Can you trust your own computer - An essay on Trusted Computing by Richard Stallman.

Can you trust your own computer - An essay on Trusted Computing by Richard Stallman.: "









Who should your computer take its orders from? Most people think their computers should obey them, not obey someone else. With a plan they call “trusted computing”, large media corporations (including the movie companies and record companies), together with computer companies such as Microsoft and Intel, are planning to make your computer obey them instead of you. (Microsoft's version of this scheme is called “Palladium”.) Proprietary programs have included malicious features before, but this plan would make it universal.

Proprietary software means, fundamentally, that you don't control what it does; you can't study the source code, or change it. It's not surprising that clever businessmen find ways to use their control to put you at a disadvantage. Microsoft has done this several times: one version of Windows was designed to report to Microsoft all the software on your hard disk; a recent “security” upgrade in Windows Media Player required users to agree to new restrictions. But Microsoft is not alone: the KaZaa music-sharing software is designed so that KaZaa's business partner can rent out the use of your computer to its clients. These malicious features are often secret, but even once you know about them it is hard to remove them, since you don't have the source code.

In the past, these were isolated incidents. “Trusted computing” would make the practice pervasive. “Treacherous computing” is a more appropriate name, because the plan is designed to make sure your computer will systematically disobey you. In fact, it is designed to stop your computer from functioning as a general-purpose computer. Every operation may require explicit permission.

The technical idea underlying treacherous computing is that the computer includes a digital encryption and signature device, and the keys are kept secret from you. Proprietary programs will use this device to control which other programs you can run, which documents or data you can access, and what programs you can pass them to. These programs will continually download new authorization rules through the Internet, and impose those rules automatically on your work. If you don't allow your computer to obtain the new rules periodically from the Internet, some capabilities will automatically cease to function.

Of course, Hollywood and the record companies plan to use treacherous computing for Digital Restrictions Management (DRM), so that downloaded videos and music can be played only on one specified computer. Sharing will be entirely impossible, at least using the authorized files that you would get from those companies. You, the public, ought to have both the freedom and the ability to share these things. (I expect that someone will find a way to produce unencrypted versions, and to upload and share them, so DRM will not entirely succeed, but that is no excuse for the system.)

Making sharing impossible is bad enough, but it gets worse. There are plans to use the same facility for email and documents—resulting in email that disappears in two weeks, or documents that can only be read on the computers in one company.

Imagine if you get an email from your boss telling you to do something that you think is risky; a month later, when it backfires, you can't use the email to show that the decision was not yours. “Getting it in writing” doesn't protect you when the order is written in disappearing ink.

Imagine if you get an email from your boss stating a policy that is illegal or morally outrageous, such as to shred your company's audit documents, or to allow a dangerous threat to your country to move forward unchecked. Today you can send this to a reporter and expose the activity. With treacherous computing, the reporter won't be able to read the document; her computer will refuse to obey her. Treacherous computing becomes a paradise for corruption.

Word processors such as Microsoft Word could use treacherous computing when they save your documents, to make sure no competing word processors can read them. Today we must figure out the secrets of Word format by laborious experiments in order to make free word processors read Word documents. If Word encrypts documents using treacherous computing when saving them, the free software community won't have a chance of developing software to read them—and if we could, such programs might even be forbidden by the Digital Millennium Copyright Act.

Programs that use treacherous computing will continually download new authorization rules through the Internet, and impose those rules automatically on your work. If Microsoft, or the US government, does not like what you said in a document you wrote, they could post new instructions telling all computers to refuse to let anyone read that document. Each computer would obey when it downloads the new instructions. Your writing would be subject to 1984-style retroactive erasure. You might be unable to read it yourself.

You might think you can find out what nasty things a treacherous-computing application does, study how painful they are, and decide whether to accept them. Even if you can find this out, it would be foolish to accept the deal, but you can't even expect the deal to stand still. Once you come to depend on using the program, you are hooked and they know it; then they can change the deal. Some applications will automatically download upgrades that will do something different—and they won't give you a choice about whether to upgrade.

Today you can avoid being restricted by proprietary software by not using it. If you run GNU/Linux or another free operating system, and if you avoid installing proprietary applications on it, then you are in charge of what your computer does. If a free program has a malicious feature, other developers in the community will take it out, and you can use the corrected version. You can also run free application programs and tools on nonfree operating systems; this falls short of fully giving you freedom, but many users do it.

