http://www.dailydot.com/politics/edward-snowden-gpg-for-journalists-video-nsa-glenn-greenwald/"&gt;demonstrated&lt;/a&gt;, this unfortunately continued to be an unsolved problem but hopefully will be solved &amp;#8220;real soon now.&amp;#8221;&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;In any case. I&amp;#8217;ve been happy with my GnuPG setup for a long time. Which is why the key I&amp;#8217;ve been using for the past 16 years looked like this:&lt;/div&gt;
&lt;div&gt;&lt;span style="font-family: Consolas, Monaco, monospace;font-size: 12px;line-height: 18px"&gt;sec# 1024D/86574ACA 1999-02-20&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;pre&gt;uid                  Georg C. F. Greve &amp;lt;greve@gnu.org&amp;gt;
uid                  Georg C. F. Greve &amp;lt;greve@fsfeurope.org&amp;gt;
uid                  Georg C. F. Greve &amp;lt;greve@brave-gnu-world.org&amp;gt;
uid                  Brave GNU World &amp;lt;column@gnu.org&amp;gt;
uid                  Georg C. F. Greve &amp;lt;greve@fsfe.org&amp;gt;
uid                  Georg C. F. Greve &amp;lt;greve@gnuhh.org&amp;gt;
uid                  Georg C. F. Greve (Kolab Systems AG, CEO) &amp;lt;georg.greve@kolabsys.com&amp;gt;
uid                  Georg C. F. Greve (Kolab Systems AG, CEO) &amp;lt;greve@kolabsys.com&amp;gt;
ssb&amp;gt;  1024R/B7DB041C 2005-05-02
ssb&amp;gt;  1024R/7DF16B24 2005-05-02
ssb&amp;gt;  1024R/5378AB47 2005-05-02&lt;/pre&gt;
&lt;/div&gt;
&lt;div&gt;You&amp;#8217;ll see that I kept the actual primary key off my work machines (look for the &amp;#8216;#&amp;#8217;) and I also moved the actual sub keys onto a hardware token. Naturally a &lt;a href="https://fsfe.org/fellowship/card"&gt;FSFE Fellowship Smart Card&lt;/a&gt; from the &lt;a href="https://blogs.fsfe.org/blog/2005/04/28/first-batch-of-smartcards-has-been-shipped/"&gt;first batch&lt;/a&gt; ever produced.&lt;/div&gt;
&lt;div&gt;Given that smart card is battered and bruised, but its chip is still intact with 58470 signatures and counting, the key itself is likely still intact and hasn&amp;#8217;t been compromised for lack of having been on a networked machine. But unfortunately there is no way to extend the length of a key. And while 1024 is probably still okay today, it&amp;#8217;s not going to last much longer. So I finally went through the motions of generating a new key:&lt;/div&gt;
&lt;div&gt;
&lt;pre&gt;sec#  4096R/B358917A 2015-01-11 [expires: 2020-01-10]
uid                  Georg C. F. Greve (Kolab Systems AG, CEO) &amp;lt;greve@kolabsystems.com&amp;gt;
uid                  Georg C. F. Greve (Kolab Systems AG, CEO) &amp;lt;greve@kolabsystems.ch&amp;gt;
uid                  Georg C. F. Greve (Kolab Systems AG, CEO) &amp;lt;greve@kolabsys.com&amp;gt;
uid                  Georg C. F. Greve (Kolab Community) &amp;lt;georg@kolab.org&amp;gt;
uid                  Georg C. F. Greve (Free Software Foundation Europe, Founding President) &amp;lt;greve@fsfeurope.org&amp;gt;
uid                  Georg C. F. Greve (Free Software Foundation Europe, Founding President) &amp;lt;greve@fsfe.org&amp;gt;
uid                  Georg C. F. Greve (digitalSTROM.org Board) &amp;lt;georg.greve@digitalSTROM.org&amp;gt;
uid                  Georg C. F. Greve &amp;lt;mail@georggreve.net&amp;gt;
uid                  Georg C. F. Greve (GNU Project) &amp;lt;greve@gnu.org&amp;gt;
ssb&amp;gt;  4096R/AD394E01 2015-01-11
ssb&amp;gt;  4096R/B0EE38D8 2015-01-11
ssb&amp;gt;  4096R/1B249D9E 2015-01-11&lt;/pre&gt;
&lt;/div&gt;
&lt;p&gt;&lt;img class="size-medium wp-image-668 alignright" src="http://blogs.fsfe.org/greve/files/2015/01/20150114_162636-300x300.jpg" alt="" width="300" height="300" /&gt;&lt;/p&gt;
&lt;div&gt;My basic setup is still the same, and the key has been &lt;a href="https://pgp.mit.edu/pks/lookup?search=greve%40kolabsys.com&amp;amp;op=index" target="_blank"&gt;uploaded to the key servers&lt;/a&gt;, signed by my old key, which I have meanwhile revoked and which you should stop using. From now on please use the key&lt;/div&gt;
&lt;div&gt;
&lt;pre&gt;pub   4096R/B358917A 2015-01-11 [expires: 2020-01-10]
      Key fingerprint = E39A C3F5 D81C 7069 B755  4466 CD08 3CE6 B358 917A&lt;/pre&gt;
&lt;/div&gt;
&lt;div&gt;exclusively and feel free to verify the fingerprint with me through side channels.&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;Not that this key has any chance to ever again make it among the top 50&amp;#8230; but then that is a good sign in so far as it means a lot more people are using GnuPG these days. And that is definitely good news.&lt;/div&gt;
&lt;p&gt;And in case you haven&amp;#8217;t done so already, &lt;a href="https://gnupg.org/donate/index.html"&gt;go and support GnuPG right now&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
</content:encoded>
    </item>
    <item>
      <title>Public cloud in Nigeria, why Open Technology matters.</title>
      <link>http://www.edwardpopoola.com/2014/10/27/public-cloud-in-nigeria-why-open-technology-matters/</link>
      <source url="http://www.edwardpopoola.com/blog">Jangbalajugbu-Homeland Stories</source>
      <guid isPermaLink="false">urn:uuid:f3efbbca-03ed-d023-804b-418af820ff37</guid>
      <pubDate>Mon, 27 Oct 2014 11:15:14 +0000</pubDate>
      <description>I recently heard about a Nigerian company shutting down its public cloud services business.  Apparently riding on the wave of cloud, the company built a public cloud infrastructure and quickly tried to leverage on its Data Centre experience in colocating services. However, after a brief stint, the revenues just did not add up. They had [&amp;#8230;]</description>
    </item>
    <item>
      <title>Getting started with Puppet Automation</title>
      <link>http://www.edwardpopoola.com/2014/10/22/getting-started-with-puppet-automation/</link>
      <source url="http://www.edwardpopoola.com/blog">Jangbalajugbu-Homeland Stories</source>
      <guid isPermaLink="false">urn:uuid:9e37e996-b119-d83e-fc2f-bd8e56b89774</guid>
      <pubDate>Wed, 22 Oct 2014 09:49:50 +0000</pubDate>
      <description>Puppet is one of the popular configuration management and IT Automation tools out there. In an age where we have more servers being spawned every minute in the cloud and on-premise, it will be a disaster not to adopt configuration management tools. There are other tools out there like Salt, Chef, Ansible etc. Currently I&amp;#8217;m liking [&amp;#8230;]</description>
    </item>
    <item>
      <title>Why it will take us 100 years not 50.</title>
      <link>http://www.edwardpopoola.com/2014/08/31/why-it-will-take-us-100-years-not-50/</link>
      <source url="http://www.edwardpopoola.com/blog">Jangbalajugbu-Homeland Stories</source>
      <guid isPermaLink="false">urn:uuid:321bfb1c-5320-4d83-f2e7-9f72311d9e3e</guid>
      <pubDate>Sun, 31 Aug 2014 15:14:39 +0000</pubDate>
      <description>Getting better at something and developing a country both have one thing in common. Deliberate effort. You need deliberate effort to get better at a thing the same way a country needs to deliberately put structures in place for development to happen. The 50 years vs. 100 years is just an analogy. My point is [&amp;#8230;]</description>
    </item>
    <item>
      <title>10 kobo tips for Nigerian Pre-Startups!</title>
      <link>http://www.edwardpopoola.com/2014/03/09/10-kobo-for-nigerian-pre-startups/</link>
      <source url="http://www.edwardpopoola.com/blog">Jangbalajugbu-Homeland Stories</source>
      <guid isPermaLink="false">urn:uuid:edb553ad-23c0-1204-c707-3725368b4692</guid>
      <pubDate>Sun, 09 Mar 2014 21:46:36 +0000</pubDate>
      <description>I am usually very careful when using the word ‘startup’. The growing tech media in Nigeria have adopted the word &amp;#8216;startup’ wholly as it is being used in Silicon Valley for every tech idea someone&amp;#8217;s trying to execute. I am of the opinion that this generalisation isn’t fair for most &amp;#8216;startups&amp;#8217; in Nigeria. According to [&amp;#8230;]</description>
    </item>
    <item>
      <title>Early 2000 web design</title>
      <link>http://www.edwardpopoola.com/2014/03/02/early-2000-web-design/</link>
      <source url="http://www.edwardpopoola.com/blog">Jangbalajugbu-Homeland Stories</source>
      <guid isPermaLink="false">urn:uuid:80317121-4b3b-a0cb-99fd-b1802242e049</guid>
      <pubDate>Sun, 02 Mar 2014 08:02:28 +0000</pubDate>
      <description>First, if you are developer reading this and you’re not subscribed to Hacker Newsletter, you are on a long thing. Its a regular collection of the best write ups you’ll ever read in tech  - Subscribe to Hackernewsletter.com here This write up is inspired by this Article I saw on Hackernews. Reading through, I felt [&amp;#8230;]</description>
    </item>
    <item>
      <title>Nigeria’s Tech Talent Problem</title>
      <link>http://www.edwardpopoola.com/2014/01/27/nigerias-tech-talent-problem/</link>
      <source url="http://www.edwardpopoola.com/blog">Jangbalajugbu-Homeland Stories</source>
      <guid isPermaLink="false">urn:uuid:6efb2812-a2fd-a9d0-955c-39a02f9973bb</guid>
      <pubDate>Mon, 27 Jan 2014 09:13:29 +0000</pubDate>
      <description>Phew! Writing almost a year later! I had a discussion with a friend recently. He has this grand idea that will change entertainment in Nigeria and to launch, he needs a website. A web app if you may. My friend is a very good graphics designer. He already has a mock up of what he [&amp;#8230;]</description>
    </item>
    <item>
      <title>SFD Call to Action: Let the STEED run!</title>
      <link>http://blogs.fsfe.org/greve/?p=634</link>
      <source url="http://www.fsfe.org/en/fellows/greve/freedom_bits">freedom bits</source>
      <guid isPermaLink="false">urn:uuid:5d9ac8db-63d3-16e7-3035-790ace91077a</guid>
      <pubDate>Fri, 20 Sep 2013 06:21:57 +0000</pubDate>
      <description>&lt;p&gt;Information Technology is a hype driven industry, a fact that has largely contributed to the current situation where the NSA and GCHQ have unprecedented access to the global communication and information. Including for a very Realpolitik based approach to how that information may be used. Economic and political manipulation may not be how these measures [...]</description>
      <content:encoded>&lt;p&gt;Information Technology is a &lt;a href="http://www.gartner.com/technology/research/hype-cycles/"&gt;hype driven industry&lt;/a&gt;, a fact that has largely contributed to the current situation where the NSA and GCHQ have unprecedented access to the global communication and information. Including for a very &lt;a href="http://en.wikipedia.org/wiki/Realpolitik"&gt;Realpolitik&lt;/a&gt; based approach to how that information may be used. Economic and political manipulation may not be how these measures are advertised, but it may very well be the &lt;a href="http://rt.com/news/us-spied-brazil-oil-588/"&gt;actual motivation&lt;/a&gt;. &lt;a href="http://en.wikipedia.org/wiki/It's_the_economy,_stupid"&gt;It&amp;#8217;s the economy, stupid&lt;/a&gt;!&lt;/p&gt;
&lt;p&gt;Ever since all of this started, many people have asked the question how to protect their privacy. Despite some there is still a lack of comprehensive answers to this question. There is an obvious answer that most mainstream media seem to have largely missed: &lt;strong&gt;Software freedom advocates had it right all along. You cannot trust proprietary cryptography, or proprietary software.&lt;/strong&gt; If a company has a connection to the legal nexus of the United States, it is subject to US law and must comply with demands of the NSA and other authorities. But if that company also provides proprietary software it is virtually impossible for you to know what kind of agreements it has with the NSA, as most of their management prefer &lt;a href="http://rt.com/news/yahoo-google-nsa-jail-treason-754/"&gt;not to go to jail&lt;/a&gt;. But one would have to be very naive to think the United States is the only country where secret agreements exist.&lt;/p&gt;
&lt;p&gt;Security unfortunately is a realm full of quacks and it is just as easy to be fooled as it is to fool yourself. In fact many of the discussions I&amp;#8217;ve had over the past weeks painfully reminded me of what Cory Doctorow called &amp;#8220;&lt;a href="https://www.schneier.com/blog/archives/2011/04/schneiers_law.html"&gt;Schneier&amp;#8217;s Law&lt;/a&gt;&amp;#8221; although Bruce Schneier himself points out the principle has been around for much longer. He has dated it back to Charles Babbage in 1864:&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;One of the most singular characteristics of the art of deciphering is the strong conviction possessed by every person, even moderately acquainted with it, that he is able to construct a cipher which nobody else can decipher.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;So in my experience it makes good sense to listen to what Bruce Schneier and a few others have to say, which is why I think his guide to &lt;a href="http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance"&gt;staying secure on the internet&lt;/a&gt; is probably something everyone should have read. In that list of recommendations there are some points that ought to read familiar:&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;4) &lt;strong&gt;Be suspicious of commercial encryption software, especially from large vendors.&lt;/strong&gt; My guess is that most encryption products from large US companies have NSA-friendly back doors, and many foreign ones probably do as well. It&amp;#8217;s prudent to assume that foreign products also have foreign-installed backdoors. Closed-source software is easier for the NSA to backdoor than open-source software. Systems relying on master secrets are vulnerable to the NSA, through either legal or more clandestine means.&lt;/p&gt;
&lt;p&gt;5) &lt;strong&gt;Try to use public-domain encryption that has to be compatible with other implementations.&lt;/strong&gt; For example, it&amp;#8217;s harder for the NSA to backdoor TLS than BitLocker, because any vendor&amp;#8217;s TLS has to be compatible with every other vendor&amp;#8217;s TLS, while BitLocker only has to be compatible with itself, giving the NSA a lot more freedom to make changes. And because BitLocker is proprietary, it&amp;#8217;s far less likely those changes will be discovered. Prefer symmetric cryptography over public-key cryptography. Prefer conventional discrete-log-based systems over elliptic-curve systems; the latter have constants that the NSA influences when they can.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;&amp;#8220;&lt;em&gt;So you were right, good for you&lt;/em&gt;&amp;#8221; I hear you think. The point I am trying to make is a different one. It has been unbelievably difficult in the past to &lt;strong&gt;consequently do the right thing&lt;/strong&gt; that would now give us the answers to the questions posed by the NSA and others. Both the &lt;a href="http://fsfe.org"&gt;Free Software Foundation Europe (FSFE)&lt;/a&gt; as an organisation and &lt;a href="http://www.kolab.org"&gt;Kolab as a technology&lt;/a&gt; have a very long history to that extent. In fact if you&amp;#8217;ve read the &lt;a href="http://kolab.org/blog/greve/2013/08/09/mykolab.com-building-open-source-cloud-service-was-missing"&gt;background of MyKolab.com&lt;/a&gt;, you&amp;#8217;ll hopefully see the same kind of approach there, as well. Having been involved with both has given me a unique perspective.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://blogs.fsfe.org/greve/files/2013/09/steed-small.png"&gt;&lt;img class="size-medium wp-image-645 alignright" src="http://blogs.fsfe.org/greve/files/2013/09/steed-small-300x87.png" alt="" width="300" height="87" /&gt;&lt;/a&gt;So when Bruce Schneier is listing &lt;a href="http://www.gnupg.org"&gt;GnuPG&lt;/a&gt; as the first of several applications he is using and recommending to stay secure, I can&amp;#8217;t help but find this rather ironic and rewarding at the same time. Because I know what has been necessary for this crucial piece of software to come so far. Especially Werner Koch, but also Markus Brinkmann are two people all of us are indebted to, even though most people don&amp;#8217;t realize it. Excellent software developers, but entrepreneurs with much room for improvement and (I&amp;#8217;m sorry, guys) horrible at marketing and fundraising. So they pretty much exploited themselves over many years in order to be able to keep the development going because they knew their work was essential. Over the course of the past 12 years the entire Kolab team and especially individuals such as &lt;a href="http://www.intevation.de/~bernhard/"&gt;Bernhard Reiter&lt;/a&gt; at &lt;a href="http://www.intevation.de"&gt;Intevation&lt;/a&gt; have always done what they could to involve them in development projects and push forward the technology.&lt;/p&gt;
&lt;p&gt;And we will continue to do that, both through &lt;a href="https://mykolab.com"&gt;MyKolab.com&lt;/a&gt; and some other development projects we are pushing with &lt;a href="http://kolabsys.com"&gt;Kolab Systems&lt;/a&gt; for customers that have an interest in these technologies. But they have a whole lot more in mind than we could make possible immediately, such as dramatically increasing the usability for end-to-end cryptography. The concept they have developed is based on over a decade of working on obstacles to end user adoption. It&amp;#8217;s called &lt;a href="http://www.g10code.de/steed.html"&gt;STEED — Usable End-to-End Encryption&lt;/a&gt; and has been available for two years now. I think it&amp;#8217;s time to be finalized and implemented.&lt;/p&gt;
