The Object Of Education Is Learning, Not Teaching

This article from Russell Ackoff on education is great: The Objective of Education Is Learning, Not Teaching.

Here’s a snippet: “Traditional education focuses on teaching, not learning. It incorrectly assumes that for every ounce of teaching, there is an ounce of learning by those who are taught. However, most of what we learn before, during, and after attending schools is learned without its being taught to us. A child learns such fundamental things as how to walk, talk, eat, dress, and so on without being taught these things. Adults learn most of what they use at work or at leisure while at work or leisure. Most of what is taught in classroom settings is forgotten, and much of what is remembered is irrelevant.”

Humans Are The Routers

Humans as Routers

The Future of Free Communication

Two very important quotes in this article which may have forever changed the way I think about the Internet and communications. To give you context in case you don’t know, routers control Internet traffic throughout the world (which is why Cisco became a dot com darling). Because we are still dependent on routers, dictators can kill communication in their country by telling ISPs to shut down. Give people access to information and give them a voice and amazing things happen.

KEY QUOTE

“I was sitting in front of Secretary Clinton and when she asked me a question I said, “Secretary Clinton, the last bastion of dictatorship is the router.” That night seeded some of the ideas that were core to Secretary Clinton’s important Internet Freedoms Speech on January 21, 2010.”

KEY QUOTE

“Free communications is an essential human right. The 21st Century will be defined by the idea that no Government, no power shall ever block or filter the right of all men and women to communicate together again.”

What are Routers?

Physical devices that direct internet traffic across networks. They form the critical infrastructure of the internet, controlling where and how data flows.

Internet Kill Switch

When governments order ISPs to shut down routers, cutting off internet access for entire regions or countries, preventing communication and information flow.

Mesh Networks

Decentralized networks where devices connect directly to each other, bypassing traditional infrastructure. When humans become routers, information can flow despite central control.

Why This Matters

Democratic Movements

Protesters and democratic movements rely on communications to organize and share information with the outside world.

Human Rights

Access to information and the ability to communicate freely are increasingly recognized as fundamental human rights.

Technological Solutions

New technologies like mesh networks can help ensure communication remains possible even when traditional infrastructure is compromised.

“The last bastion of dictatorship is the router.”

Further Reading

Humans Are The Routers

TechCrunch article that inspired this post about how people can become the network infrastructure.

Clinton’s Internet Freedoms Speech

Secretary Clinton’s groundbreaking speech about internet freedom as a fundamental right.

Join the Conversation

How do you think technology can help protect free communication around the world?

How Transparency Can Save Lives

WikiLeaks logo

“Consider the mosquito borne disease malaria. This year, malaria will kill over one million people, over 80% of which will be children. Great Britain used to have malaria. In North America, malaria was epidemic and there are still a handful of infections each year. In Africa malaria kills over 100 people per hour. In Russia, amidst the corruption of the 1990s, malaria re-established itself. What is the difference between these cases?

We know how to prevent malaria. The science is universal. The difference is good governance.”

Put another way, unresponsive or corrupt government, through malaria alone, causes a children’s “9/11” every day.

The Mission of Transparency

It is only when the people know the true plans and behavior of their governments that they can meaningfully choose to support them. Historically, the most resilient forms of open government are those where publication and revelation are protected. Where that protection does not exist, it is our mission to provide it.

Case Study: Kenya

In Kenya, malaria was estimated to cause 20% of all deaths in children under five. Before the Dec 2007 national elections, WikiLeaks exposed $3,000,000,000 of Kenyan corruption and swung the vote by 10%. This lead to enormous changes in the constitution and the establishment of a more open government — one many hundreds of reforms catalyzed by WikiLeaks.

The Numbers Behind the Crisis

1,000,000+

People killed by malaria annually

80%

Victims are children

100+

Deaths per hour in Africa

The Power of Good Governance

Where Governance Failed

  • Russia in the 1990s — corruption allowed malaria to return
  • Africa — inadequate healthcare infrastructure and corruption
  • Kenya — 20% of under-five deaths from a preventable disease

Where Governance Succeeded

  • Great Britain — complete eradication of malaria
  • North America — from epidemic to only occasional cases
  • Post-2007 Kenya — reforms catalyzed by transparency

We believe WikiLeaks is the strongest way we have of generating the true democracy and good governance on which all mankind’s dreams depend.