Treacherous computing puts the existence of free operating systems and free applications at risk, because you may not be able to run them at all. Some versions of treacherous computing would require the operating system to be specifically authorized by a particular company. Free operating systems could not be installed. Some versions of treacherous computing would require every program to be specifically authorized by the operating system developer. You could not run free applications on such a system. If you did figure out how, and told someone, that could be a crime.

There are proposals already for US laws that would require all computers to support treacherous computing, and to prohibit connecting old computers to the Internet. The CBDTPA (we call it the Consume But Don't Try Programming Act) is one of them. But even if they don't legally force you to switch to treacherous computing, the pressure to accept it may be enormous. Today people often use Word format for communication, although this causes several sorts of problems “We Can Put an End to Word Attachments”). If only a treacherous-computing machine can read the latest Word documents, many people will switch to it, if they view the situation only in terms of individual action (take it or leave it). To oppose treacherous computing, we must join together and confront the situation as a collective choice.

To block treacherous computing will require large numbers of citizens to organize. We need your help! Please support Defective by Design, the FSF's campaign against Digital Restrictions Management.

Postscripts

  1. The computer security field uses the term “trusted computing” in a different way—beware of confusion between the two meanings.

  2. The GNU Project distributes the GNU Privacy Guard, a program that implements public-key encryption and digital signatures, which you can use to send secure and private email. It is useful to explore how GPG differs from treacherous computing, and see what makes one helpful and the other so dangerous.







    When someone uses GPG to send you an encrypted document, and you use GPG to decode it, the result is an unencrypted document that you can read, forward, copy, and even re-encrypt to send it securely to someone else. A treacherous-computing application would let you read the words on the screen, but would not let you produce an unencrypted document that you could use in other ways. GPG, a free software package, makes security features available to the users; they use it. Treacherous computing is designed to impose restrictions on the users; it uses them.










  3. The supporters of treacherous computing focus their discourse on its beneficial uses. What they say is often correct, just not important.







    Like most hardware, treacherous-computing hardware can be used for purposes which are not harmful. But these features can be implemented in other ways, without treacherous-computing hardware. The principal difference that treacherous computing makes for users is the nasty consequence: rigging your computer to work against you.

    What they say is true, and what I say is true. Put them together and what do you get? Treacherous computing is a plan to take away our freedom, while offering minor benefits to distract us from what we would lose.










  4. Microsoft presents Palladium as a security measure, and claims that it will protect against viruses, but this claim is evidently false. A presentation by Microsoft Research in October 2002 stated that one of the specifications of Palladium is that existing operating systems and applications will continue to run; therefore, viruses will continue to be able to do all the things that they can do today.







    When Microsoft employees speak of “security” in connection with Palladium, they do not mean what we normally mean by that word: protecting your machine from things you do not want. They mean protecting your copies of data on your machine from access by you in ways others do not want. A slide in the presentation listed several types of secrets Palladium could be used to keep, including “third party secrets” and “user secrets”—but it put “user secrets” in quotation marks, recognizing that this somewhat of an absurdity in the context of Palladium.

    The presentation made frequent use of other terms that we frequently associate with the context of security, such as “attack”, “malicious code”, “spoofing”, as well as “trusted”. None of them means what it normally means. “Attack” doesn't mean someone trying to hurt you, it means you trying to copy music. “Malicious code” means code installed by you to do what someone else doesn't want your machine to do. “Spoofing” doesn't mean someone's fooling you, it means your fooling Palladium. And so on.










  5. A previous statement by the Palladium developers stated the basic premise that whoever developed or collected information should have total control of how you use it. This would represent a revolutionary overturn of past ideas of ethics and of the legal system, and create an unprecedented system of control. The specific problems of these systems are no accident; they result from the basic goal. It is the goal we must reject.





"

Linux Gazette January 2010 (#170):

Linux Gazette January 2010 (#170):: "

Linux Gazette 170 is out. Highlights: How to Start a Linux User Group, What's up with Google Public DNS?, and The things I do with digital photography on Linux.


Advertisement:


read more

"

full circle magazine: A new year, a new decade, and a new issue

full circle magazine: A new year, a new decade, and a new issue: "

It’s new year’s for most of the world. Not only is it a new year, it’s a new decade full of promises for the computing world and the world at large. I hope you’ve enjoyed our foray into Ubuntu and Linux for the past few years. Here’s to many more!


