LGBT communities have relied on broadband technology in several unique ways since its earliest inception. In many instances the Internet served to decrease isolation and spark empowerment by eliminating geographic barriers that long separated LGBT individuals and their communities.
Cape Town is to host the 3rd annual African Creative Economy Conference from 6-9 October 2013 - a three-day intensive programme of exchanging cutting-edge information and innovative ideas about Africa’s creative economy.MissionTo place great focus on and generate attention about the continent’s creative industries, not just as economic drivers but also to highlight the potential contribution of the Creative Industries to the eradication of poverty, democracy and human rights.Description
The African Creative Economy Conference (ACEC) is a unique opportunity to empower yourself in a three-day intensive programme of exchanging cutting-edge information and innovative ideas. With Africa’s current share of the global creative economy at less than 1%, the conference will focus on unlocking the potential of the continent’s creative industries and leapfrogging into emerging high-growth sectors of the world economy.
The Conference programme will broadly cover:
• Examining and re-defining the creative industries under African conditions and their relevance to African economic, social and political developments;
• Undertaking and sharing detailed, up-to-date research on each sector in the creative industries; and
• Discussing the creative industries and their relevance within the broader political and economic context. For example, the role of BRICS countries in Africa, and the impact of countries such as China on the creative industries.
This event will be of particular interest to creative practitioners, government bodies and policy makers, academics, researchers, entrepreneurs, journalists and many others.
For more information about ACEC, visit www.acec2013.org.za
The NSA has released some details of 12 incidents in which analysts used their access to America’s high-tech surveillance infrastructure to spy on girlfriends, boyfriends, and random people they met in social settings. It’s a fascinating look at what happens when the impulse that drives average netizens to look up long-ago ex-lovers on Facebook is mated with the power to fire up a wiretap with a few keystrokes.
From Wired Threat Level. There’s a nicely interactive viewer for reading the documentation disclosing these incidences, if you’re so inclined.
How two Microsoft employees uncovered a suspicious flaw in a federally approved algorithm that some say is an NSA backdoor.In August 2007, a young programmer in Microsoft’s Windows security group stood up to give a five-minute turbo talk at the annual Crypto conference in Santa Barbara.
Dan Shumow and his Microsoft colleague Niels Ferguson titled theirs, provocatively, “On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng.” It was a title only a crypto geek would love or get.
The talk was only nine slides long (.pdf). But those nine slides were potentially dynamite. They laid out a case showing that a new encryption standard, given a stamp of approval by the U.S. government, possessed a glaring weakness that made an algorithm in it susceptible to cracking. But the weakness they described wasn’t just an average vulnerability, it had the kind of properties one would want if one were intentionally inserting a backdoor to make the algorithm susceptible to cracking by design.
For such a dramatic presentation — by mathematicians’ standards — the reaction to it was surprisingly muted. “I think folks thought, ‘Well that’s interesting,’ and, ‘Wow, it looks like maybe there was a flaw in the design,’” says a senior Microsoft manager who was at the talk. “But there wasn’t a huge reaction.”
Six years later, that’s all changed.
Early this month the New York Times drew a connection between their talk and memos leaked by Edward Snowden, classified Top Secret, that apparently confirms that the weakness in the standard and so-called Dual_EC_DRBG algorithm was indeed a backdoor. The Times story implies that the backdoor was intentionally put there by the NSA as part of a $250-million, decade-long covert operation by the agency to weaken and undermine the integrity of a number of encryption systems used by millions of people around the world.
The Times story has kindled a firestorm over the integrity of the byzantine process that produces security standards. The National Institute of Standards and Technology, which approved Dual_EC_DRBG and the standard, is now facing a crisis of confidence, having been forced to re-open the standard for public discussion, while security and crypto firms scramble to unravel how deeply the suspect algorithm infiltrated their code, if at all. On Thursday, corporate giant RSA Security publicly renounced Dual_EC_DRBG, while also conceding that its commercial suite of cryptographic libraries had been using the bad algorithm as its default algorithm for years.
How ancient Africans were the first nerds: Birth of technology traced back 70,000 years to the continent’s southern tip.
Modern human technology began more than 70,000 years ago in South Africa before spreading to communities elsewhere, a new study claims.
