Professional

It’s over. Isn’t it? Microsoft/Yahoo, continued

a killer klown“It’s over. Isn’t it?”

— the end of Killer Klowns from Outer Space

Act 1 ended with a temporary resolution: Microsoft deciding not to “go hostile” and instead withdrawing their offer to buy Yahoo! After a brief intermission, Bill Gates’ announcement of Live Search Cashback is bang-up start to Act 2, featuring guest star Carl Icahn, with the finale already scheduled at Yahoo’s repeatedly-postponed shareholder’s meeting … grab some popcorn!

Continue Reading »

Professional

Comments (8)

Permalink

CFP08: trip report

Part 1 of a series

cfp logoComputers, Freedom, and Privacy 2008 ended with me presenting Dear Potus 08 and circulating the letter to the presidential candidates for signatures, and then a closing plenary by Clay Shirky (notes below). It was exhiliarating as always, and I’m now simultaneously exhausting, revved up, and suffering from jet lag. So I figured I’d blog about it.

Continue Reading »

Personal
political
privacy
Professional
social computing

Comments (4)

Permalink

Computers, Freedom, and Privacy 2008: showtime!

cfp logoCFP2008 traditionally starts off with a day of tutorials.

I was on a panel organized by Lillie Coney of EPIC on E-Deceptive Campaign Practices: “Elections 2.0″, which was extremely interesting; I discussed examples of, and responses to, e-deception based on my activism experiences this election season, much of which I’ve blogged about here already.

Tova Wang of Common Cause moderated, and the other panelists included John Phillips of Aristotle, Jenigh J. Garrett of the NAACP Legal Defense and Education Fund, and Ruchi Bhorwmik of Senator Barack Obama’s office, talking about the legislation he’s introduced banning certain deceptive campaign practices relating to knowingly and intentionally spreading false information about voting times and locations. The audience was extremely involved — and knowledgable — and the conversations during the breaks were great as well. Aldon Hynes already has an interesting followup post in Project VoteProtector on his blog Orient House.

Continue Reading »

political
privacy
Professional
social computing
Tales from the Net

Comments Off on Computers, Freedom, and Privacy 2008: showtime!

Permalink

E-Deceptive Campaign Practices: “Elections 2.0”

I’m at a tutorial on Tuesday discussing “elections 2.0” at the Computers, Freedom, and Privacy conference, and one of the things I want to cover is Web 2.0 technologies’ positive role in countering deceptive campaign practices. I’m planning on using some examples from the Obama activism work I’ve been doing on Facebook, as well as some other sites I’ve tracked:

  • the “know your rights” work the One Million Strong for Barack group did for Texas and Ohio. group members got calls from a couple of people who had attended the Texas caucuses saying how valuable it was
  • the Courage Campaign’s “count every vote” petition in Los Angeles County, which led to counting most (not all) of the votes on the deceptive ballots
  • Continue Reading »

political
Professional
social computing
Uncategorized

Comments Off on E-Deceptive Campaign Practices: “Elections 2.0”

Permalink

Hillary Clinton Facebook group overrun by troll mob

a trollThe Hillary Clinton group got overrun with trolls last night. A Facebook bug — that’s been reported and unfixed since February — prevented the admins from being able to react. I saved a snapshot of a series of 25 threads with sexist (and in many cases racist) subjects; I won’t quote them, but trust me, they’re vile. In the middle of this was a plaintive plea for adult behavior by an Obama supporter — with a bunch of responses from trolls. Sigh.

Update: Will Bower’s Glitch-Plagued Clinton Facebook Group Cries Foul; Obama Page Glitch Free in the Huffington Post has administrator Candy Elizabeth’s excellent open letter.  Why yes, now that you mention it, that is the same Will Bower who was mentioned in comments in How to respond when Facebook censors your political speech on Tales from the net.  Small world!