Advertisement:


read more

"

MICROSOFT UNLEASHES OFFICE WEB APPS

MICROSOFT UNLEASHES OFFICE WEB APPS: "MIXED START TO LIFE FOR THE BROWSER-BASED EDITION OF MICROSOFT OFFICE 2010

Microsoft has released an early technical preview of its Office Web Apps — although half the applications are still completely unusable. The browser-based versions of Word, OneNote, Excel and PowerPoint are due for release with the desktop software in the first half of next year, although only the latter two are working in the technical preview currently open to invitees only. Of those, Excel is by far the most impressive. The online app coped well with the intricate formulae and conditional formatting used in our Labs feature tables — something that rival Google Spreadsheet certainly couldn't boast. Changes made to the data were reflected in dependent fields with a delay of only a half-second or so. Although the online apps use the same Ribbon interface as the desktop software, they currently contain a fraction of the features. Only the Home and Insert tabs are present in Excel, for example, and a number of the features from even those two tabs are omitted.

Microsoft has long stated that there won't be feature parity between the desktop and online apps, but claims we can expect to see more features added as the service progresses towards a full public beta before the end of the year. The company has confirmed that Web Apps will be free of charge to consumers and small business, with 25GB of storage provided via Microsoft's SkyDrive. However, business customers who wish to run Web Apps via their SharePoint Server or as a hosted Microsoft service could face charges. 'There may be some licences where it's included in the price, and others where there's an incremental rharge,' Microsoft's Office Live product manager, Tim Kimber, told PC Pro.

Source of Information : PC Pro December 2009
"

Microsoft.com - Careers

Microsoft.com - Careers

Linux and Open Office Compete Lead(700901 -External)

Job Category: Marketing
Location: United States, WA, Bellevue
Job ID: 700901
Division: Marketing
Linux and Open Office Compete Lead, US Subsidiary (CSI Lead)

If you’re looking for a new role where you’ll focus on one of the biggest issues that is top of mind for KT and Steve B in “Compete”, build a complete left to right understanding of the subsidiary, have a large amount of executive exposure, build and manage the activities of a v-team of 13 district Linux& Open Office Compete Leads, and develop a broad set of marketing skills and report to a management team committed to development and recognized for high WHI this is the position for you!
The Commercial Software Initiative (CSI) Lead plays a pivotal role for the Subsidiary GM, the BG leads and the BMO by building a discipline within the US that is focused on competing against. The core mission of CSI is to win share against Linux and OpenOffice.org by designing and driving marketing programs, changing perceptions, engaging with Open Source communities and organizations, and drive internal readiness on how to compete with Commercial Linux and participate with Open Source Communities.

The CSI Lead owns three core objectives for the Area (and Subsidiaries) as follows:
1. Drive compete Strategy. The CSI Lead is responsible for providing a 360 degree view of the US compete environment (directly to the Compete lead and BMO) and ensuring plans are in place to help drive healthy, balanced, and sustained growth. Ability to win share and ensure growth faster than the market (Servers, IW, Web, HPC)

2. Be a Perception Change Agent. The CSI Lead needs to drive perception across a number of key audiences (IT Pros, Government Elites, BDMs, IT Journalists, etc.) Ability to implement programmatic marketing that will CHANGE THE WAY PEOPLE think about Microsoft, specifically those with a ‘hostile’ or negative perception of the Microsoft platform.


3. Build ‘Compete Muscle’ in the US. The CSI Lead owns ensuring that the region and subs are fully ready to compete against Linux and participate with Open Source Communities. This includes everything from training to being the subject matter expertise, where needed. Ability to diagnose and share problem, find root causes and pull together a team that will PLAN / DO / CHECK / ACT in the right direction.

• This includes developing PR, marketing, sales, communication and readiness infrastructure for executing competitive strategies and executing perception changes.

• You will educate our field and partners to compete and win. Work with EPG and other field organizations to profile Linux in key accounts. Drive Linux and UNIX compete content.

• Support competitive sales situations where Linux is a key competitor to help drive marquee wins and grow your US evidence. Work with your account teams and develop growth plans.

