ones JCM Credit issuance in Indonesia By www.yokogawa.com Published On :: 2020-01-30T15:00:00+09:00 In March 2019, Yokogawa completed a demonstration project for the Optimization of the Operation Control of Oil Refining Plants in Indonesia. The New Energy and Industrial Technology Development Organization (NEDO) awarded this project to Yokogawa in 2013. Full Article
ones Epothilones By feeds.nature.com Published On :: 2012-06-27 These polyketides, which occur naturally in a myxobacterial species, stabilize microtubule polymers and are therefore being investigated as potential anticancer agents. Full Article
ones Indonesian unicorn Bukalapak’s co-founder & CTO Herucahyono exits By www.dealstreetasia.com Published On :: Fri, 17 Apr 2020 13:25:03 +0000 Former CEO Achmad Zaky stepped down from his position, in a surprise move, in December 2019. The post Indonesian unicorn Bukalapak’s co-founder & CTO Herucahyono exits appeared first on DealStreetAsia. Full Article Bukalapak
ones Indonesia Digest: Ruangguru CEO quits govt role; Gojek partners Paxel By www.dealstreetasia.com Published On :: Thu, 23 Apr 2020 05:36:46 +0000 Ruangguru CEO Adamas Belva Syah Devara has resigned from its role as the government's special staff. The post Indonesia Digest: Ruangguru CEO quits govt role; Gojek partners Paxel appeared first on DealStreetAsia. Full Article Gojek paxel ruangguru
ones Indonesia’s MDI Ventures appoints former AC Ventures partner Donald Wihardja as CEO By www.dealstreetasia.com Published On :: Fri, 08 May 2020 05:25:33 +0000 Wihardja’s appointment comes nine months after his predecessor, former MDI Ventures CEO Nicko Widjaja, quit to join BRI Ventures. The post Indonesia’s MDI Ventures appoints former AC Ventures partner Donald Wihardja as CEO appeared first on DealStreetAsia. Full Article AC Ventures MDI Ventures
ones Indonesian VC firm Indogen Capital eyes succour in East Asia amid virus crisis By www.dealstreetasia.com Published On :: Wed, 29 Apr 2020 00:17:49 +0000 Indogen is working with its portfolio firms to explore opportunities in Greater China and Japan. The post Indonesian VC firm Indogen Capital eyes succour in East Asia amid virus crisis appeared first on DealStreetAsia. Full Article FundPark IndoGen Capital
ones AC Ventures leads seed round of Indonesian restaurant ERP startup ESB By www.dealstreetasia.com Published On :: Tue, 05 May 2020 00:40:47 +0000 ESB claims to be enabling restaurants to transition to the cloud-kitchen model amid the COVID-19 outbreak. The post AC Ventures leads seed round of Indonesian restaurant ERP startup ESB appeared first on DealStreetAsia. Full Article AC Ventures Agaeti Convergence ESB
ones Comments on “The role of appetite-related hormones, adaptive thermogenesis, perceived hunger and stress in long-term weight-loss maintenance: a mixed-methods study” By feeds.nature.com Published On :: 2020-05-07 Full Article
ones Análisis de los servicios 'a la carta' de las televisiones autonómicas españolas By eprints.rclis.org Published On :: Tue, 28 Apr 2020 10:37:13 +0200 Anton, Laura and Guallar, Javier Análisis de los servicios 'a la carta' de las televisiones autonómicas españolas., 2020 . In IV Congreso ISKO España y Portugal, Barcelona, 11-12 July 2019. [Conference paper] Full Article
ones Comunicación corporativa, relaciones públicas y gestión del riesgo reputacional en tiempos del Covid-19 By eprints.rclis.org Published On :: Sat, 09 May 2020 09:57:30 +0200 Xifra, Jordi Comunicación corporativa, relaciones públicas y gestión del riesgo reputacional en tiempos del Covid-19. El profesional de la información, 2020, vol. 29, n. 2. [Journal article (Unpaginated)] Full Article
ones Comunicación y crisis del coronavirus en España. Primeras lecciones // Communication and coronavirus crisis in Spain. First lessons By eprints.rclis.org Published On :: Sat, 09 May 2020 12:53:12 +0200 Costa-Sánchez, Carmen and López-García, Xosé Comunicación y crisis del coronavirus en España. Primeras lecciones // Communication and coronavirus crisis in Spain. First lessons. El profesional de la información, 2020, vol. 29, n. 3. [Journal article (Unpaginated)] Full Article
ones Jones Act tanker loaded China-bound ANS cargo: OSG By www.argusmedia.com Published On :: 08 May 2020 23:43 (+01:00 GMT) Full Article Crude oil Oil products North America US Freight Clean Dirty Petroleum transportation Rates Shipping
ones What’s different about Islam in Malaysia and Indonesia? By webfeeds.brookings.edu Published On :: Thu, 07 Jul 2016 11:29:00 -0400 Editors’ Note: In Southeast Asia, democratization went hand in hand with Islamization, writes Shadi Hamid. So where many assume that democracy can’t exist with Islamism, it is more likely the opposite. The Aspen Institute originally published this post. In both theory and practice, Islam has proven to be resistant to secularization, even (or particularly) in countries like Turkey and Tunisia where attempts to privatize Islam have been most vigorous. If Islam is exceptional in its relationship to politics — as I argue it is in my new book Islamic Exceptionalism — then what exactly does that mean in practice? As Western small-l or “classical” liberals, we don’t have to like or approve of Islam’s prominent place in politics, but we do have to accept life as it is actually lived and religion as it is actually practiced in the Middle East and beyond. What form, though, should that “acceptance” take? If Islam is exceptional in its relationship to politics ... then what exactly does that mean in practice? First, where the two are in tension, it means prioritizing democracy over liberalism. In other words, there’s no real way to force people to be liberal or secular if that’s not who they are or what they want to be. To do so would suggest a patronizing and paternalistic approach to the Middle East — one that President Barack Obama and other senior U.S. officials, and not just those on the right, have repeatedly expressed. If our own liberalism as Americans is context-bound (we grew up in a liberal democratic society), then of course Egyptians, Jordanians or Pakistanis will similarly be products of their own contexts. One should be suspicious of “models” of any kind, since models, such as Turkey’s, tend to disappoint. That said, there are good examples outside of the Middle East that deserve a closer look. Indonesia and to a lesser extent Malaysia are often held up as models of democracy, pluralism, and tolerance. Yet, perhaps paradoxically, these two countries feature significantly more shariah ordinances than, say, Egypt, Tunisia or Morocco. In one article, the Indonesia scholar Robin Bush documents some of the shariah by-laws implemented in the country’s more conservative regions. They include requiring civil servants and students to wear “Muslim clothing,” requiring women to wear the headscarf to receive local government services, and requiring demonstrations of Quranic reading ability to be admitted to university or to receive a marriage license. But there’s a catch. According to a study by the Jakarta-based Wahid Institute, most of these regulations have come from officials of ostensibly secular parties like Golkar. How is this possible? The implementation of shariah is part of a mainstream discourse that cuts across ideological and party lines. That suggests that Islamism is not necessarily about Islamists but is about a broader population that is open to Islam playing a central role in law and governance. Islamists need secularists and secularists need Islamists. But in Indonesia and Malaysia, there was a stronger “middle.” In sum, it wasn’t that religion was less of a “problem” in Indonesia and Malaysia; it’s that the solutions were more readily available. Islam might have still been exceptional, but the political system was more interested in accommodating this reality than in suppressing it. There wasn’t an entrenched secular elite in the same way there was in many Arab countries. Meanwhile, Islamist parties were not as strong, so polarization wasn’t as deep and destabilizing. Islamism wasn’t the province of one party, but of most. In a sense, Islamists need secularists and secularists need Islamists. But in Indonesia and Malaysia, there was a stronger “middle,” and that middle had settled around a relatively uncontroversial conservative consensus. In Southeast Asia, then, democratization went hand in hand with Islamization. To put it more simply, where many assume that democracy can’t exist with Islamism, it is more likely the opposite. What distinguishes Indonesia and Malaysia, as well as their electorates, isn’t some readiness to embrace the gradual privatization of religion. The difference is that their brand of Islamic politics garners much less attention in the West, in part because they aren’t seen as strategically vital and, perhaps more importantly, because the passage of Islamic legislation is simply less controversial domestically. There has been a coming to terms with Islam’s role in public life, where in much of the Middle East, there hasn’t — at least not yet. Authors Shadi Hamid Full Article