Members of the Clinton group migrated to a private group, always a good thing to do in a situation like this. This morning, the board seems calmer but it’s hard to know whether that’s just a temporary lull. There are aftermath threads like since only the trollzz are here thread and (in the Obama group) The Hillary group has become a trollfest.

Continue Reading »

political
Professional
social computing
Tales from the Net

Comments (8)

Permalink

Clay Shirky to deliver closing plenary at CFP08!

From the Computers, Freedom, and Privacy blog:

We are pleased to announce that Clay Shirky will deliver the closing plenary keynote at CFP Technology Policy ’08.

Since the 1990s, Shirky has written, taught, and consulted on the social, cultural, and economic effects of Internet technologies and social media. His most recent book, Here Comes Everybody: The Power of Organizing Without Organizations, evaluates the significant role being played by technological advances on the formation and experience of modern group dynamics, citing such examples as Wikipedia and MySpace to demonstrate the Internet’s power in bridging geographical and cultural gaps.

Shirky’s hot-hot-hot around the internets these days, between the book (excellent reading!) and his Gin, Television, and Social Surplus talk at O’Reilly’s Web 2.0 conference, so this is really exciting. And of course this ties in extremely well with the all-day Workshop on Activism and Education Using Social Networks running in parallel with other CFP activities the day before Shirky’s talk. Good news indeed!

We hope to have streaming video of the plenary talks, and will update the CFP blog with information once it’s confirmed; and we’ll be having some pre-conference discussions as well.  So please, stay tuned!

Professional
social computing

Comments Off on Clay Shirky to deliver closing plenary at CFP08!

Permalink

Allies in the blogosphere

There’s so much to write about for Angry Black Woman’s Carnival of Allies that it’s hard to know where to start. At first I thought of focusing on “why the usual excuses are not good enough.” As the month of April went on, though, with brownfemipower’s and Blackamazon’s final statements, the growing list of women of color bloggers rejecting the term “feminism”, prof bw’s call for a Seal Press girlcott, open letters to white feminists from Jessica Hoffman and Ico … I realized that after all that, if anybody is still clinging to the usual excuses, it’s almost certainly beyond my power to reach them.

So I started working on an essay building on the discussion in places like Melissa McEwan et al’s We write letters on Shakesville, Chris Clarke’s Is a humane online politics possible, and Theriomorph’s An ally 101 thread. not currently publicly available

Continue Reading »

political
Professional
social computing
Tales from the Net

Comments (9)

Permalink

“9.5 Theses for Technology Policy in the Next Administration”

On the CFP08 blog, Laura DeNardis of the Yale Internet and Society Project writes:

To help shape public debate in this election year, the Information Society Project at Yale Law School recommends the following policy principles – The 9.5 Theses for Technology Policy in the Next Administration

The principles include Privacy, Access, Network Neutrality, Transparency, Culture, Diversity, and Openness.  The intent here is that these are starting points for a discussion; threads between now and CFP will delve into the individual principles, and I’ve already put them up on the wiki to allow for revision.

There’s certainly a lot of good stuff here.  Since at this stage we’re trying to get the conversation started, I’ve instead been focusing on some areas I thought had room for improvement, for example asking in a comment*

why does diversity mention only media concentration, and ignore the general dynamic in which marginalized groups (women, persons of color, those on the wrong side of the digital divide … the list goes on) have been excluded from discussions like these?

It’s an interesting discussion so far; please check it out and join in!

jon

* the actual comment I left there had a few typos as well; I fixed them here.

Professional

Comments Off on “9.5 Theses for Technology Policy in the Next Administration”

Permalink

Color me impressed …

Flying down to SF last Monday for RSA, I opened up my Macbook and got … nuthin’. Once I landed and plugged it in, and the little green light on the power supply connector didn’t even come on, I realized I was in trouble. So I headed down to the Mac store, conveniently right by the Muni stop, and made an appointment at the “Genius Bar” for that evening.