• Start a productive and positive culture of ‘Loss Reviews’ Look at the competitive pipeline regularly to see where Linux Server and OpenOffice challenges arise.

The right candidate will have a great blend of strategic, marketing and analytical skills coupled with tenacity for execution and delivery. You must be action and detail oriented with experience in the high tech marketing industry including solid experience working with cross-organizational teams to achieve superior results. The ability to multi-task and manage projects under pressure along with an unwavering persistence, commitment, passion and optimism for this work is essential. When successful, you’ll be looked to as the key expert for the Windows Server business by the entire field sales force, marketing, & executive organizations. Experience with server marketing and an MBA are pluses.

The Official Geek&Poke-The-Whole-Year-2009-In-One-Strip Strip

The Official Geek&Poke-The-Whole-Year-2009-In-One-Strip Strip: "
Swine





Update: Sorry, I forgot: Happy new year to all Geek&Poke readers!



"

DRM and the Destruction of the Book

DRM and the Destruction of the Book: "Hugh Pickens writes "EFF reports that Cory Doctorow spoke to a crowd of about a hundred librarians, educators, publishers, authors, and students at the National Reading Summit on How to Destroy the Book and said that 'anyone who claims that readers can’t and won’t and shouldn’t own their books are bent on the destruction of the book, the destruction of publishing, and the destruction of authorship itself.' Doctorow says that for centuries, copyright has acknowledged that sacred connection between readers and their books and that when you own a book 'it’s yours to give away, yours to keep, yours to license or to borrow, to inherit or to be included in your safe for your children' and that 'the most important part of the experience of a book is knowing that it can be owned.'"

Read more of this story at Slashdot.

"

Distro Review: Linux Mint 8

Distro Review: Linux Mint 8: "

Default Mint Desktop


I’m a bit late with this review I know, but the distro releases have been so thick and fast lately I just couldn’t keep up. Today I’d like to talk to you about Linux Mint 8, AKA Helena. I’ve said this many times before, but the codenames still sound a little tacky to me. The distro itself is anything but tacky though and it’s been one of my firm favourites in the past. How would this release stack up? Well, I’ll tell you…


Vital Stats:

Distro base – Ubuntu (itself based on Debian)

Packaging – .deb (Managed by the mighty Apt)

Linux Kernel – 2.6.31-14-generic

Default Desktop – Gnome 2.28



Installation:


Setting Time Zone

Setting Time Zone


I began by downloading the standard Linux Mint 8 install CD, foregoing the Universal version. For those interested in the differences between the two, the Universal version is actually a much larger download and contains support for a lot more languages. I suppose the name should have made that obvious really, but I always thought there must be more technical differences. Firing up the LiveCD worked like a treat as expected and I was soon loading into a live session, from which I could install the new system. The look of Mint is always very nice and they seem to take a lot of time over the desktop themes, wallpapers and so on. This release is no exception in that department and it looks beautiful. Clicking the install shortcut located on the desktop I wasted no time in getting into business. If you’re new to Linux or just the whole LiveCD model in general, don’t be fooled by the slowness of a live session. This usually bears no real reflection on how the final install will perform on your hardware. It’s just that constantly loading data from a CD is much slower than a hard drive, so don’t panic.


Disk Partitioning


The Mint installer is inherited from Ubuntu 9.10 and they don’t seem to have modified this much, I guess it didn’t need it. The Ubiquity installer is one of my favourites and one area where Ubuntu has really done a lot for the Linux experience. That’s not to say that other distro installers aren’t good, they are. I just think the work on Ubiquity has been a catalyst for overall installer development, which is a good thing. I proceeded through all the usual stages of set up, time zone & localisation, user details etc. I also chose my normal partitioning scheme of 12gb root (/), 4gb swap and remaining 140gb(ish) as /home. It only took a minute or two to configure the installer and I set it on its way. You are now treated to a slideshow during the Mint install, a feature I noticed in Ubuntu Karmic. It’s a nice touch. The install process itself took about 10 minutes all together, and you really couldn’t complain at that. I was then prompted to reboot and remove the disc to boot into the new system.


All in all the installation was quick and painless. I think the Ubiquity installer has to take most of the credit here, but it’s good that the Mint devs realised not to mess about trying to change it. Concentrating instead on other areas of the distro which actually need attention.