ones The Case for Corruption: Why Washington Needs More Honest Graft By webfeeds.brookings.edu Published On :: Mon, 30 Nov -0001 00:00:00 +0000 Jonathan Rauch describes the concept of honest graft in Washington politics and policymaking. Politics needs good leaders, but it needs good followers even more, and they don’t come cheap. Loyalty gets you only so far, and ideology is divisive. Political machines need to exist, and they need to work. Full Article
ones How the Spread of Smartphones will Open up New Ways of Improving Financial Inclusion By webfeeds.brookings.edu Published On :: Tue, 02 Dec 2014 07:30:00 -0500 It’s easy to imagine a future in a decade or less when most people will have a smartphone. In our recent paper Pathways to Smarter Digital Financial Inclusion, we explore the benefits of extending financial services to the mass of lower-income people in developing countries who are currently dubious of the value that financial services can bring to them, distrustful of formal financial institutions, or uncomfortable with the treatment they expect to receive. The report analyzes six inherent characteristics of smartphones that have the potential to change market dynamics relative to the status quo of simple mobile phones and cards. Customer-Facing Changes: 1. The graphical user interface. 2. The ability to attach a variety of peripheral devices to it (such as a card reader or a small printer issuing receipts). 3. The lower marginal cost of mobile data communications relative to traditional mobile channels (such as SMS or USSD). Service Provider Changes: 4. Greater freedom to program services without requiring the acquiescence or active participation of the telco. 5. Greater flexibility to distribute service logic between the handset (apps) and the network (servers). 6. More opportunities to capture more customer data with which to enhance customer value and stickiness. Taken together, these changes may lower the costs of designing for lower-income people dramatically, and the designs ought to take advantage of continuous feedback from users. This should give low-end customers a stronger sense of choice over the services that are relevant to them, and voice over how they wish to be served and treated. Traditionally poor people have been invisible to service providers because so little was known about their preferences that it was not possible build a service proposition or business case around them. The paper describes three pathways that will allow providers to design services on smartphones that will enable an increasingly granular understanding of their customers. Each of the three pathways offers providers a different approach to discover what they need to know about prospective customers in order to begin engaging with them. Pathway One: Through Big Data Providers will piece together information on potential low-income customers directly, by assembling available data from disparate sources (e.g. history of airtime top-ups and bill payment, activity on online social networks, neighborhood or village-level socio-demographic data, etc.) and by accelerating data acquisition cycles (e.g. inferring behavior from granting of small loans in rapid succession, administering selected psychometric questions, or conducting A/B tests with special offers). There is a growing number of data analytics companies that are applying big data in this way to benefit the poor. Pathway Two: Through local Businesses Smartphones will have a special impact on micro and small enterprises, which will see increasing business benefits from recording and transacting more of their business digitally. As their business data becomes more visible to financial institutions, local firms will increasingly channel financial services, and particularly credit, to their customers, employees, and suppliers. Financial institutions will backstop their credit, which in effect turns smaller businesses into front-line distribution partners into local communities. Pathway Three: Through Socio-Financial Networks Firms view individuals primarily as managers of a web of socio-financial relationships that may or may not allow them access to formal financial services. Beyond providing loans to “creditworthy” people, financial institutions can provide transactional engines, similar to the crowdfunding platforms that enable all people to locate potential funding sources within their existing social networks. A provider equipped with appropriate network analysis tools could then promote rather than displace people´s own funding relationships and activities. This would provide financial service firms valuable insight into how people manage their financial needs. The pathways are intended as an exploration of how smartphones could support the development of a healthier and more inclusive digital financial service ecosystem, by addressing the two critical deficiencies of the current mass-market digital finance systems. Smartphones could enable stronger customer value propositions, leading to much higher levels of customer engagement, leading to more revelation of customer data and more robust business cases for the providers involved. Mobile technology could also lead to a broader diversity of players coming into the space, each playing to their specific interests and contributing their specific set of skills, but together delivering customer value through the right combination of collaboration and competition. Authors Ignacio MasDavid Porteous Image Source: © CHRIS KEANE / Reuters Full Article
ones Monitoring milestones: Financial inclusion progress among FDIP countries By webfeeds.brookings.edu Published On :: Thu, 15 Oct 2015 07:30:00 -0400 Editor’s Note: This post is part of a series on the 2015 Financial and Digital Inclusion Project (FDIP) Report and Scorecard, which were launched at a Brookings public event in August. Previous posts have highlighted five key findings from the 2015 FDIP Report, explored financial inclusion developments in India, and examined the rankings for selected FDIP countries in Southeast and Central Asia, the Middle East, and Africa. The 2015 Financial and Digital Inclusion Project (FDIP) Report and Scorecard were launched in August of this year and generally reflect data current through May 2015. Since the end of the data collection period for the report, countries have continued to push forward to greater financial inclusion, and international organizations have continued to assert the importance of financial inclusion as a mechanism for promoting individual well-being and macroeconomic development. Financial inclusion is a key component of the United Nations’ Sustainable Development Goals, signaling international commitment to advancing access to and use of quality financial products among the underserved. We discussed one recent groundbreaking financial inclusion development in a previous post. To learn more about the approval of payments banks in India, read “Inclusion in India: Unpacking the 2015 FDIP Report and Scorecard.” Below are four other key developments among our 21-country sample since the end of the data collection period for the 2015 FDIP Report and Scorecard. The list is in no way intended to be exhaustive, but rather to provide a snapshot illustrating how rapidly the financial inclusion landscape is evolving globally. 