industryterm:computing

  • Boeing’s 737 Max Software Outsourced to $9-an-Hour Engineers - Bloomberg
    https://www.bloomberg.com/news/articles/2019-06-28/boeing-s-737-max-software-outsourced-to-9-an-hour-engineers

    In offices across from Seattle’s Boeing Field, recent college graduates employed by the Indian software developer HCL Technologies Ltd. occupied several rows of desks, said Mark Rabin, a former Boeing software engineer who worked in a flight-test group that supported the Max.

    The coders from HCL were typically designing to specifications set by Boeing. Still, “it was controversial because it was far less efficient than Boeing engineers just writing the code,” Rabin said. Frequently, he recalled, “it took many rounds going back and forth because the code was not done correctly.”

    Boeing’s cultivation of Indian companies appeared to pay other dividends. In recent years, it has won several orders for Indian military and commercial aircraft, such as a $22 billion one in January 2017 to supply SpiceJet Ltd. That order included 100 737-Max 8 jets and represented Boeing’s largest order ever from an Indian airline, a coup in a country dominated by Airbus.

    Based on resumes posted on social media, HCL engineers helped develop and test the Max’s flight-display software, while employees from another Indian company, Cyient Ltd., handled software for flight-test equipment.

    C’est beau comme tout la langue de bois des public relations :

    Boeing said the company did not rely on engineers from HCL and Cyient for the Maneuvering Characteristics Augmentation System, which has been linked to the Lion Air crash last October and the Ethiopian Airlines disaster in March. The Chicago-based planemaker also said it didn’t rely on either firm for another software issue disclosed after the crashes: a cockpit warning light that wasn’t working for most buyers.

    “Boeing has many decades of experience working with supplier/partners around the world,” a company spokesman said. “Our primary focus is on always ensuring that our products and services are safe, of the highest quality and comply with all applicable regulations.”

    In a statement, HCL said it “has a strong and long-standing business relationship with The Boeing Company, and we take pride in the work we do for all our customers. However, HCL does not comment on specific work we do for our customers. HCL is not associated with any ongoing issues with 737 Max.”

    Starting with the 787 Dreamliner, launched in 2004, it sought to increase profits by instead providing high-level specifications and then asking suppliers to design more parts themselves. The thinking was “they’re the experts, you see, and they will take care of all of this stuff for us,” said Frank McCormick, a former Boeing flight-controls software engineer who later worked as a consultant to regulators and manufacturers. “This was just nonsense.”

    Sales are another reason to send the work overseas. In exchange for an $11 billion order in 2005 from Air India, Boeing promised to invest $1.7 billion in Indian companies. That was a boon for HCL and other software developers from India, such as Cyient, whose engineers were widely used in computer-services industries but not yet prominent in aerospace.

    La sous-traitance logicielle peut-elle suivre les modèles de la sous-traitance de l’industrie ?

    HCL, once known as Hindustan Computers, was founded in 1976 by billionaire Shiv Nadar and now has more than $8.6 billion in annual sales. With 18,000 employees in the U.S. and 15,000 in Europe, HCL is a global company and has deep expertise in computing, said Sukamal Banerjee, a vice president. It has won business from Boeing on that basis, not on price, he said: “We came from a strong R&D background.”

    Still, for the 787, HCL gave Boeing a remarkable price – free, according to Sam Swaro, an associate vice president who pitched HCL’s services at a San Diego conference sponsored by Avionics International magazine in June. He said the company took no up-front payments on the 787 and only started collecting payments based on sales years later, an “innovative business model” he offered to extend to others in the industry.

    The 787 entered service three years late and billions of dollars over budget in 2011, in part because of confusion introduced by the outsourcing strategy. Under Dennis Muilenburg, a longtime Boeing engineer who became chief executive in 2015, the company has said that it planned to bring more work back in-house for its newest planes.

    #Boeing #Sous-traitance #Capitalisme #Sécurité #Logiciel

  • CERN wechselt von Microsoft- zu Open-Source-Software | heise online
    https://www.heise.de/newsticker/meldung/CERN-wechselt-von-Microsoft-zu-Open-Source-Software-4447421.html

    Das europäische Kernforschungszentrum CERN möchte Lizenzkosten für proprietäre Programme sparen. Dazu dient das „Microsoft Alternatives project“, kurz MAlt.

    Migrating to open-source technologies | CERN
    https://home.cern/news/news/computing/migrating-open-source-technologies

    The Microsoft Alternatives project (MAlt) started a year ago to mitigate anticipated software license fee increases. MAlt’s objective is to put us back in control using open software. It is now time to present more widely this project and to explain how it will shape our computing environment.

    Background

    Over the years, CERN’s activities and services have increasingly relied on commercial software and solutions to deliver core functionalities, often leveraged by advantageous financial conditions based on the recognition of CERN’s status as an academic, non-profit or research institute. Once installed, well-spread and heavily used, the leverage used to attract CERN service managers to the commercial solutions tends to disappear and be replaced by licensing schemes and business models tuned for the private sector.

    Given the collaborative nature of CERN and its wide community, a high number of licenses are required to deliver services to everyone, and when traditional business models on a per-user basis are applied, the costs per product can be huge and become unaffordable in the long term.

    A prime example is that CERN has enjoyed special conditions for the use of Microsoft products for the last 20 years, by virtue of its status as an “academic institution”. However, recently, the company has decided to revoke CERN’s academic status, a measure that took effect at the end of the previous contract in March 2019, replaced by a new contract based on user numbers, increasing the license costs by more than a factor of ten. Although CERN has negotiated a ramp-up profile over ten years to give the necessary time to adapt, such costs are not sustainable.

    Anticipating this situation, the IT department created the Microsoft Alternatives project, MAlt, a year ago.

    MAlt’s objective

    The initial objective was to investigate the migration from commercial software products (Microsoft and others) to open-source solutions, so as to minimise CERN’s exposure to the risks of unsustainable commercial conditions. By doing so, the laboratory is playing a pioneering role among public research institutions, most of whom have recently been faced with the same dilemma.

    MAlt is a multi-year effort and it will now enter a new phase with the first migrations.

    The project’s principles of engagement are to:

    Deliver the same service to every category of CERN personnel
    Avoid vendor lock-in to decrease risk and dependency
    Keep hands on the data
    Address the common use-cases

    Coming in 2019

    The first major change coming is a pilot mail Service for the IT department and volunteers this summer, followed by the start of CERN-wide migration. In parallel, some Skype for Business clients and analogue phones will migrate to a softphone telephony pilot.