&lt;p&gt;That&amp;#8217;s why I am using tomorrow&amp;#8217;s &lt;a href="http://softwarefreedomday.org/"&gt;Software Freedom Day&lt;/a&gt; to ask for volunteers to help them run a crowdfunding campaign so they can finally put it into practice, in the open, to everyone&amp;#8217;s benefit. Because that&amp;#8217;s going to contribute more than just a little bit towards a world where privacy will once more be the default. So please help spread the word and let the STEED run!&lt;/p&gt;
</content:encoded>
    </item>
    <item>
      <title>Groklaw shutting down.</title>
      <link>http://blogs.fsfe.org/greve/?p=625</link>
      <source url="http://www.fsfe.org/en/fellows/greve/freedom_bits">freedom bits</source>
      <guid isPermaLink="false">urn:uuid:35aeb10c-c233-e82b-fc4e-8c9069a910b0</guid>
      <pubDate>Tue, 20 Aug 2013 10:31:48 +0000</pubDate>
      <description>&lt;p&gt;Today is a sad day for the world of Information Technology and the cause of software freedom. PJ just announced she&amp;#8217;ll be shutting down Groklaw.&lt;/p&gt; &lt;p&gt;It&amp;#8217;s hard to overestimate the role that Groklaw has played in the past years. Many of us, myself included, have worked with Groklaw over the years. I still take pride [...]</description>
      <content:encoded>&lt;p&gt;Today is a sad day for the world of Information Technology and the cause of software freedom. PJ just announced she&amp;#8217;ll be &lt;a href="http://www.groklaw.net/article.php?story=20130818120421175"&gt;shutting down Groklaw&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;It&amp;#8217;s hard to overestimate the role that Groklaw has played in the past years. Many of us, myself included, have worked with Groklaw over the years. I still take pride my article about the &lt;a href="http://www.groklaw.net/articlebasic.php?story=20061208135621706"&gt;dangers of OOXML for Free Software and Open Standards&lt;/a&gt; might have been the first of many calls to arms on this topic. Or how Groklaw followed the Microsoft antitrust case that &lt;a href="http://www.fsfe.org"&gt;FSFE&lt;/a&gt; fought for and with the &lt;a href="http://www.samba.org"&gt;Samba&lt;/a&gt; team, and won for all of software freedom. Groklaw was essential in helping us &lt;a href="http://www.groklaw.net/article.php?story=20070923170905803"&gt;counter some of the Microsoft spin-doctoring&lt;/a&gt;. Or the Sean Daly &lt;a href="http://www.groklaw.net/article.php?story=20070919214307459"&gt;interview with Volker Lendecke, Jeremy Allison, Carlo Piana and myself&lt;/a&gt; for Groklaw after the landslide victory against Microsoft in court.&lt;/p&gt;
&lt;p&gt;I remember very well how giddy I still was during the interview for having realized that Microsoft would not be able to take down FSFE, because that would have been the consequence had they gotten their way. We bet our life&amp;#8217;s work at the time. And won. The relief was incredible.&lt;/p&gt;
&lt;p&gt;So there is a good deal of personal sadness to hear about this, as well as a general concern which &lt;a href="http://blogs.fsfe.org/padams/"&gt;Paul Adams&lt;/a&gt; just summarized rather well on the &lt;a href="irc://irc.freenode.net/kolab"&gt;#kolab&lt;/a&gt; IRC channel:&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;the world of IT is just that little bit less safe without groklaw&lt;/p&gt;&lt;/blockquote&gt;
&lt;p&gt;And it&amp;#8217;s true. Groklaw has been the most important platform to counter corporate spin doctoring, has practiced an important form of whistleblowing long before Wikileaks, and has been giving alternative and background perspective on some of the most important things going on inside and outside the media limelight. without Groklaw, all of us will lack that essential information.&lt;/p&gt;
&lt;p&gt;So firstly, I&amp;#8217;d like to thank PJ for all the hard years of work on Groklaw. Never having had the pleasure of meeting her in real life, I still feel that I know her from the conversations we had over email over so many years. And I know how she got weary of the pressure, the death threats and the attempts at intimidating her into silence. Thank you for putting up with it for so long, and for doing what you felt was right and necessary despite the personal cost to yourself! The world needs more people like you.&lt;/p&gt;
&lt;p&gt;But with email having been the only channel of communication she was comfortable using for reasons of personal safety, when Edward Snowden revealed the PRISM program, when Lavabit and Silent Circle shut down, when the boyfriends of journalists get detained at Heathrow, she apparently drew the conclusion this was no longer good enough to protect her own safety and the safety of the people she was in communication with.&lt;/p&gt;
&lt;p&gt;That she chose &lt;a href="https://mykolab.com"&gt;MyKolab.com&lt;/a&gt; as the service to confide in with her remaining communication lines at least to me confirms that we did the right thing when we launched MyKolab.com and also that we did the right thing &lt;a href="https://kolab.org/blog/greve/2013/08/09/mykolab.com-building-open-source-cloud-service-was-missing"&gt;in the way we did it&lt;/a&gt;. But it cannot mitigate the feeling of loss for seeing Groklaw fall victim to the &lt;a href="http://blogs.fsfe.org/greve/?p=568"&gt;totalitarian tendencies our societies are exhibiting and apparently willingly embracing&lt;/a&gt; over the past years.&lt;/p&gt;
&lt;p&gt;While we&amp;#8217;re happy to provide a privacy asylum in a safe legislation, society should not need them. Privacy should be the default, not the exception.&lt;/p&gt;
</content:encoded>
    </item>
    <item>
      <title>MyKolab.com: Building the Open Source Cloud service that was missing</title>
      <link>http://blogs.fsfe.org/greve/?p=609</link>
      <source url="http://www.fsfe.org/en/fellows/greve/freedom_bits">freedom bits</source>
      <guid isPermaLink="false">urn:uuid:521d1fa8-baa6-f06e-0ad9-074cd94a70c9</guid>
      <pubDate>Fri, 09 Aug 2013 18:26:43 +0000</pubDate>
      <description>&lt;p&gt;In January this year we started the MyKolab beta phase and last week we finally moved it to its production environment, just in time for the Swiss national day. This seemed oddly fitting since the Swiss national day celebrates its independence and self-determination, as they were liberating themselves from the feudal system. So when Bruce [...]</description>
      <content:encoded>&lt;p&gt;In January this year we started the &lt;a href="http://kolabsys.com/news/make-it-your-kolab-kolab-systems-launching-mykolabcom-public-beta"&gt;MyKolab beta phase&lt;/a&gt; and last week we finally moved it to &lt;a href="http://kolabsys.com/news/no-foreign-data-reeves-privacy-respecting-email-service-mykolabcom-launched"&gt;its production environment&lt;/a&gt;, just in time for the &lt;a href="https://en.wikipedia.org/wiki/Swiss_national_holiday"&gt;Swiss national day&lt;/a&gt;. This seemed oddly fitting since the Swiss national day celebrates its independence and self-determination, as they were liberating themselves from the feudal system. So when Bruce Schneier wrote about how the Internet right now &lt;a href="https://www.schneier.com/blog/archives/2012/12/feudal_sec.html"&gt;resembles a feudal system&lt;/a&gt;, it was too tempting an opportunity to miss. And of course &lt;a href="https://blogs.fsfe.org/greve/?p=553"&gt;PRISM and Tempora&lt;/a&gt; played their part in the timing, as well, although we obviously had no idea this leak was coming when we started the beta in January.&lt;/p&gt;
&lt;p&gt;Anyhow. So now &lt;a href="https://mykolab.com/"&gt;MyKolab.com&lt;/a&gt; has its new home.&lt;/p&gt;
&lt;h2&gt;Step 1: Hardware &amp;amp; Legislation&lt;/h2&gt;
&lt;p&gt;It should be highlighted that we actually run this on our own hardware, in a trustworthy, secure data centre, in a rack which we physically control. Because that is where security starts, really. Also, we run this in Switzerland, with a Swiss company, and for a reason. Most people do not seem to realize the level of protection data enjoys in Switzerland. We tried to &lt;a href="https://mykolab.com/faq#privacy"&gt;explain it in the FAQ&lt;/a&gt;, and the &lt;a href="https://mykolab.com/privacy"&gt;privacy information&lt;/a&gt;. But it seems that too many people still don&amp;#8217;t get it.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Put frankly, in these matters, &lt;a href="https://queue.acm.org/detail.cfm?id=2508864"&gt;legislation trumps technology and even cryptography&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Because when push comes to shove, people would rather not go to jail. So no matter what snake oil someone may be trying to sell you about your data being secure because “&lt;em&gt;it is encrypted on our server with your passphrase, so even we don&amp;#8217;t have access&lt;/em&gt;” &amp;#8211; choice of country and legislation trumps it all.&lt;/p&gt;
&lt;p&gt;As long as server-side cryptography is involved a provider can of course access your data even when it is encrypted. Especially when the secret is as simple as your password which all your devices submit to the server every time you check mail. Better yet, when you have push activated, your devices even keep the connection open. And if the provider happens to be subject to a requirement to cooperate and hand over your data, of course they will. Quite often they don&amp;#8217;t even necessarily know that this is going on if they do not control the physical machines.&lt;/p&gt;
&lt;div class="wp-caption alignright" style="width: 458px"&gt;&lt;a href="http://xkcd.com/538/"&gt;&lt;img src="http://imgs.xkcd.com/comics/security.png" alt="XKCD 538: Security" width="448" height="274" /&gt;&lt;/a&gt;&lt;p class="wp-caption-text"&gt;XKCD 538: Security&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;So whenever someone tries to serve you that kind of &lt;a href="https://en.wikipedia.org/wiki/Snake_oil_(cryptography)"&gt;snake oil&lt;/a&gt;, you should avoid that service at all cost, because you do not know which lies you are &lt;strong&gt;not&lt;/strong&gt; catching them in the act with. And yes, it is a true example, unfortunately. The romantic picture of the internet as a third place above nation states has never had much evidence on its side. Whoever was harbouring these notions and &lt;a href="http://xkcd.com/538/"&gt;missed XKCDs&lt;/a&gt; take on the matter should definitely have received their wakeup call by &lt;a href="https://www.techdirt.com/articles/20130808/13092724113/ed-snowdens-email-provider-lavabit-shuts-down-to-fight-us-govt-intrusion.shtml"&gt;Lavabit&lt;/a&gt; and &lt;a href="http://silentcircle.wordpress.com/2013/08/09/to-our-customers/"&gt;Silent Circle&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The reality of the matter is:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;There is no digital security without physical security&lt;/strong&gt;, and&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Country and applicable legislation always win.&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Step 2: Terms of Service &amp;amp; Pricing&lt;/h2&gt;
&lt;p&gt;So legislation, hardware. What else? Terms of Service come to mind. Too often they are deliberately written to obfuscate or frankly turn you into the product. Because writing software, buying hardware, physical security, maintaining systems, staffing help desks, electricity: All these things cost money. If you do not pay for it, make sure you know who does. Because otherwise it&amp;#8217;s like this old poker adage: If you cannot tell who is the weakest player at the table, it&amp;#8217;s you. Likewise for any on-line service: if you cannot tell who is paying for this, it&amp;#8217;s probably you.&lt;/p&gt;
&lt;p&gt;Sometimes this may just in ways you did not expect, or may not have been aware of. So while most people only look for the lowest price, the question you actually should be asking yourself is: Am I paying enough for this service that I think it can be profitable even when it does everything right and pays all its employees fairly even if they have families and perhaps even mortgages?&lt;/p&gt;
&lt;p&gt;The alternative are services that are run by enthusiasts for the common good, or subsidized by third parties – sometimes for marketing purposes. If it is run by an enthusiast, the question is how long they can afford to run this service well, and what will happen if their priorities or interests change. Plus few enthusiasts are willing to dish out the kind of cash that comes with a physically controlled, secure system in a data centre. So more often than not, this is either a box in someone&amp;#8217;s basement where pretty much anyone has access while they go out for a pizza or cinema, or – at least as problematic – a cheap VM at some provider with unknown physical, legislative and technical security.&lt;/p&gt;
&lt;p&gt;If it is a subsidized service, it&amp;#8217;s worse. Just like subsidies on food in Europe destroy the farming economy in Africa, making almost a whole continent dependent on charity, subsidized services cannibalize those that are run for professional interest.&lt;/p&gt;
&lt;p&gt;In this case that means they damage the professional development community around Open Source, leading to less Free Software being developed. Why is that? Because such subsidized services typically do not bother with contributing upstream – which is a pure cost factor and this is already charity, so no-one feels there is a problem not to support the upstream – and they are destroying the value proposition of those services that contribute upstream. So the developers of the upstream technologies need to find other ways to support their work on Open Source, which typically means they get to spend less time on Free Software development.&lt;/p&gt;
&lt;p&gt;This is the well-meaning counterpart to providers who simply take the software, do not bother to contribute upstream, but use it to provide a commercial service that near-automatically comes in below the price if you were to price it sustainably by factoring in the upstream contribution and ongoing development. The road to hell and all that.&lt;/p&gt;
&lt;p&gt;None of this is anything we wanted to contribute to with &lt;a href="https://MyKolab.com/"&gt;MyKolab.com&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;So we made sure to write &lt;a href="https://mykolab.com/tos"&gt;Terms of Service&lt;/a&gt; that were as good, honest and clear as we could make them, discussed them with the people behind the important &lt;a href="http://tosdr.org/"&gt;Terms of Service; Didn&amp;#8217;t Read&lt;/a&gt; project, and even link to that project from our own Terms of Service so people have a fair chance to compare them without being lawyers or even reading them.&lt;/p&gt;
&lt;h2&gt;Step 3: Contributing to the Commons&lt;/h2&gt;
&lt;div id="attachment_615" class="wp-caption alignright" style="width: 310px"&gt;&lt;a href="http://blogs.fsfe.org/greve/files/2013/08/kolab-mail-compose.png"&gt;&lt;img class="size-medium wp-image-615 " src="http://blogs.fsfe.org/greve/files/2013/08/kolab-mail-compose-300x120.png" alt="Kolab Web Client - Roundcube++" width="300" height="120" /&gt;&lt;/a&gt;&lt;p class="wp-caption-text"&gt;Roundcube++ - The Kolab Web Client&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;We also were careful to not choose a pricing point that would cannibalize anything but proprietary software. Because we pay the developers. All of who write Open Source exclusively. This has made sure that we have been the largest main contributor to the &lt;a href="http://roundcube.net/"&gt;Roundcube web mailer&lt;/a&gt; by some margin, for instance. In doing so, we deliberately made sure to keep the project independent and did not interfere with its internal management. Feel free to read the &lt;a href="http://roundcubeinbox.wordpress.com/2013/03/11/the-kolab-story/"&gt;account of Thomas Brüderli&lt;/a&gt; on that front.&lt;/p&gt;
&lt;p&gt;So while hundreds of thousands of sites use Roundcube world wide, and it is popular with millions of users, only a handful of companies bother to contribute to its development, and none as much as Kolab Systems AG, which is the largest contributor by orders of magnitude. Don&amp;#8217;t get me wrong. That&amp;#8217;s all fine. We are happy about everyone who makes use of the software we develop, and we firmly believe there is a greater good achieved through Free Software.&lt;/p&gt;
&lt;p&gt;But the economics are nonetheless the same: The developers working on Roundcube have lives, families even, monthly bills to pay, and we pay them every month to continue working on the technology for everyone&amp;#8217;s good. Within our company group, similar things can probably be said for more than 60 people. And of course there are other parts of our stack that we do not contribute as much to, in some cases we are primarily the beneficiary of others doing the same.&lt;/p&gt;
&lt;p&gt;It&amp;#8217;s a give and take among companies who operate in this way that works extremely well. But there are some who almost never contribute. And if, as a customer, you choose them over those that are part of the developer community, you are choosing to have less Open Source Software developed.&lt;/p&gt;
&lt;p&gt;So looking at contribution to Free Software as one essential criterion for whether the company you are about to choose is acting sustainably or trying to work towards a &lt;a href="https://en.wikipedia.org/wiki/Tragedy_of_the_commons"&gt;tragedy of the commons&lt;/a&gt; is something I would certainly suggest you do.&lt;/p&gt;
&lt;p&gt;This now brings us to an almost complete list of items you want to check&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Physical control&lt;/strong&gt;, including hardware&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Legal control&lt;/strong&gt;, choice of applicable legislation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Terms of Service&lt;/strong&gt; that are honest and fair&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Contribution&lt;/strong&gt; to Open Source / Free Software&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;and you want to make sure you pay enough for all of these to meet the criteria you expect.&lt;/p&gt;