1) The Philippines launched a national financial inclusion strategy. In July 2015, the Philippines launched a national financial inclusion strategy (NFIS) and committed to drafting an Action Plan on Financial Inclusion. The Philippines’ NFIS identifies four areas central to promoting financial inclusion: “policy and regulation, financial education and consumer protection, advocacy programs, and data and measurement.” As discussed in the 2015 FDIP Report, national financial inclusion strategies often serve as a platform for identifying key priorities, clarifying the roles of key stakeholders, and setting measurable targets. These strategies can foster accountability and incentivize implementation of stated initiatives. While correlation does not necessarily equal causation, it is nonetheless interesting to note that, according to the World Bank, “[o]n average, there is a 10% increase in the percentage of adults with an account at a formal financial institution for countries that launched an NFIS after 2007, whereas the increase is only 5% for those countries that have not launched an NFIS.” 2) Peru adopted a national financial inclusion strategy. With support from the World Bank, Peru’s Multisectoral Financial Inclusion Commission established an NFIS that was adopted in July 2015 through a Supreme Decree issued by President Ollanta Humala Tasso. The strategy contains a goal to increase financial inclusion to 50 percent of adults by 2018. This is quite an ambitious target: As of 2014, the World Bank Global Financial Inclusion (Global Findex) database found that only 29 percent of adults in Peru had an account with a formal financial services provider. The NFIS also commits the country to facilitating access to a transaction account among at least 75 percent of adults by 2021. Peru’s NFIS emphasizes the promotion of electronic payment systems, including electronic money, as well as improvements pertaining to consumer protection and education. Advancing access to both digital and traditional financial services should boost Peru’s adoption levels over time. As noted in the 2015 FDIP Report, while Peru’s national-level commitment to financial inclusion and regulatory environment for financial services are strong, adoption levels remain low (Peru ranked 15th on the adoption dimension of the 2015 Scorecard, the lowest ranking among the Latin American countries in our sample). 3) Colombia updated its quantifiable targets and released a financial inclusion survey. The 2015 Maya Declaration Progress Report, published in late August 2015, highlights a number of quantifiable financial inclusion targets set by the Ministerio de Hacienda y Crédito Público de Colombia (Colombia’s primary Maya Declaration signatory) relating to the percentage of adults with financial products and savings accounts. For example, the target for the percentage of adults with a financial product is now 76 percent by 2016, up from a target of 73.7 percent by 2015. The goal for the percentage of adults with an active savings account in 2016 is now 56.6 percent, up from a target of 54.2 percent by 2015. To learn more about concrete financial inclusion targets among other FDIP countries, read the 2015 Maya Declaration Progress Report. In July, Banca de las Oportunidades, a key financial inclusion stakeholder in Colombia, presented the results of the country’s first demand-side survey specifically related to financial inclusion. As noted by the Economist Intelligence Unit, previous national-level surveys conducted by entities such as the Superintendencia Financiera and Asobancaria have identified supply- and demand-side indicators pertaining to various financial services. As discussed in the 2015 FDIP Report, national-level surveys that focus on access to and usage of financial services can help identify areas of greatest need and enable countries to better leverage their resources to promote adoption of quality financial services among marginalized populations. 4) Nigeria’s “super agent” network enables greater access to digital financial services. In September 2015, telecommunications company Globacom launched a “super agent” network, Glo Xchange, which can access the mobile money services of any partner mobile money operator. The network has been launched in partnership with four banks. Globacom was given approval in 2014 to develop this network; since then, the company has been recruiting and training its agents. About 1,000 agents will initially be part of this system, with a goal to recruit 10,000 agents by September 2016. Expanding access points to financial services by building agent networks is hoped to boost adoption of digital financial services. Despite having multiple mobile money operators (19 as of October 2015, according to the GSMA’s Mobile Money Deployment Tracker), Nigeria’s mobile money adoption levels have not reached the degree of success of some other countries in Africa: The Global Findex noted that less than 3 percent of adults in Nigeria had mobile money accounts in 2014, compared with over 30 percent in Tanzania and about 60 percent in Kenya. Nigeria’s primarily bank-led approach to financial services, which excludes mobile network operators from being licensed as mobile money operators, is one factor that may have constrained adoption of mobile money services to date. You can read more about Nigeria’s regulatory environment and financial services landscape in the 2015 FDIP Report. We welcome your feedback regarding recent financial inclusion developments. Please send any links, questions, or comments to FDIPComments@brookings.edu. Authors Robin LewisJohn VillasenorDarrell M. West Image Source: © Romeo Ranoco / Reuters Full Article
ones Civilian Drones, Privacy, and the Federal-State Balance By webfeeds.brookings.edu Published On :: Tue, 30 Sep 2014 00:00:00 -0400 Full Article
ones Should Rock Bands Use Drones? By webfeeds.brookings.edu Published On :: Wed, 05 Nov 2014 07:30:00 -0500 In the new music video from OK Go, the band uses a drone with a camera to capture some fantastic footage. Businesses, artists, and hobbyists are using drones for a variety of purposes. But, the rock group didn’t film the music video in the United States. They filmed it in Japan and one possible contributing factor is that filming the video in the U.S. may have been illegal. The laws and regulations governing drones are still being sorted out by authorities. Both state governments and the federal government have started to take notice of the problem. Civil liberties advocates have emerged in support for strong federal oversight of drone surveillance to ensure that privacy is protected. Others argue that states and their preexisting privacy laws are already equipped to deal with nongovernment drone surveillance. Photo credit: OK Go https://www.youtube.com/watch?v=u1ZB_rGFyeU State Privacy Law Wells C. Bennett’s recent report Civilian Drones, Privacy, and the Federal-State Balance describes how most state privacy laws could be applied to drone operators. Most states offer three general types of privacy protections: Protection against intrusion: Common law that makes it unlawful for a person to trespass on someone else’s property. Protection against aerial surveillance: Laws in this category are either criminal or civil in nature