One Laptop Per Child Wilfrid Laurier University

Total Page:16

File Type:pdf, Size:1020Kb

One Laptop Per Child Wilfrid Laurier University One Laptop Per Child Wilfrid Laurier University Terry Sturtevant Wilfrid Laurier University March 3, 2010 1 / 67 vision hardware software vision meets reality future Overview 2 / 67 hardware software vision meets reality future Overview vision 2 / 67 software vision meets reality future Overview vision hardware 2 / 67 vision meets reality future Overview vision hardware software 2 / 67 future Overview vision hardware software vision meets reality 2 / 67 Overview vision hardware software vision meets reality future 2 / 67 Vision 3 / 67 50% of kids don't have electricity at home OR school Kids don't drop out because they have to work; they drop out because they're bored Education around the world 4 / 67 Kids don't drop out because they have to work; they drop out because they're bored Education around the world 50% of kids don't have electricity at home OR school 4 / 67 they drop out because they're bored Education around the world 50% of kids don't have electricity at home OR school Kids don't drop out because they have to work; 4 / 67 Education around the world 50% of kids don't have electricity at home OR school Kids don't drop out because they have to work; they drop out because they're bored 4 / 67 25% of teachers are illiterate another 25% are only 1 grade ahead of students 50% of kids don't go to school 75% of girls don't go to school In one country, 5 / 67 another 25% are only 1 grade ahead of students 50% of kids don't go to school 75% of girls don't go to school In one country, 25% of teachers are illiterate 5 / 67 50% of kids don't go to school 75% of girls don't go to school In one country, 25% of teachers are illiterate another 25% are only 1 grade ahead of students 5 / 67 75% of girls don't go to school In one country, 25% of teachers are illiterate another 25% are only 1 grade ahead of students 50% of kids don't go to school 5 / 67 In one country, 25% of teachers are illiterate another 25% are only 1 grade ahead of students 50% of kids don't go to school 75% of girls don't go to school 5 / 67 Would a computer for each child change that? 6 / 67 Would a computer for each child change that? 6 / 67 Nicholas Negroponte of the MIT Media lab proposed an under $100 PC. ( 2004) Michael Dell - \Impossible!" Bill Gates - \Gees! Get a REAL computer!" Vision 7 / 67 proposed an under $100 PC. ( 2004) Michael Dell - \Impossible!" Bill Gates - \Gees! Get a REAL computer!" Vision Nicholas Negroponte of the MIT Media lab 7 / 67 Michael Dell - \Impossible!" Bill Gates - \Gees! Get a REAL computer!" Vision Nicholas Negroponte of the MIT Media lab proposed an under $100 PC. ( 2004) 7 / 67 \Impossible!" Bill Gates - \Gees! Get a REAL computer!" Vision Nicholas Negroponte of the MIT Media lab proposed an under $100 PC. ( 2004) Michael Dell - 7 / 67 Bill Gates - \Gees! Get a REAL computer!" Vision Nicholas Negroponte of the MIT Media lab proposed an under $100 PC. ( 2004) Michael Dell - \Impossible!" 7 / 67 \Gees! Get a REAL computer!" Vision Nicholas Negroponte of the MIT Media lab proposed an under $100 PC. ( 2004) Michael Dell - \Impossible!" Bill Gates - 7 / 67 Vision Nicholas Negroponte of the MIT Media lab proposed an under $100 PC. ( 2004) Michael Dell - \Impossible!" Bill Gates - \Gees! Get a REAL computer!" 