&lt;h2&gt;Bringing it all together&lt;/h2&gt;
&lt;p&gt;On all these counts simultaneously, we made sure to put &lt;a href="https://mykolab.com/"&gt;MyKolab.com&lt;/a&gt; into the top 10%. Perhaps even the top 5%, because we develop, maintain and publish the entire stack, as a solution, fully Open Source and more radically Open Standards based than any other solution in this area. So in fact you never need to rely upon MyKolab.com continuing to provide the service you want.&lt;/p&gt;
&lt;p&gt;You can always continue to use the &lt;strong&gt;exact same solution&lt;/strong&gt;, on your own server, in your own hands.&lt;/p&gt;
&lt;p&gt;That is a claim that is unique, as far as I am aware. And you know that whatever you pay for the service never contributes to the development of proprietary software, but contributes to the state of the art in Free Software, available for everyone to take control of their own computing needs, as well as also improving the service itself.&lt;/p&gt;
&lt;p&gt;For me, it&amp;#8217;s this part that truly makes MyKolab.com special. Because if you ever need to break out of &lt;a href="https://mykolab.com/"&gt;MyKolab.com&lt;/a&gt;, your path to self-reliance and control is already built into the system, delivered with and supported by the service itself: It&amp;#8217;s called &lt;a href="http://www.kolab.org/"&gt;Kolab&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
</content:encoded>
    </item>
    <item>
      <title>Life post-PRISM: Politics and Power Struggles</title>
      <link>http://blogs.fsfe.org/greve/?p=586</link>
      <source url="http://www.fsfe.org/en/fellows/greve/freedom_bits">freedom bits</source>
      <guid isPermaLink="false">urn:uuid:554744f0-286a-7cfc-2a5a-2632930868f3</guid>
      <pubDate>Mon, 22 Jul 2013 09:35:49 +0000</pubDate>
      <description>&lt;p&gt;Following the disclosures about details on how the United States and other countries are monitoring the world there has been a global discussion about this subject that&amp;#8217;s been long overdue. In previous articles I tried to put together what actually has been proven thus far, what that means for society, and what are the implications [...] &lt;p&gt;Following the disclosures about details on how the United States and other countries are monitoring the world there has been a global discussion about this subject that&amp;#8217;s been long overdue. In previous articles I tried to put together what &lt;a href="https://blogs.fsfe.org/greve/?p=553"&gt;actually has been proven&lt;/a&gt; thus far, what that &lt;a href="https://blogs.fsfe.org/greve/?p=568"&gt;means for society&lt;/a&gt;, and what are the &lt;a href="https://blogs.fsfe.org/greve/?p=573"&gt;implications for businesses&lt;/a&gt; around the world.&lt;/p&gt;
&lt;p&gt;Now I&amp;#8217;d like to take a look at governments. Firstly, of course governments have a functional aspect not entirely unlike business, and of course governments should be conscious about the society and values they promote. Purely on these grounds it would likely be possible to say quite a few things about the post PRISM society.&lt;/p&gt;
&lt;p&gt;Secondly, there is of course also the question to which extent governments have known about this previously and may even have colluded with what has been going on – in some cases possibly without democratic support for doing so. It has been pointed by quite a few journalists that “I had no idea” amounts to saying you have not been following technical progress since the typewriter was invented, and there is some truth to that. Although typewriters have also known to be &lt;a href="http://matthewaid.tumblr.com/post/31579150245/soviet-cold-war-tapping-of-the-us-embassy-in-moscow-a"&gt;bugged&lt;/a&gt;, of course.&lt;/p&gt;
&lt;p&gt;In fact when spending so much time at the United Nations, one of the typical sights would be a diplomat talking on their mobile phone while covering their mouth with one hand in order to ward off the possibility of lip readers. So there is clearly an understanding that trying to know more about anyone you may have common or opposing interests with will give you an advantage, and that everyone is trying to gain that advantage to the best of their ability.&lt;/p&gt;
&lt;p&gt;What I think is really at play here are two different things: Having been blind-sided by the actual threat, and having been found naïve.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Defending against bunnies, turning your back on lions&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Smart politicians will now have understood their threat model has been totally off. It&amp;#8217;s much easier to intercept that mobile phone call (and get both sides of the conversation) than it is to learn to lip read, guarantee to speak the same language and try and make sure you have line of sight. In other words: They were spending lots of effort protecting the wrong things while ignoring the right things. So there is no way for them to know how vulnerable they have been, what damage arose from that, and what will follow from that for their future work.&lt;/p&gt;
&lt;p&gt;So intelligent people should now be very worried, indeed. Because either they did not know better, or perhaps even let a sense of herd safety drag them along into behaviour that has compromised their professional integrity in so far as it may have exposed their internal thoughts to people they did not want to share them with. If you&amp;#8217;ve ever seen how international treaties are being negotiated it does not take a whole lot of fantasy to imagine how this might be a problem. Given the levels of secrecy and apparent lack of supervision if highest level politicians truly had no idea, there is also a major concern about possible abuse of the system to influence the political balance within a country by those in government.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Politicians are also romantic&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The other part of the surprise seems to stem from a certain romantic notion of friendship among nations harboured by many politicians and deliberately nurtured by nations that do not share such romantic perspectives, most importantly in this context the United States.&lt;/p&gt;
&lt;p&gt;The allies of the United States, in particular also the European Union know that the US has these capabilities and is not afraid to use them to gain an advantage for the home team. But for some reason they thought they were part of that home team because the United States have been telling them they&amp;#8217;re best friends forever. It does not lack a certain irony that Germany fell for this, not realizing that the United States are following their default approach abroad, which is commonly referred to as &lt;a href="https://en.wikipedia.org/wiki/Realpolitik"&gt;Realpolitik&lt;/a&gt; in the US.&lt;/p&gt;
&lt;p&gt;So when European politicians suddenly &lt;a href="http://www.spiegel.de/international/europe/eu-officials-furious-at-nsa-spying-in-brussels-and-germany-a-908614.html"&gt;realize that it may &lt;/a&gt;&lt;a href="http://www.spiegel.de/international/europe/eu-officials-furious-at-nsa-spying-in-brussels-and-germany-a-908614.html"&gt;be &lt;/a&gt;&lt;a href="http://www.spiegel.de/international/europe/eu-officials-furious-at-nsa-spying-in-brussels-and-germany-a-908614.html"&gt;problematic&lt;/a&gt; to negotiate free trade agreements with someone who is reading your internal briefings and mails and is listening to your phone calls, it is not so much out of a shock that the US is doing this in general. They know the US is not shy to use force at any level to obtain results. It&amp;#8217;s about the fact they&amp;#8217;re using these methods universally, no matter who you are. That they were &lt;a href="http://www.zerohedge.com/news/2013-06-09/which-we-learn-cia-was-instrumental-breaking-swiss-bank-secrecy-code"&gt;willing to do so against Switzerland&lt;/a&gt;, a country in the heart of Europe, should have demonstrated that aptly. Only that in this particular case, EU politicians were hoping to ride on the &lt;a href="http://www.spiegel.de/international/europe/banking-secrecy-germany-s-wild-west-tone-angers-the-swiss-a-613990.html"&gt;coat-tails of the US cavalry&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;International Organizations&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Of course that surprise also betrays the level of collaboration that has been present for a long time. The reason they thought they were part of the home team is that in some cases, they were. So when they were the benefactors of this system as they worked side by side with the United States at the Intergovernmental Organizations to put in place the global power structures that rule the world, this sort of advantage might have seemed very handy and very welcome. Not too many questions were asked, I presume.&lt;/p&gt;
&lt;p&gt;But if you&amp;#8217;re one of the countries in transition, a country from the developing world, or simply a country that got on the wrong sides of the United States and their power block, you now have to wonder: How much worse are you off for having been pushed back in negotiation much further than if the “Northern” power block had not known all your internal assessments, plans and contingencies? And how can Intergovernmental Organizations truly function if all your communications with these organizations are unilaterally transparent to this power block?&lt;/p&gt;
&lt;p&gt;It&amp;#8217;s time to understand that imbalance, and address it. I know that several countries are aware of this, of course, and some of them are actively seeking ways to address that strategic disadvantage, since parts of our &lt;a href="http://kolabsys.com/news/kolab-systems-wins-dreamlab-technologies-new-investor"&gt;company group&lt;/a&gt; have been involved in that. But too many countries do not yet seem to have the appropriate measures in place, nor are they addressing it with sufficient resource and urgency, perhaps out of a underestimation of the analytic capabilities.&lt;/p&gt;
&lt;p&gt;The PRISM leaks should have been the wakeup call for these countries. But I&amp;#8217;d also expect them to raise their concerns at the Intergovernmental Organizations, asking the secretariats how the IT and communications strategy of these organizations adequately protects the mandate of the organizations, for they can only function if a certain minimum level of confidence can be placed into them and the integrity of their work flow.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Global Powerstructures&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;But on a more abstract level, all of this once more establishes a trend of the United States as the secret world government. Because it is for the US government to decide which countries to bless with access to that information, and whose information to access. Cooperate and be rewarded. Be defiant and be punished. For example by ensuring your national business champion does not get that deal since we might just employ our information to ensure our competing US business &lt;a href="http://news.bbc.co.uk/2/hi/europe/820758.stm"&gt;will.&lt;/a&gt;. This establishes a gravitation towards pleasing the interests of the United States that I find problematic. As I would find a similar imbalance towards any other nation.&lt;/p&gt;
&lt;p&gt;But in this case it is the United States that has moved to &amp;#8220;economic policy by spook&amp;#8221; as a good friend recently called it. Although of course there may be other countries doing the same, as right now it seems more or less confirmed this is at least in part &lt;a href="http://gigaom.com/2013/07/18/are-there-really-two-prisms-or-just-one-prism-with-nato-involvement/"&gt;collusion at NATO level&lt;/a&gt;. Be that as it may, countries need to understand that their sovereignty and economic well-being is highly dependent upon the ability to protect your own information and that of your economy.&lt;/p&gt;
&lt;p&gt;Which is why Brazil and India probably feel confirmed in their focus on strategic independence. With the high dependency of virtually any economic sector, Information Technology has become as fundamental as electricity, roads or water. Perhaps it is time to re-assess to which level governments want to ensure an independent, stable supply that holds up to the demands of their nation.&lt;/p&gt;
&lt;p&gt;Estonias president &lt;a href="http://www.zdnet.com/after-prism-europe-has-to-move-to-its-own-clouds-says-estonias-president-7000018048/"&gt;recently suggested&lt;/a&gt; to establish European cloud providers, other areas of the world may want to pay close attention to this.&lt;/p&gt;
&lt;h3&gt;The Opportunity Exists, Does The Will?&lt;/h3&gt;
&lt;p&gt;Let&amp;#8217;s say a nation wanted to address these issues. Imagine they had to engineer the entire stack of software. The prospects would be daunting.&lt;/p&gt;
&lt;p&gt;Fortunately they don&amp;#8217;t have to. Nothing runs your data centres and infrastructures better, and with higher security than Free Software does. Our community has been building these tools for a long time now, and they have the potential to serve as the big equalizer in the global IT power struggle. The UNCTAD &lt;a href="http://unctad.org/en/Pages/Publications/InformationEconomyReportSeries.aspx"&gt;Information Economy Reports&lt;/a&gt; provide some excellent fact based, neutral analysis of the impact of software freedom on economies around the world.&lt;/p&gt;
&lt;p&gt;Countries stand to gain or lose a lot in this central question. Open Source may have been the answer all along, but PRISM highlighted the need is both real and urgent.&lt;/p&gt;
&lt;p&gt;Any government should be able to answer the following question: &lt;strong&gt;What is your policy on a sovereign software supply and digital infrastructure?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If that question cannot be answered, it&amp;#8217;s time to get to work. And soon.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;All articles:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href="https://blogs.fsfe.org/greve/?p=553"&gt;[ Part 1: Welcome to the Post-PRISM Society ]&lt;/a&gt; - The primer&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;strong&gt;&lt;a href="https://blogs.fsfe.org/greve/?p=568"&gt;[ Part 2: Totaliatarian Clouds ]&lt;/a&gt; - The social implications&lt;/strong&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href="https://blogs.fsfe.org/greve/?p=573"&gt;[ Part 3: No More Business Secrets]&lt;/a&gt; - The business impact&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
</description>
      <content:encoded>&lt;p&gt;Following the disclosures about details on how the United States and other countries are monitoring the world there has been a global discussion about this subject that&amp;#8217;s been long overdue. In previous articles I tried to put together what &lt;a href="https://blogs.fsfe.org/greve/?p=553"&gt;actually has been proven&lt;/a&gt; thus far, what that &lt;a href="https://blogs.fsfe.org/greve/?p=568"&gt;means for society&lt;/a&gt;, and what are the &lt;a href="https://blogs.fsfe.org/greve/?p=573"&gt;implications for businesses&lt;/a&gt; around the world.&lt;/p&gt;
&lt;p&gt;Now I&amp;#8217;d like to take a look at governments. Firstly, of course governments have a functional aspect not entirely unlike business, and of course governments should be conscious about the society and values they promote. Purely on these grounds it would likely be possible to say quite a few things about the post PRISM society.&lt;/p&gt;
&lt;p&gt;Secondly, there is of course also the question to which extent governments have known about this previously and may even have colluded with what has been going on – in some cases possibly without democratic support for doing so. It has been pointed by quite a few journalists that “I had no idea” amounts to saying you have not been following technical progress since the typewriter was invented, and there is some truth to that. Although typewriters have also known to be &lt;a href="http://matthewaid.tumblr.com/post/31579150245/soviet-cold-war-tapping-of-the-us-embassy-in-moscow-a"&gt;bugged&lt;/a&gt;, of course.&lt;/p&gt;
&lt;p&gt;In fact when spending so much time at the United Nations, one of the typical sights would be a diplomat talking on their mobile phone while covering their mouth with one hand in order to ward off the possibility of lip readers. So there is clearly an understanding that trying to know more about anyone you may have common or opposing interests with will give you an advantage, and that everyone is trying to gain that advantage to the best of their ability.&lt;/p&gt;
&lt;p&gt;What I think is really at play here are two different things: Having been blind-sided by the actual threat, and having been found naïve.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Defending against bunnies, turning your back on lions&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Smart politicians will now have understood their threat model has been totally off. It&amp;#8217;s much easier to intercept that mobile phone call (and get both sides of the conversation) than it is to learn to lip read, guarantee to speak the same language and try and make sure you have line of sight. In other words: They were spending lots of effort protecting the wrong things while ignoring the right things. So there is no way for them to know how vulnerable they have been, what damage arose from that, and what will follow from that for their future work.&lt;/p&gt;