    Many other products and services are being worked on: evaluations of alternative solutions for various software packages used for IT core services, prototypes and pilots will emerge along the course of the next few years.

    How will MAlt impact you and how to contribute?

    You will find all the details and progress on the project site and more particularly the list of products addressed in the project.

    The new computing newsletter blog will communicate on general items, and in addition, a general presentation will be provided in the Main Auditorium on 10 September at 2.30 p.m.

    Needless to say, isolated initiatives will waste effort and resources. Instead, if you or your team are willing to participate, if you have ideas, the best way is to join the coordinated Microsoft Alternatives effort by checking the project site and contributing to the discussion channel.

    Interesting times ahead! While the Microsoft Alternatives project is ambitious, it’s also a unique opportunity for CERN to demonstrate that building core services can be done without vendor and data lock-in, that the next generation of services can be tailored to the community’s needs and finally that CERN can inspire its partners by collaborating around a new range of products.

    #FLOSS #Microsoft

  • Use of ML and AI in BlackHat Hacking.
    https://hackernoon.com/use-of-ml-and-ai-in-blackhat-hacking-737a621e4694?source=rss----3a8144ea

    Algorithms, Attack Vectors, Possibilities, and Caffeine.Source: SophosNews.De-Briefing Artificial Intelligence.Computers are only smart enough to carry out whatever the task programmed to be functioned. Scalable computing power like Quantum computers or TeraFlop computers are rather faster than compared to the other machines but they still are the same. They make faster calculations, they run millions of permutations just the way they are programmed to be done. It’s rather fast than compared to the regular human’s brain usage. It’s said only 10% of the Human Brain is used in our daily lives but still, systems like Azure or IBM Watson make smoother and quicker calculations to be more precise. Artificial Intelligence is just a complex math progression with too many If/Else Statements (...)

  • The Innards of an #erc20 Token
    https://hackernoon.com/the-innards-of-an-erc20-token-587c29e9b8a1?source=rss----3a8144eabfe3---

    What does this mean?You’ve all heard by now that #suncontract’s SNC token is an ERC20 token… But do you know what it means to be of ERC20 standard? If not, stick around for a simple explanation on the ERC20 standard.Ethereum PlatformERC20 tokens are designed and used solely on the #ethereum platform. The Ethereum platform consists of a #blockchain that is capable of storing transactions, and a virtual machine that is capable of running smart contracts.Because of these two functions of the Ethereum network, the platform can support the running of decentralised applications (DApps). In return Ethereum charges developers for the computing power in their network — which is paid in Ethers — the main currency on the Ethereum network. Besides Ether, the platform can also support other tokens, including (...)

    #ethereum-blockchain

  • A Guide to Post-Quantum #cryptography
    https://hackernoon.com/a-guide-to-post-quantum-cryptography-d785a70ea04b?source=rss----3a8144ea

    This article was written by Ben Perez and originally appeared on the Trail of Bits Blog. It is being republished with permission of the author and includes additional notes & comments from researchers at the RI lab.For many high-assurance applications such as TLS traffic, medical databases, and blockchains, forward secrecy is absolutely essential. It is not sufficient to prevent an attacker from immediately decrypting sensitive information. Here the threat model encompasses situations where the adversary may dedicate many years to the decryption of ciphertexts after their collection. One potential way forward secrecy might be broken is that a combination of increased computing power and number-theoretic breakthroughs make attacking current cryptography tractable. However, unless (...)

    #security #quantum-cryptography #quantum-computing #post-quantum-cryptography

  • What I learned by migrating an #rds #database into production using #aws DMS
    https://hackernoon.com/what-i-learned-by-migrating-an-rds-database-into-production-using-aws-dm

    What I learned by migrating an RDS database into production using AWS DMS (Database Migration Service)…or how to avoid a big headache while live migrating and replicating your db instancesImage from Jan Antonin Kolar — UnsplashI am currently managing the migration of some on premise services, and other services already present on AWS under a single VPC.Having active production systems H24 7/7 it was essential to design and implement a fairly precise migration plan with a zero error margin.While regarding services like EC2 instances, EFS, Security Group, Target Group and Load Balancer the transition was quite simple, I encountered some obstacles during the migration of our RDS database (MariaDB) from one VPC to another.For this task the native Amazon service, DMS (Database Migration Service) (...)

    #cloud #cloud-computing

  • #quantum Computing Explained
    https://hackernoon.com/quantum-computing-explained-94125280fabb?source=rss----3a8144eabfe3---4

    Introduction​Advances in computing require appropriate hardware. Though computers have become smaller and more powerful over time, the power of regular computers (also known as classical computers) is limited.​Quantum computers are a new generation of computers built to solve the problem of exponential scaling (for example, finding the optimal solution to a problem in which there are too many possibilities for a classical computer to analyze).Background on Classical ComputersClassical computers have many components (including main memory, arithmetic unit, control unit, and others). They represent, process, and control data through these components. Computer chips contain modules, which include logic gates, which in turn include transistors.A computer module is a collection of electronic (...)

    #quantum-computer #factorials #quantum-computing #whats-quantum-computing

  • Observability Without Having to Break the Bank
    https://hackernoon.com/observability-without-having-to-break-the-bank-7ebbc861245f?source=rss--

    To run a #serverless application in production reliably, you need to be able to debug issues quickly. You need to have good observability, and having structured logs is a big part of that. They allow you to capture useful contextual information with each log message.But observability comes with a cost.The ProblemCloudWatch Logs charges $0.50 for per GB of data ingested, and $0.03 per GB per month for storage. As such, it’s common for companies to spend more on CloudWatch Logs than Lambda invocations in their production environment. Best practices such as using structured logs further exasperate the cost associated with logging.Furthermore, with #aws Lambda, it’s no longer possible to rely on agents to collect and publish observability data such as custom metrics and traces. Instead, you have (...)

    #aws-lambda #cloud #cloud-computing

  • Are #neuromorphic chips the future of #ai and #blockchain?
    https://hackernoon.com/are-neuromorphic-chips-the-future-of-ai-and-blockchain-27891de5404c?sour

    Are Neuromorphic Chips the Future of AI and Blockchain?There is no doubt that artificial intelligence (AI) is the driver of a revolution in automation akin to the influence of coal and factory machines on previous industrial revolutions. Jayshree Pandya, writing for Forbes, makes a very interesting point when he suggests that the increasing importance of AI also goes hand in hand with a need for more computing power.He suggests, “There are indicators that raw computing power is on its way to replacing fossil fuels and will be the most valued fuel in the rapidly emerging intelligence age.” The question of course is — where will that computing power come from?The need for more computing powerAI also needs massive amounts of data to produce useful tools. One of the sources of both power and (...)

