book Defense Playbook for Campaigns By feedproxy.google.com Published On :: Mar 24, 2020 Mar 24, 2020The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition. This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. Full Article
book Comparative Grand Strategy: A Framework and Cases—Book Review By feedproxy.google.com Published On :: Jan 14, 2020 Jan 14, 2020William James reviews Comparative Grand Strategy: A Framework and Cases edited by Thierry Balzacq, Peter Dombrowski, and Simon Reich (Oxford University Press, 2019). Full Article
book Comparative Grand Strategy: A Framework and Cases—Book Review By feedproxy.google.com Published On :: Jan 14, 2020 Jan 14, 2020William James reviews Comparative Grand Strategy: A Framework and Cases edited by Thierry Balzacq, Peter Dombrowski, and Simon Reich (Oxford University Press, 2019). Full Article
book Defense Playbook for Campaigns By feedproxy.google.com Published On :: Mar 24, 2020 Mar 24, 2020The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition. This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. Full Article
book Defense Playbook for Campaigns By feedproxy.google.com Published On :: Mar 24, 2020 Mar 24, 2020The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition. This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. Full Article
book MEI Affiliate Books By feedproxy.google.com Published On :: Feb 18, 2020 Feb 18, 2020Newly published books by MEI affiliate scholars. Full Article
book Defense Playbook for Campaigns By feedproxy.google.com Published On :: Mar 24, 2020 Mar 24, 2020The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition. This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. Full Article
book Defense Playbook for Campaigns By feedproxy.google.com Published On :: Mar 24, 2020 Mar 24, 2020The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition. This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. Full Article
book Defense Playbook for Campaigns By feedproxy.google.com Published On :: Mar 24, 2020 Mar 24, 2020The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition. This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. Full Article
book Defense Playbook for Campaigns By feedproxy.google.com Published On :: Mar 24, 2020 Mar 24, 2020The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition. This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. Full Article
book MEI Affiliate Books By feedproxy.google.com Published On :: Feb 18, 2020 Feb 18, 2020Newly published books by MEI affiliate scholars. Full Article
book MEI Affiliate Books By www.belfercenter.org Published On :: Feb 18, 2020 Feb 18, 2020Newly published books by MEI affiliate scholars. Full Article
book Defense Playbook for Campaigns By feedproxy.google.com Published On :: Mar 24, 2020 Mar 24, 2020The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition. This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. Full Article
book Defense Playbook for Campaigns By feedproxy.google.com Published On :: Mar 24, 2020 Mar 24, 2020The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition. This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. Full Article
book Defense Playbook for Campaigns By feedproxy.google.com Published On :: Mar 24, 2020 Mar 24, 2020The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition. This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. Full Article
book Defense Playbook for Campaigns By feedproxy.google.com Published On :: Mar 24, 2020 Mar 24, 2020The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition. This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. Full Article
book MEI Affiliate Books By feedproxy.google.com Published On :: Feb 18, 2020 Feb 18, 2020Newly published books by MEI affiliate scholars. Full Article
book Suezmax tanker booked for VGO floating storage By www.argusmedia.com Published On :: 07 May 2020 12:52 (+01:00 GMT) Full Article Oil products Vacuum gasoil Europe FSU Mediterranean Fundamentals Demand Inventories Refining Supply
book Defense Playbook for Campaigns By feedproxy.google.com Published On :: Mar 24, 2020 Mar 24, 2020The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition. This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. Full Article
book MEI Affiliate Books By feedproxy.google.com Published On :: Feb 18, 2020 Feb 18, 2020Newly published books by MEI affiliate scholars. Full Article
book MEI Affiliate Books By feedproxy.google.com Published On :: Feb 18, 2020 Feb 18, 2020Newly published books by MEI affiliate scholars. Full Article
book MEI Affiliate Books By feedproxy.google.com Published On :: Feb 18, 2020 Feb 18, 2020Newly published books by MEI affiliate scholars. Full Article
book MEI Affiliate Books By feedproxy.google.com Published On :: Feb 18, 2020 Feb 18, 2020Newly published books by MEI affiliate scholars. Full Article
book MEI Affiliate Books By feedproxy.google.com Published On :: Feb 18, 2020 Feb 18, 2020Newly published books by MEI affiliate scholars. Full Article
book Defense Playbook for Campaigns By feedproxy.google.com Published On :: Mar 24, 2020 Mar 24, 2020The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition. This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. Full Article