&lt;p&gt;So intelligent people should now be very worried, indeed. Because either they did not know better, or perhaps even let a sense of herd safety drag them along into behaviour that has compromised their professional integrity in so far as it may have exposed their internal thoughts to people they did not want to share them with. If you&amp;#8217;ve ever seen how international treaties are being negotiated it does not take a whole lot of fantasy to imagine how this might be a problem. Given the levels of secrecy and apparent lack of supervision if highest level politicians truly had no idea, there is also a major concern about possible abuse of the system to influence the political balance within a country by those in government.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Politicians are also romantic&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The other part of the surprise seems to stem from a certain romantic notion of friendship among nations harboured by many politicians and deliberately nurtured by nations that do not share such romantic perspectives, most importantly in this context the United States.&lt;/p&gt;
&lt;p&gt;The allies of the United States, in particular also the European Union know that the US has these capabilities and is not afraid to use them to gain an advantage for the home team. But for some reason they thought they were part of that home team because the United States have been telling them they&amp;#8217;re best friends forever. It does not lack a certain irony that Germany fell for this, not realizing that the United States are following their default approach abroad, which is commonly referred to as &lt;a href="https://en.wikipedia.org/wiki/Realpolitik"&gt;Realpolitik&lt;/a&gt; in the US.&lt;/p&gt;
&lt;p&gt;So when European politicians suddenly &lt;a href="http://www.spiegel.de/international/europe/eu-officials-furious-at-nsa-spying-in-brussels-and-germany-a-908614.html"&gt;realize that it may &lt;/a&gt;&lt;a href="http://www.spiegel.de/international/europe/eu-officials-furious-at-nsa-spying-in-brussels-and-germany-a-908614.html"&gt;be &lt;/a&gt;&lt;a href="http://www.spiegel.de/international/europe/eu-officials-furious-at-nsa-spying-in-brussels-and-germany-a-908614.html"&gt;problematic&lt;/a&gt; to negotiate free trade agreements with someone who is reading your internal briefings and mails and is listening to your phone calls, it is not so much out of a shock that the US is doing this in general. They know the US is not shy to use force at any level to obtain results. It&amp;#8217;s about the fact they&amp;#8217;re using these methods universally, no matter who you are. That they were &lt;a href="http://www.zerohedge.com/news/2013-06-09/which-we-learn-cia-was-instrumental-breaking-swiss-bank-secrecy-code"&gt;willing to do so against Switzerland&lt;/a&gt;, a country in the heart of Europe, should have demonstrated that aptly. Only that in this particular case, EU politicians were hoping to ride on the &lt;a href="http://www.spiegel.de/international/europe/banking-secrecy-germany-s-wild-west-tone-angers-the-swiss-a-613990.html"&gt;coat-tails of the US cavalry&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;International Organizations&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Of course that surprise also betrays the level of collaboration that has been present for a long time. The reason they thought they were part of the home team is that in some cases, they were. So when they were the benefactors of this system as they worked side by side with the United States at the Intergovernmental Organizations to put in place the global power structures that rule the world, this sort of advantage might have seemed very handy and very welcome. Not too many questions were asked, I presume.&lt;/p&gt;
&lt;p&gt;But if you&amp;#8217;re one of the countries in transition, a country from the developing world, or simply a country that got on the wrong sides of the United States and their power block, you now have to wonder: How much worse are you off for having been pushed back in negotiation much further than if the “Northern” power block had not known all your internal assessments, plans and contingencies? And how can Intergovernmental Organizations truly function if all your communications with these organizations are unilaterally transparent to this power block?&lt;/p&gt;
&lt;p&gt;It&amp;#8217;s time to understand that imbalance, and address it. I know that several countries are aware of this, of course, and some of them are actively seeking ways to address that strategic disadvantage, since parts of our &lt;a href="http://kolabsys.com/news/kolab-systems-wins-dreamlab-technologies-new-investor"&gt;company group&lt;/a&gt; have been involved in that. But too many countries do not yet seem to have the appropriate measures in place, nor are they addressing it with sufficient resource and urgency, perhaps out of a underestimation of the analytic capabilities.&lt;/p&gt;
&lt;p&gt;The PRISM leaks should have been the wakeup call for these countries. But I&amp;#8217;d also expect them to raise their concerns at the Intergovernmental Organizations, asking the secretariats how the IT and communications strategy of these organizations adequately protects the mandate of the organizations, for they can only function if a certain minimum level of confidence can be placed into them and the integrity of their work flow.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Global Powerstructures&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;But on a more abstract level, all of this once more establishes a trend of the United States as the secret world government. Because it is for the US government to decide which countries to bless with access to that information, and whose information to access. Cooperate and be rewarded. Be defiant and be punished. For example by ensuring your national business champion does not get that deal since we might just employ our information to ensure our competing US business &lt;a href="http://news.bbc.co.uk/2/hi/europe/820758.stm"&gt;will.&lt;/a&gt;. This establishes a gravitation towards pleasing the interests of the United States that I find problematic. As I would find a similar imbalance towards any other nation.&lt;/p&gt;
&lt;p&gt;But in this case it is the United States that has moved to &amp;#8220;economic policy by spook&amp;#8221; as a good friend recently called it. Although of course there may be other countries doing the same, as right now it seems more or less confirmed this is at least in part &lt;a href="http://gigaom.com/2013/07/18/are-there-really-two-prisms-or-just-one-prism-with-nato-involvement/"&gt;collusion at NATO level&lt;/a&gt;. Be that as it may, countries need to understand that their sovereignty and economic well-being is highly dependent upon the ability to protect your own information and that of your economy.&lt;/p&gt;
&lt;p&gt;Which is why Brazil and India probably feel confirmed in their focus on strategic independence. With the high dependency of virtually any economic sector, Information Technology has become as fundamental as electricity, roads or water. Perhaps it is time to re-assess to which level governments want to ensure an independent, stable supply that holds up to the demands of their nation.&lt;/p&gt;
&lt;p&gt;Estonias president &lt;a href="http://www.zdnet.com/after-prism-europe-has-to-move-to-its-own-clouds-says-estonias-president-7000018048/"&gt;recently suggested&lt;/a&gt; to establish European cloud providers, other areas of the world may want to pay close attention to this.&lt;/p&gt;
&lt;h3&gt;The Opportunity Exists, Does The Will?&lt;/h3&gt;
&lt;p&gt;Let&amp;#8217;s say a nation wanted to address these issues. Imagine they had to engineer the entire stack of software. The prospects would be daunting.&lt;/p&gt;
&lt;p&gt;Fortunately they don&amp;#8217;t have to. Nothing runs your data centres and infrastructures better, and with higher security than Free Software does. Our community has been building these tools for a long time now, and they have the potential to serve as the big equalizer in the global IT power struggle. The UNCTAD &lt;a href="http://unctad.org/en/Pages/Publications/InformationEconomyReportSeries.aspx"&gt;Information Economy Reports&lt;/a&gt; provide some excellent fact based, neutral analysis of the impact of software freedom on economies around the world.&lt;/p&gt;
&lt;p&gt;Countries stand to gain or lose a lot in this central question. Open Source may have been the answer all along, but PRISM highlighted the need is both real and urgent.&lt;/p&gt;
&lt;p&gt;Any government should be able to answer the following question: &lt;strong&gt;What is your policy on a sovereign software supply and digital infrastructure?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If that question cannot be answered, it&amp;#8217;s time to get to work. And soon.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;All articles:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href="https://blogs.fsfe.org/greve/?p=553"&gt;[ Part 1: Welcome to the Post-PRISM Society ]&lt;/a&gt; - The primer&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;strong&gt;&lt;a href="https://blogs.fsfe.org/greve/?p=568"&gt;[ Part 2: Totaliatarian Clouds ]&lt;/a&gt; - The social implications&lt;/strong&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href="https://blogs.fsfe.org/greve/?p=573"&gt;[ Part 3: No More Business Secrets]&lt;/a&gt; - The business impact&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
</content:encoded>
    </item>
    <item>
      <title>Life post-PRISM: No More Business Secrets</title>
      <link>http://blogs.fsfe.org/greve/?p=573</link>
      <source url="http://www.fsfe.org/en/fellows/greve/freedom_bits">freedom bits</source>
      <guid isPermaLink="false">urn:uuid:b5c3e0ae-2af8-2626-c82c-3a485217af9f</guid>
      <pubDate>Wed, 10 Jul 2013 18:30:18 +0000</pubDate>
      <description>&lt;p&gt;After a primer on the realities of today&amp;#8217;s world, and the totalitarian tendencies that follow from this environment and our behaviour in it, let&amp;#8217;s take a look at what this means for professional use of information technology.&lt;/p&gt; &lt;p&gt;Firstly, it should be obvious that when you use the cloud services of a company, you have no [...] &lt;p&gt;After a primer on the &lt;a href="https://blogs.fsfe.org/greve/?p=553"&gt;realities of today&amp;#8217;s world&lt;/a&gt;, and the &lt;a href="http://blogs.fsfe.org/greve/?p=568"&gt;totalitarian tendencies that follow&lt;/a&gt; from this environment and our behaviour in it, let&amp;#8217;s take a look at what this means for professional use of information technology.&lt;/p&gt;
&lt;p&gt;Firstly, it should be obvious that when you use the cloud services of a company, you have no secrets from that company other than the ones this company guarantees you to keep. That promise is good up to the level of guarantee that such a company can make due to the legal environment it is situated in and of course subject to the level of trust you can place into the people running and owning the company.&lt;/p&gt;
&lt;p&gt;So when using Google Apps for your business, you have no secrets from Google. Same for Office 365 and Microsoft. iCloud and Apple. Also, these companies are known for having very good internal data analytics. Google for instance has been using &lt;a href="///home/greve/KolabSystems/Drafting/algorithms%20to%20identify%20employees%20that%20are%20about%20to%20leave"&gt;algorithms to identify employees that are about to leave&lt;/a&gt; in order to make them a better offer to keep them on board. Naturally that same algorithm could be used to identify which of your better employees might be susceptible to being head hunted.&lt;/p&gt;
&lt;p&gt;Of course no-one will ever know whether that actually took place or whether it contributed to your company losing that important employee to Google. But the simple truth is: In some ways, Google/Microsoft/Apple is likely to know a lot more about your business than you do yourself. That knowledge has value, and it may be tempting to turn that value into shareholder value for either of these businesses.&lt;/p&gt;
&lt;p&gt;If you are a US business, or a small, local business elsewhere that may not be an issue.&lt;/p&gt;
&lt;p&gt;But if you are into software, or have more than regional reach, it may become a major concern. Because thanks to what we &lt;a href="https://blogs.fsfe.org/greve/?p=553"&gt;now know about PRISM&lt;/a&gt;, your using these services means the US intelligence services also have real-time access to your business and its development. And since FISA explicitly empowers these services to make use of those capabilities for the general interests of the United States – including foreign policy and economic goals – the conclusion is simple: You might just be handing your internal business information to people who are champions for your competition.&lt;/p&gt;
&lt;p&gt;Your only protection is your own lack of success. And you might be right, you might be too small for them to use too many resources, because while their input bandwidth is almost unlimited, their output bandwidth for acting upon it of course has limits. But that&amp;#8217;s about it.&lt;/p&gt;
&lt;p&gt;The US has a long tradition of putting their public services at the disposal of industry, trying to promote their “tax paying home team.” It&amp;#8217;s a cultural misunderstanding to assume they would be pulling their punches just because you like to watch Hollywood movies and sympathise with the American Dream.&lt;/p&gt;
&lt;p&gt;Which is why the US has been active to &lt;a href="http://www.guardian.co.uk/world/2011/jan/03/wikileaks-us-eu-gm-crops"&gt;promote GM crops in Europe&lt;/a&gt;, or uphold the interests of &lt;a href="http://mondediplo.com/openpage/looking-at-wikileaks-cables-on-pharmaceutical"&gt;their pharmaceutical industry&lt;/a&gt;. Is &lt;a href="http://googleenterprise.blogspot.ch/2012/02/roche-group-goes-google.html"&gt;anyone at Roche&lt;/a&gt; reading this? No shareholder is concerned about this? To me it would seem like a good example of what risks are unwittingly taken when you let the CFO manage the IT strategy. Those two professions rarely mix, in my experience.&lt;/p&gt;
&lt;p&gt;The United States are not the only nation in the world doing this, of course. Almost every nation has at least a small agency trying to support its own industry in building international business, and the German chancellor typically has a whole entourage of industry representatives when she&amp;#8217;s visiting countries that are markets of interests. I guess it&amp;#8217;s a tribute to their honesty that the United States made it explicit for its intelligence services to feed into this system in this way.&lt;/p&gt;
&lt;p&gt;Several other countries are likely to do the same, but probably not as successfully or aggressively.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Old school on site IT as the solution?&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Some people may now feel fairly smart they did not jump on the Public Cloud bandwagon. Only that not all of them are as secure as they think they are. Because we also learned that access to data is not only happening through the public clouds. Some software vendors, most importantly Microsoft, are also &lt;a href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;supplying the NSA with priority access&lt;/a&gt; to vulnerabilities in their software. Likely they will do their best to manage the pipe of disclosure and resolution in a way that there is always at least one way for the NSA to get into your locally installed system in an automated fashion that is currently not publicly known.&lt;/p&gt;
&lt;p&gt;This would also explain the ongoing debate about the “&lt;a href="http://www.heise.de/tp/artikel/5/5263/1.html"&gt;NSA back door in Windows&lt;/a&gt;” which were always denied, but the denial could have been carefully concealing this alternative way of achieving the same effect. So running your local installation of Windows is likely a little better for your business secrets than using public cloud services by US businesses, but not as much as you might want to believe. But it&amp;#8217;s not just Windows, of course, Lotus has been called out on the same practice a long time ago, and one may wonder whether the other software vendors avoided doing it, or simply avoided being caught.&lt;/p&gt;
&lt;p&gt;Given the discussions among three-letter agencies about wanting that level of access into any software and service originating in the United States, and provided the evident lack of public disclosure in this area, a rather large question mark remains. So on-site IT is not necessarily the solution, unless it is done to certain standards. In all honesty, most installations probably do not meet those at the moment.  And the cost associated with doing it properly may be considered excessive for your situation.&lt;/p&gt;
&lt;p&gt;So it&amp;#8217;s not as simple and not a black and white decision between &amp;#8220;all on-site self-run&amp;#8221; and &amp;#8220;all in public cloud by US business&amp;#8221;. There is a whole range of options in between that provide different advantages, disadvantages, costs and risks.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Weighing the risks&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;So whatever you do: There is always a risk analysis involved.&lt;/p&gt;
&lt;p&gt;All businesses take risks based on educated guesses and sometimes even instinct. And they need to weigh cost against benefit. The perfect solution is rarely obtained, typically because it is excessively costly, so often businesses stick with “what works.” And their IT is no different in that regard.&lt;/p&gt;