FULL INSTALLATION SLIDE SHOW


Customising The Desktop:


My Finished Desktop


Much as I love Mint, there are a few things about the default desktop layout I’m not crazy about. These may be purely personal preferences but I’ve never understood why there’s no workspace switcher on view by default. I’ve speculated before that perhaps this is meant to make the desktop more recognisable to fresh Windows exiles, but being able to use multiple workspaces is something I’ve loved about the many Linux desktop environments I’ve used over the years. Apple even added this feature to OS X themselves quite recently, about 10 years after us. So one of the first things I do with any new Mint install is to modify the desktop configuration. It only takes a few minutes, but I’ll share this process with you now. Firstly I move the bottom toolbar to the top of the screen, making it more like a traditional Gnome set up. That’s simple. I then add a workspace switcher and dock it next to the notification area on the bar. Next I install the Avant Window Navigator and configure that at the bottom of the screen. I’ve skipped a step here which I should point out. Before you can install AWN you need to have working 3D graphics drivers. In my case this involves installing the restricted and evil Nvidia drivers, which is really simple on Mint. The Restricted driver manager prompts you to do this if you have a freedom hating card. With AWN installed I set it to start automatically on login and add all my shortcuts. You can see an example of my finished desktop layout in the screenshots. Mac fans will be quick to point out this looks much more Mac-like and that’s a fair comment, I do like having a dock at the bottom of me screen. As I said, these changes to the default set up are quick and this is the most work I ever have to do with Mint. Codecs, Flash, Java and all the other things you often need for a home desktop are already installed. Adding software yourself is also a simple process. Let’s look at that in more detail.


Who Made Who?


Shoulders Of Giants


Mint is based on Ubuntu Linux and because of that some people have dismissed it as nothing more than Ubuntu with added media codecs, proprietary apps and a green paint job. I’ve long countered that assumption and I believe there’s a lot more to it as a distribution in it’s own right. That fact just gets more and more evident with each new release. Mint benefits from a lot of Ubuntu development of course, but Ubuntu in turn benefits from Debian development, Gnome development and Kernel development if you want to analyse it down to that level. The accusation is a bit unfair. Mint has many custom tools such as the Software Manager, MintUpdate, MintAssistant, MintUpload, MintBackup, MintNanny and more. If you haven’t tried it before that’s worth keeping in mind.


The Software Manager:


The Software Manager


One of the big changes made to Ubuntu with 9.10 was the addition of the Ubuntu Software Centre. I commented at the time that this was oddly reminiscent of the tool developed for Mint a long time ago. Despite some initial hesitation I actually liked the Ubuntu Software Centre very much, so I wondered if Mint would abandon their own Software Manager tool and adopt this new offering. They haven’t, instead they’ve made improvements to their own Software Manager and strengthened it. A big change is the ability to mark and install multiple programs in one action. This was sorely needed and it speeds greatly things up. I also noticed the “featured applications” button and I think this could really help newcomers to the platform. It offers a list of the most commonly installed packages and even some things you might not expect to find in the repositories, such as Skype and Google Earth. I like that it gives you user reviews and a whole wealth of of other information on each application right in the installer. I did find it a little odd that you can’t right-click on items in the list to get up a contextual menu though, perhaps this is just a bug. The Software Manager has come a long way since it first appeared in Mint a couple of years ago and it’s one area where perhaps the pupil has taught the master a lesson, in respect to the Ubuntu/Mint relationship at least. I like both the new Ubuntu tool and the Software Manager in Mint and I’d really like to see them work more collaboratively to produce one really stellar tool, but I won’t hold my breath. People have often asked me why these Mint innovations don’t make their way back upstream into Ubuntu and I can’t explain that. The same question could be asked about the lack of Ubuntu tools making their way back into Debian I suppose. I know they’re working hard but it would be nice to see more collaboration from all parties. One slight downside to the Mint Software Manager is that it doesn’t list all the available packages you could get with Apt-Get or Synaptic. I’ll illustrate this point in the screen shots. Here’s the result when I search for Gwibber in the Software Manager…


Gwibber search in Software Manager


Gwibber search in Synaptic


…but if I open up Synaptic and do the same there it is. This could confuse some new users and it would be good to consolidate. I’m not sure of the exact solution but it wouldn’t seem that hard to me to make Software Manager display all the results of an “apt-cache search” command somewhere. Perhaps they could be colour coded to differentiate, or even put into another panel if that’s easier. It would make a lot more sense to unify the process and could give Mint a real edge. Just a suggestion.