and aim to specifically block aerial surveillance. Anti-Voyeurism: These laws deal with “peeping toms” and other moments when people have an expectation of privacy. Federal Aviation Rules Those who believe that drones ought to be heavily regulated argue that the Federal Aviation Authority (FAA) should introduce strong new rules. In 2012 Congress has called on the FAA to develop new rules for drones by 2015. The FAA has long regulated aircraft of all types but the agency has less experience with privacy issues. In 2013, the agency selected six test sites where it would be legal to fly drones. The operators at these sites were required to abide by privacy rules the FAA created, which over time developed into a set of comprehensive standards. These standards ultimately remained applicable to test sites only as the agency was reticent to enforce privacy regulations for the whole country. However, the standards still serve as the foundation for the FAA’s roadmap to integrating drones into American skies and as a set of recommendations for policymakers. The FAA’s reticence to regulate privacy creates a policy conundrum. Bennett proposes an approach that involves the states taking the lead with policy. The states already have a broad, legal framework that can be applied to privately owned drones. Where the states lack authority, Bennett suggests the Federal government can fill in the gaps. This mixed approach allows the states to use tested privacy laws and for the federal government to wait until it has the mission-critical data necessary to even begin crafting regulations for nongovernment drone surveillance. Matt Mariano contributed to this piece. Authors Joshua Bleiberg Image Source: © Andrew Kelly / Reuters Full Article
ones Drones and Aerial Surveillance: Considerations for Legislators By webfeeds.brookings.edu Published On :: Thu, 13 Nov 2014 00:00:00 -0500 Full Article
ones Drones and Aerial Surveillance: The Opportunities and The Risks By webfeeds.brookings.edu Published On :: Tue, 18 Nov 2014 07:30:00 -0500 Businesses, citizens, and law enforcement officials are discovering innovative new uses for drones every day. Drones have a distinctively menacing reputation because TV footage typically depicts them flying over a faraway battlefield launching missiles. In the popular imagination, drones have replaced the black helicopters of the 1990s and the satellite images of the 2000s as the primary surveillance tool. For this reason many perceive the drone as a threat to civil rights and safety in the United States. Privacy advocates have called upon lawmakers to pass legislation that keeps drones out of American skies. Others see a potentially beneficial role from drones if effective regulations are developed. In a recent paper titled Drones and Aerial Surveillance: Considerations For Legislators, Gregory McNeal proposes a model for how Congress should regulate drones. McNeal’s Policy Recommendations Privacy advocates have argued that law enforcement officers should secure a warrant before ever using a drone for surveillance. McNeal contends that the best standard relies on an interpretation of property rights law with a few supplementary criteria: Property Rights: As mentioned above, landowners should be allowed to deny aircraft access to a column of airspace extending from their property for up to 350ft. Duration-Based Surveillance: Law enforcement officials should only be able to survey an individual using a drone for a specific amount of time. Data Retention: Data collected from a drone on a surveillance flight should only be accessible to law enforcement officials for a period of time. The data would eventually be deleted when there is no longer a level of suspicion associated with the monitored individual. Transparency: Government agencies should be required to regularly publish information about the use of aerial surveillance equipment. Expectation of Privacy The crucial factors in determining whether the 4th Amendment prohibits drone monitoring has to do with the surveyed individuals’ expectation of privacy. In California vs. Ciraolo a police officer received a tip that a man was growing marijuana in a walled off part of his yard not visible from the street. The officer obtained a private aircraft and flew at an altitude of 1,000 feet in order to survey the walled off space. The Supreme Court ultimately ruled this type of “naked-eye” surveillance was not unlawful because it was within what the Federal Aviation Administration (FAA) calls a publicly navigable airspace. The officer had the right to view the walled off portion of the yard because it could be viewed in public airspace. McNeal cites the expectation of privacy as a central point of his argument against the advocates who don’t want any drones in the air. He asserts that his approach actually offers more protections for privacy as opposed to a warrant requirement approach. He argues that it is not reasonable to expect privacy in a public place. For example there is no functional difference between a police officer monitoring a public protest and a drone monitoring one. McNeal wisely argues that it is possible to live in a world where a person’s privacy is respected and drones can be utilized to help create a safer society. Matt Mariano contributed to this post. Authors Joshua Bleiberg Image Source: © Mike Segar / Reuters Full Article
ones Explained: Why America's deadly drones keep firing By webfeeds.brookings.edu Published On :: Thu, 21 May 2015 12:00:00 -0400 President Obama's announcement last month that earlier this year a “U.S. counterterrorism operation” had killed two hostages, including an American citizen, has become a fresh occasion for questioning the rationales for continuing attacks from unmanned aerial vehicles aimed at presumed, suspected, or even confirmed terrorists. This questioning is desirable, although not mainly for hostage-related reasons connected to this incident. Sometimes an incident has a sufficient element of controversy to stoke debate even though what most needs to be debated is not an issue specific to the incident itself. More fundamental issues about the entire drone program need more attention than they are getting. The plight of hostages held by terrorists has a long and sometimes tragic history, almost all of which has had nothing to do with drones. Hostage-taking has been an attractive terrorist tool for so long partly because of the inherent advantages that the hostage-holders always will have over counterterrorist forces. Those advantages include not only the ability to conceal the location of hostages—evidently a successful concealment in the case of the hostages mentioned in the president's announcement—but also the ability of terrorists to kill the hostages themselves and to do so quickly enough to make any rescue operation extraordinarily difficult. Even states highly skilled at such operations, most notably Israel, have for this reason suffered failed rescue attempts. It is not obvious what the net effect of operations with armed drones is likely to be on the fate of other current or future hostages. The incident in Pakistan demonstrates one of the direct negative possibilities. Possibly an offsetting consideration is that fearing aerial attack and being kept on the run may make, for some terrorists, the taking of hostages less attractive and the management of their custody more difficult. But a hostage known to be in the same location as a terrorist may have the attraction to the latter of serving as a human shield. The drone program overall has had both pluses and minuses, as anyone who is either a confirmed supporter or opponent of the program should admit. There is no question that a significant number of certified bad guys have been removed as a direct and immediate consequence of the attacks. But offsetting, and probably more than offsetting, that result are the anger and