&lt;p&gt;It is a valid decision to say you&amp;#8217;re not concerned about business secrets leaking, or consider the likely damage smaller than the risk of running a poorly secured IT under your own control either directly or through a third party. And the additional cost of running that kind of installation well does not seem justified in comparison to what you gain. So you go to a more trustworthy local provider that runs your installation on Open Source and Open Standards. Or you use the services of a large US public cloud vendor. It&amp;#8217;s your call to make.&lt;/p&gt;
&lt;p&gt;But I would argue this call should always be made consciously, in full knowledge of all risks and implications. And truth is that in too many cases people did not take this into account, it was more convenient to ignore and dismiss as unproven speculation . Only that it&amp;#8217;s only speculation as long as it hasn&amp;#8217;t been proven. So virtually any business right now should be re-evaluating its IT strategy to see what risks and benefits are associated with their current strategy, and whether another strategy might provide a more adequate approach.&lt;/p&gt;
&lt;p&gt;And when that evaluation is done, I would suggest to look at the Total Cost of Operations (TCO). But not in an overly simplistic way, because most often the calculation is skewed in favour of proprietary lock-in. So always make sure to factor in cost of decommissioning the solution you are about to introduce. And the TCO isn&amp;#8217;t everything.&lt;/p&gt;
&lt;p&gt;IT is not just a cost, there is a benefit. All too often two alternatives are compared purely on the grounds of their cost. So more often than not the slightly cheaper solution will be chosen despite offering dramatically fewer benefits and a poor strategic outlook. And a year later you find out that it actually wasn&amp;#8217;t cheaper, at all, because of hidden costs. And that you would have needed the benefits of the other solution. And that you&amp;#8217;re in a strategic dead-end.&lt;/p&gt;
&lt;p&gt;So I would always advocate to also take into account the benefits, both in things you require right now, and in things that you might be able to achieve in the future. For lack of a common terminology, let&amp;#8217;s call this the Option Value Generated (OVG) for your business, both in gained productivity, as well as innovative potential. And then there is what I now conveniently name the Customer Confidence Impact (CCI) of both your ability to devise an efficient IT strategy, as well as how you handle &lt;strong&gt;their business, data and trust&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;After all is said and done, you might still want to run US technology. And you might still want to use a public cloud service. If you do, be transparent about it, so your customers can choose whether or not they agree to that usage by being in business with you. Because some people are likely to take offence due to the &lt;a href="http://blogs.fsfe.org/greve/?p=568"&gt;social implications and ownership of their own data&lt;/a&gt;. In other words: Make sure those who communicate with you and use your services know where that data ends up.&lt;/p&gt;
&lt;p&gt;This may not be a problem for your business and your customers. They may consider this entirely acceptable, and that is fine. Being able to make that call is part of what it means to have freedom to try out business approaches and strategies.&lt;/p&gt;
&lt;p&gt;But if you do not communicate your usage of this service, be aware of the risks you might be incurring. The potential impact for customer confidence and public image for having misled your business associates and customers is dramatic. Just look at the level of coverage PRISM is getting and you&amp;#8217;ll get an idea.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;The door is wide open&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;When reviewing your strategy, keep in mind that you may require some level of ability to adapt to a changed world in the future. Nothing guarantees that better than Open Source and Open Standards. So if you have ignored this debate throughout the past years, now would be the time to take a look at the strategic reasons for the adoption of Free Software. Most importantly &lt;strong&gt;transparency, security, control, ability to innovate&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;While the past ten years most of the debate has been around how Open Source can provide more efficient IT at better price for many people, PRISM has demonstrated that the strategic values of Free Software were spot on and are providing benefits for professional use of IT that proprietary software cannot hope to match.&lt;/p&gt;
&lt;p&gt;Simultaneously the past 20 years have seen a dramatic growth of professional services in the area. Because benefits are nice in theory, but if they cannot be made use of because the support network is missing, they won&amp;#8217;t reach the average business.&lt;/p&gt;
&lt;p&gt;In fact, in the spirit of full disclosure, I speak of personal experience in this regard. Since 2009 I dedicated myself to building up such a business: &lt;a href="http://kolabsys.com/"&gt;Kolab Systems&lt;/a&gt; is an Open Source ISV for the &lt;a href="http://www.kolab.org/"&gt;Kolab Groupware Solution&lt;/a&gt;. We built this company because Kolab had a typical Open Source problem. Excellent concepts and technology, but a gap in professional support in services to allow wide adoption and use of that technology. That&amp;#8217;s been fixed. We now provide support for on-site hosting as well as Kolab as a service through &lt;a href="https://mykolab.com/"&gt;MyKolab.com&lt;/a&gt;. We even &lt;a href="http://kolabsys.com/news/kolab-systems-wins-dreamlab-technologies-new-investor"&gt;structured our corporate group&lt;/a&gt; to be able to take care of high security requirements in a verifiable way.&lt;/p&gt;
&lt;p&gt;But we are of course not the only business that has built its business around combining the advantages of software freedom with professional services for its customers. There are so many businesses working on this that it would be impossible to list them all. And they provide services for customers of all sizes – up to the very largest businesses and governments of this world.&lt;/p&gt;
&lt;p&gt;So the concerns are real, as are the advantages. And there is a plethora of professional services at your disposal to make use of the advantages and address the concerns.&lt;/p&gt;
&lt;p&gt;The only question is whether you will make use of them.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;All articles:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href="https://blogs.fsfe.org/greve/?p=553"&gt;[ Part 1: Welcome to the Post-PRISM Society ]&lt;/a&gt; - The primer&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href="https://blogs.fsfe.org/greve/?p=568"&gt;[ Part 2: Totaliatarian Clouds ]&lt;/a&gt; - The social implications&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
</description>
      <content:encoded>&lt;p&gt;After a primer on the &lt;a href="https://blogs.fsfe.org/greve/?p=553"&gt;realities of today&amp;#8217;s world&lt;/a&gt;, and the &lt;a href="http://blogs.fsfe.org/greve/?p=568"&gt;totalitarian tendencies that follow&lt;/a&gt; from this environment and our behaviour in it, let&amp;#8217;s take a look at what this means for professional use of information technology.&lt;/p&gt;
&lt;p&gt;Firstly, it should be obvious that when you use the cloud services of a company, you have no secrets from that company other than the ones this company guarantees you to keep. That promise is good up to the level of guarantee that such a company can make due to the legal environment it is situated in and of course subject to the level of trust you can place into the people running and owning the company.&lt;/p&gt;
&lt;p&gt;So when using Google Apps for your business, you have no secrets from Google. Same for Office 365 and Microsoft. iCloud and Apple. Also, these companies are known for having very good internal data analytics. Google for instance has been using &lt;a href="///home/greve/KolabSystems/Drafting/algorithms%20to%20identify%20employees%20that%20are%20about%20to%20leave"&gt;algorithms to identify employees that are about to leave&lt;/a&gt; in order to make them a better offer to keep them on board. Naturally that same algorithm could be used to identify which of your better employees might be susceptible to being head hunted.&lt;/p&gt;
&lt;p&gt;Of course no-one will ever know whether that actually took place or whether it contributed to your company losing that important employee to Google. But the simple truth is: In some ways, Google/Microsoft/Apple is likely to know a lot more about your business than you do yourself. That knowledge has value, and it may be tempting to turn that value into shareholder value for either of these businesses.&lt;/p&gt;
&lt;p&gt;If you are a US business, or a small, local business elsewhere that may not be an issue.&lt;/p&gt;
&lt;p&gt;But if you are into software, or have more than regional reach, it may become a major concern. Because thanks to what we &lt;a href="https://blogs.fsfe.org/greve/?p=553"&gt;now know about PRISM&lt;/a&gt;, your using these services means the US intelligence services also have real-time access to your business and its development. And since FISA explicitly empowers these services to make use of those capabilities for the general interests of the United States – including foreign policy and economic goals – the conclusion is simple: You might just be handing your internal business information to people who are champions for your competition.&lt;/p&gt;
&lt;p&gt;Your only protection is your own lack of success. And you might be right, you might be too small for them to use too many resources, because while their input bandwidth is almost unlimited, their output bandwidth for acting upon it of course has limits. But that&amp;#8217;s about it.&lt;/p&gt;
&lt;p&gt;The US has a long tradition of putting their public services at the disposal of industry, trying to promote their “tax paying home team.” It&amp;#8217;s a cultural misunderstanding to assume they would be pulling their punches just because you like to watch Hollywood movies and sympathise with the American Dream.&lt;/p&gt;
&lt;p&gt;Which is why the US has been active to &lt;a href="http://www.guardian.co.uk/world/2011/jan/03/wikileaks-us-eu-gm-crops"&gt;promote GM crops in Europe&lt;/a&gt;, or uphold the interests of &lt;a href="http://mondediplo.com/openpage/looking-at-wikileaks-cables-on-pharmaceutical"&gt;their pharmaceutical industry&lt;/a&gt;. Is &lt;a href="http://googleenterprise.blogspot.ch/2012/02/roche-group-goes-google.html"&gt;anyone at Roche&lt;/a&gt; reading this? No shareholder is concerned about this? To me it would seem like a good example of what risks are unwittingly taken when you let the CFO manage the IT strategy. Those two professions rarely mix, in my experience.&lt;/p&gt;
&lt;p&gt;The United States are not the only nation in the world doing this, of course. Almost every nation has at least a small agency trying to support its own industry in building international business, and the German chancellor typically has a whole entourage of industry representatives when she&amp;#8217;s visiting countries that are markets of interests. I guess it&amp;#8217;s a tribute to their honesty that the United States made it explicit for its intelligence services to feed into this system in this way.&lt;/p&gt;
&lt;p&gt;Several other countries are likely to do the same, but probably not as successfully or aggressively.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Old school on site IT as the solution?&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Some people may now feel fairly smart they did not jump on the Public Cloud bandwagon. Only that not all of them are as secure as they think they are. Because we also learned that access to data is not only happening through the public clouds. Some software vendors, most importantly Microsoft, are also &lt;a href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;supplying the NSA with priority access&lt;/a&gt; to vulnerabilities in their software. Likely they will do their best to manage the pipe of disclosure and resolution in a way that there is always at least one way for the NSA to get into your locally installed system in an automated fashion that is currently not publicly known.&lt;/p&gt;
&lt;p&gt;This would also explain the ongoing debate about the “&lt;a href="http://www.heise.de/tp/artikel/5/5263/1.html"&gt;NSA back door in Windows&lt;/a&gt;” which were always denied, but the denial could have been carefully concealing this alternative way of achieving the same effect. So running your local installation of Windows is likely a little better for your business secrets than using public cloud services by US businesses, but not as much as you might want to believe. But it&amp;#8217;s not just Windows, of course, Lotus has been called out on the same practice a long time ago, and one may wonder whether the other software vendors avoided doing it, or simply avoided being caught.&lt;/p&gt;
&lt;p&gt;Given the discussions among three-letter agencies about wanting that level of access into any software and service originating in the United States, and provided the evident lack of public disclosure in this area, a rather large question mark remains. So on-site IT is not necessarily the solution, unless it is done to certain standards. In all honesty, most installations probably do not meet those at the moment.  And the cost associated with doing it properly may be considered excessive for your situation.&lt;/p&gt;
&lt;p&gt;So it&amp;#8217;s not as simple and not a black and white decision between &amp;#8220;all on-site self-run&amp;#8221; and &amp;#8220;all in public cloud by US business&amp;#8221;. There is a whole range of options in between that provide different advantages, disadvantages, costs and risks.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Weighing the risks&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;So whatever you do: There is always a risk analysis involved.&lt;/p&gt;
&lt;p&gt;All businesses take risks based on educated guesses and sometimes even instinct. And they need to weigh cost against benefit. The perfect solution is rarely obtained, typically because it is excessively costly, so often businesses stick with “what works.” And their IT is no different in that regard.&lt;/p&gt;
&lt;p&gt;It is a valid decision to say you&amp;#8217;re not concerned about business secrets leaking, or consider the likely damage smaller than the risk of running a poorly secured IT under your own control either directly or through a third party. And the additional cost of running that kind of installation well does not seem justified in comparison to what you gain. So you go to a more trustworthy local provider that runs your installation on Open Source and Open Standards. Or you use the services of a large US public cloud vendor. It&amp;#8217;s your call to make.&lt;/p&gt;
&lt;p&gt;But I would argue this call should always be made consciously, in full knowledge of all risks and implications. And truth is that in too many cases people did not take this into account, it was more convenient to ignore and dismiss as unproven speculation . Only that it&amp;#8217;s only speculation as long as it hasn&amp;#8217;t been proven. So virtually any business right now should be re-evaluating its IT strategy to see what risks and benefits are associated with their current strategy, and whether another strategy might provide a more adequate approach.&lt;/p&gt;
&lt;p&gt;And when that evaluation is done, I would suggest to look at the Total Cost of Operations (TCO). But not in an overly simplistic way, because most often the calculation is skewed in favour of proprietary lock-in. So always make sure to factor in cost of decommissioning the solution you are about to introduce. And the TCO isn&amp;#8217;t everything.&lt;/p&gt;
&lt;p&gt;IT is not just a cost, there is a benefit. All too often two alternatives are compared purely on the grounds of their cost. So more often than not the slightly cheaper solution will be chosen despite offering dramatically fewer benefits and a poor strategic outlook. And a year later you find out that it actually wasn&amp;#8217;t cheaper, at all, because of hidden costs. And that you would have needed the benefits of the other solution. And that you&amp;#8217;re in a strategic dead-end.&lt;/p&gt;
&lt;p&gt;So I would always advocate to also take into account the benefits, both in things you require right now, and in things that you might be able to achieve in the future. For lack of a common terminology, let&amp;#8217;s call this the Option Value Generated (OVG) for your business, both in gained productivity, as well as innovative potential. And then there is what I now conveniently name the Customer Confidence Impact (CCI) of both your ability to devise an efficient IT strategy, as well as how you handle &lt;strong&gt;their business, data and trust&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;After all is said and done, you might still want to run US technology. And you might still want to use a public cloud service. If you do, be transparent about it, so your customers can choose whether or not they agree to that usage by being in business with you. Because some people are likely to take offence due to the &lt;a href="http://blogs.fsfe.org/greve/?p=568"&gt;social implications and ownership of their own data&lt;/a&gt;. In other words: Make sure those who communicate with you and use your services know where that data ends up.&lt;/p&gt;