7 / 67 - Nicholas Negroponte Constructivism- Children learn by doing \It's an education project, not a laptop project" 8 / 67 Constructivism- Children learn by doing \It's an education project, not a laptop project" - Nicholas Negroponte 8 / 67 Children learn by doing \It's an education project, not a laptop project" - Nicholas Negroponte Constructivism- 8 / 67 \It's an education project, not a laptop project" - Nicholas Negroponte Constructivism- Children learn by doing 8 / 67 limited (and/or intermittent) power limited (and/or intermittent) connectivity limited (and/or uncontrollable) light limited (and/or intermittent) maintenance facilities Hardware Environment 9 / 67 limited (and/or intermittent) connectivity limited (and/or uncontrollable) light limited (and/or intermittent) maintenance facilities Hardware Environment limited (and/or intermittent) power 9 / 67 limited (and/or uncontrollable) light limited (and/or intermittent) maintenance facilities Hardware Environment limited (and/or intermittent) power limited (and/or intermittent) connectivity 9 / 67 limited (and/or intermittent) maintenance facilities Hardware Environment limited (and/or intermittent) power limited (and/or intermittent) connectivity limited (and/or uncontrollable) light 9 / 67 Hardware Environment limited (and/or intermittent) power limited (and/or intermittent) connectivity limited (and/or uncontrollable) light limited (and/or intermittent) maintenance facilities 9 / 67 AMD Geode 433MHz 256MB DRAM 1GB Flash memory (no hard drive) Dual mode 1200x900 display Built-in wireless with mesh networking Microphone, speakers, and jacks Video camera (640x480 30FPS) Basic specs 10 / 67 256MB DRAM 1GB Flash memory (no hard drive) Dual mode 1200x900 display Built-in wireless with mesh networking Microphone, speakers, and jacks Video camera (640x480 30FPS) Basic specs AMD Geode 433MHz 10 / 67 1GB Flash memory (no hard drive) Dual mode 1200x900 display Built-in wireless with mesh networking Microphone, speakers, and jacks Video camera (640x480 30FPS) Basic specs AMD Geode 433MHz 256MB DRAM 10 / 67 Dual mode 1200x900 display Built-in wireless with mesh networking Microphone, speakers, and jacks Video camera (640x480 30FPS) Basic specs AMD Geode 433MHz 256MB DRAM 1GB Flash memory (no hard drive) 10 / 67 Built-in wireless with mesh networking Microphone, speakers, and jacks Video camera (640x480 30FPS) Basic specs AMD Geode 433MHz 256MB DRAM 1GB Flash memory (no hard drive) Dual mode 1200x900 display 10 / 67 Microphone, speakers, and jacks Video camera (640x480 30FPS) Basic specs AMD Geode 433MHz 256MB DRAM 1GB Flash memory (no hard drive) Dual mode 1200x900 display Built-in wireless with mesh networking 10 / 67 Video camera (640x480 30FPS) Basic specs AMD Geode 433MHz 256MB DRAM 1GB Flash memory (no hard drive) Dual mode 1200x900 display Built-in wireless with mesh networking Microphone, speakers, and jacks 10 / 67 Basic specs AMD Geode 433MHz 256MB DRAM 1GB Flash memory (no hard drive) Dual mode 1200x900 display Built-in wireless with mesh networking Microphone, speakers, and jacks Video camera (640x480 30FPS) 10 / 67 3 USB ports, SD card slot Thicker case, protection from water, temperature extremes, shock Rotating display Potrait/Landscape (i.e. eBook) mode) Handle No external display adapter Case 11 / 67 Thicker case, protection from water, temperature extremes, shock Rotating display Potrait/Landscape (i.e. eBook) mode) Handle No external display adapter Case 3 USB ports, SD card slot 11 / 67 Rotating display Potrait/Landscape (i.e. eBook) mode) Handle No external display adapter Case 3 USB ports, SD card slot Thicker case, protection from water, temperature extremes, shock 11 / 67 Potrait/Landscape (i.e. eBook) mode) Handle No external display adapter Case 3 USB ports, SD card slot Thicker case, protection from water, temperature extremes, shock Rotating display 11 / 67 Handle No external display adapter Case 3 USB ports, SD card slot Thicker case, protection from water, temperature extremes, shock Rotating display Potrait/Landscape (i.e. eBook) mode) 11 / 67 No external display adapter Case 3 USB ports, SD card slot Thicker case, protection from water, temperature extremes, shock Rotating display Potrait/Landscape (i.e. eBook) mode) Handle 11 / 67 Case 3 USB ports, SD card slot