Posted by:
admin
15 years, 11 months ago
I haven't seen many criticisms of the $100 laptop project. It's hard to criticize something that is being done for altruistic reasons. I have always thought that it was not what was needed. Clean water, mosquito netting, text books, schools, things like that seemed more important to me, but since I'm not doing anything (except giving platelets), who am I to talk?
I do have a friend who is qualified to talk about it, having spent a lot of time in some of the worse places in Africa, including the Congo and Mogadishu during particularly scary times. Here are his thoughts on the one laptop per child project.
I'm not one to call the kettle black, for the international development and disaster relief business is rife with fantasies and funding dedicated to a 'better world' for the most destitute of the planet. But at Davos, where so many rich people and self-proclaimed visionaries mingle annually, one would expect their underlings to have researched what prior forms of literacy, infrastructure and knowledge are required if a computer is to mean anything other than spacejunk to an subsistence farmer, a former child soldier, or the third wife of a man with 27 children to feed.
Read the entire post to find out what Dinka of Southern Sudan do with CDs.
My prediction for the $100 laptop: If 100 laptops get to a village, 99 will be on Ebay the next day. That will get food for the village for a year or a decade or so depending on prices. The last laptop will be shared, hopefully.
Share on Twitter Share on FacebookRecent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)