&lt;p&gt;This may not be a problem for your business and your customers. They may consider this entirely acceptable, and that is fine. Being able to make that call is part of what it means to have freedom to try out business approaches and strategies.&lt;/p&gt;
&lt;p&gt;But if you do not communicate your usage of this service, be aware of the risks you might be incurring. The potential impact for customer confidence and public image for having misled your business associates and customers is dramatic. Just look at the level of coverage PRISM is getting and you&amp;#8217;ll get an idea.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;The door is wide open&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;When reviewing your strategy, keep in mind that you may require some level of ability to adapt to a changed world in the future. Nothing guarantees that better than Open Source and Open Standards. So if you have ignored this debate throughout the past years, now would be the time to take a look at the strategic reasons for the adoption of Free Software. Most importantly &lt;strong&gt;transparency, security, control, ability to innovate&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;While the past ten years most of the debate has been around how Open Source can provide more efficient IT at better price for many people, PRISM has demonstrated that the strategic values of Free Software were spot on and are providing benefits for professional use of IT that proprietary software cannot hope to match.&lt;/p&gt;
&lt;p&gt;Simultaneously the past 20 years have seen a dramatic growth of professional services in the area. Because benefits are nice in theory, but if they cannot be made use of because the support network is missing, they won&amp;#8217;t reach the average business.&lt;/p&gt;
&lt;p&gt;In fact, in the spirit of full disclosure, I speak of personal experience in this regard. Since 2009 I dedicated myself to building up such a business: &lt;a href="http://kolabsys.com/"&gt;Kolab Systems&lt;/a&gt; is an Open Source ISV for the &lt;a href="http://www.kolab.org/"&gt;Kolab Groupware Solution&lt;/a&gt;. We built this company because Kolab had a typical Open Source problem. Excellent concepts and technology, but a gap in professional support in services to allow wide adoption and use of that technology. That&amp;#8217;s been fixed. We now provide support for on-site hosting as well as Kolab as a service through &lt;a href="https://mykolab.com/"&gt;MyKolab.com&lt;/a&gt;. We even &lt;a href="http://kolabsys.com/news/kolab-systems-wins-dreamlab-technologies-new-investor"&gt;structured our corporate group&lt;/a&gt; to be able to take care of high security requirements in a verifiable way.&lt;/p&gt;
&lt;p&gt;But we are of course not the only business that has built its business around combining the advantages of software freedom with professional services for its customers. There are so many businesses working on this that it would be impossible to list them all. And they provide services for customers of all sizes – up to the very largest businesses and governments of this world.&lt;/p&gt;
&lt;p&gt;So the concerns are real, as are the advantages. And there is a plethora of professional services at your disposal to make use of the advantages and address the concerns.&lt;/p&gt;
&lt;p&gt;The only question is whether you will make use of them.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;All articles:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href="https://blogs.fsfe.org/greve/?p=553"&gt;[ Part 1: Welcome to the Post-PRISM Society ]&lt;/a&gt; - The primer&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href="https://blogs.fsfe.org/greve/?p=568"&gt;[ Part 2: Totaliatarian Clouds ]&lt;/a&gt; - The social implications&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
</content:encoded>
    </item>
    <item>
      <title>Downtown Soweto and other places!</title>
      <link>http://www.edwardpopoola.com/2013/03/17/downtown-soweto-and-other-places/</link>
      <source url="http://www.edwardpopoola.com/blog">Jangbalajugbu-Homeland Stories</source>
      <guid isPermaLink="false">urn:uuid:ca808d32-492e-3f1c-2aa6-45ec97cfb941</guid>
      <pubDate>Sun, 17 Mar 2013 21:38:47 +0000</pubDate>
      <description>I visited South Africa  last December and was glad I did. A beautiful city with a rich history of struggle and of hope and eventually, of reconciliation. I didn&amp;#8217;t understand the depth of South Africa&amp;#8217;s diversity until then. South Africa is where you&amp;#8217;d see a white-german-indo-african man. Now that&amp;#8217;s rich. After visiting the Apartheid Museum I came [...] &lt;p&gt;I visited South Africa  last December and was glad I did. A beautiful city with a rich history of struggle and of hope and eventually, of reconciliation. I didn&amp;#8217;t understand the depth of South Africa&amp;#8217;s diversity until then. South Africa is where you&amp;#8217;d see a white-german-indo-african man. Now that&amp;#8217;s rich. After visiting the Apartheid Museum I came to relate with why Mandela had to choose the negotiating table rather than gun against those that stole 27 years of his life. It&amp;#8217;s a complex mix.&lt;/p&gt;
&lt;p&gt;One thing that still baffles me though is why there is still so much &lt;a href="http://en.wikipedia.org/wiki/Xenophobia_in_South_Africa" target="_blank"&gt;Xenophobia in South Africa&lt;/a&gt;. I would think for a country with such a history, they&amp;#8217;d be the world&amp;#8217;s model for tolerance, especially to people of their own skin color. Above all though, SA is a country to visit. It has so much to teach the rest of the world.&lt;/p&gt;
&lt;p&gt;My trip wouldn&amp;#8217;t have been complete if I hadn&amp;#8217;t visited So-we-to!&lt;/p&gt;
&lt;div id="attachment_104" class="wp-caption alignnone" style="width: 626px"&gt;&lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/mh.jpg"&gt;&lt;img class="size-full wp-image-104" alt="Mandela House" src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/mh.jpg" width="616" height="408" /&gt;&lt;/a&gt;&lt;p class="wp-caption-text"&gt;Mandela House&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;&lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/mh2.jpg"&gt;&lt;img class="size-full wp-image-105" alt="Mandela House" src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/mh2.jpg" width="709" height="470" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;dl class="wp-caption alignnone" id="attachment_105" style="width: 719px;"&gt;
&lt;dd class="wp-caption-dd"&gt;Mandela House&lt;/dd&gt;
&lt;/dl&gt;
&lt;p&gt; &lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/wall.jpg"&gt;&lt;img class="size-full wp-image-103" alt="Mandela House " src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/wall.jpg" width="719" height="383" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;div id="attachment_98" class="wp-caption alignnone" style="width: 744px"&gt;&lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/madiba1.jpg"&gt;&lt;img class="size-full wp-image-98" alt="Mandela House Archive" src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/madiba1.jpg" width="734" height="875" /&gt;&lt;/a&gt;&lt;p class="wp-caption-text"&gt;From the Mandela House Archives&lt;/p&gt;&lt;/div&gt;
&lt;div id="attachment_107" class="wp-caption alignnone" style="width: 659px"&gt;&lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/apartheid-museum.jpg"&gt;&lt;img class="size-full wp-image-107" alt="Apartheid Museum" src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/apartheid-museum.jpg" width="649" height="395" /&gt;&lt;/a&gt;&lt;p class="wp-caption-text"&gt;Apartheid Museum&lt;/p&gt;&lt;/div&gt;
&lt;div id="attachment_108" class="wp-caption alignnone" style="width: 739px"&gt;&lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/apartheid-museum2.jpg"&gt;&lt;img class="size-full wp-image-108" alt="Apartheid Classification" src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/apartheid-museum2.jpg" width="729" height="675" /&gt;&lt;/a&gt;&lt;p class="wp-caption-text"&gt;Apartheid Classification&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;&lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/cont_hill.jpg"&gt;&lt;img class="size-full wp-image-97" alt="Reconciliation &amp;amp; Democracy" src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/cont_hill.jpg" width="655" height="989" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;dl class="wp-caption alignnone" id="attachment_97" style="width: 665px;"&gt;
&lt;dd class="wp-caption-dd"&gt;Reconciliation &amp;amp; Democracy&lt;/dd&gt;
&lt;/dl&gt;
&lt;p&gt; &lt;em id="__mceDel"&gt;And San City! (Sun City)&lt;/em&gt;&lt;/p&gt;
&lt;div id="attachment_95" class="wp-caption alignnone" style="width: 664px"&gt;&lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/suncity.jpg"&gt;&lt;img class="size-full wp-image-95" alt="Sun City South Africa" src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/suncity.jpg" width="654" height="433" /&gt;&lt;/a&gt;&lt;p class="wp-caption-text"&gt;Sun City South Africa.&lt;/p&gt;&lt;/div&gt;
&lt;div id="attachment_96" class="wp-caption alignnone" style="width: 610px"&gt;&lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/madiba.jpg"&gt;&lt;img class="size-full wp-image-96" alt="Towering Madiba" src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/madiba.jpg" width="600" height="885" /&gt;&lt;/a&gt;&lt;p class="wp-caption-text"&gt;And the Towering Madiba @ Sandton&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
</description>
      <content:encoded>&lt;p&gt;I visited South Africa  last December and was glad I did. A beautiful city with a rich history of struggle and of hope and eventually, of reconciliation. I didn&amp;#8217;t understand the depth of South Africa&amp;#8217;s diversity until then. South Africa is where you&amp;#8217;d see a white-german-indo-african man. Now that&amp;#8217;s rich. After visiting the Apartheid Museum I came to relate with why Mandela had to choose the negotiating table rather than gun against those that stole 27 years of his life. It&amp;#8217;s a complex mix.&lt;/p&gt;
&lt;p&gt;One thing that still baffles me though is why there is still so much &lt;a href="http://en.wikipedia.org/wiki/Xenophobia_in_South_Africa" target="_blank"&gt;Xenophobia in South Africa&lt;/a&gt;. I would think for a country with such a history, they&amp;#8217;d be the world&amp;#8217;s model for tolerance, especially to people of their own skin color. Above all though, SA is a country to visit. It has so much to teach the rest of the world.&lt;/p&gt;
&lt;p&gt;My trip wouldn&amp;#8217;t have been complete if I hadn&amp;#8217;t visited So-we-to!&lt;/p&gt;
&lt;div id="attachment_104" class="wp-caption alignnone" style="width: 626px"&gt;&lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/mh.jpg"&gt;&lt;img class="size-full wp-image-104" alt="Mandela House" src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/mh.jpg" width="616" height="408" /&gt;&lt;/a&gt;&lt;p class="wp-caption-text"&gt;Mandela House&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;&lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/mh2.jpg"&gt;&lt;img class="size-full wp-image-105" alt="Mandela House" src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/mh2.jpg" width="709" height="470" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;dl class="wp-caption alignnone" id="attachment_105" style="width: 719px;"&gt;
&lt;dd class="wp-caption-dd"&gt;Mandela House&lt;/dd&gt;
&lt;/dl&gt;
&lt;p&gt; &lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/wall.jpg"&gt;&lt;img class="size-full wp-image-103" alt="Mandela House " src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/wall.jpg" width="719" height="383" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;div id="attachment_98" class="wp-caption alignnone" style="width: 744px"&gt;&lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/madiba1.jpg"&gt;&lt;img class="size-full wp-image-98" alt="Mandela House Archive" src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/madiba1.jpg" width="734" height="875" /&gt;&lt;/a&gt;&lt;p class="wp-caption-text"&gt;From the Mandela House Archives&lt;/p&gt;&lt;/div&gt;
&lt;div id="attachment_107" class="wp-caption alignnone" style="width: 659px"&gt;&lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/apartheid-museum.jpg"&gt;&lt;img class="size-full wp-image-107" alt="Apartheid Museum" src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/apartheid-museum.jpg" width="649" height="395" /&gt;&lt;/a&gt;&lt;p class="wp-caption-text"&gt;Apartheid Museum&lt;/p&gt;&lt;/div&gt;
&lt;div id="attachment_108" class="wp-caption alignnone" style="width: 739px"&gt;&lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/apartheid-museum2.jpg"&gt;&lt;img class="size-full wp-image-108" alt="Apartheid Classification" src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/apartheid-museum2.jpg" width="729" height="675" /&gt;&lt;/a&gt;&lt;p class="wp-caption-text"&gt;Apartheid Classification&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;&lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/cont_hill.jpg"&gt;&lt;img class="size-full wp-image-97" alt="Reconciliation &amp;amp; Democracy" src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/cont_hill.jpg" width="655" height="989" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;dl class="wp-caption alignnone" id="attachment_97" style="width: 665px;"&gt;
&lt;dd class="wp-caption-dd"&gt;Reconciliation &amp;amp; Democracy&lt;/dd&gt;
&lt;/dl&gt;
&lt;p&gt; &lt;em id="__mceDel"&gt;And San City! (Sun City)&lt;/em&gt;&lt;/p&gt;
&lt;div id="attachment_95" class="wp-caption alignnone" style="width: 664px"&gt;&lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/suncity.jpg"&gt;&lt;img class="size-full wp-image-95" alt="Sun City South Africa" src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/suncity.jpg" width="654" height="433" /&gt;&lt;/a&gt;&lt;p class="wp-caption-text"&gt;Sun City South Africa.&lt;/p&gt;&lt;/div&gt;
&lt;div id="attachment_96" class="wp-caption alignnone" style="width: 610px"&gt;&lt;a href="http://www.edwardpopoola.com/wp-content/uploads/2013/03/madiba.jpg"&gt;&lt;img class="size-full wp-image-96" alt="Towering Madiba" src="http://www.edwardpopoola.com/wp-content/uploads/2013/03/madiba.jpg" width="600" height="885" /&gt;&lt;/a&gt;&lt;p class="wp-caption-text"&gt;And the Towering Madiba @ Sandton&lt;/p&gt;&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
</content:encoded>
    </item>
    <item>
      <title>Now blogging on my book blog at Consentofthenetworked.com</title>
      <link>https://rconversation.blogs.com/rconversation/2012/01/now-blogging-on-my-book-blog-at-consentofthenetworkedcom.html</link>
      <source url="http://rconversation.blogs.com/rconversation/">RConversation</source>
      <guid isPermaLink="false">urn:uuid:c9384f82-0fa8-a40a-991c-d65e6f90047f</guid>
      <pubDate>Wed, 18 Jan 2012 00:38:33 +0000</pubDate>
      <description>Please note that I have shifted my regular blogging activity over to my book's website at consentofthenetworked.com. Click here to subscribe to that blog's RSS feed, or subscribe to email updates by clicking on the link under "follow blog by...</description>
      <content:encoded>&lt;p&gt;Please note that I have shifted my regular blogging activity over to my book&amp;#39;s website at &lt;a href="http://consentofthenetworked.com/" target="_self"&gt;consentofthenetworked.com&lt;/a&gt;. Click &lt;a href="http://consentofthenetworked.com/author/rebeccamackinnon/" target="_self"&gt;here&lt;/a&gt; to subscribe to that blog&amp;#39;s RSS feed, or subscribe to email updates by clicking on the link under &amp;quot;follow blog by email&amp;quot; in the right-hand column.&lt;/p&gt;</content:encoded>
    </item>
    <item>
      <title>Netizen Report: Fight for the Future Edition</title>
      <link>https://rconversation.blogs.com/rconversation/2011/12/netizen-report-fight-for-the-future-edition.html</link>
      <source url="http://rconversation.blogs.com/rconversation/">RConversation</source>
      <guid isPermaLink="false">urn:uuid:f351cff9-b5fc-a84b-39de-4f396d73f384</guid>
      <pubDate>Sun, 11 Dec 2011 23:51:23 +0000</pubDate>
      <description>Meet Khaled Alaa Abdel Fattah, born last Tuesday to two Egyptian cyber-activists: mother Manal Bahey al-Din Hassan and father Alaa Abd El-Fattah, who is currently in prison. Khaled is named after Khaled Said, the young man whose violent death at...</description>
      <content:encoded>&lt;p&gt;&lt;a href="https://secure.flickr.com/photos/89031137@N00/sets/72157628305146069/" target="_self"&gt;&lt;img align="left" alt="" height="175" hspace="4" src="http://advocacy.globalvoicesonline.org/wp-content/uploads/2011/12/manalbaby1.jpg" title="manalbaby" width="175" /&gt;&lt;/a&gt; Meet &lt;a href="http://www.almasryalyoum.com/en/node/536566" target="_self"&gt;Khaled Alaa Abdel Fattah&lt;/a&gt;, born last Tuesday to two Egyptian cyber-activists: mother &lt;a href="https://madubesbrainpot.wordpress.com/tag/manal-bahey-el-din-hassan/"&gt;Manal Bahey al-Din Hassan&lt;/a&gt; and father &lt;a href="https://en.wikipedia.org/wiki/Alaa_Abd_El-Fatah"&gt;Alaa Abd El-Fattah&lt;/a&gt;, who is currently &lt;a href="http://www.guardian.co.uk/world/2011/nov/02/egyptian-activist-alaa-accuses-army"&gt;in prison&lt;/a&gt;. Khaled is named after &lt;a href="https://en.wikipedia.org/wiki/Death_of_Khaled_Mohamed_Saeed"&gt;Khaled Said&lt;/a&gt;,  the young man whose violent death at the hands of police in 2010 became  a symbol and rallying point for activism that brought down the Mubarak  regime earlier this year.&amp;quot;&lt;/p&gt;