book MEI Affiliate Books By feedproxy.google.com Published On :: Feb 18, 2020 Feb 18, 2020Newly published books by MEI affiliate scholars. Full Article
book Defense Playbook for Campaigns By feedproxy.google.com Published On :: Mar 24, 2020 Mar 24, 2020The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition. This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. Full Article
book Facebook can’t resolve conflicts in Myanmar and Sri Lanka on its own By webfeeds.brookings.edu Published On :: Wed, 27 Jun 2018 19:42:37 +0000 Facebook CEO Mark Zuckerberg has been caught up in a whirlwind in recent months, giving congressional testimony and public statements defending Facebook against allegations that it has been too lax in combating online hate speech and disinformation. International criticism has rightly brought attention to the urgent need to address Facebook’s role in stoking ethnic and… Full Article
book The Political Geography of Virginia and Florida: Bookends of the New South By webfeeds.brookings.edu Published On :: Fri, 10 Oct 2008 12:00:00 -0400 This is the fourth in a series of reports on the demographic and political dynamics under way in key “battleground” states, deemed to be crucial in deciding the 2008 election. As part of the Metropolitan Policy Program’s Blueprint for American Prosperity, this series will provide an electoral component to the initiative’s analysis of, and prescriptions for, bolstering the health and vitality of America’s metropolitan areas, the engines of the U.S. economy. This report focuses on two major battleground states in the South, Virginia and Florida, which serve as bookends to an emerging New South. Virginia and Florida have eligible voter populations that are rapidly changing. White working class voters are declining sharply while white college graduates are growing and minorities, especially Hispanics and Asians, are growing even faster. These changes are having their largest effects in these states’ major metropolitan areas, particularly Miami and rapidly-growing Orlando and Tampa in Florida’s I-4 Corridor and the suburbs of Washington, D.C. in Northern Virginia. Other large metro areas in these states are also feeling significant effects from these changes and will contribute to potentially large demographically related political shifts in the next election. In Virginia, these trends will have their strongest impact in the fast-growing and Democratic-trending Northern Virginia area, where Democrats will seek to increase their modest margin from the 2004 election. The trends could also have big impacts in the Richmond and Virginia Beach metros, where Democrats will need to compress their 2004 deficits. Overall, the GOP will be looking to maintain their very strong support among Virginia’s declining white working class, especially in the conservative South and West region. The Democrats will be reaching out to the growing white college graduate group, critical to their prospects in Northern Virginia and statewide. The Democrats will also be relying on the increasing number of minority voters, who could help them not just in Northern Virginia, but also in the Virginia Beach metro and the Richmond and East region. In Florida, these trends will have their strongest impacts in the fast-growing I-4 Corridor (36 percent of the statewide vote), which, while Democratic2 trending, is still the key swing region in Florida, and in the Miami metro, largest in the state and home to 27 percent of the vote. The trends could also have big impacts in the South and North, where Democrats will be looking to reduce their 2004 deficits in important metros like Jacksonville (North) and Sarasota and Cape Coral (South). Across the state, the GOP needs to prevent any erosion of support among white working class voters, especially among Democratic-trending whites with some college. They will also seek to hold the line among white college graduates, whose support levels for the GOP are high but declining over time. Finally, the support of the growing Hispanic population is critical to GOP efforts to hold the state, but this group is changing generationally and in terms of mix (more non-Cuban Hispanics), which could open the door to the Democrats. Both of these states are near the top of the lists of most analysts’ list of battleground states for November 2008. Florida was a very closely contested state in both 2000 and 2004 (especially 2000). But Virginia’s status as a battleground is new to 2008. Yet in both states the contested political terrain reflects the dynamic demographic changes occurring within them. With 27 and 13 electoral votes, respectively, all eyes will be on Florida and Virginia on election night. Downloads DownloadMaps and Figures, Part OneMaps and Figures, Part Two Authors William H. FreyRuy Teixeira Full Article
book Book Review of Al From’s Reflections on the Creation and Rise of the DLC By webfeeds.brookings.edu Published On :: Mon, 30 Nov -0001 00:00:00 +0000 Phillip Wallach reviews Al From’s new political memoir, The New Democrats and the Return to Power (2013). The book contains a wealth of historical material, including From’s time working in the Clinton transition team from 1992-1993 and his efforts to spread a progressive Third Way abroad during the late 1990s. One lesson in particular stands out: institutional change is a long slog, requiring a combination of fertile political conditions and reformers well prepared to seize their moment. Yet From notes that a Democratic Leadership Council-style turnaround will be harder for Republicans today because today’s Republicans are more homogeneous and less inclusive than the Democrats of the 1980s. Full Article Uncategorized