Hire A Clown To Stalk Your Kids

Evil Clown Birthday Service

When a Week of Terror Ends with Cake in Your Face

Evil Clown with pie
Dominic Deville, the Evil Clown of Lucerne

Imagine a week of being stalked by a terrifying clown who sends chilling texts, makes prank phone calls, and leaves ominous notes warning that you’re being watched. This isn’t the plot of a horror film — it’s a birthday service offered in Switzerland that culminates in a surprise cake attack.

“The clown’s one and only aim is to smash a cake into the face of his victim, when they least expect it, during the course of seven days.”

How the Evil Clown Service Works

The Stalking Phase

Dominic Deville stalks young victims for a week, sending chilling texts, making prank phone calls and setting traps in letterboxes. He posts notes warning children they are being watched, telling them they will be attacked.

The Target’s Experience

“The child feels more and more that it is being pursued,” said Deville. The psychological tension builds over the course of the week as the victim never knows when the clown might strike.

The Grand Finale

The week of terror culminates in a “hit” — being splatted in the face with a cake when least expected. If the child manages to avoid the attack, they receive the cake as a birthday present instead.

Safety Precautions

Parental Oversight

The frightening fun can be stopped at any time, which is handy for parents who have second thoughts and don’t fancy the cost of child therapy.

Clear Boundaries

“The clown will never break into a residence or show up at work,” Deville assures. “It’s all in fun and if, at any point, the kids get scared or their parents are concerned, we stop right there.”

Clown Industry Reactions

🤡

Despite concerns about coulrophobia — the fear of clowns that many wouldn’t consider “irrational” after a week of being stalked — some industry professionals support the service.

“I think what Dominic is doing is a great idea,” said Stephen Vaughan of Clowns International. “Bringing a little bit of life and laughter into kids’ lives is what we are all about.”

Horror Inspiration

Deville set up his Evil Clown service in Lucerne, Switzerland, after being inspired by some of his favorite horror films – possibly including Stephen King’s “It” and “Killer Klowns From Outer Space.”

Stephen King’s “It”

🎈

The iconic novel featuring Pennywise, perhaps the most terrifying clown in fiction

Killer Klowns From Outer Space

👽

The cult classic 1988 horror comedy featuring alien clowns who harvest humans

Traditional Pie Gag

🥧

A classic clown routine reimagined as the culmination of a week of terror

Would You Hire an Evil Clown?

According to Deville: “Most kids absolutely love being scared senseless.”

Would you consider hiring an evil clown for your child’s birthday, or do you think this service takes “scary fun” a step too far?

Share Your Thoughts

Would you hire the Evil Clown service for your child? Or would you require therapy just reading about it? Comment below!

Internet Bill Of Rights

A Bill of Rights in Cyberspace

Proposed by Jeff Jarvis, author of “What Would Google Do?”

Jeff Jarvis, author of What Would Google Do? wrote the below rights we should have for the Internet (source):

The Rights

I. We have the right to connect.

This is a preamble and precondition to the American First Amendment: before we can speak, we must be able to connect. Hillary Clinton defines the freedom to connect as “the idea that governments should not prevent people from connecting to the internet, to websites, or to each other.” It is this principle that also informs discussion of net neutrality.

II. We have the right to speak.

No one may abridge our freedom of speech. We acknowledge the limitations on freedom of speech but they must be defined as narrowly as possible, lest we find ourselves operating under the lowest common denominator of offense. Freedom is our default.

III. We have the right to speak in our languages.

The English language’s domination of the internet has faded as more languages and alphabets have joined the net, which is to be celebrated. But Ethan Zuckerman also cautions that in our polyglot internet, we will want to build bridges across languages. We will want to speak in our own languages but also speak with others’.

IV. We have the right to assemble.

In the American Bill of Rights, the right to assemble is listed separately from the right to speak. The internet enables us to organize without organizations and collaborate and that now threatens repressive regimes as much as speech.