&lt;p&gt;Little Khaled was born as Internet-driven activism in another part of the world, &lt;a href="http://globalvoicesonline.org/-/special/runet-echo/"&gt;Russia&lt;/a&gt;, is bringing a new generation of young people - many of whom had &lt;a href="http://globalvoicesonline.org/2011/12/05/russia-the-revolt-of-net-hamsters/"&gt;never participated in a protest before&lt;/a&gt; - &lt;a href="http://www.bbc.co.uk/news/world-europe-16052329"&gt;into the streets&lt;/a&gt; to oppose election results that they believe to have been rigged in the ruling party&amp;#39;s favor. One blogger &lt;a href="http://www.time.com/time/world/article/0,8599,2101569,00.html"&gt;told TIME magazine &lt;/a&gt;that  he risked reprisals by United Russia supporters to post flyers around  Moscow on the eve of the election, calling on people to vote against  them. One flyer said:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;quot;One day, your child will ask you, Papa, what were you doing when the crooks and thieves were robbing our country blind?&amp;quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;People like Alaa, Syrian blogger &lt;a href="http://advocacy.globalvoicesonline.org/2011/12/05/syria-free-razan-ghazzawi/"&gt;Razan Ghazzawi&lt;/a&gt; who was arrested on the Jordanian border last weekend, and &lt;a href="http://advocacy.globalvoicesonline.org/2011/11/07/remembering-ali-abdulemam/"&gt;Ali Abdulemam,&lt;/a&gt; the Bahraini blogger who has been in hiding since February, are all  fighting for a world in which their own children will be able to speak  their minds and participate in opposition politics without going to  prison. But what about the rest of us? To echo the Russian blogger&amp;#39;s  question:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;What are we doing to make sure that our  children will even be able to use the Internet to fight for their rights  speak truth to power?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The war for freedom and control of the Internet continues to rage. To get the full rundown, check out &lt;a href="http://advocacy.globalvoicesonline.org/2011/12/12/netizen-report-fight4future/"&gt;the latest Netizen Report on Global Voices Advocacy&lt;/a&gt;.  Since September I have been working with the Global Voices team and  several volunteers to publish these twice monthly updates on global  developments related to the power dynamics between citizens, companies  and governments on the Internet. You can even subscribe to them by  e-mail &lt;a href="https://feedburner.google.com/fb/a/mailverify?uri=NetizenReport"&gt;here&lt;/a&gt;.&lt;/p&gt;</content:encoded>
    </item>
    <item>
      <title>An open thank you letter to Global Voices, on International Volunteer Day</title>
      <link>https://rconversation.blogs.com/rconversation/2011/12/an-open-thank-you-letter-to-global-voices-on-international-volunteer-day.html</link>
      <source url="http://rconversation.blogs.com/rconversation/">RConversation</source>
      <guid isPermaLink="false">urn:uuid:7eb0c9ee-908e-f72a-eeb5-ed18bf7be036</guid>
      <pubDate>Mon, 05 Dec 2011 16:14:51 +0000</pubDate>
      <description>Today is International Volunteer Day, a celebration of the millions of people around the world who give their time, energy and wisdom to projects and causes they care about. Volunteers feed the hungry, care for the sick, comfort the grieving....</description>
      <content:encoded>&lt;p&gt;Today is &lt;a href="http://www.worldvolunteerweb.org/intl-vol-day.html"&gt;International Volunteer Day&lt;/a&gt;, a celebration of the millions of people around the world who give their time, energy and wisdom to projects and causes they care about. &lt;a href="http://www.volunteermatch.org/"&gt;Volunteers&lt;/a&gt; feed the hungry, care for the sick, comfort the grieving. We live in a world where companies and governments are responsible for producing most of the products and services we need and use. Volunteers prove that there&amp;#39;s another way to build things - we can &lt;a href="http://www.wikipedia.org/"&gt;write encyclopedias&lt;/a&gt; or&lt;a href="http://en.wikipedia.org/wiki/Linux"&gt; operating systems&lt;/a&gt;, we can &lt;a href="http://globalvoicesonline.org/"&gt;report the news&lt;/a&gt;, or &lt;a href="http://www.occupytogether.org/"&gt;host a revolution&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Choosing to build a volunteer community was the key decision that made &lt;a href="http://globalvoicesonline.org/"&gt;Global Voices&lt;/a&gt; possible. Rebecca and I realized that some of the most interesting information we were getting from the developing world wasn&amp;#39;t coming from professional reporters, but from volunteers, using their blogs to share their perspectives on local and national events with the wider world. Our first action as a community -&lt;a href="http://globalvoicesonline.org/about/gv-manifesto/"&gt; the manifesto&lt;/a&gt; that continues to inform and govern our decisions today - was co-written by volunteers at our first meeting, and rapidly translated into twenty five languages by volunteers.&lt;/p&gt;
&lt;p&gt;While there&amp;#39;s a small team of editors and coordinators for whom Global Voices is a job (as well as a passion - we don&amp;#39;t pay well enough for anyone to do this for the money!), the lifeblood of our project is our volunteer community. 532 active volunteers are responsible for Global Voices today, part of the 1,904 volunteers who&amp;#39;ve worked on writing, editing, translating, designing over the seven year life of our endeavour. Volunteers have written more than 58,000 articles on Global Voices, and translated even more. We rely on an even broader community of volunteers - the tens of thousands of bloggers, twitterers and videographers who we feature on our site, the vast majority of whom create not for fiscal gain, but out of passion and dedication - to make our work possible. And we&amp;#39;re governed by volunteers: our board of directors serve without pay, giving their time because they care about our work and the sustainability of our community.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://rconversation.blogs.com/.a/6a00d8341c609853ef0162fd6341c5970d-pi" style="display: inline;"&gt;&lt;img alt="FREE-RAZAN-450x129" class="asset  asset-image at-xid-6a00d8341c609853ef0162fd6341c5970d" src="https://rconversation.blogs.com/.a/6a00d8341c609853ef0162fd6341c5970d-350wi" style="width: 350px;" title="FREE-RAZAN-450x129" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;As co-founders of Global Voices, Rebecca and I are profoundly grateful to everyone who gives their time and energy to make the world more just, fair, knowledgeable and connected. But we wanted to call attention to two volunteers who&amp;#39;ve taken incredible risks to work with us. Late last week, &lt;a href="http://advocacy.globalvoicesonline.org/2011/12/05/syria-free-razan-ghazzawi/"&gt;Razan Ghazzawi was arrested by Syrian authorities &lt;/a&gt;when she travelled to Amman, Jordan to attend a workshop on press freedom. Razan is an active blogger and twitter user, and has written for Global Voices and Global Voices Advocacy. She&amp;#39;s one of several brave Syrians who is willing to work under her own name, despite the dangers of arrest, and we hope for her speedy release from detention.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://rconversation.blogs.com/.a/6a00d8341c609853ef0162fd63446d970d-pi" style="float: right;"&gt;&lt;img alt="Free-ali-450x600" class="asset  asset-image at-xid-6a00d8341c609853ef0162fd63446d970d" src="https://rconversation.blogs.com/.a/6a00d8341c609853ef0162fd63446d970d-200wi" style="width: 200px; margin: 0px 0px 5px 5px;" title="Free-ali-450x600" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;We also recognize &lt;a href="http://en.wikipedia.org/wiki/Ali_Abdulemam#2011_disappearance_and_sentencing_in_absentia"&gt;Ali Abdulemam&lt;/a&gt;, a Bahraini blogger, activist and Global Voices volunteer. Ali remains in hiding today, because &lt;a href="http://advocacy.globalvoicesonline.org/2011/06/22/bahrain-leading-blogger-ali-abdulemam-sentenced-to-15-years-in-prison-along-with-other-human-rights-defenders/"&gt;he&amp;#39;s been sentenced to fifteen years in prison by Bahrain&amp;#39;s courts&lt;/a&gt;, who accused him of plotting a coup. In fact, Ali was sentenced because he&amp;#39;s been a passionate advocate for online speech in Bahrain, and has been arrested and tortured for his work on Bahrain Online and Global Voices.  We are profoundly grateful for everyone who volunteers their time and energy to make Global Voices a reality. We pledge to work with you to make possible a world where no one ever need risk arrest to participate in a remarkable community like ours.&lt;/p&gt;
&lt;p&gt;-&lt;a href="http://www.ethanzuckerman.com/blog/2011/12/05/an-open-thank-you-letter-to-global-voices-on-international-volunteer-day/" target="_self"&gt;Ethan Zuckerman&lt;/a&gt; and Rebecca MacKinnon, Global Voices co-founders and volunteers&lt;/p&gt;</content:encoded>
    </item>
    <item>
      <title>The Great Firewall of America</title>
      <link>https://rconversation.blogs.com/rconversation/2011/11/the-great-firewall-of-america.html</link>
      <source url="http://rconversation.blogs.com/rconversation/">RConversation</source>
      <guid isPermaLink="false">urn:uuid:d856f9ea-ad5e-5ce1-fe95-dd195b0dc16b</guid>
      <pubDate>Wed, 16 Nov 2011 06:33:32 +0000</pubDate>
      <description>Last month the U.S. Trade Representative Ron Kirk sent a letter to the Chinese government requesting information about its censorship practices. The middle kingdom’s response: a polite middle finger. Foreign ministry spokeswoman Jiang Yu declared that Chinese censorship follows “international...</description>
      <content:encoded>&lt;p&gt;Last month the U.S. Trade Representative Ron Kirk &lt;a href="http://www.ustr.gov/about-us/press-office/press-releases/2011/october/united-states-seeks-detailed-information-china%E2%80%99s-i"&gt;sent a letter&lt;/a&gt; to the Chinese government requesting information about its censorship practices. The middle kingdom’s response: a &lt;a href="http://www.salon.com/2011/10/20/china_says_internet_censorship_meets_global_norms/"&gt;polite middle finger&lt;/a&gt;. Foreign ministry spokeswoman Jiang Yu declared that Chinese censorship follows “international practice.”&lt;/p&gt;
&lt;p&gt;Her  response is specious given that China operates the world’s most  elaborate and opaque system of Internet censorship, as I describe in  Chapter 3 of &lt;a href="http://consentofthenetworked.com/" target="_self"&gt;my forthcoming book&lt;/a&gt;. Yet Congress has been hard at work to bolster its legitimacy,  however inadvertently. The reality is that the &lt;a href="http://www.govtrack.us/congress/bill.xpd?bill=s112-968"&gt;PROTECT IP Act&lt;/a&gt; now in the Senate, and a new House version called &lt;a href="http://www.govtrack.us/congress/bill.xpd?bill=h112-3261"&gt;Stop Online Piracy Act (SOPA)&lt;/a&gt;, would bring key features of China’s Great Firewall to America. Read &lt;a href="https://www.nytimes.com/2011/11/16/opinion/firewall-law-could-infringe-on-free-speech.html"&gt;my opinion piece in the &lt;/a&gt;&lt;em&gt;&lt;a href="https://www.nytimes.com/2011/11/16/opinion/firewall-law-could-infringe-on-free-speech.html"&gt;New York Times&lt;/a&gt; &lt;/em&gt;for  more details on how these bills would implement technical and legal  solutions that would have the unfortunate result of making the Internet  everywhere more like the Chinese Internet.&lt;/p&gt;
&lt;p&gt;The House Judiciary Committee will hold a &lt;a href="http://judiciary.house.gov/hearings/hear_11162011.html"&gt;hearing&lt;/a&gt; on SOPA at 10am on Wednesday morning (a few hours from now). It will be webcast live on the &lt;a href="http://judiciary.house.gov/index.html"&gt;committee website&lt;/a&gt;. The video should also be archived there after the event.&lt;/p&gt;
&lt;p&gt;Opposition to SOPA is widespread, bipartisan, and international. The &lt;a href="https://www.cdt.org/report/growing-chorus-opposition-stop-online-piracy-act"&gt;Center for Democracy and Technology is collecting&lt;/a&gt; links to &lt;a href="https://www.cdt.org/report/growing-chorus-opposition-stop-online-piracy-act#3"&gt;blog posts&lt;/a&gt;, &lt;a href="https://www.cdt.org/report/growing-chorus-opposition-stop-online-piracy-act#2"&gt;articles&lt;/a&gt;,  as well as letters of opposition from human rights groups, Internet  engineers, law professors, Internet companies, public interest  advocates, consumer rights groups, among others. Allan Friedman at the  Brookings Institution has an &lt;a href="http://www.brookings.edu/papers/2011/1115_cybersecurity_friedman.aspx"&gt;excellent paper&lt;/a&gt; explaining how SOPA and PROTECT IP will make the Internet less secure,  sabotaging engineers&amp;#39; long-running efforts to increase the level of  security in the global domain name system.&lt;/p&gt;
&lt;p&gt;The New America Foundation (where I am a senior fellow) has signed &lt;a href="http://www.newamerica.net/pressroom/2011/new_america_s_oti_to_reps_smith_conyers_sopa_would_be_detrimental_to_freedom_of_expre"&gt;an open letter&lt;/a&gt; to the House Judiciary Committee, along with a list of human rights, civil liberties and public interest groups. It argues:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;We  do not dispute that there are hubs of online infringement. But the  definitions of the sites that would be subject to SOPA’s remedies are so  broad that they would encompass far more than those bad actors  profiting from infringement. By including all sites that may – even  inadvertently – “facilitate” infringement, the bill raises serious  concerns about overbreadth. Under section 102 of the bill, a nondomestic  startup video-sharing site with thousands of innocent users sharing  their own noninfringing videos, but a small minority who use the site to  criminally infringe, could find its domain blocked by U.S. DNS  operators. Countless non-infringing videos from the likes of aspiring  artists, proud parents, citizen journalists, and human rights activists  would be unduly swept up by such an action. Furthermore, overreach  resulting from bill is more likely to impact the operators of smaller  websites and services that do not have the legal capacity to fight false  claims of infringement.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In Chapter 7 I describe my experience testifying at a &lt;a href="http://www.internationalrelations.house.gov/hearing_notice.asp?id=1152"&gt;March 2010 House Foreign Relations Committee hearing&lt;/a&gt; chaired by Rep. Howard Berman (D-CA). Berman happens to be one of  SOPA’s key sponsors. While the hearing’s stated purpose was to discuss  Google’s decision to halt censorship in China and how the United States  can support global Internet freedom, committee members devoted  considerable time to chastising a Google executive for failing to  sufficiently police uploads to YouTube for infringing content. By their  standards, YouTube and other similar user-driven sites clearly fall  short of SOPA’s requirements. As I point out in the book, The cognitive  dissonance on display at that hearing highlighted an inconvenient  reality: politicians throughout the democratic world are pushing for  stronger censorship and surveillance by Internet companies to stop the  theft of intellectual property. They are doing so in response to  aggressive lobbying by powerful corporate constituents without adequate  consideration of the consequences for civil liberties, and for democracy  more broadly.&lt;/p&gt;
&lt;p&gt;The public interest letter details some of those consequences:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Relying  on an even broader definition of “site dedicated to theft of US  property,” section 103 of SOPA creates a private right of action of  breathtaking scope. Any rightsholder could cut off the financial  lifeblood of services such as search engines, user-generated content  platforms, social media, and cloud-based storage unless those services  actively monitor and police user activity to the rightsholder’s  satisfaction.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In my op-ed I conclude:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The  potential for abuse of power through digital networks — upon which we  as citizens now depend for nearly everything, including our politics —  is one of the most insidious threats to democracy in the Internet age.  We live in a time of tremendous political polarization. Public trust in  both government and corporations is low, and deservedly so. This is no  time for politicians and industry lobbyists in Washington to be devising  new Internet censorship mechanisms, adding new opportunities for abuse  of corporate and government power over online speech. While American  intellectual property deserves protection, that protection must be won  and defended in a manner that does not stifle innovation, erode due  process under the law, and weaken the protection of political and civil  rights on the Internet.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;I am not against copyright or  intellectual property protection - I&amp;#39;m about to publish a copyrighted  book. I hope that people will buy it. Its quality owes a great deal to  the editors and other professionals whose job it was to help me shape  and refine my argument, and to improve my prose. But I don&amp;#39;t believe  that the defense of my copyright should come at the expense of civil  liberties. It is a moral imperative for democracies to find new and  innovative ways to protect copyright in the Internet age without  stifling the ability of citizens around the world to exercise their  right to freedom of speech and assembly on the Internet.&lt;/p&gt;</content:encoded>
    </item>
    <item>
      <title>Surveillance and Censorship in India</title>
      <link>https://rconversation.blogs.com/rconversation/2011/11/surveillance-and-censorship-in-india.html</link>