Thicker case, protection from water, temperature extremes, shock Rotating display Potrait/Landscape (i.e. eBook) mode) Handle No external display adapter 11 / 67 Display can be replaced in 15 minutes Few tools required Keyboard can be replaced Bunny ears can be re-attached Maintenance 12 / 67 Few tools required Keyboard can be replaced Bunny ears can be re-attached Maintenance Display can be replaced in 15 minutes 12 / 67 Keyboard can be replaced Bunny ears can be re-attached Maintenance Display can be replaced in 15 minutes Few tools required 12 / 67 Bunny ears can be re-attached Maintenance Display can be replaced in 15 minutes Few tools required Keyboard can be replaced 12 / 67 Maintenance Display can be replaced in 15 minutes Few tools required Keyboard can be replaced Bunny ears can be re-attached 12 / 67 Active colour in normal or low light Reflective in bright light Dual mode display 13 / 67 Reflective in bright light Dual mode display Active colour in normal or low light 13 / 67 Dual mode display Active colour in normal or low light Reflective in bright light 13 / 67 14 / 67 15 / 67 Rubber membrane Several special keys Keyboard 16 / 67 Several special keys Keyboard Rubber membrane 16 / 67 Keyboard Rubber membrane Several special keys 16 / 67 17 / 67 Power options 18 / 67 This is an option where power is available for part of the day. Charging several batteries at once 19 / 67 This is an option where power is available for part of the day. Charging several batteries at once 19 / 67 Charging several batteries at once This is an option where power is available for part of the day. 19 / 67 Note that solar cells are not cheap. Solar power 20 / 67 Note that solar cells are not cheap. Solar power 20 / 67 Solar power Note that solar cells are not cheap. 20 / 67 This is ok for cellphones, but limited use for the XO. Human charging 21 / 67 This is ok for cellphones, but limited use for the XO. Human charging 21 / 67 Human charging This is ok for cellphones, but limited use for the XO. 21 / 67 My personal favourite; similar problem with clamp charger.
Recommended publications
  • Using Olpc Laptop Technology As a Computer Science Case Study Teaching Tool*
    USING OLPC LAPTOP TECHNOLOGY AS A COMPUTER SCIENCE CASE STUDY TEACHING TOOL* Suzanne Fox Buchele Southwestern University, 1001 East University Avenue, Georgetown, Texas 78626 (512) 863-1361 [email protected] ABSTRACT The One Laptop Per Child project has succeeded in developing a novel computer that is tailored to the particular needs of the developing world. The use of this example of a modern computer systems design challenge can be a valuable case study as a teaching tool in computer science. The OLPC laptop is a multiple-purpose computer that is rugged, low-power, mesh- networked, and inexpensive. An overview of the technology in the laptops is given, as well as curricula suggestions for using the laptops in an undergraduate computer science curriculum. INTRODUCTION The mission of the One Laptop Per Child foundation, spun out of MIT’s Media Lab, is to “create educational opportunities for the world's poorest children by providing each child with a rugged, low-cost, low-power, connected laptop with content and software designed for collaborative, joyful, self-empowered learning” [9]. The result of several years of research and development efforts is the XO Laptop, a remarkable multi-purpose mesh- networked computer with no moving parts, that uses no more than 6 watts of power (with an average of 1-3 Watts), and is currently manufactured for $188 [3, 6, 14]. This novel platform can provide a timely and interesting teaching tool for many computer science concepts, especially computer systems design. Many interesting design decisions during the development of the XO were the result of the over-arching need for low power consumption and low cost.