Conclusions:

Ease Of Installation & Use: 5/5

Stability: 5/5

Speed: 4/5

Community & Documentation: 4/5

Features: 4/5

Overall: 5/5


Chromium browser image

Chromium Installed From PPA


I went into Linux Mint 8 with high expectations from previous releases and I wasn’t let down. I like the custom tools they’ve added on top of a solid Ubuntu base, and I’ve said many times this is the best distribution for anyone new to Linux. I see no reason to alter that assertion. This release has added a few little features like the OEM install options and many improvements to the Mint Menu, but it seems to be mostly a consolidation of previous work. There’s nothing wrong with that. For me it gives by far the most complete home desktop experience of any distro out of the box. Everything you could need is here, and if you do want to add something else the Software Manager makes it easy. For more advanced users the benefit of Ubuntu compatibility means you can still add PPAs and get involved in the Ubuntu community if you like. It not a distribution for freedom crusaders though, and if your primary concern is Free Software values I’d advise you to look elsewhere. Perhaps Fedora or something off the FSF approved list would suit those people better.


The Mint Menu in action

Mint Menu


There seems to be a fairly strong community around Mint and this will only be improved by the development of a new website. It’s in the early stages but the idea is to provide a kind of social networking platform for Mint users, where they can post ideas and rate the suggestions of others. I’ll be very interested to see how that develops. The size of the Mint following isn’t close to Ubuntu in sheer numbers at least, but once again the Ubuntu compatibility means that most guides and tutorials will work the same here. I’m a big fan of Mint and I make no secret of that fact, but as always I’ve done my best to assess it fairly and objectively. Some people will disagree with the 5 star rating I’ve given it I’m sure, but it’s as close as I’ve ever seen to distro perfection. For my own taste at least, I find it very comfortable and easy to settle into each time I stop by. It will continue to be the CD I give to people when they come to me and say “what’s this Linux business about then?”. I think that says it all. Truly advanced users and kernel hackers may find something else suits them better, but for the rest of us this is a great option.


Don’t take my word for it, try out Mint for yourself and let me know what you think in the comments. You might think I’m completely wrong and you’re welcome to say so. All I ask is that you do it in a reasonably civilised manner.


YOU CAN GET LINUX MINT 8 HERE


Up next…

Just before Christmas I was fortunate enough to be sent an N900 Linux-based phone from Nokia. It’s my first real smartphone (a fact that shocked many people) and while I can’t compare it to the iPhone or an Android device directly, I would like to give you my assessment of it. The Debian-based Maemo operating system is very interesting, coupled with the fact that you get easy root access and it even runs my own shoddy Python code. Join me for that in the New Year. If you have any suggestions for other things I should look at please feel free to send them to me or leave comment. I’ll see you all back here in 2010 for more adventures…




"

New Open Source Intrusion Detector Suricata Released

New Open Source Intrusion Detector Suricata Released: "richrumble writes 'The OISF has released the beta version of the Suricata IDS/IPS engine: The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will bring new ideas and technologies to the field. This new Engine supports Multi-Threading, Automatic Protocol Detection (IP, TCP, UDP, ICMP, HTTP, TLS, FTP and SMB! ), Gzip Decompression, Fast IP Matching and coming soon hardware acceleration on CUDA and OpenCL GPU cards.'

Read more of this story at Slashdot.

"

Microsoft Cracks Down On Windows Piracy In China... So Pirating Group Offers Up Ubuntu That Looks Like XP

Microsoft Cracks Down On Windows Piracy In China... So Pirating Group Offers Up Ubuntu That Looks Like XP: "It's been pointed out before how much Microsoft has benefited from having its operating system and office suites 'pirated,' in that it helped make Microsoft a de facto standard, that created lock-in and network effects, that helped make Microsoft into the massively successful company it is today. Even Bill Gates has famously said:

'And as long as they're going to steal it, we want them to steal ours. They'll get sort of addicted, and then we'll somehow figure out how to collect sometime in the next decade.'