    #artificial-intelligence

  • A Beginners Guide to Federated Learning
    https://hackernoon.com/a-beginners-guide-to-federated-learning-b29e29ba65cf?source=rss----3a814

    We predict growth of Federated Learning, a new framework for Artificial Intelligence (AI) model development that is distributed over millions of mobile devices. Federated Learning models are hyper personalized for an user, involve minimum latencies, low infra overheads and are privacy preserved by design. This article is a beginner level primer for Federated Learning.Disclaimer: the author is an investor and advisor in the Federated Learning startup S20.ai. In case you are wondering, S20 stands for “Software 2.0”.The AI market is dominated by tech giants such as #google, Amazon and Microsoft, offering cloud-based AI solutions and APIs. In the traditional AI methods sensitive user data are sent to the servers where models are trained.Recently we are seeing the beginning of a decentralized (...)

    #federated-learning #artificial-intelligence #machine-learning #cloud-computing

  • Distributed Ledger Tech with David Sønstebø, Co-Founder of #iota
    https://hackernoon.com/distributed-ledger-tech-with-david-s%C3%B8nsteb%C3%B8-co-founder-of-iota

    Episode 37 of the Hacker Noon Podcast: An interview with David Sonstebo of IOTA, a permission-less distributed ledger for a new economy.Today’s show would not be possible without Digital Ocean.https://medium.com/media/bf142049d9704d537f79b510ba9ba4db/hrefListen to the interview on iTunes, or Google Podcast, or watch on YouTube.In this episode Trent Lapinski interviews David Sønstebø, the co-founder of IOTA, you get to learn about distributed technologies, edge computing and what is happening in #crypto today!“If you look at how much computational power something like AWS or Azure Microsoft, if you look at how much they have, it sounds impressive, and I’m not saying it isn’t, but when you compare it to the idle amount of computation that exists in all the phones, all the laptops, and all the (...)

    #hackernoon-podcast #blockchain #iot

  • Quantum Computing Explained — It’s Rocket #science
    https://hackernoon.com/quantum-computing-explained-its-rocket-science-55d7766edac2?source=rss--

    Quantum Computing Explained — It’s Rocket ScienceBut rocket science is easier than you think ?A couple of years ago, I thought Quantum Mechanics was a bunch of theoretical science with no real world applications: Not anymoreIn recent years, we’ve seen the emergence of Quantum Computing; spearheaded by companies such as D-Wave, Rigetti Computing, and IBM. In a nutshell (Kurzgesagt ?), Quantum Computing will revolutionize computing, allowing us to solve complex computational problems that would have been impossible on classical computers.Today, with classical computers:Drug Discovery takes over 10 years to get to market, costing billions for each drugFeature spaces in Machine Learning are limited to computational constraintsToday, quantum computers:Exponentially increase speeds in Drug Discovery, (...)

    #technology #hackernoon-top-story #quantum-computing #innovation

  • The Future of Cloud Computing with Joshua Strebel from Pagely
    https://hackernoon.com/the-future-of-cloud-computing-with-joshua-strebel-from-pagely-e502435cd4

    Episode 36 of the Hacker Noon Podcast: An interview with Joshua Strebel, CEO of Pagely and NorthStack.https://medium.com/media/0d1b47d6c24b20039a870c9dfbb22208/hrefListen to the interview on iTunes, or Google Podcast, or watch on YouTube.In this episode Trent Lapinski and Joshua Strebel discuss #serverless, cloud computing, #devops, #wordpress, and Joshua’s new project NorthStack.“You talk about AI and specifically around content publishing, there’s those crazy algorithms now that you can give it a sentence and a closing and it’ll write a thousand words in between and it will be on point. You’re like ‘I couldn’t have written this any better!” — Joshua StrebelThe Future of Cloud Computing with Joshua Strebel from PagelyProduction and music by Derek Bernard — haberdasherband.com/productionHost: Trent (...)

    #hackernoon-podcast #cloud-computing

  • #CBP terminates controversial $297 million #Accenture contract amid continued staffing struggles

    #Customs_and_Border_Protection on Thursday ended its controversial $297 million hiring contract with Accenture, according to two senior DHS officials and an Accenture representative.
    As of December, when CBP terminated part of its contract, the company had only completed processing 58 applicants and only 22 had made it onto the payroll about a year after the company was hired.
    At the time, the 3,500 applicants that remained in the Accenture hiring pipeline were transferred to CBP’s own hiring center to complete the process.

    CBP cut ties with Accenture on processing applicants a few months ago, it retained some services, including marketing, advertising and applicant support.
    This week, the entire contract was terminated for “convenience,” government speak for agreeing to part ways without placing blame on Accenture.
    While government hiring is “slow and onerous, it’s also part of being in the government” and that’s “something we have to accept and deal with as we go forward,” said one of the officials.
    For its efforts, CBP paid Accenture around $19 million in start-up costs, and around $2 million for 58 people who got job offers, according to the officials.
    Over the last couple of months, CBP explored how to modify the contract, but ultimately decided to completely stop work and return any remaining funds to taxpayers.
    But it’s unclear how much money, if any, that will be.

    In addition, to the funds already paid to Accenture, CBP has around $39 million left to “settle and close the books” with the company, an amount which has yet to be determined.
    In November 2017, CBP awarded Accenture the contract to help meet the hiring demands of an executive order on border security that President Donald Trump signed during his first week in office. The administration directed CBP to hire an additional 7,500 agents and officers on top of its current hiring goals.
    “We were in a situation where we needed to try something new” and “break the cycle of going backwards,” said a DHS official about why the agency started the contract.

    Meanwhile, hiring remains difficult for the agency amid a surge of migrants at the southern border that is stretching CBP resources thin.
    It “continues to be a very challenging environment,” said one official about hiring efforts this year.