    [Show full text]
  • Surrahman Mmath08.Pdf (3.326Mb)
    Security for Rural Public Computing by Sumair Ur Rahman A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics in Computer Science Waterloo, Ontario, Canada, 2008 c Sumair Ur Rahman 2008 I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. Sumair Ur Rahman ii Abstract Current research on securing public computing infrastructure like Internet kiosks has focused on the use of smartphones to establish trust in a computing platform or to offload the processing of sensitive information, and the use of new cryptosystems such as Hierarchical Identity-based Encryption (HIBE) to protect kiosk user data. Challenges posed by rural kiosks, specifically (a) the absence of specialized hardware features such as Trusted Platform Modules (TPMs) or a modifiable BIOS in older recycled PCs, (b) the potential use of periodically disconnected links between kiosks and the Internet, (c) the absence of a production-ready implementation of HIBE and (d) the limited avail- ability of smartphones in most developing regions make these approaches difficult, if not impossible, to implement in a rural public computing scenario. In this thesis, I present a practical, unobtrusive and easy-to-use security architecture for rural public computing that uses a combination of physical and cryptographic mechanisms to pro-
    [Show full text]
  • One Laptop Per Child
    One Laptop per Child Bringing OLPC to the GNU/Linux Desktop Dr. C. Scott Ananian <[email protected]> ONE LAPTOP PER CHILD Bringing OLPC to the Linux Desktop. C. Scott Ananian, 17 April 2008. 1 Talk Outline OLPC Overview − What we want to do − How we're doing Areas of divergence − Networking − Sugar & Activities − Security − Power Management − Data store Let's work together! ONE LAPTOP PER CHILD Bringing OLPC to the Linux Desktop. C. Scott Ananian, 17 April 2008. 2 Sometimes the riskiest path is the status quo. ONE LAPTOP PER CHILD Bringing OLPC to the Linux Desktop. C. Scott Ananian, 17 April 2008. 3 A global transformation of education It's about giving children who don't have the opportunity for learning that opportunity: so it's about access; it's about equity; and it's about giving the next generation of children in the developing world a bright and open future. ONE LAPTOP PER CHILD Bringing OLPC to the Linux Desktop. C. Scott Ananian, 17 April 2008. 4 Children lack opportunity, not capability 1 High-quality education for every child is essential to provide an equitable and viable society; 2 A connected laptop computer is the most powerful tool for knowledge creation; 3 Access on a sufficient scale provides real benefits for learning. ONE LAPTOP PER CHILD Bringing OLPC to the Linux Desktop. C. Scott Ananian, 17 April 2008. 5 ONE LAPTOP PER CHILD Bringing OLPC to the Linux Desktop. C. Scott Ananian, 17 April 2008. 6 ONE LAPTOP PER CHILD Bringing OLPC to the Linux Desktop. C.
    [Show full text]
  • The State of the Art of Application Restrictions and Sandboxes: a Survey of Application-Oriented Access Controls and Their Shortfalls
    MURDOCH RESEARCH REPOSITORY This is the author’s final version of the work, as accepted for publication following peer review but without the publisher’s layout or pagination. The definitive version is available at http://dx.doi.org/10.1016/j.cose.2012.09.007 Schreuders, Z.C., McGill, T. and Payne, C. (2012) The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfalls. Computers & Security, 32 . pp. 219-241. http://researchrepository.murdoch.edu.au/12118/ © 2012 Elsevier Ltd. It is posted here for your personal use. No further distribution is permitted. The State of the Art of Application Restrictions and Sandboxes: A Survey of Application-oriented Access Controls and their Shortfalls Abstract: Under most widely-used security mechanisms the programs users run possess more authority than is strictly necessary, with each process typically capable of utilising all of the user’s privileges. Consequently such security mechanisms often fail to protect against contemporary threats, such as previously unknown (‘zero-day’) malware and software vulnerabilities, as processes can misuse a user’s privileges to behave maliciously. Application restrictions and sandboxes can mitigate threats that traditional approaches to access control fail to prevent by limiting the authority granted to each process. This developing field has become an active area of research, and a variety of solutions have been proposed. However, despite the seriousness of the problem and the security advantages these schemes provide, practical obstacles have restricted their adoption. This paper describes the motivation for application restrictions and sandboxes, presenting an in- depth review of the literature covering existing systems.
    [Show full text]
  • Educational Software for the XO Computer for Use in Nepal
    IQP KAL - 0801 Educational Software for the XO Computer for use in Nepal An Interactive Qualifying Project Report submitted to the Faculty of WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements for the Degree of Bachelor of Science Professor Karen Lemone, Advisor By ______________ Alex Camilo march 8, 2009 Approval: Karen Lemone, Advisor Abstract This project aims to create an environment in which children's play is utilized to let children teach themselves. Through this goal, the project will also contribute to One Laptop Per Child’s (OLPC) resources. Research and analysis of the situation at our target site, Nepal, was completed. After consulting with the OLPC organization, the team determined that developing an open source physics simulation game would be appropriate. The basis for this game, Squeak’s Journey, was then designed and partially implemented. i Executive Summary Nepal is a developing nation and carries much of the baggage that category entails. While approaching the levels of developed nations in some areas, it is still far behind in others, especially education. The One Laptop Per Child (OLPC) organization was created to help fill this gap in developing countries, like Nepal. It provides the children with low-cost, durable laptops designed specifically for them. These laptops come fitted out with a small array of software to enable children to communicate and interact with each other over distance. They also include useful tools, like a calculator, and some educational material. The collaboration and educational abilities of these laptops are what differentiates them from other laptops. These abilities are what allow them to be such powerful educational tools, empowering the children to teach and learn from each other.
