cyberenviro | eportfolio

gregory donovan's eportfolio (a syndication of cyberenviro.org)

Archive for cyberenviro

outtake: governing the semantic web

Another outtake from the article Cindi Katz and I have been writing on the relationship between U.S. children and young people and their technological environments in the post-9/11 security state:
In their pursuit of both national and homeland security as well as the creation of new markets, the state and corporations are engaging the free-flowing horizontal […]

wiretapping – at&t’s new marketing strategy

I’ve been meaning to write about this for a while now, but what with article deadlines, ecycolpedia entries, the NUDA Summer School, and Euro-SSIG, I’m just now getting around to it. Back in June, at&t briefly flirted with the idea of using the scandal surrounding their illegal wiretapping of U.S. citizens’ domestic and international communications […]

outtake: public wi-fi & nola

The following is an outtake from an article Cindi Katz and I have been writing on the relationship between U.S. children and young people and their technological environments in the post-9/11 security state. Once/if the final article is published, I’ll post a link to it here. In the meantime, consider this a “teaser.”
These shifts, and […]

goodbye learning, hello workforce training

Some sad news regarding the One Laptop Per Child (OLPC) project:

Microsoft has joined forces with the developers of the “$100 laptop” to make Windows available on the machines.
According to Wired, Microsoft has had their sights on emerging markets in developing countries for a while now and have viewed low-cost children’s laptops as ideal vehicles for […]

we are the ones we’ve been waiting for…

From the conclusion of Chopra & Dexter’s (2007, p173) Decoding Liberation: The Promise of Free and Open Source Software:

Jacques Ellul imagined an iron cage constructed of technology (Ellul 1967), but never the possibility that the cage could be unlocked by its prisoners. We began with a historical note on hacking: the significance of hacking should […]

Next entries »