It was there that our ancestors made the first bone tools, the first abstract art, the first jewellery and probably the first stone tipped spears and arrows, research shows.
The claims, based on archaeological findings over the past decade, contradict the widely held belief that modern human behaviour originated in Europe about 40,000 years ago.
The first nerds? A reconstruction of a Homo sapiens hunting party from the BBC documentary Planet of the Apeman. New research traces the birth of technology 70,000 years to southern Africa
They chime with findings published just last month which suggested that the development of long-range weapons in Africa was the technological breakthrough which allowed humans to become the dominant species.
Click here for the full article.
Read more: http://www.dailymail.co.uk/sciencetech/article-2243946/How-ancient-Africans-nerds-Birth-technology-traced-70-000-years-continents-southern-tip.html#ixzz2brOXnjDA
Follow us: @MailOnline on Twitter | DailyMail on Facebook
fuck you racist anthropologists—get a load of this shit
pssst Azaelia and company.
Mihoko Ogaki | www.mihoko-ogaki.com
In her ongoing series of figurative sculptures titled Milky Ways, artist Mihoko Ogakiexplores ideas of life, death, and rebirth. The dead or dying human forms are constructed from Fibre-reinforced plastic and embedded with bright LEDs that when lit project fields of light resembling stars in the surrounding space. You can see many more installation views over on her website.
I am so enthralled by this.
Crowdsourcing project Ushahidi develops tools to facilitate blood donations and help users contact loved ones in a crisis
The terror attacks by a group of suspected al-Shabaab militants at the Westgate mall in Nairobi shocked residents of the city and placed a heavy burden on emergency services.
Following the horrible attack, Ushahidi has come up with two tools for emergencies. Ushahidi is a non-profit technology company that specialises in developing free and open source software for information collection, visualisation and interactive mapping.
Ushahidi, which means “testimony” in Swahili, was initially developed to map reports of violence in Kenya after the post-election fallout in 2007/8.
It’s new app, the Ping is a binary, multichannel tool that will help families, friends and companies to quickly make contact to check that their loved ones and colleagues are safe:
There was a consistent problem in every disaster that happens, not just in Kenya, but everywhere. Small groups, families and companies need to quickly check in with each other. They need to “ping” one another to make sure they’re okay. It has to be something incredibly simple, that requires little thinking to use. People have been doing some stuff in this space in the past, the best like “I’m Ok” are focused on smartphone users, but we have a need to make it work for even the simplest phones. Our goal is to have this available for anyone globally to use.
This is how the Ping works:
1. You create a list of your contact (family, organisation), and each person also adds another contact who is close to them (spouse, roommate, boy/girlfriend, etc).
2. If a disaster happens, you send out a message for everyone to check-in. The app admin sends out a 120 character message that always has “are you ok?” appended to the end. This goes out via text message and email (more channels can be added later).
3. The message goes out three times, once every five minutes. If there is a response, then that person is considered safe. If no response, then three messages are sent to their other contact.
4. Each response is filed into one of three areas: responded (verified), not responded, not ok.
Another tool is Blood Donation Kenya, which is a crowdmap of all locations of blood drive centres. The map matches blood location centres with people willing to help with donation, medical instruments or medical personnel.
Erik Hersmann explains the logic behind the map:
One of the most amazing guys in Kenya in any emergency is Philip Ogola of the Kenya Red Cross. He’s first on scene with great updates, but there’s only so much that one person can do. Now, the Kenya Red Cross itself has been doing incredible work, but they have a problem with a lot of their stuff still being paper and pen (and there’s another group working on a locally hosted database system to digitize this without putting real people’s names online, run by Nivi of eLimu). Another problem that they have is that the hospitals are running short on some types of blood, and are overwhelmed with others, as the Kenyan population comes out in full force to donate blood.
(We asked) how can this be managed better, so that people aren’t turned away from some places and so that they know where to go for their type?
Hersmann said Ushahidi had set up a crowdmap deployment to map the locations of all blood drive centres, in an effort to match these areas with those willing to help at BloodDonationKenya.Crowdmap.com.
How to Answer the Top 35 Asked Interview Questions from The Undercover Recruiter here. Posted for friends looking for jobs this summer.Unfortunately you may also be asked illegal questions and these are two pretty good articles here and here.
NOT WRITING RELATED BUT GOOD TO KNOW