    In fact, one of the reasons that CBP didn’t need Accenture to process applicants, is because the agency didn’t receive as many applications as it initially planned for.
    The agency has been focused on beating attrition and has been able to recently “beat it by a modest amount,” said the official. “Ultimately we would like to beat it by a heck of a lot, but we’re not there yet.”

    https://edition.cnn.com/2019/04/05/politics/cbp-terminate-hiring-contract-accenture/index.html
    #frontières #contrôles_frontaliers #USA #Ests-Unis #complexe_militaro-industriel #business

    • Border Profiteers

      On a recent sunny spring afternoon in Texas, a couple hundred Border Patrol agents, Homeland Security officials, and salespeople from a wide array of defense and security contractors gathered at the Bandera Gun Club about an hour northwest of San Antonio to eat barbecue and shoot each other’s guns. The techies wore flip-flops; the veterans wore combat boots. Everyone had a good time. They were letting loose, having spent the last forty-eight hours cooped up in suits and ties back at San Antonio’s Henry B. Gonzalez convention center, mingling and schmoozing, hawking their wares, and listening to immigration officials rail about how those serving in enforcement agencies are not, under any circumstances, Nazis.

      These profiteers and bureaucrats of the immigration-industrial complex were fresh from the 2019 #Border_Security_Expo —essentially a trade show for state violence, where law enforcement officers and weapons manufacturers gather, per the Expo’s marketing materials, to “identify and address new and emerging border challenges and opportunities through technology, partnership, and innovation.” The previous two days of panels, speeches, and presentations had been informative, a major in the Argentine Special Forces told me at the gun range, but boring. He was glad to be outside, where handguns popped and automatic rifles spat around us. I emptied a pistol into a target while a man in a Three Percenter militia baseball hat told me that I was a “natural-born killer.” A drone buzzed overhead until, in a demonstration of a company’s new anti-drone technology, a device that looked like a rocket launcher and fired a sort of exploding net took it down. “This is music to me,” the Argentine major said.

      Perhaps it’s not surprising the Border Security Expo attendees were so eager to blow off steam. This year’s event found many of them in a defensive posture, given the waves of bad press they’d endured since President Trump’s inauguration, and especially since the disastrous implementation of his family separation policy, officially announced by former Attorney General Jeff Sessions in April of 2018, before being rescinded by Trump two-and-a-half months later. Throughout the Expo, in public events and in background roundtable conversations with reporters, officials from the various component parts of the Department of Homeland Security rolled out a series of carefully rehearsed talking points: Immigrations and Customs Enforcement (ICE) and Customs and Border Patrol (CBP) need more money, personnel, and technology; taking migrants to hospitals distracts CBP officers from their real mission; and the 1997 Flores court settlement, which prohibits immigration enforcement agencies from detaining migrant families with children for more than twenty days, is undermining the very sovereignty of the United States. “We want a secure border, we want an immigration system that has integrity,” Ronald Vitiello, then–acting head of ICE, said in a keynote address to the hundreds of people gathered in San Antonio. “We have a generous immigration system in this country, but it has to have integrity in order for us to continue to be so generous.”

      More of a technocrat than his thuggish predecessor Thomas Homan, Vitiello also spoke at length about using the “dark web” to take down smugglers and the importance of having the most up-to-date data-management technology. But he spoke most adamantly about needing “a fix” for the Flores settlement. “If you prosecute crimes and you give people consequences, you get less of it,” he said. “With Flores, there’s no consequence, and everybody knows that,” a senior ICE official echoed to reporters during a background conversation immediately following Vitiello’s keynote remarks. “That’s why you’re seeing so many family units. We cannot apply a consequence to a family unit, because we have to release them.”

      Meanwhile, around 550 miles to the west, in El Paso, hundreds of migrants, including children and families, were being held by CBP under a bridge, reportedly forced to sleep on the ground, with inadequate medical attention. “They treated us like we are animals,” one Honduran man told Texas Monthly. “I felt what they were trying to do was to hurt us psychologically, so we would understand that this is a lesson we were being taught, that we shouldn’t have crossed.” Less than a week after the holding pen beneath the bridge closed, Vitiello’s nomination to run ICE would be pulled amid a spate of firings across DHS; President Trump wanted to go “in a tougher direction.”

      Family Values

      On the second day of the Border Security Expo, in a speech over catered lunch, Scott Luck, deputy chief of Customs and Border Protection and a career Border Patrol agent, lamented that the influx of children and families at the border meant that resources were being diverted from traditional enforcement practices. “Every day, about 150 agents spend their shifts at hospitals and medical facilities with illegal aliens receiving treatment,” he said. “The annual salary cost for agents on hospital watch is more than $11.5 million. Budget analysts estimate that 13 percent of our operational budget—the budget that we use to buy equipment, to buy vehicles for our men and women—is now used for transportation, medical expenses, diapers, food, and other necessities to care for illegal aliens in Border Patrol custody.”

      As far as Luck was concerned, every dollar spent on food and diapers is one not spent on drones and weapons, and every hour an agent spends guarding a migrant in a hospital is an hour they don’t spend on the border. “It’s not what they signed up for. The mission they signed up for is to protect the United States border, to protect the communities in which they live and serve,” he told reporters after his speech. “The influx, the volume, the clutter that this creates is frustrating.” Vitiello applied an Orwellian inversion: “We’re not helping them as fast as we want to,” he said of migrant families apprehended at the border.

      Even when discussing the intimate needs of detained migrant families, the language border officials used to describe their remit throughout the Expo was explicitly militaristic: achieving “operational control,” Luck said, requires “impedance and denial” and “situational awareness.” He referred to technology as a “vital force multiplier.” He at least stopped short of endorsing the president’s framing that what is happening on the border constitutes an invasion, instead describing it as a “deluge.”

      According to the Migration Policy Institute, a non-partisan think tank, the U.S. immigrant population has continued to grow—although at a slower rate than it did before the 2007 recession, and undocumented people appear to make up a smaller proportion of the overall population. Regardless, in fiscal year 2018, both ICE and CBP stepped up their enforcement activities, arresting, apprehending, and deporting people at significantly higher rates than the previous year. More than three times as many family members were apprehended at the border last year than in 2017, the Pew Research Center reports, and in the first six months of FY 2019 alone there were 189,584 apprehensions of “family units”: more than half of all apprehensions at the border during that time, and more than the full-year total of apprehended families for any other year on record. While the overall numbers have not yet begun to approach those of the 1980s and 1990s, when apprehensions regularly exceeded one million per year, the demographics of who is arriving at the United States southern border are changing: fewer single men from Mexico and more children and families from Guatemala, Honduras, and El Salvador—in other words, an ever-wider range of desperate victims of drug gangs and American policies that have long supported corrupt regimes.