      <source url="http://rconversation.blogs.com/rconversation/">RConversation</source>
      <guid isPermaLink="false">urn:uuid:d59efcb5-785a-9b5f-48ca-144244f21dd2</guid>
      <pubDate>Fri, 11 Nov 2011 20:10:51 +0000</pubDate>
      <description>Chapter 9 of my forthcoming book opens with quotes from an infamous April 2011 BBC interview with RIM's co-CEO Mike Lazaridis, in which he ends the interview abruptly after the BBC's Rory Cellan-Jones presses him to answer questions about RIM's...</description>
      <content:encoded>&lt;p&gt;Chapter 9 of &lt;a href="http://consentofthenetworked.com/" target="_self"&gt;my forthcoming book&lt;/a&gt; opens with quotes from an &lt;a href="http://news.bbc.co.uk/2/hi/programmes/click_online/9456798.stm"&gt;infamous April 2011 BBC interview&lt;/a&gt; with RIM's co-CEO Mike Lazaridis, in which he ends the interview abruptly after the BBC's Rory Cellan-Jones presses him to answer questions about RIM's “arguments with the Indian government and various other governments in the Middle East" over those governments' desire to gain access to Blackberry messages and e-mails.  In &lt;a href="https://www.networkworld.com/news/2010/080610-rim-holds-talks-with-uae.html"&gt;August 2010&lt;/a&gt;, the United Arab Emirates and Saudi Arabia  threatened to ban BlackBerry services until RIM agreed to allow a satisfactory level of government access to communications sent through RIM devices within the country. India soon followed suit with its own demands for access. Late last month,&lt;a href="http://online.wsj.com/article/SB10001424052970204505304577001592335138870.html#ixzz1cxcl5IIg"&gt; the Wall Street Journal reported&lt;/a&gt; that RIM has set up a facility in Mumbai "to help the Indian government carry out lawful surveillance of its BlackBerry services." The report further quotes a RIM statement which says that "we believe the government of India is now applying its security policy in a consistent manner to all handset makers and service providers in India, which means that RIM should not be singled out any more than any other provider."&lt;/p&gt;
&lt;p&gt;There is a larger problem, however. When it comes to censorship in India, the hardworking folks at the &lt;a href="http://www.cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt; in Bangalore &lt;a href="http://www.cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking"&gt;recently concluded&lt;/a&gt; that the Indian government is violating not only Indian laws but also the Indian Constitution in the way it handles censorship demands to companies. What are the chances, then, that the Indian government is not violating its citizens' rights in similar ways when it comes to demands for user information to RIM and other mobile service providers?  CIS's Pranesh Prakash compared &lt;a href="https://www.google.com/transparencyreport/governmentrequests/IN/"&gt;Google's most recent Transparency Report&lt;/a&gt;, which reveals the number of content removal and user data requests made between January and June 2011 by the Indian government, and &lt;a href="http://www.cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking"&gt;compared&lt;/a&gt; that information with an &lt;a href="http://www.cis-india.org/internet-governance/dit-response-2nd-rti-blocking"&gt;official response to CIS queries on content removal and blocking &lt;/a&gt;by the Ministry of Communications &amp;amp; Information Department of Information Technology. Prakash's conclusion:&lt;/p&gt;
&lt;blockquote&gt;...it would seem that law enforcement agencies are operating outside the bounds set up under the Indian Penal Code, the Code of Criminal Procedure, as also the Information Technology Act, when they send requests for removal of content to companies like Google. While a company might comply with it because it appears to them to violate their own terms of service (which generally include a wide clause about content being in accordance with all local laws), community guidelines, etc., it would appear that it is not required under the law to do so if the order itself is not legal.  However, anecdotal evidence has it that most companies comply with such 'requests' even when they are not under any legal obligation to do so.  This way the intention of Parliament in enacting s.69A of the IT Act—to regulate government censorship of the Internet and bring it within the bounds laid down in the Constitution—is defeated.&lt;/blockquote&gt;
&lt;p&gt;As I reported in the book, in April 2011, the Ministry of Communications and Information Technology &lt;a href="https://www.nytimes.com/2011/04/28/technology/28internet.html?_r=1"&gt;issued new rules &lt;/a&gt;under which Internet companies are expected to remove within thirty-six hours any content regulators designated as “grossly harmful,” “harassing,” or “ethnically objectionable.” Indian free speech advocates have vowed to challenge the rules’ constitutionality. Google &lt;a href="http://www.washingtonpost.com/world/indias-new-internet-rules-criticized/2011/07/27/gIQA1zS2mI_story.html"&gt;publicly protested &lt;/a&gt;the rules in a statement warning that “if Internet platforms are held liable for third party content, it would lead to self-censorship and reduce the free flow of information.” As Prakash &lt;a href="cis-india.org/advocacy/igov/blog/rebuttal-dit-press-release-intermediaries"&gt;put it&lt;/a&gt; then, “The Indian Constitution limits how much the government can regulate citizens’ fundamental right to freedom of speech and expression. Any measure afoul of the constitution is invalid.”&lt;/p&gt;
&lt;p&gt;More details about surveillance and censorship in India can be found in the India-focused chapter of a new book, &lt;a href="http://citizenlab.org/2011/09/access-contested-is-now-available/"&gt;&lt;em&gt;Access Contested: Security, Identity, and Resistance in Asian Cyberspace&lt;/em&gt;&lt;/a&gt;, produced by the &lt;a href="http://opennet.net/"&gt;Open Net Initiative,&lt;/a&gt; coming out in December from MIT Press. The India chapter is not currently available online but I discuss India's issues in a related chapter titled "Corporate Accountability in Networked Asia" (The Citizenlab, one of ONI's partners, has made that chapter, along with all of Part I of the book, available online &lt;a href="http://citizenlab.org/2011/09/access-contested-is-now-available/"&gt;here&lt;/a&gt;.) I wrote it late last year and it went into production before the new April 2011 rules came out (academic presses take a long time), but I think the larger point remains very relevant. I compare the role played by companies in facilitating government censorship and surveillance in China to the role of companies in two Asian democracies: South Korea and India. I argue that "efforts to hold companies accountable for free speech and privacy in authoritarian countries like China will face an uphill battle unless companies in Asia’s democracies are pushed by domestic civil society actors to defend and protect user rights in a more robust manner than is currently the case."&lt;/p&gt;
&lt;p&gt;The first step is for companies to follow Google's lead in being more transparent about how they respond to government demands. Then civil society organizations in democracies, like India's CIS, will be equipped and empowered with the information they need to push their governments to stop using companies as an opaque and unaccountable extension of state power. RIM can and must recognize that by being evasive with the public it is standing firmly on the wrong side of history.&lt;/p&gt;
&lt;p&gt;Here is the video of Lazaridis' interview:&lt;/p&gt;
&lt;p&gt;&lt;iframe width="350" height="267" src="http://www.youtube.com/embed/Q6iGe7vuGeQ?rel=0" frameborder="0" allowfullscreen&gt;&lt;/iframe&gt;&lt;/p&gt;
</content:encoded>
    </item>
    <item>
      <title>Back here for WSIS 2015 prep and follw up.</title>
      <link>http://events.takingitglobal.org/3838/blogs/#3456041</link>
      <source url="http://events.takingitglobal.org/3838/blogs/#">TIGblogs - Event - World Summit on the Information Society (WSIS) Phase Two</source>
      <guid isPermaLink="false">urn:uuid:ce223823-e24c-7bb6-12a6-78b6b1cc463d</guid>
      <pubDate>Sun, 28 Nov 2010 18:58:00 +0000</pubDate>
      <description>I am back here after a break. Decided to get involved foe the WSIS 2015 prep and follow ups. Indian youths have a role to play and this time our voice will be heard.</description>
    </item>
    <item>
      <title>HUMAN RIGHTS</title>
      <link>http://events.takingitglobal.org/3838/blogs/#369145</link>
      <source url="http://events.takingitglobal.org/3838/blogs/#">TIGblogs - Event - World Summit on the Information Society (WSIS) Phase Two</source>
      <guid isPermaLink="false">urn:uuid:ccf2a322-a120-c697-8a84-614ce1f057c1</guid>
      <pubDate>Sat, 10 May 2008 19:01:00 +0000</pubDate>
      <description>Human Rights as thought when created should  only be  profitable to the whole world...but the way the world is living  nowadays is really shamefull , discouraging , hopeless , and RISKY...&lt;br /&gt;
This coming 60th anniversary of the Human right should let all wise people around the whole world know... in all sphere of decision to question themselves ...deep in their consceous : is it this actual world, where Invasions-Spoluation-Colonialism-civil wars-decease-hunger-asylium-poverty-repression-racism-xenophoby-pedophily-tortures-dictatures..etc., why HUMAN RIGHTS WERE CREATED ?????&lt;br /&gt;
If not ...means their is VERY BIG FAILURE ...in the way of Operating and Supervising  Human Rights.Its sorryful that the world should wait 60 years before being able to crosscheck failures in something that was implicating people's life... Just to have an idea of the meaning of it ...let we suppose to be at the place of people who are in refugee camps....or people who are in Jails illigally....or people who are living in occupied terrtories...;WHAT HUMAN RIGHT STANDS FOR THEM.???&lt;br /&gt;
They are Humans...as far as they are living in the same world like all of us....so, They should HAVE RIGHTS....AS FAR AS ITS HUMAN RIGHTS...&lt;br /&gt;
If millions of people are still suffering actually in the world ...coz of lack of Human Rights...means the goals or targets why wise people created United Nation after Second world War...are not reached....So UNITED NATINS HAS FAILED TOTALLY TO HIS MISSION...while the very correct and logic solution....is to Dismissed UN ,And to rebuild a NEW INSTITUT ...where all nations will be represented...all ethny will be respected...all religions will be recognised...all culture will be honored.... It can goes throught coz, that new institution will  avoid all previous mistakes of done by UN.....&lt;br /&gt;
why not even to creat in each nation a concil that only wise  and respected people....and each concil will choose his or her represent that will stand for his country in the New Institution....&lt;br /&gt;
Coz the actual biggest MISTAKE OF UN IS HIS PARTIALLITY...for some people UN talk very very loud; for others Nothing is done....That is the Main thing that can creates frustruation and violence...the other problem of UN is: very few nations are truely represented...thats not FAIRE AT ALL....Africa has 53 countries how many countries is at UN...???  That idea of permanent and unpermanent Membership IS NOT FAIRE AND IS ILLOGIC...coz the world has really past the context where some can be permanent ...the others not.....coz " a shared something for everybody, ..what ever it can be should be for everyone...." The day some people will have more rights than others, that day, discriminated people will show their unhappyness...and in their own style....who should tell them to stop ?....Favourited people ??? or poeple in the same position ?? A FAIRE WORLD SHOULD BE FAIRE FOR EVERY NATION....AS WELL AS ISRAELIANS THAN PALESTINIANS...&lt;br /&gt;
Now if we think keeping our eyes closed in such discriminations, creating fake resolutions evryday,diabolising islam any moment,keeping UN with his limited number of member with VETO can solve the problems....we are faking ourselves..and if in 60 years UN cannot change nothing in how the world is moving....for sure terrorism and violence have to be supported for long again....who will be reached ??? no body can tell !!!&lt;br /&gt;
Its quite time now to change vision ...to build a very peacefull world where HUMAN RIGHTS WILL BE LIVED LIKE WHAT IT REALLY MEANS...&lt;br /&gt;
Its just aims ...how wise people did to creat UN ...plenty more wise can do it to creat something far better than UN....its matter of Courage and Will ...and as a member of TIG ..I really Hope the TAKING IT GLOBAL WILL INVOLVE IN THAT very hard and important Challenge..</description>
    </item>
    <item>
      <title>Google propose aux ONG de leur servir de vitrine</title>
      <link>http://blogue.apc.org/fr/index.shtml?x=5538194</link>
      <source url="http://www.apc.org/francais/wsis/blog/index.shtml">APC Blog - FR</source>
      <guid isPermaLink="false">urn:uuid:6a126844-2bee-71f8-a13a-71d6a8a61790</guid>
      <pubDate>Wed, 09 Apr 2008 16:48:39 +0000</pubDate>
      <description>Google veut mettre en application son célèbre slogan Don't be evil. La firme américaine a présenté mardi dans les locaux du Haut-Commissariat des Nations unies pour les réfugiés (HCR), à Genève, une nouvelle version de son logiciel Earth, destinée aux ONG.</description>
    </item>
    <item>
      <title>Concluyó el eLAC: ¿qué rol se deja a  la sociedad civil?</title>
      <link>http://blog.apc.org/es/index.shtml?x=5485124</link>
      <source url="http://www.apc.org/espanol/wsis/blog/index.shtml">APC Blog - ES</source>
      <guid isPermaLink="false">urn:uuid:aa890809-d370-91c8-510f-e866a17fe1ed</guid>
      <pubDate>Fri, 08 Feb 2008 17:51:22 +0000</pubDate>
      <description>La II Conferencia Ministerial para la Sociedad de la Información acaba de culminar, y con ella se inicia un nuevo proceso regional, en base a la recién acordada plataforma de acción eLAC 2010. Algunos logros, muchos tironeos, y un gran cansancio es el saldo de esta semana de actividades. El proceso de negociación fue irregular, y la sociedad civil ha criticado con fuerza las modificaciones realizadas al borrador del mecanismo de seguimiento, que relegan a las OSC al papel de observadores, y no garantizan la calidad multisectorial del proceso. </description>
    </item>
    <item>
      <title>The world of Lies</title>
      <link>http://www.tigblog.org/group/wsis/post/65409</link>
      <source url="http://www.tigblog.org/group/wsis">TIGblogs - Group - WSIS</source>
      <guid isPermaLink="false">urn:uuid:9b89ca15-2b39-3853-f917-344e5ddb16b9</guid>
      <pubDate>Sun, 12 Nov 2006 15:53:00 +0000</pubDate>
      <description>http://video.google.com/videoplay?docid=3469985878820354075</description>
    </item>
    <item>
      <title>About the Event</title>
      <link>http://www.tigblog.org/group/wsis/post/45473</link>
      <source url="http://www.tigblog.org/group/wsis">TIGblogs - Group - WSIS</source>
      <guid isPermaLink="false">urn:uuid:1a6fd8af-6b34-b374-a292-5723673c4176</guid>
      <pubDate>Thu, 05 Oct 2006 21:12:00 +0000</pubDate>
      <description>Important notice:&lt;br /&gt;
Due to unforeseen circumstances we have had to cancel the Focus Day. The main conference will be going ahead as planned.    Special Rate for Nigerian Delegates: £200&lt;br /&gt;
 &lt;br /&gt;
The Commonwealth Telecommunications Organisation is organising the second Connecting Rural Communities Conference in Nigeria scheduled to take place between 10th -12th October. The CTO are also pleased to announce that the event be hosted by the Ministry of Communications. This is the second in a four-event series which focuses on the development of information and Communications Technology (ICT) – and in particular the progress which is being made on connecting rural communities. With the rapid projected development of rural communications in developing countries there has never been a greater opportunity for ICT companies to stake their claim on this lucrative market.&lt;br /&gt;
The first Connecting Rural Communities conference took place in January and was proud to have the support of the Indian Department of Telecommunications and the invaluable assistance of the Indian Institute of Management Ahmedabad.&lt;br /&gt;
The event emphasized the sharing of practical experiences while highlighting the role of place and place- based innovation in local development, rural health, education, culture and environment, with attention to implications for rural policy and governance. Government initiatives, regulatory strategies were also discussed that could allow businesses to advance in rural communities.&lt;br /&gt;
Connecting Rural Communities 2006 is a must-attend event for anyone involved in the ICT industry featuring presentations from high-level industry professionals and public sector representatives. The agenda will cover several topics essential to enhancing your company’s understanding of the market, including:&lt;br /&gt;
•	Latest regulatory initiatives for promoting ICTs in rural areas &lt;br /&gt;
•	Marketing strategies to drive rural revenues&lt;br /&gt;
•	Best practice case studies of successful rural communications projects &lt;br /&gt;
•	An overview of the variety of current and upcoming ICT technologies for connecting rural communities &lt;br /&gt;
•	How ICTs can be used to deliver e-health, e-education, e- agriculture, e-government and e-commerce to rural areas &lt;br /&gt;
•	Future financing mechanisms for setting up rural communications&lt;br /&gt;
•	Governments’ plans to expand rural ICT access &lt;br /&gt;
•	Developments on mobile Communications&lt;br /&gt;
•	Satellite communications&lt;br /&gt;
</description>
    </item>
  </channel>
</rss>