book Code Red: A book event with E.J. Dionne Jr. By webfeeds.brookings.edu Published On :: Mon, 10 Feb 2020 14:00:28 +0000 Broad and principled opposition to Donald Trump’s presidency has drawn millions of previously disengaged citizens to the public square and to the ballot box. But if progressives and moderates are unable—and unwilling—to overcome their differences, they could not only enable Trump to prevail again but also squander an occasion for launching a new era of… Full Article
book Trump’s Playbook Is Terribly Ill-Suited to a Pandemic By webfeeds.brookings.edu Published On :: Tue, 03 Mar 2020 17:33:21 +0000 Full Article
book U.S. Embassy Pakistan: First to Pass One Million Fans on Facebook By webfeeds.brookings.edu Published On :: The U.S. Embassy in Pakistan has just cracked a diplomatic milestone: becoming the first mission in the world to pass one million fans on Facebook. Its rise to top spot has been swift. The embassy only decided to make social media a priority in late 2011. Following a request to Washington for technical assistance… Full Article Uncategorized
book First Step to Literacy: Getting Books in the Hands of Children By webfeeds.brookings.edu Published On :: Fri, 28 Jan 2011 14:07:00 -0500 Being able to read and write is the most basic foundation of knowledge accumulation and further skill development. Without literacy, there can be no quality education. Presently, 1 in 5 adults is illiterate, two-thirds of whom are women. At the current pace, over 700 million adults worldwide will still not be able to read in 2015. [1] In global education discussions, literacy rates are most often reported for adolescents and adults, an ex post facto measure of the failure of primary school systems to impart basic skills in the most formative schooling years. It is clear that much needs to be done to provide these adolescents and adults with access to successful literacy programs. But we must also ensure that children with access to schooling are not growing up to be illiterate.Children enrolled and regularly attending school for the first three grades should be able to read basic text. Evidence shows that acquiring this ability to read sets students up for further learning, enabling them to read and comprehend progressively more advanced materials and acquire additional knowledge.As explained in our earlier policy brief, data from numerous countries show that children in school are failing to acquire the most basic of skills, measured as the ability to read words of connected text. We called for a global paradigm shift that places learning at the center of the global education discourse. This shift requires the major bilateral and multilateral actors to refocus their own efforts on supporting learning in the classroom and measuring progress by increased learning outcomes. There has been some progress here, such as USAID’s goal to improve reading skills for primary school children in its new education strategy and the World Bank’s Education Strategy 2020, Learning for All: investing in people’s knowledge and skills to promote development.This shift of focus also requires substantial changes on the ground, including encouraging and supporting a culture of literacy and learning at the community level. For example, Gove and Cvelich highlight some main factors contributing to low reading levels, including a lack of support for teachers, limited instructional time, poorly resourced schools, the absence of books in the home and policies regarding the language of instruction. [2] In Mali, a recent survey found that three-quarters of grade 2 students did not have a textbook and no student had supplementary reading books at school. [3] In The Gambia, the vast majority of students who demonstrated a level of reading fluency said that they had books at home. Globally, in both developed and developing economies, a relatively consistent proxy for “parental commitment to education” is the number of books in the home. A 20-year study of 27 countries found that children growing up in homes with many books get three years more schooling than their peers who come from homes without books. [4] There is no one-size-fits-all solution to improving the quality of education in developing countries. However, there is plenty of room for innovation to address some of the biggest barriers to improving reading levels, including availability of appropriate reading materials at school and at home. In disadvantaged communities, where there are relatively few books and even fewer books in local languages and that deal with culturally-relevant topics, innovation is needed to help develop a robust culture of literacy.One such innovation is Worldreader.org’s iRead pilot in Ghana, which has put hundreds of e-readers into children’s hands. A lot has been written on similar classroom technology