      This change has presented people like Luck with problems they insist are merely logistical: aging Border Patrol stations, he told us at the Expo, “are not luxurious in any way, and they were never intended to handle families and children.” The solution, according to Vitiello, is “continued capital investment” in those facilities, as well as the cars and trucks necessary to patrol the border region and transport those apprehended from CBP custody to ICE detention centers, the IT necessary to sift through vast amounts of data accumulated through untold surveillance methods, and all of “the systems by which we do our work.”

      Neither Vitiello nor Luck would consider whether those systems—wherein thousands of children, ostensibly under the federal government’s care, have been sexually abused and five, from December through May of this year, have died—ought to be questioned. Both laughed off calls from migrant justice organizers, activists, and politicians to abolish ICE. “The concept of the Department of Homeland Security—and ICE as an agency within it—was designed for us to learn the lessons from 9/11,” Vitiello said. “Those needs still exist in this society. We’re gonna do our part.” DHS officials have even considered holding migrant children at Guantánamo Bay, Cuba, according to the New York Times, where a new $23 million “contingency mass migration complex” is being built. The complex, which is to be completed by the end of the year, will have a capacity of thirteen thousand.

      Violence is the Point

      The existence of ICE may be a consequence of 9/11, but the first sections of fencing along the U.S.-Mexico border—originally to contain livestock—went up in 1909 through 1911. In 1945, in response to a shift in border crossings from Texas to California, the U.S. Border Patrol and the Immigration and Naturalization Service recycled fencing wire and posts from internment camps in Crystal City, Texas, where more than a hundred thousand Japanese Americans had been imprisoned during World War II. “Although the INS could not erect a continuous line of fence along the border, they hoped that strategic placement of the fence would ‘compel persons seeking to enter the United States illegally to attempt to go around the ends of the fence,’” historian Kelly Lytle Hernández, quoting from government documents, writes in Migra! A History of the U.S. Border Patrol. “What lay at the end of the fences and canals were desert lands and mountains extremely dangerous to cross without guidance or sufficient water. The fences, therefore, discouraged illegal immigration by exposing undocumented border crossers to the dangers of daytime dehydration and nighttime hypothermia.”

      Apprehension and deportation tactics continued to escalate in the years following World War II—including Operation Wetback, the infamous (and heavily propagandized) mass-deportation campaign of 1954—but the modern, militarized border era was greatly boosted by Bill Clinton. It was during Clinton’s first administration that Border Patrol released its “Strategic Plan: 1994 and Beyond,” which introduced the idea of “prevention through deterrence,” a theory of border policing that built on the logic of the original wall and hinges upon increasing the “cost” of migration “to the point that many will consider it futile to continue to attempt illegal entry.” With the Strategic Plan, the agency was requesting more money, officers, and equipment in order to “enhance national security and safeguard our immigration heritage.”

      The plan also noted that “a strong interior enforcement posture works well for border control,” and in 1996, amid a flurry of legislation targeting people of color and the poor, Congress passed the Illegal Immigration Reform and Immigrant Responsibility Act, which empowered the federal government to deport more people more quickly and made it nearly impossible for undocumented immigrants to obtain legal status. “Before 1996, internal enforcement activities had not played a very significant role in immigration enforcement,” the sociologists Douglas Massey and Karen A. Pren wrote in 2012. “Afterward these activities rose to levels not seen since the deportation campaigns of the Great Depression.” With the passage of the Patriot Act in 2001 and the creation of the Department of Homeland Security and Immigration and Customs Enforcement in 2002, immigration was further securitized and criminalized, paving the way for an explosion in border policing technology that has further aligned the state with the defense and security industry. And at least one of Border Patrol’s “key assumptions,” explicitly stated in the 1994 strategy document, has borne out: “Violence will increase as effects of strategy are felt.”

      What this phrasing obscures, however, is that violence is the border strategy. In practice, what “prevention through deterrence” has meant is forcing migrants to cross the U.S.-Mexico border in the desert, putting already vulnerable people at even greater risk. Closing urban points of entry, for example, or making asylum-seekers wait indefinitely in Mexico while their claims are processed, pushes migrants into remote areas where there is a higher likelihood they will suffer injury and death, as in the case of seven-year-old Jakil Caal Maquin, who died of dehydration and shock after being taken into CBP custody in December. (A spokesperson for CBP, in an email response, deflected questions about whether the agency considers children dying in its custody a deterrent.) Maquin is one of many thousands who have died attempting to cross into the United States: the most conservative estimate comes from CBP itself, which has recovered the remains of 7,505 people from its southwest border sectors between 1998 and 2018. This figure accounts for neither those who die on the Mexican side of the border, nor those whose bodies remain lost to the desert.

      Draconian immigration policing causes migrants to resort to smugglers and traffickers, creating the conditions for their exploitation by cartels and other violent actors and increasing the likelihood that they will be kidnapped, coerced, or extorted. As a result, some migrants have sought the safety of collective action in the form of the “caravan” or “exodus,” which has then led the U.S. media and immigration enforcement agencies to justify further militarization of the border. Indeed, in his keynote address at the Expo, Luck described “the emerging prevalence of large groups of one hundred people or more” as “troubling and especially dangerous.” Later, a sales representative for the gun manufacturer Glock very confidently explained to me that this was because agents of al-Shabaab, the al-Qaeda affiliate in Somalia, were embedded with the caravans.

      Branding the Border

      Unsurprisingly, caravans came up frequently at the Border Security Expo. (An ICE spokesperson would later decline to explain what specific threat they pose to national security, instead citing general statistics about the terrorist watchlist, “special interest aliens,” and “suspicious travel patterns.”) During his own keynote speech, Vitiello described how ICE, and specifically its subcomponent Homeland Security Investigations, had deployed surveillance and intelligence-gathering techniques to monitor the progress of caravans toward the border. “When these caravans have come, we’ve had trained, vetted individuals on the ground in those countries reporting in real time what they were seeing: who the organizers were, how they were being funded,” he said, before going on an astonishing tangent:

      That’s the kind of capability that also does amazing things to protecting brands, property rights, economic security. Think about it. If you start a company, introduce a product that’s innovative, there are people in the world who can take that, deconstruct it, and create their own version of it and sell it as yours. All the sweat that went into whatever that product was, to build your brand, they’ll take it away and slap it on some substandard product. It’s not good for consumers, it’s not good for public safety, and it’s certainly an economic drain on the country. That’s part of the mission.

      That the then–acting director of ICE, the germ-cell of fascism in the bourgeois American state, would admit that an important part of his agency’s mission is the protection of private property is a testament to the Trump administration’s commitment to saying the quiet part out loud.