Except... of course, Microsoft has been pushing hard to 'stop' that kind of 'piracy' in China, and it may be having an unintended effect. Slashdot points us to the news that a group that had been offering pirated copies of Windows is now offering a copy of Ubuntu Linux, designed to look just like Windows XP. So, congrats, Microsoft, in 'stopping' some piracy in China, you may just be driving users to Linux instead.

Permalink | Comments | Email This Story






"

Developing a Successful Open Source Training Model

Developing a Successful Open Source Training Model: "Training programs for open source software provide a tangible, and sellable, product. A successful training program not only builds revenue, it also adds to the overall body of knowledge available for the open source project. By gathering best practices and taking advantage of the collective expertise within a community, it may be possible for a business to partner with an open source project to build a curriculum that promotes the project and supports the needs of the company's training customers. This article describes the initial approach used by Canonical, the commercial sponsor of the Ubuntu Linux operating system, to engage the community in the creation of its training offerings. We then discuss alternate curriculum creation models and some of the conditions that are necessary for successful collaboration between creators of existing documentation and commercial training providers."

Open Source User Assistance: Ensuring That Everybody Wins

Open Source User Assistance: Ensuring That Everybody Wins: "This article describes the importance of user assistance to the success of open source projects and offers some suggestions on fostering community contributions to open source user assistance. The term 'user assistance' encompasses all the ways that users get help in figuring out how to use a product, spanning the traditional categories of both documentation and support. User assistance provides opportunities for participation by community members who are not software developers. This in turn relieves the burden on developers for filling these roles while broadening the community. Projects should support the differing motivations of members in these roles while providing leadership and direction, removing barriers to contribution, and engaging in concerted efforts. Licensing for open source documentation should likewise be open, to support user freedom and foster community collaboration. Leaders in open source user assistance need to share ideas across projects in order to improve their offerings."

Why Schools Should Learn To Use Online Services Like Facebook & YouTube Rather Than Banning Them

Why Schools Should Learn To Use Online Services Like Facebook & YouTube Rather Than Banning Them: "It's no secret that we live in a world of moral panics -- where new technologies are feared by those who don't understand them, often leading to regulations that block their potential. For years now, a number of politicians have sought laws to ban social networks in schools, assuming that they are either bad or simply inappropriate for schools. While those laws have yet to pass, many schools already do ban access to social networks and other sites. I've never quite understood how this makes sense. Rather than training students to use those sites properly, now they're seen as forbidden -- which only makes them more attractive to students, while making it even clearer that students won't be prepared to handle those sites properly. On top of that, as more powerful mobile phones become popular, students will easily bypass the school's own network and access those sites on their own -- and there will be nothing the schools can do about it.



So it's nice to see a sensible opinion piece in Slate arguing that rather than ban or block social online services like Facebook and YouTube, schools should be embracing them and looking for ways to incorporate them into the learning process. There are a variety of strong arguments for why this makes sense, but two that stick out:

  1. Students already like using these sites quite a bit. Using those sites to make other things more relevant and interesting seems like a good way to reach kids in a manner that they understand, and which doesn't feel quite as much like 'education,' but more like something fun that they want to do.
  2. Using these kinds of free tools may be cheaper, easier and much more effective than a number of the super expensive e-learning tools out there, which would require a steep learning curve anyway. But incorporating lesson plans and info and assignments into the tools that students already use would be both cheaper and more likely to actually be used.

Of course, some will decry that these sites are automatically bad for kids -- or that it makes no sense to waste time on such issues. But the fact is kids are going to use these sites no matter what. Ignoring that doesn't change that. Banning the sites doesn't change that. It just makes the activity more underground without any oversight or reasonable lessons. But incorporating the technology into the educational efforts could actually get a lot more attention. Yes, some of the examples in the Slate article seem pretty lame (and would be seen as such by the kids), but if done right, it really could add a lot more value to students' educations.

Permalink | Comments | Email This Story






"

Apple Censors Dalai Lama iPhone Apps In China

Apple Censors Dalai Lama iPhone Apps In China: "eldavojohn writes 'Google and Yahoo! have relinquished any sort of ethical integrity with regards to free speech in China but Apple appears to be following suit by blocking Dalai Lama applications in the Chinese iPhone app store. An official Apple statement reads, 'We continue to comply with local laws. Not all apps are available in every country.' A small monetary price to pay for the economic boon that is the blooming Chinese cell phone market but a very large price to pay for that in principals.'

Read more of this story at Slashdot.

"