    [Show full text]
  • UPDATE April 2007
    AT&T Consultant/Vendor Sales Group UPDATE April 2007 k a r i ’ s c o r n e r New Opportunities i n s i d e . What a busy start to the year! Our merger integration with BellSouth continues to expand our business and consumer solutions portfolio. Local to 3 global, we remain dedicated to providing the most complete, secure and reliable networks for your Zombie Networks business success. –Jerry Hinek In such a fast-changing industry, access to the latest information is essential. Your Consultant Liaison Managers certainly take the lead in keeping you informed, and we hope you also 6 find value in this publication. And this year we are delighted to add to that communications stream by offering you the opportunity to attend AT&T BusinessDirect® FOCUS seminars! FOCUS is a non-profit AT&T business user group that –Robert Sloan has grown steadily by providing an active forum for communications users and providers. FOCUS programs and events provide the professional advantage members need to stay on top of today’s industry 8 evolution. Earlier this year, we had a very successful FOCUS chapter meeting in Data with David Anaheim, California. Consultant Robert Harris from Communications –Tom David Advantage said the event was “a great example of how the CLP program keeps me (and my team members) informed and supported, 12 and ethically leverages the relationship that consultants have with clients.” One Laptop per Also in Anaheim, consultants were invited to attend our Networking Child Leaders Forum. This full-day event gave consultants, customers and AT&T account teams the opportunity to discuss the critical business –Nancy Grover continuity and network security issues businesses face today.
    [Show full text]
  • GFS2 Filesystem 253 Steven Whitehouse
    Proceedings of the Linux Symposium Volume Two June 27th–30th, 2007 Ottawa, Ontario Canada Contents Unifying Virtual Drivers 9 J. Mason, D. Shows, and D. Olien The new ext4 filesystem: current status and future plans 21 A. Mathur, M. Cao, S. Bhattacharya, A. Dilger, A. Tomas, & L. Vivier The 7 dwarves: debugging information beyond gdb 35 Arnaldo Carvalho de Melo Adding Generic Process Containers to the Linux Kernel 45 P.B. Menage KvmFS: Virtual Machine Partitioning For Clusters and Grids 59 Andrey Mirtchovski Linux-based Ultra Mobile PCs 65 Rajeev Muralidhar, Hari Seshadri, Krishna Paul, & Srividya Karumuri Where is your application stuck? 71 S. Nagar, B. Singh, V. Kashyap, C. Seethraman, N. Sharoff, & P. Banerjee Trusted Secure Embedded Linux 79 Hadi Nahari Hybrid-Virtualization—Enhanced Virtualization for Linux 87 J. Nakajima and A.K. Mallick Readahead: time-travel techniques for desktop and embedded systems 97 Michael Opdenacker Semantic Patches 107 Y. Padioleau & J.L. Lawall cpuidle—Do nothing, efficiently. 119 V. Pallipadi, A. Belay, & S. Li My bandwidth is wider than yours 127 Iñaky Pérez-González Zumastor Linux Storage Server 135 Daniel Phillips Cleaning up the Linux Desktop Audio Mess 145 Lennart Poettering Linux-VServer 151 H. Pötzl Internals of the RT Patch 161 Steven Rostedt lguest: Implementing the little Linux hypervisor 173 Rusty Russell ext4 online defragmentation 179 Takashi Sato The Hiker Project: An Application Framework for Mobile Linux Devices 187 David Schlesinger Getting maximum mileage out of tickless 201 Suresh Siddha Containers: Challenges with the memory resource controller and its performance 209 Balbir Singh and Vaidyanathan Srinivasan Kernel Support for Stackable File Systems 223 Sipek, Pericleous & Zadok Linux Rollout at Nortel 229 Ernest Szeideman Request-based Device-mapper multipath and Dynamic load balancing 235 Kiyoshi Ueda Short-term solution for 3G networks in Linux: umtsmon 245 Klaas van Gend The GFS2 Filesystem 253 Steven Whitehouse Driver Tracing Interface 261 David J.