resentment from collateral casualties and damage and the stimulus to radicalization that the anger and resentment provide. There is a good chance that the aerial strikes have created more new terrorists bent on exacting revenge on the United States than the number of old terrorists the strikes have killed. This possibility is all the more disturbing in light of what appears to be a significant discrepancy between the official U.S. posture regarding collateral casualties and the picture that comes from nonofficial sources of reporting and expertise. The public is at a disadvantage in trying to judge this subject and to assess who is right and who is wrong, but what has been pointed out by respected specialists such as Micah Zenko is enough to raise serious doubt about official versions both of the efforts made to avoid casualties among innocents and of how many innocents have become victims of the strikes. The geographic areas in which the drone strikes are most feasible and most common are not necessarily the same places from which future terrorist attacks against the United States are most likely to originate. The core Al-Qaeda group, which has been the primary target and concern in northwest Pakistan, is but a shadow of its former self and not the threat it once was. Defenders of the drone strikes are entitled to claim that this development is in large part due to the strikes. But that leaves the question: why keep doing it now? The principal explanation, as recognized in the relevant government circles, for the drone program has been that it is the only way to reach terrorists who cannot be reached by other tools or methods. It has been seen as the only counterterrorist game that could be played in some places. That still leaves more fundamental questions about the motivations for playing the game. Policy-makers do not use a counterterrorist tool just because the tool is nifty—although that may be a contributing factor regarding the drones—but rather because they feel obligated to use every available tool to strike at terrorists as long as there are any terrorists against whom to strike. In the back of their minds is the thought of the next Big One, or maybe even a not so big terrorist attack on U.S. soil, occurring on their watch after not having done everything they could to prevent it, or doing what would later be seen in hindsight as having had the chance to prevent it. The principal driver of such thoughts is the American public's zero tolerance attitude toward terrorism, in which every terrorist attack is seen as a preventable tragedy that should have been prevented, without fully factoring in the costs and risks of prevention or of attempted prevention. Presidents and the people who work for them will continue to fire missiles from drones and to do some other risky, costly, or even counterproductive things in the cause of counterterrorism because of the prospect of getting politically pilloried for not being seen to make the maximum effort on behalf of that cause. This piece was originally published by The National Interest. Authors Paul R. Pillar Publication: The National Interest Image Source: © Handout . / Reuters Full Article
ones Drones and the “Wild West” of regulatory experimentation By webfeeds.brookings.edu Published On :: Mon, 17 Aug 2015 07:30:00 -0400 As noted in our recent Brookings Institution report, unmanned aerial vehicles (UAVs), commonly referred to as drones, are an emerging technology that requires the attention of local governments. Unfortunately, regulations governing their usage are significantly lagging the pace of innovation. Individual citizens who do not want these devices flying over (or even near) their property due to privacy or safety concerns have limited options. You can stay in your home and turn the music up until it goes away. Or you can go about your business and ignore the possibility that the drone has a camera to see inside your home. Others might prefer a more active response. In fact, there have been several recent instances where residents have taken it upon themselves to remove these drones from the skies…by force. Misuses of drones The usage of UAVs and the lack of a functional regulatory environment have not been without incident. Fire personnel in southern San Bernardino County were fighting the first major fire of the season and had to abort their tanker flights due to someone flying a drone at approximately 12,000 feet and interfering with the safety of the pilots. Just two weeks later, firefighters in Southern California were using several manned aircraft to help put out 20 car fires on an interstate highway that were caused when a wildfire jumped the highway unexpectedly. Pilots had to ground the planes when it was reported that five drones were flying around the area to get a good look at the fires (two of which were witnessed actually chasing the tanker planes!). In addition to the general lack of common sense by a few users interfering with life-saving aircraft around the U.S., Britain, Poland, and elsewhere, there have been an increasing number of incidents involving drones accused of serving as remote “peeping toms.” UAVs have also crashed into cars and homes; they have even been used to smuggle drugs across the U.S.-Mexico border in addition to smuggling marijuana into prisons in South Carolina and in Ohio. Uneven regulations When it comes to regulations around drones, we are living in the proverbial wild-west. A few states, like Nevada and Wisconsin, have passed legislation to prevent the weaponization of drones. But in July, a YouTube video went viral of a teenager in Connecticut who modified his drone to fire a semi-automatic handgun successfully. When confronted by law enforcement officials, they determined that no laws had actually been broken. Virginia was the first state legislature to put in place a two-year moratorium on drone usage by state or law enforcement agencies. That moratorium expired July 1st. By the end of 2014, 36 states had introduced legislation aimed at protecting individual privacy in some manner. Only four of those passed last year. Currently, there are 17 states with some form of drone regulation on their books, and several other states still have legislation pending. Most of the laws that have passed, such as those in Idaho and Florida, focus on limiting police usage of drones by requiring probable cause warrants. Nevada has been one of the more active states in the drone legislation arena. In addition to their legislation prohibiting the weaponization of civilian drones, the state also has passed legislation to provide homeowners rights to sue drone owners who fly their drones over personal property in certain circumstances. Furthermore, Nevada now requires law enforcement agencies to get warrants when using drones near any home “where there is an expectation of privacy.” Potential benefits and rulemaking challenges We do acknowledge and are excited about the positive benefits that drone technology is poised to provide. Amazon has been testing their commercial “Prime Air” package delivery system under an experimental testing agreement with the FAA since early 2015, which will likely impact the nature of their almost two year old partnership with the U.S. Postal Service. Drone startup company Flirtey successfully demonstrated their ability to deliver medicine to a rural medical facility in Virginia as part of their proof of concept efforts this July. Drones may even represent the future of pizza delivery. The challenge this rapidly developing technology is creating is well ahead of local government efforts to rein in excessive activities. State and local governments need to engage on this policy issue more proactively. To do so, however, requires a delicate balancing act of the multiple competing interests of legitimate commercial uses, policing, public safety, privacy, and private property concerns. And this balancing has to take place in an environment where federal law remains unsettled too. One thing we would definitely caution against is ‘regulation by default.’ To date, the efforts to regulate drone policy has focused on the drones themselves. As is commonly the case with new technology, governments typically engaged with a heavy hand that sometimes misses the opportunities afforded by the new technologies to improve city services and quality of life. Examples of this possible overreaction is Iowa City, Iowa and Charlottesville, Virginia, both of which were early adopters of complete bans on all surveillance drones within city limits back in 2013. Local governments need to accept that drone technology is here for the near future. They must recognize that technology is not the problem, but how it is used can be a potential problem. Given the potential drawbacks and benefits, there is justification for reasoned regulation of drone technology. Authors David SwindellKevin C. DesouzaSabrina P.K. Glimcher Image Source: © Rick Wilking / Reuters Full Article