      In fact, brands and private industry had pride of place at the Border Security Expo. A memorial ceremony for men and women of Border Patrol who have been killed in the line of duty was sponsored by Sava Solutions, an IT firm that has been awarded at least $482 million in federal contracts since 2008. Sava, whose president spent twenty-four years with the DEA and whose director of business development spent twenty with the FBI, was just one of the scores of firms in attendance at the Expo, each hoping to persuade the bureaucrats in charge of acquiring new gear for border security agencies that their drones, their facial recognition technology, their “smart” fences were the best of the bunch. Corporate sponsors included familiar names like Verizon and Motorola, and other less well-known ones, like Elbit Systems of America, a subsidiary of Israel’s largest private defense contractor, as well as a handful of IT firms with aggressive slogans like “Ever Vigilant” (CACI), “Securing the Future” (ManTech), and “Securing Your Tomorrow” (Unisys).

      The presence of these firms—and indeed the very existence of the Expo—underscores an important truth that anyone attempting to understand immigration politics must reckon with: border security is big business. The “homeland security and emergency management market,” driven by “increasing terrorist threats and biohazard attacks and occurrence of unpredictable natural disasters,” is projected to grow to more than $742 billion by 2023 from $557 billion in 2018, one financial analysis has found. In the coming decades, as more people are displaced by climate catastrophe and economic crises—estimates vary between 150 million and 1 billion by 2050—the industry dedicated to policing the vulnerable stands to profit enormously. By 2013, the United States was already spending more on federal immigration enforcement than all other federal law enforcement agencies combined, including the FBI and DEA; ICE’s budget has doubled since its inception in 2003, while CBP’s has nearly tripled. Between 1993 and 2018, the number of Border Patrol agents grew from 4,139 to 19,555. And year after year, Democrats and Republicans alike have been happy to fuel an ever more high-tech deportation machine. “Congress has given us a lot of money in technology,” Luck told reporters after his keynote speech. “They’ve given us over what we’ve asked for in technology!”

      “As all of this rhetoric around security has increased, so has the impetus to give them more weapons and more tools and more gadgets,” Jacinta Gonzalez, a senior campaign organizer with Mijente, a national network of migrant justice activists, told me. “That’s also where the profiteering comes in.” She continued: “Industries understand what’s good for business and adapt themselves to what they see is happening. If they see an administration coming into power that is pro-militarization, anti-immigrant, pro-police, anti-communities of color, then that’s going to shape where they put their money.”

      By way of example, Gonzalez pointed to Silicon Valley billionaire Peter Thiel, who spent $1.25 million supporting Trump’s 2016 election campaign and followed that up last year by donating $1 million to the Club for Growth—a far-right libertarian organization founded by Heritage Foundation fellow and one-time Federal Reserve Board prospect Stephen Moore—as well as about $350,000 to the Republican National Committee and other GOP groups. ICE has awarded Palantir, the $20 billion surveillance firm founded by Thiel, several contracts worth tens of millions of dollars to manage its data streams—a partnership the agency considers “mission critical,” according to documents reviewed by The Intercept. Palantir, in turn, runs on Amazon Web Services, the cloud computing service provided by the world’s most valuable public company, which is itself a key contractor in managing the Department of Homeland Security’s $6.8 billion IT portfolio.

      Meanwhile, former DHS secretary John Kelly, who was Trump’s chief of staff when the administration enacted its “zero-tolerance” border policy, has joined the board of Caliburn International—parent organization of the only for-profit company operating shelters for migrant children. “Border enforcement and immigration policy,” Caliburn reported in an SEC filing last year, “is driving significant growth.” As Harsha Walia writes in Undoing Border Imperialism, “the state and capitalism are again in mutual alliance.”

      Triumph of the Techno-Nativists

      At one point during the Expo, between speeches, I stopped by a booth for Network Integrity Systems, a security firm that had set up a demonstration of its Sentinel™ Perimeter Intrusion Detection System. A sales representative stuck out his hand and introduced himself, eager to explain how his employer’s fiber optic motion sensors could be used at the border, or—he paused to correct himself—“any kind of perimeter.” He invited me to step inside the space that his coworkers had built, starting to say “cage” but then correcting himself, again, to say “small enclosure.” (It was literally a cage.) If I could get out, climbing over the fencing, without triggering the alarm, I would win a $500 Amazon gift card. I did not succeed.

      Overwhelmingly, the vendors in attendance at the Expo were there to promote this kind of technology: not concrete and steel, but motion sensors, high-powered cameras, and drones. Customs and Border Patrol’s chief operating officer John Sanders—whose biography on the CBP website describes him as a “seasoned entrepreneur and innovator” who has “served on the Board of Directors for several leading providers of contraband detection, geospatial intelligence, and data analytics solutions”—concluded his address by bestowing on CBP the highest compliment he could muster: declaring the agency comparable “to any start-up.” Rhetoric like Sanders’s, ubiquitous at the Expo, renders the border both bureaucratic and boring: a problem to be solved with some algorithmic mixture of brutality and Big Data. The future of border security, as shaped by the material interests that benefit from border securitization, is not a wall of the sort imagined by President Trump, but a “smart” wall.

      High-ranking Democrats—leaders in the second party of capital—and Republicans from the border region have championed this compromise. During the 2018-2019 government shutdown, House Homeland Security Committee Chairman Bennie Thompson told reporters that Democrats would appropriate $5.7 billion for “border security,” so long as that did not include a wall of Trump’s description. “Walls are primitive. What we need to do is have border security,” House Majority Whip Jim Clyburn said in January. He later expanded to CNN: “I’ve said that we ought to have a smart wall. I defined that as a wall using drones to make it too high to get over, using x-ray equipment to make it too wide to get around, and using scanners to go deep enough not to be able to tunnel under it. To me, that would be a smart thing to do.”

      Even the social democratic vision of Senator Bernie Sanders stops short at the border. “If you open the borders, my God, there’s a lot of poverty in this world, and you’re going to have people from all over the world,” he told Iowa voters in early April, “and I don’t think that’s something that we can do at this point.” Over a week later, during a Fox News town hall with Pennsylvania voters, he recommitted: “We need border security. Of course we do. Who argues with that? That goes without saying.”