One of the geniuses in residence verified that his power supply connector light didn’t come on either, checked a couple of things, and asked if he could go in the back to run some tests. Sure, no problem. He came back within 10 minutes and said that seemed like there was some liquid in the display — he had verified that the machine booted, so it wasn’t hopeless. After signing the usual disclaimer in case of data loss (and wondering when was the last time I had backed things up — I’m still on Tiger, so haven’t yet experienced the joys of Time Machine) and authorizing a charge if need be (I hadn’t bought AppleCare), I left my Mac to be shipped off for repairs.

Thursday afternoon, I got a call: my Mac was at the store, I could come pick it up whenever. I Muni’ed back down the store, showed my photo ID, and there was my machine. I booted up to verify, and everything was hunky-dory; Firefox even offered to restore my last session state. Color me impressed.

“This was a really good experience,” I said to the helpful Genius.

“Always glad to hear it! And you’re still under the one-year limited warranty, so there’s no charge.”

Hey, I may be a geek, but I really hate dealing with hardware — or any other kind of machine configuration. Being able to find a place in whatever city I’m visiting on a business trip, talk to somebody knowledgable and competent, and have the right thing happen without me having to put out a lot of effort … that means a lot to me.

I found myself thinking about the arguments that cropped up from time to time on the Litebulb DL at Microsoft, as techie guys went on at great length about how Apple’s emphasis on the retail experience was a sign of weakness and used market share numbers to “prove” how real people (as opposed to the ones in Apple ads) didn’t really care about things like this. The other people at the store, or at the Genius Bar getting Mac, iPhone, and iPod help, seemed pretty real to me.

Sure, I beat Apple up about their security. That’s not the only consideration. I find the usability, responsibility, and attention to design of the Mac experience much more pleasant than Windows; it feels to me like I’m more productive (although when I’ve actually tracked my time, it’s roughly comparable). Throw in stellar support experiences like the one I had …

I hate to say it, but I think I’m now officially a Mac fan.

[And yes, I have now made a current backup. Thanks for reminding me.]

Personal
Professional

Comments Off on Color me impressed …

Permalink

A bumper crop o’ Slashdot security threads

In RSA: “It feels like something’s missing” earlier this week, I mentioned that I found myself wondering whether what I was seeing at the show responded to security problems as experienced by users. Coincidentally enough, when I checked Slashdot today there were several of interesting security-related threads. So while it’s far from a statistically-valid sample, it’s still agreat chance to ask: is the industry successfully addressing these kinds of problems?

Let’s start with Oklahoma Leaks 10,000 Social Security Numbers, which is by far the most serious single issue:

“By putting SQL queries in the URLs, they not only leaked the personal data of tens of thousands of people, but enabled literally anyone with basic SQL knowledge to put his neighbor/boss/enemies on the sexual offender list.”

Continue Reading »

Professional

Comments Off on A bumper crop o’ Slashdot security threads

Permalink

RSA, part 2: static analysis

A continuation of RSA: “It feels like something’s missing”

RSA’s a tough show for static analysis companies, but several were there. Ounce had the largest booth and an excellent message (“listen to your code”); Veracode, Armorize, and Fortify had smaller presence. However, I didn’t actually spend much time at the booths or looking at the details of any specific technology, instead talking with various folks I ran into about the strategic possibilities.

Continue Reading »

Professional

Comments (2)

Permalink

RSA: “It feels like something’s missing”

The last time I was at the RSA conference/expo in 2004, Bill Gates talked about PREfix and PREfast in his keynote — he even went off and started talking about Microsoft’s acquisition of PREfix! Hard to top that … but it’s a great place for shoozing and to get a feel for the market, so I spent a couple of days hanging out there last week. Unsurprisingly, I was largely thinking about strategies related to static analysis products and technologies, and I’ll cover those in my next post. First, though, I wanted to share my more general impressions.

Continue Reading »

Professional
social sciences

Comments (2)

Permalink