ones Drugs and drones: The crime empire strikes back By webfeeds.brookings.edu Published On :: Wed, 24 Feb 2016 09:10:00 -0500 Editors’ Note: Organized crime actors have increasingly adopted advanced technologies, with law enforcement agencies adapting accordingly. However, the use of ever fancier-technology is only a part of the story. The future lies as much behind as ahead, writes Vanda Felbab-Brown, with criminal groups now using primitive technologies and methods to counter the advanced technologies used by law enforcement. This post was originally published by the Remote Control Project, a project hosted by the Oxford Research Group. The history of drug trafficking and crime more broadly is a history of adaptation on the part of criminal groups in response to advances in methods and technology on the part of law enforcement agencies, and vice versa. Sometimes, technology trumps crime: The spread of anti-theft devices in cars radically reduced car theft. The adoption of citadels (essentially saferooms) aboard ships, combined with intense naval patrolling, radically reduced the incidence of piracy off Somalia. Often, however, certainly in the case of many transactional crimes such as drug trafficking, law enforcement efforts have tended to weed out the least competent traffickers, and to leave behind the toughest, meanest, leanest, and most adaptable organized crime groups. Increasingly, organized crime actors have adopted advanced technologies, such as semi-submersible and fully-submersible vehicles to carry drugs and other contraband, and cybercrime and virtual currencies for money-laundering. Adaptations in the technology of smuggling by criminal groups in turn lead to further evolution and improvement of methods by law enforcement agencies. However, the use of ever fancier-technology is only a part of the story. The future lies as much behind as ahead (to paraphrase J.P. Wodehouse), with the asymmetric use of primitive technologies and methods by criminal groups to counter the advanced technologies used by law enforcement. The seduction of SIGINT and HVT The improvements in signal intelligence (SIGINT) and big-data mining over the past two decades have dramatically increased tactical intelligence flows to law enforcement agencies and military actors, creating a more transparent anti-crime, anti-terrorism, and counterinsurgency battlefield than before. The bonanza of communications intercepts of targeted criminals and militants that SIGINT has come to provide over the past decades in Colombia, Mexico, Iraq, Pakistan, Afghanistan, and other parts of the world has also strongly privileged high-value targeting (HVT) and decapitation policies-i.e., principally targeting the presumed leaders of criminal and militant organizations. The proliferation of SIGINT and advances in big-data trawling, combined with some highly visible successes of HVT, has come with significant downsides. First, high-value targeting has proven effective only under certain circumstances. In many contexts, such as in Mexico, HVT has been counterproductive, fragmenting criminal groups without reducing their proclivity to violence; in fact, exacerbating violence in the market. Other interdiction patterns and postures, such as middle-level targeting and focused-deterrence, would be more effective policy choices. A large part of the problem is that the seductive bonanza of signal intelligence has lead to counterproductive discounting of the need to: develop a strategic understanding of criminal groups’ decisionmaking—knowledge crucial for anticipating the responses of targeted non-state actors to law enforcement actions; Mexico provides a disturbing example; cultivate intelligence human intelligence assets, sorely lacking in Somalia, for example; obtain a broad and comprehensive understanding of the motivations and interests of local populations that interact with criminal and insurgent groups, notably deficient in Iraq, Afghanistan, and Pakistan; and establish good relationships with local populations to advance anti-crime and counterinsurgency policies, such as in Colombia where drug eradication policy antagonized local populations from national government and strengthened the bonds between them and rebel groups. In other words, the tactical tool, technology—in the form of signal intelligence and big-data mining—has trumped strategic analysis. The correction needed is to bring back strategic intelligence analysis to drive interdiction targeting patterns, instead of letting the seduction of signal data drive intelligence analysis and targeting action. The political effects, anticipated responses by criminal and militant groups, and other outcomes of targeting patterns need be incorporated into the strategic analysis. Questions to be assessed need to include: Can interdiction hope to incapacitate—arrest and kill—all of the enemy or should it seek to shape the enemy? What kind of criminals and militants, such as how fractured or unified, how radicalized or restrained in their ambitions, and how closely aligned with local populations against the state, does interdiction want to produce? Dogs fights or drone fights: Remote lethal action by criminals Criminal groups have used technology not merely to foil law enforcement actions, but also to fight each other and dominate the criminal markets and control local populations. In response to the so-called Pacification (UPP) policy in Rio de Janeiro through which the Rio government has sought to wrestle control over slums from violent criminal gangs, the Comando Vermelho (one of such gangs), for example, claimed to deploy remote-sensor cameras in the Complexo do Alemão slum to identify police collaborators, defined as those who went into newly-established police stations. Whether this specific threat was credible or not, the UPP police units have struggled to establish a good working relationship with the locals in Alemão. The new radical remote-warfare development on the horizon is for criminal groups to start using drones and other remote platforms not merely to smuggle and distribute contraband, as they are starting to do already, but to deliver lethal action against their enemies—whether government officials, law enforcement forces, or rival crime groups. Eventually, both law enforcement and rival groups will develop defenses against such remote lethal action, perhaps also employing remote platforms: drones to attack the drones. Even so, the proliferation of lethal remote warfare capabilities among criminal groups will undermine deterrence, including deterrence among criminal groups themselves over the division of the criminal market and its turfs. Remotely delivered hits will complicate the attribution problem— i.e., who authorized the lethal action—and hence the certainty of sufficiently painful retaliation