      To the extent that Trump’s rhetoric, his administration’s immigration policies, and the enforcement agencies’ practices have made the “border crisis” more visible than ever before, they’ve done so on terms that most Democrats and liberals fundamentally agree with: immigration must be controlled and policed; the border must be enforced. One need look no further than the high priest of sensible centrism, Thomas Friedman, whose major complaint about Trump’s immigration politics is that he is “wasting” the crisis—an allusion to Rahm Emanuel’s now-clichéd remark that “you never want a serious crisis to go to waste.” (Frequently stripped of context, it is worth remembering that Emanuel made this comment in the throes of the 2008 financial meltdown, at the Wall Street Journal’s CEO Council, shortly following President Obama’s election.) “Regarding the border, the right place for Democrats to be is for a high wall with a big gate,” Friedman wrote in November of 2018. A few months later, a tour led by Border Patrol agents of the San Ysidro port of entry in San Diego left Friedman “more certain than ever that we have a real immigration crisis and that the solution is a high wall with a big gate—but a smart gate.”

      As reasonable as this might sound to anxious New York Times readers looking for what passes as humanitarian thinking in James Bennet’s opinion pages, the horror of Friedman’s logic eventually reveals itself when he considers who might pass through the big, smart gate in the high, high wall: “those who deserve asylum” and “a steady flow of legal, high-energy, and high-I.Q. immigrants.” Friedman’s tortured hypothetical shows us who he considers to be acceptable subjects of deportation and deprivation: the poor, the lazy, and the stupid. This is corporate-sponsored, state-sanctioned eugenics: the nativism of technocrats.

      The vision of a hermetically sealed border being sold, in different ways, by Trump and his allies, by Democrats, and by the Border Security Expo is in reality a selectively permeable one that strictly regulates the movement of migrant labor while allowing for the unimpeded flow of capital. Immigrants in the United States, regardless of their legal status, are caught between two factions of the capitalist class, each of which seek their immiseration: the citrus farmers, construction firms, and meat packing plants that benefit from an underclass of unorganized and impoverished workers, and the defense and security firms that keep them in a state of constant criminality and deportability.

      You could even argue that nobody in a position of power really wants a literal wall. Even before taking office, Trump himself knew he could only go so far. “We’re going to do a wall,” he said on the campaign trail in 2015. However: “We’re going to have a big, fat beautiful door on the wall.” In January 2019, speaking to the American Farm Bureau Association, Trump acknowledged the necessity of a mechanism allowing seasonal farmworkers from Mexico to cross the border, actually promising to loosen regulations on employers who rely on temporary migrant labor. “It’s going to be easier for them to get in than what they have to go through now,” he said, “I know a lot about the farming world.”

      At bottom, there is little material difference between this and what Friedman imagines to be the smarter, more humane approach. While establishment liberals would no doubt prefer that immigration enforcement be undertaken quietly, quickly, and efficiently, they have no categorical objection to the idea that noncitizens should enjoy fewer rights than citizens or be subject to different standards of due process (standards that are already applied in deeply inequitable fashion).

      As the smorgasbord of technologies and services so garishly on display at the Border Security Expo attests, maintaining the contradiction between citizens and noncitizens (or between the imperial core and the colonized periphery) requires an ever-expanding security apparatus, which itself becomes a source of ever-expanding profit. The border, shaped by centuries of bourgeois interests and the genocidal machinations of the settler-colonial nation-state, constantly generates fresh crises on which the immigration-industrial complex feeds. In other words, there is not a crisis at the border; the border is the crisis.

      CBP has recently allowed Anduril, a start-up founded by one of Peter Thiel’s mentees, Palmer Luckey, to begin testing its artificial intelligence-powered surveillance towers and drones in Texas and California. Sam Ecker, an Anduril engineer, expounded on the benefits of such technology at the Expo. “A tower doesn’t get tired. It doesn’t care about being in the middle of the desert or a river around the clock,” he told me. “We just let the computers do what they do best.”

      https://thebaffler.com/outbursts/border-profiteers-oconnor

  • The Quantum Computer: Annihilator of Contemporary #blockchain Technology
    https://hackernoon.com/the-quantum-computer-annihilator-of-contemporary-blockchain-technology-4

    With the popularity of cryptocurrencies on the rise, specialists in the area worry about how, when it comes about, quantum computers will threaten blockchain technology, which at the moment still lacks reliable data security.Photo by Pawel Janiak on UnsplashLooming ThreatsQuantum computers are our future, not just with #cryptocurrency but in all areas of life, though the fear that they could — in the realm where they are seen as being of most use at the moment — crack the cryptography which blockchains use for security.The threat is a real one.However, some scientists believe the only way to counter this is to use quantum blockchains as a wall against the threat.A simple case of ‘like for like’.Like Sheep in the BrainSource: Wooden Poster — Do Androids Dream of Electric SheepMy whole interest in (...)

    #life-lessons #science #quantum-computing

  • Be Your Own “X”- Why #blockchain Matters
    https://hackernoon.com/be-your-own-x-why-blockchain-matters-4f07fe899992?source=rss----3a8144ea

    There are three types of folks you’d usually meet on Crypto Twitter.“The blockchain is just an overhyped technology. It’s slow and it sucks”“The blockchain is good for #bitcoin, and nothing else. Everything else is an alt/shitcoin/scam. Also, Satoshi is my lord and savior”“The blockchain is a monumental shift in computing, and we’re just in the beginning”I’m in the third camp, and I’ll tell you why.The market looks fine today, doesn’t it?Blockchain Redefines Data CustodyHave you heard the phrase “Be Your Own Bank”?This phrase pretty much encapsulates the value proposition of Bitcoin: You don’t need banks because you have a decentralized network that enables you to control your own money. You, and no one else.So in essence, we’re talking about a shift of custody.Banks -> You.But what if we look at (...)

    #cryptocurrency #decentralization #ethereum

  • #iot Development and Edge Computing: Why Do We Need It?
    https://hackernoon.com/iot-development-and-edge-computing-why-do-we-need-it-9b0d06e2c09?source=

    Are you wondering how IoT development services and edge computing could be beneficial in your life or business? Learn more about how IoT services work in this guide.It started with smartphones. Now, everyday devices such as cars, lights, TVs, phones, etc. are being made smart via connecting them through networks and the internet.What is the Internet of Things?IoT (Internet of Things) is the connection of computer technology infused with modern devices. This gives the devices the ability to connect to the internet, send and receive data.The Growth of Edge and Fog Computing in IoTAs IoT has continued to develop within the tech industry, edge and fog computing can be used interchangeably.With the opportunities and challenges on the unstructured data front in mind it’s important to look at (...)