V. We have the right to act.

These first articles are a thread: We connect to speak and speak to assemble and assemble to act and that is how we can and will change the world, not just putting forth grievances but creating the means to fix them. That is what threatens the institutions that would stop us.

VI. We have the right to control our data.

You should have access to data about you. And what’s yours is yours. We want the internet to operate on a principle of portability, so your information and creations cannot be held prisoner by a service or government and so you retain control. But keep in mind that when control is given to one, it is taken from another; in those details lurk devils. This principle thus speaks to copyright and its laws, which set the definitions and limits of control or creation. This principle also raises questions about whether the wisdom of the crowd belongs to the crowd.

VII. We have the right to our own identity.

This is not as simple as a name. Our identity online is made up of our names, addresses, speech, creations, actions, connections. Note also that in repressive regimes, maintaining anonymity — hiding one’s identity — is a necessity; thus anonymity, with all its faults and baggage and trolls, must also be protected online to protect the dissenter and the whistleblower. Note finally that these two articles — controlling our data and our identities — make up the right to privacy, which is really a matter of control.

VIII. What is public is a public good.

The internet is public; indeed, it is a public place (rather than a medium). In the rush to protect privacy, we must beware the dangers of restricting the definition of public. What’s public is owned by the public. Making the public private or secret serves the corrupt and tyrannical.

IX. The internet shall be built and operated openly.

The internet must continue to be built and operated to open standards. It must not be taken over or controlled by any company or government. It must not be taxed. It is the internet’s openness that gives it its freedom. It is this freedom that defines the internet.

Freedom

The internet’s value lies in its freedom from control by governments, corporations, or other institutions that seek to limit expression.

Openness

Open standards and protocols ensure the internet remains a platform for innovation, expression, and collaboration available to all.

Privacy

Control over personal data and identity is fundamental to protecting individual liberty in the digital age.

Join the Discussion

What other rights should be included in an Internet Bill of Rights? Which of these principles do you feel is most important to preserve?

Why One Auschwitz Survivor Avoided Doctors For 65 Years

Yitzhak Ganon survived Auschwitz SS doctor Josef Mengele's medical experiments

Sixty-five years ago, infamous Auschwitz doctor Josef Mengele removed Yitzhak Ganon’s kidney without anesthesia. The Greek-born Jew swore never to see a doctor again — until a heart attack last month brought his horrific tale into the open.  >> Read the full article

Renovating American Infrastructure

 Roads, Bridges & Trains Paul Wootton

I was talking with Scott at lunch yesterday about our normal random things and somehow we got on the subject of America’s infrastructure.  I was telling him I recently read a great article from Popular Science about renovating America’s infrastructure and wanted to share with everyone as well.  The following is an excerpt: “Chicago road crews are scrambling to fill 67,000 potholes a month. Communities in Pennsylvania rely on 100-year-old water pipes made of wood. Squirrels still cause widespread blackouts. The country’s 600,000 bridges, four million miles of roads, and 30,000 wastewater plants desperately need attention. The solution isn’t patches, it’s an overhaul. Soon roads and power lines will fix themselves, and we’ll mine energy from sewage. America’s 21st-century tune-up won’t happen overnight, but we could start reaping the benefits (faster broadband! cleaner water!) within the next few years.”  >> Read the full article

An Unusual Love Story (Email I Received)

Friends Forever – An orangutan was in a rescue and not doing well.  This old hound wandered in absolutely emaciated and the orangutan snapped to like his buddy had arrived. He stayed with the hound night and day until he was well and in the whole scenario found a reason to live.  Suryla and Roscoe are now inseparable.

ATT5249162
Where you lead, I will follow...best friends Suryia the orangutan and Roscoe the Blue Tick hound.
ATT5249163
Doggy paddle's the order of the day here for the couple who live at the Tiger's Sanctuary in Myrtle Beach , SC.
ATT5249164
Suryia and Roscoe spend hours together every day - they're particularly keen on swimming.
ATT5249165
There's always time to chill.
ATT5249166
For once, Roscoe's letting it all hang out.
ATT5249168
A dog's not just a man's best friend, he's an orangutan's too.