against the source and thus a stable equilibrium. More than before, criminal groups will be tempted to instigate wars over the criminal market with the hope that they will emerge as the most powerful criminal actors and able to exercise even greater power over the criminal market—the way the Sinaloa Cartel has attempted to do in Mexico even without the use of fancy technology. Stabilizing a highly violent and contested—dysfunctional—criminal market will become all the more difficult the more remote lethal platforms have proliferated among criminal groups. Back to the past: The Ewoks of crime and anti-crime In addition to adopting ever-advancing technologies, criminal and militant groups also adapt to the technological superiority of law enforcement-military actors by the very opposite tactic—resorting asymmetrically to highly primitive deception and smuggling measures. Thus, both militant and criminal groups have adapted to signal intelligence not just by using better encryption, but also by not using cell phones and electronic communications at all, relying on personal couriers, for example, or by flooding the e-waves with a lot of white noise. Similarly, in addition to loading drugs on drones, airplanes, and submersibles, drug trafficking groups are going back to very old-methods such as smuggling by boats, including through the Gulf of Mexico, by human couriers, or through tunnels. Conversely, society sometimes adapts to the presence of criminal groups and intense, particularly highly violent, criminality by adopting its own back-to-the-past response—i.e., by standing up militias (which in a developed state should have been supplanted by state law enforcement forces). The rise of anti-crime militias in Mexico, in places such as Michoacán and Guerrero, provides a vivid and rich example of such populist responses and the profound collapse of official law enforcement. The inability of law enforcement there to stop violent criminality—and in fact, the inadvertent exacerbation of violence by criminal groups as a result of HVT—and the distrust of citizens toward highly corrupt law enforcement agencies and state administrations led to the emergence of citizens’ anti-crime militias. The militias originally sought to fight extortion, robberies, theft, kidnapping, and homicides by criminal groups and provide public safety to communities. Rapidly, however, most of the militias resorted to the very same criminal behavior they purported to fight—including extortion, kidnapping, robberies, and homicides. The militias were also appropriated by criminal groups themselves: the criminal groups stood up their own militias claiming to fight crime, where in fact, they were merely fighting the rival criminals. Just as when external or internal military forces resort to using extralegal militias, citizens’ militias fundamentally weaken the rule of law and the authority and legitimacy of the state. They may be the ewoks’ response to the crime empire, but they represent a dangerous and slippery slope to greater breakdown of order. In short, technology, including remote warfare, and innovations in smuggling and enforcement methods are malleable and can be appropriated by both criminal and militant groups as well as law enforcement actors. Often, however, such adoption and adaptation produces outcomes that neither criminal groups nor law enforcement actors have anticipated and can fully control. The criminal landscape and military battlefields will resemble the Star Wars moon of Endor: drone and remote platforms battling it out with sticks, stones, and ropes. Authors Vanda Felbab-Brown Publication: Oxford Research Group Full Article
ones "Should we live together first?" Yes, say Democrats. No, say Republicans (even young ones) By webfeeds.brookings.edu Published On :: Thu, 19 May 2016 11:00:00 -0400 There is a marriage gap in America. This is not just a gap in choices and actions, but in norms and attitudes. Each generation is more liberal, on average, when it comes to issues like premarital relationships, same-sex marriage, and divorce. But generational averages can obscure other divides, including ideology—which in many cases is a more powerful factor. Take opinions on the most important prerequisites for marriage, as explored in the American Family Survey conducted earlier this year by Deseret News and the Center for the Study of Elections and Democracy (disclosure: I am an adviser to the pollsters). There is widespread agreement that it is best to have a stable job and to have completed college before tying the knot. But there is less agreement in the 3,000-person survey on other questions, including premarital cohabitation. Living in sin, or preparing for commitment? In response to the question of whether it is “important to live with your future spouse before getting married,” a clear gap emerges between those who identify as Democrats and those who identify as Republicans. This gap trumps the generational one, with younger Republicans (under 40) more conservative than Democrats over the age of 40: The importance of family stability for a child’s wellbeing and prospects is well-documented, not least in Isabel Sawhill’s book, Generation Unbound. The question is not whether stability matters, but how best to promote it. To the extent that biological parents stay together and provide a stable environment, it doesn’t much matter if they are married. For children living with both biological parents, there is no difference in outcomes between those being raised by a married couple compared to a cohabiting couple, according to research by Wendy Manning at Bowling Green State University. But people who marry are much more likely to stay together: Marriage, at least in America, does seem to act as an important commitment device, a “co-parenting” contract for the modern world, as I’ve argued in an essay for The Atlantic, “How to Save Marriage in America.” The varied meaning of “cohabitation” Cohabitation can signal radically different situations. A couple who plan to live together for a couple of years, then marry, and then plan the timing of having children are very different from a couple who start living together, accidentally get pregnant, and then, perhaps somewhat reluctantly, get married. There is some evidence that cohabitation is in fact becoming a more common bridge to marriage and commitment. First-time premarital cohabiting relationships are also lasting longer on average and increasingly turn into marriage: around seven in ten cohabiting couples are still together after three years, of whom four have married. In the end what matters is planning, stability, and commitment. If cohabitation is a planned prelude to what some scholars have labeled “decisive marriages,” it seems likely to prove a helpful shift in social norms, by allowing couples to test life under the same roof before making a longer-term commitment. Sawhill’s distinction between “drifters” and “planners” in terms of pregnancy may also be useful when it comes to thinking about cohabitation, too. Authors Richard V. ReevesNathan Joo Image Source: © Brendan McDermid / Reuters Full Article
ones Explained: Why America’s deadly drones keep firing By webfeeds.brookings.edu Published On :: Mon, 30 Nov -0001 00:00:00 +0000 President Obama's announcement last month that earlier this year a “U.S. counterterrorism operation” had killed two hostages, including an American citizen, has become a fresh occasion for questioning the rationales for continuing attacks from unmanned aerial vehicles aimed at presumed, suspected, or even confirmed terrorists. This questioning is desirable, although not mainly for hostage-related reasons… Full Article