    #edge-computing #fog-computing #industrial-iot #internet-of-things

  • How #blockchain Can Democratize AI Development
    https://hackernoon.com/how-blockchain-can-democratize-ai-development-6c49037100e4?source=rss---

    Data Access for AI: An Under-Explored Use for BlockchainThere is a vast amount of computing power around the world that is not used efficiently. There are an estimated 4 billion personal computers in the world and 90% of them have free capacities at any given moment. This is to say nothing of the idle capacities of other personal devices, like smartphones and tablets. In effect, this excess computing power is wasted.Lots of startups are trying to use blockchain technology to take advantage of this inefficiency to meet different economic needs. The blockchain is exciting in this context because it provides an infrastructure for distributed computing power, while at the same time providing an incentive for individuals to link their idle devices to the network.Many of the startups I’ve (...)

    #startup #cryptocurrency #artificial-intelligence #business

  • Are #bitcoin And #ethereum As Secure As You Think?
    https://hackernoon.com/are-bitcoin-and-ethereum-as-secure-as-you-think-f020bc68e28c?source=rss-

    Written by Dr. Vincent Gramoli (Data61-CSIRO, University of Sydney)Consensus is a fundamental problem of distributed computing. While this problem has been known to be unsolvable, existing protocols were designed to solve consensus under various assumptions. Today, with the recent advent of blockchains, various consensus implementations were proposed to make replicas reach an agreement on the order of transactions that update the distributed ledger. However, very little work has been devoted to assessing their #security level. As a result, existing protocols are sometimes misunderstood and it is often unclear whether the problems arising during their executions are due to implementation bugs or more fundamental design issues.The proof-of-work blockchains, like Bitcoin and Ethereum, have (...)

    #cryptocurrency #blockchain

  • #vr Project Development — How Project Managers Should Prepare
    https://hackernoon.com/vr-project-development-how-project-managers-should-prepare-2714a40c130b?

    VR Project Development — How Project Managers Should PrepareBy 2019, most people have probably seen or tried virtual reality experiences, otherwise known as VR. You may have tried a very basic version of VR with Google Cardboard where you could look around and see a 360-degree picture around you. Or you might have even tried a full-fledged VR with the HTC Vive or an Oculus Rift where you were not only able to look around but also to move and explore the new and unfamiliar space.Some people think that VR is just a passing fad, while others praise it to be the next big thing in computing. Despite all that, VR is a new type of medium for interaction with computers, and it’s been steadily breaking into the consumer and enterprise markets for the last 8 years. For example, Ford has used VR to (...)

    #product-management #virtual-reality #project-management #pm

  • What is #aws #lambda or #serverless ?
    https://hackernoon.com/what-is-aws-lambda-or-serverless-f0a006e9d56c?source=rss----3a8144eabfe3

    AWS Lambda logoThere has been a lot of talk about serverless and AWS lambda these days. More and more companies and teams are switching towards the serverless architecture for their applications.In this article, I will be explaining serverless and we will be deploying our first hello world lambda function!What is Serverless?Serverless simply means that you don’t have to manage the servers on which your application runs.You don’t have to take care of patching the system, installing antivirus software or configuring firewalls. Also, you don’t have to worry about scaling your application as the load increases, it is handled automatically!Hence, it allows you to focus more on the functionality of your application.Why is it better?Normally, when you are creating a dynamic web application you (...)

    #cloud #cloud-computing

  • Fedora Picks a Pack of Perfect Wallpapers (Like Always)
    https://www.omgubuntu.co.uk/2019/03/im-a-fan-of-fedoras-fantastic-wallpapers

    We can count on Ubuntu to deliver a solid computing experience atop the latest and greatest open source tech, every six months. We can count on elementary OS and Deepin Linux to wow the previously ‘unwowable’ Linux naysayers, impressing all and every with their sleek desktop designs. And we can count on the Fedora Linux […] This post, Fedora Picks a Pack of Perfect Wallpapers (Like Always), was written by Joey Sneddon and first appeared on OMG! Ubuntu!.

  • Quantum Computing — Can Blockchain be Hacked?
    https://hackernoon.com/quantum-computing-can-blockchain-be-hacked-19c2ec7bac85?source=rss----3a

    Quantum Computing — Can Blockchain be Hacked?“Cryptography is the field concerned with linguistic and mathematical techniques for securing information, particularly in communications” and the security characteristic of Distributed Ledger Technology. Quantum computers have long been dubbed as the Achilles’ heel of Bitcoin and the whole cryptocurrency industry. Due to their overwhelming advantage in computing speed, quantum computers could theoretically be used to disrupt the activity not only of a decentralized system or a blockchain but of any software using any kind of encryption.In Germany, you probably call that ‘Bauernfänger’ (since in Germany we have a single word for almost everything), in English perhaps ‘hornswoggle people’s attention by plotting an attention-grabbing headline’ or (...)

    #distributed-ledgers #legacy-systems #quantum-computing #quantum-computer #quantum-computing-hacks

  • #bitcoin: The Living Room Revolution
    https://hackernoon.com/bitcoin-the-living-room-revolution-9acdf521295e?source=rss----3a8144eabf

    Bitcoin and #crypto are a massive crowd-sourced project to increase individual sovereignty over money and information, which, if successful, will transform the world we live in, forever.“The tree of liberty must be refreshed from time to time with the electricity and computing power of patriots and revolutionaries.” — Thomas Jefferson (if he were alive today)It’s about LibertyMost of the world’s money is fiat money. Fiat is a dirty word. Its usage is rooted in phrases like “by Royal fiat” as in, by Royal command.While we may think that we tossed off the shackles of ‘rule by fiat’ from monarchies and dictatorships, we still comfortably refer to our money as “fiat”. It is, after all, printed on-demand by a handful of people whenever they wish. This point shouldn’t be taken lightly because the power of (...)

    #cryptocurrency #crypto-mining

  • m-e-t-h-o-d-o-l-o-g-i-e-s (or not)
    http://constantvzw.org/site/m-e-t-h-o-d-o-l-o-g-i-e-s-or-not.html

    Contribution to the third lab meeting of the project “Re-configuring computing through cyberfeminism and new materialism” (CF+). CF+ is a project of the Gender/Diversity in Informatics Systems research lab at the University of Kassel, Germany. The project aims to lay the groundwork for revisiting dominant modes and practices of knowledge and artifact production in computer science through cyberfeminist and feminist new materialist lenses. It also aims to consolidate a network of researchers, (...)

    And more...

    #And_more...