    [Show full text]
  • Bitfrost: the One Laptop Per Child Security Model
    Bitfrost: the One Laptop per Child Security Model Ivan Krstic´ Simson L. Garfinkel One Laptop per Child Naval Postgraduate School Cambridge, MA Monterey, CA [email protected] [email protected] ABSTRACT We present an integrated security model for a low-cost lap- top that will be widely deployed throughout the developing world. Implemented on top of Linux operating system, the model is designed to restrict the laptop’s software without restricting the laptop’s user. Categories and Subject Descriptors D.4.6.c [Security and Privacy Protection]: Cryptographic Controls; H.5.2.e [HCI User Interfaces]: Evaluation/methodology General Terms Usability, Security Keywords Bitfrost, Linux 1. INTRODUCTION Figure 1: The XO-1 Laptop Within the next year more than five million low-cost lap- tops will be distributed to children in the developing world who have never before had direct experience with informa- the world outside their communities and communicate with tion technology. This “One Laptop per Child” project seeks other children around the world. to use the power of information technology to revolutionize Attempting such a project with existing security mech- education and learning within the developing world. anisms such as anti-virus software and personal firewalls The laptops will be sold to countries and educational au- would likely be disastrous: soon after deployment, attackers thorities (hereafter “customers”), not to individuals, and would inevitably introduce malicious software into the lap- shipped from production facilities at Quanta Computer; fur- top communities. This software might recruit the million- ther shipping and delivery is the responsibility of the cus- plus laptops to join “botnets.” Other attackers might try tomer.
    [Show full text]
  • Towards Comprehensible and Effective Permission Systems
    Towards Comprehensible and Effective Permission Systems by Adrienne Porter Felt A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the GRADUATE DIVISION of the UNIVERSITY OF CALIFORNIA, BERKELEY Committee in charge: Professor David Wagner, Chair Professor Vern Paxson Professor Tapan Parikh Fall 2012 Towards Comprehensible and Effective Permission Systems Copyright c 2012 by Adrienne Porter Felt Abstract Towards Comprehensible and Effective Permission Systems by Adrienne Porter Felt Doctor of Philosophy in Computer Science University of California, Berkeley Professor David Wagner, Chair How can we, as platform designers, protect computer users from the threats associated with ma- licious, privacy-invasive, and vulnerable applications? Modern platforms have turned away from the traditional user-based permission model and begun adopting application permission systems in an attempt to shield users from these threats. This dissertation evaluates modern permission systems with the goal of improving the security of future platforms. In platforms with application permission systems, applications are unprivileged by default and must request permissions in order to access sensitive API calls. Developers specify the permis- sions that their applications need, and users approve the granting of permissions. Permissions are intended to provide defense in depth by restricting the scope of vulnerabilities and user consent by allowing users to control whether third parties have access to their resources. In this dissertation we investigate whether permission systems are effective at providing de- fense in depth and user consent. First, we perform two studies to evaluate whether permissions provide defense in depth: we analyze applications to determine whether developers request mini- mal sets of permissions, and we quantify the impact of permissions on real-world vulnerabilities.
    [Show full text]
  • Educational Software for the XO Computer for Use in Nepal
    IQP KAL - 0801 Educational Software for the XO Computer for use in Nepal An Interactive Qualifying Project Report submitted to the Faculty of WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements for the Degree of Bachelor of Science Professor Karen Lemone, Advisor By ______________ Tesia Shizume September 7, 2008 Approval: Karen Lemone, Advisor Abstract This project aims to create an environment in which children's play is utilized to let children teach themselves. Through this goal, the project will also contribute to One Laptop Per Child‟s (OLPC) resources. Research and analysis of the situation at our target site, Nepal, was completed. After consulting with the OLPC organization, the team determined that developing an open source physics simulation game would be appropriate. The basis for this game, Squeak‟s Journey, was then designed and partially implemented. i Executive Summary Nepal is a developing nation and carries much of the baggage that category entails. While approaching the levels of developed nations in some areas, it is still far behind in others, especially education. The One Laptop Per Child (OLPC) organization was created to help fill this gap in developing countries, like Nepal. It provides the children with low-cost, durable laptops designed specifically for them. These laptops come fitted out with a small array of software to enable children to communicate and interact with each other over distance. They also include useful tools, like a calculator, and some educational material. The collaboration and educational abilities of these laptops are what differentiates them from other laptops. These abilities are w hat allow them to be such powerful educational tools, empowering the children to teach and learn from each other.