ones Indonesia’s imminent presidential election By webfeeds.brookings.edu Published On :: On April 17, Indonesians will go to the polls to vote in the country’s fifth general election since 1998 when their country’s transition to democratic rule began. Once again, the upcoming election will be a match-up between the two men who ran against each other five years ago: incumbent President Joko Widodo (commonly called Jokowi)… Full Article
ones The Impact of Domestic Drones on Privacy, Safety and National Security By webfeeds.brookings.edu Published On :: Legal and technology experts hosted a policy discussion on how drones and forthcoming Federal Aviation Agency regulations into unmanned aerial vehicles will affect Americans’ privacy, safety and the country’s overall security on April 4, 2012 at Brookings. The event followed a new aviation bill, signed in February, which will open domestic skies to “unmanned aircraft… Full Article
ones News from Mother Jones: Help Haiti, Whole Foods' Ungreen Ways, Gross Tap Water By www.treehugger.com Published On :: Thu, 14 Jan 2010 04:00:00 -0500 Yesterday, TreeHugger rounded up a few green charities that are helping the recovery effort in Haiti after Tuesday's earthquake. MoJo's human rights reporter Mac McClelland has a few more suggestions for how to help one of the poorest and least Full Article Business
ones It's Gonna Take a Lotta Love to Reforest Indonesia By www.treehugger.com Published On :: Wed, 06 May 2009 08:30:00 -0400 Love is often said to blossom, but a new government initiative in the Indonesian district of Garut aims to make that metaphor literal by requiring newly married couples to plant 10 tree saplings.Two years ago, Indonesia Full Article Business
ones Could smart phones soon be grown from 'living materials'? By www.treehugger.com Published On :: Tue, 25 Mar 2014 22:43:00 -0400 How would design for obsolescence change if materials that conduct electricity or emit light could be grown and repair themselves, like bone? Full Article Technology
ones Indonesia to Add 4000 MW of Geothermal Power by 2014... And Add Another 10 GW of Coal by 2012 By www.treehugger.com Published On :: Mon, 26 Apr 2010 12:36:00 -0400 Indonesia may not be tapping into much of its superior Full Article Energy
ones CLT House by Susan Jones shows the future of sustainable, green and healthy housing By www.treehugger.com Published On :: Mon, 30 Mar 2015 12:45:24 -0400 And it is beautiful too. Full Article Design
ones Susan Jones' Seattle CLT house is a wooden wonder By www.treehugger.com Published On :: Fri, 16 Oct 2015 11:23:53 -0400 It really could be the future of sustainable, green and healthy housing. Full Article Design
ones Questionable ingredient found in Jessica Alba's Honest Company detergent By www.treehugger.com Published On :: Fri, 11 Mar 2016 15:09:00 -0500 After promising not to use sodium lauryl sulfate in any products, The Honest Co. is under scrutiny after two lab tests found significant amounts of the chemical in its laundry detergent. Full Article Living
ones Ecorazzi on DiCaprio + Van Jones, Worldchanging Interviews Wangari Maathai, Chevron Toxico, and More By www.treehugger.com Published On :: Thu, 07 May 2009 07:45:54 -0400 Chevron Toxico: Chevron Produces Phony Online News Coverage to Spread Misinformation about Ecuador Disaster "To promote a misinformation campaign about its role in the oil contamination of a pristine area of the rainforest in Ecuador, Chevron recently Full Article Living
ones Florida's official culture of driving blames pedestrians (and cellphones) for "vast majority" of deaths By www.treehugger.com Published On :: Thu, 30 Mar 2017 11:25:12 -0400 A Today Show bit today is perhaps the grossest example yet. Full Article Transportation
ones The Ballad of Lonesome George, The Galapagos' Most Famous Tortoise By www.treehugger.com Published On :: Tue, 30 Nov 2010 10:48:27 -0500 Lonesome George is quite a character. He's a Pinta Island tortoise, and, as Brian noted when he visited a few years ago, he's the last of this breed. Yep, that means when he's gone, that's it -- his species will Full Article Science
ones R.I.P. Lonesome George, the Last of His Kind By www.treehugger.com Published On :: Sun, 24 Jun 2012 23:40:38 -0400 Lonesome George, the world's last remaining Pinta Island tortoise, has died at age 100 -- marking the final end of a species millennia in the making, and inching that 'loneliest' mantle one notch closer to us. Full Article Science
ones Lonesome George May Not Have Been the Last of His Species By www.treehugger.com Published On :: Fri, 16 Nov 2012 16:36:47 -0500 On a remote island in the Galapagos, hybrid turtles have been found that suggest a long-lost purebred companion for the late Lonesome George may survive. Full Article Science
ones Here's the best treadmill desk we've seen yet, designed long before all the other ones By www.treehugger.com Published On :: Thu, 05 Feb 2015 10:31:22 -0500 Steven M. Johnson really should have had an agent. Full Article Design
ones Statistical Analysis Shows 2 Degree Temperature Rise Zones in North America By www.treehugger.com Published On :: Wed, 16 May 2012 07:00:00 -0400 Analysis bridges differences between various climate change models to predict North American climate change with high certainty. Will skeptics finally be convinced? Full Article Science
ones British scientists power cell phones with urine By www.treehugger.com Published On :: Wed, 17 Jul 2013 07:46:40 -0400 The researchers have developed a fuel cell that creates electricity from urine and could be used to power our gadgets. Full Article Technology
ones Cell phones charged by sound are now closer to becoming a reality By www.treehugger.com Published On :: Wed, 03 Sep 2014 08:56:32 -0400 Nanotechnology breakthroughs have lead to a successful prototype of a device that could charge your cell phone with ambient noise or the conversations of users. Full Article Technology
ones Hawaiian volcano offers gifts of gemstones delivered from the sky By www.treehugger.com Published On :: Thu, 14 Jun 2018 12:38:11 -0400 As if to say 'sorry,' Kilauea softens its fury by tossing shimmery green olivine to the humble humans below. Full Article Science
ones Reconfigurable canopy uses drones to move its modules around (Video) By www.treehugger.com Published On :: Mon, 22 Oct 2018 13:23:41 -0400 This example of programmable architecture uses lightweight materials and drones to help it adapt to environmental changes. Full Article Design
ones Let Bygones Be Bygones Already, for the Environment's Sake! By www.treehugger.com Published On :: Sun, 23 Sep 2007 13:51:28 -0400 Due to security issues, the date has not been released yet, but we are happy to announce that Middle East environmentalists are putting political pet peeves aside to focus on one goal: preserving the environment. Full Article Business
ones Winner of the Goldman Environmental Prize tackles illegal palm oil companies in Indonesia By www.treehugger.com Published On :: Tue, 29 Apr 2014 08:00:00 -0400 From palm oil invaders to adorable Sumatran rhinos, this story about a recent environmental victory will inspire you. Full Article Business
ones Facebook wants to use solar drones to bring internet access to the world By www.treehugger.com Published On :: Mon, 10 Mar 2014 07:00:00 -0400 The company would use the Solara solar-powered drone, which can remain in flight for five years at a time! Full Article Technology
ones Willie Smits on Regrowing the Indonesian Rainforest and Harvesting Biofuels By www.treehugger.com Published On :: Fri, 08 Jan 2010 12:09:34 -0500 Image: Casajuntoalrio Willie Smits long ago abandoned the customary role of the microbiologist. After working in the Indonesian rainforest for three decades (and marrying a tribal queen), he has taken it upon himself to regrow the delicate ecosystems Full Article TreeHugger Radio
ones Indonesia's Tin Mines are a Health Nightmare By www.treehugger.com Published On :: Fri, 30 Nov 2012 09:30:00 -0500 This article from The Guardian explores the tin mines of Bangka and the death tolls that come with them. Full Article Technology