    [Show full text]
  • Empowering End Users to Confine Their Own Applications: the Results of a Usability Study Comparing Selinux, Apparmor and FBAC-LSM
    http://tweaket.com/CPGenerator/?id=6177 MURDOCH RESEARCH REPOSITORY http://researchrepository.murdoch.edu.au This is the author's final version of the work, as accepted for publication following peer review but without the publisher's layout or pagination. Schreuders, Z.C. , McGill, T. and Payne, C. (2011) Empowering end users to confine their own applications. ACM Transactions on Information and System Security, 14 (2). pp. 1-28. http://researchrepository.murdoch.edu.au/6177 Copyright © 2011 ACM It is posted here for your personal use. No further distribution is permitted. 1 of 1 12/12/2011 12:43 PM Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor and FBAC-LSM Z. CLIFFE SCHREUDERS, TANYA MCGILL, and CHRISTIAN PAYNE Murdoch University ________________________________________________________________ Protecting end users from security threats is an extremely difficult, but increasingly critical, problem. Traditional security models that focused on separating users from each other have proven ineffective in an environment of widespread software vulnerabilities and rampant malware. However, alternative approaches that provide more finely grained security generally require greater expertise than typical end users can reasonably be expected to have, and consequently have had limited success. The functionality-based application confinement (FBAC) model is designed to allow end users with limited expertise to assign applications hierarchical and parameterised policy abstractions based upon the functionalities each program is intended to perform. To validate the feasibility of this approach and assess the usability of existing mechanisms, a usability study was conducted comparing an implementation of the FBAC model with the widely used Linux-based SELinux and AppArmor security schemes.
    [Show full text]
  • The Charisma Machine Infrastructures Series Edited by Geoffrey C
    The Charisma Machine Infrastructures Series Edited by Geoffrey C. Bowker and Paul N. Edwards Paul N. Edwards, A Vast Machine: Computer Models, Climate Data, and the Politics of Global Warming Lawrence M. Busch, Standards: Recipes for Reality Lisa Gitelman, ed., “Raw Data” Is an Oxymoron Finn Brunton, Spam: A Shadow History of the Internet Nil Disco and Eda Kranakis, eds., Cosmopolitan Commons: Sharing Resources and Risks across Borders Casper Bruun Jensen and Brit Ross Winthereik, Monitoring Movements in Development Aid: Recursive Partnerships and Infrastructures James Leach and Lee Wilson, eds., Subversion, Conversion, Development: Cross-Cultural Knowledge Exchange and the Politics of Design Olga Kuchinskaya, The Politics of Invisibility: Public Knowledge about Radiation Health Effects after Chernobyl Ashley Carse, Beyond the Big Ditch: Politics, Ecology, and Infrastructure at the Panama Canal Alexander Klose, translated by Charles Marcrum II, The Container Principle: How a Box Changes the Way We Think Eric T. Meyer and Ralph Schroeder, Knowledge Machines: Digital Transformations of the Sciences and Humanities Sebastián Ureta, Assembling Policy: Transantiago, Human Devices, and the Dream of a World-Class Society Geoffrey C. Bowker, Stefan Timmermans, Adele E. Clarke, and Ellen Balka, eds., Boundary Objects and Beyond: Working with Leigh Star Clifford Siskin, System: The Shaping of Modern Knowledge Lawrence Busch, Knowledge for Sale: The Neoliberal Takeover of Higher Education Bill Maurer and Lana Swartz, eds., Paid: Tales of Dongles, Checks, and Other Money Stuff Dietmar Offenhuber, Waste Is Information: Infrastructure Legibility and Governance Katayoun Shafiee, Machineries of Oil: An Infrastructural History of BP in Iran Megan Finn, Documenting Aftermath: Information Infrastructures in the Wake of Disasters Laura Watts, Energy at the End of the World: An Orkney Islands Saga Ann M.
    [Show full text]