in developing countries, which cite examples of supplying hardware to schools without plans for its educational use, promoting technology from a single company, insufficient planning for sustainability, and inadequate investment in time to train teachers and administrators who will be the purveyors of the technology initiatives in the classrooms. [5]However, the important difference between this e-reader program and similar projects focused on putting computers in classrooms is that e-readers usually operate on the mobile phone system, which has exploded in developing regions over the last few years. In Kenya, more than 80 percent of the population has mobile phone network coverage and more than half of the population has purchased a mobile phone subscription. The GSM compatibility of e-readers allows for downloading of new reading materials wherever there is mobile phone coverage and sufficient funds available to purchase new texts. E-readers also have relatively low levels of energy consumption (a one-hour charge can last more than a week). In addition to gaining the support of community leaders and teachers from the beginning, the pilot began with intense in-service training for teachers in how to use e-readers to complement their existing curricula. While Worldreader.org has not solved all of the challenges posed by technology initiatives in education, it has taken some important steps toward addressing the barriers to project success. [6]The organization has also tackled specific challenges that are impeding reading success in the early primary grades:Additional support for emergent readers. E-readers provide additional support to teachers in teaching children how to read, an important supplement in primary school classrooms in low-income countries where there may be 40 or 50 students per teacher. In such cases, students are required to work independently or in small groups while the teacher is working with other students. The text-to-speech feature on e-readers can read books aloud to the student, exposing her to the written text as she hears it read aloud. Students can also use the downloaded dictionary while reading to look up unfamiliar words and continue to read without adult assistance.Students and teachers get to choose. While paper books donated by schools, libraries, and individuals from around the world have helped to get written materials into low-resource schools in developing countries, e-books allow students and teachers in developing countries to choose which books they teach and read. Although choices now are restricted by the dominance of English in the e-book market, the potential for the expansion of the digital market represents a step toward greater agency for teachers and students. Working with local publishers to increase access to books for emergent readers. Children learning to read need access to the types of books that engage their imagination and spark their interest. For children learning to read, this means stories with simple sentences in their local language. Yet, traditionally children’s books are not a good economic bet for publishers, particularly in developing countries. The high cost of printing the books are not recouped since so many families cannot purchase copies for their own household use. However, distributing books in e-reader format will actually allow publishers to reach more customers at a lower cost. To bring more books to the developing world through e-readers and e-books, Worldreader.org seeks to support a self-sustaining reading and publishing culture by working with local publishers to digitize books and materials to support local language curricula.Portability can increase reading opportunities. Anecdotal reports from classroom teachers in the Ghanaian pilot frequently reference how students would not stop reading, pulling out their e-readers in between lessons, during recess and lunch, and after school with friends, parents and siblings. An International Association for the Evaluation of Educational Achievement study on reading literacy in 32 countries found that the amount of voluntary book reading that students did during out-of-school time was strongly positively related to students’ achievement levels. [7]While the pilot is still in the early stages, the founders of the project are focused on the essential outcomes. Their USAID-funded impact study seeks to find out whether children are reading more than they were before the program and whether children read better than they were before the program. Measuring program success by understanding the impact on learning outcomes is a critical step for shifting the global education paradigm to one focused on learning. [1] UNESCO. (2010). EFA Global Monitoring Report 2010: Reaching the Marginalized. Paris: UNESCO. [2] Gove, A., and P. Cvelich, (2010). Early Reading: Igniting Education for All. A report by the Early Grades Learning Community of Practice. Research Triangle Park, NC: Research Triangle Institute. [3] Evans, 2010[4] M.D.R. Evans, Jonathan Kelley, Joanna Sikora, Donald J. Treiman. “Family scholarly culture and educational success: Books and schooling in 27 nations.” Research in Social Stratification and Mobility, 2010; DOI: 10.1016/j.rssm.2010.01.002 The study controls for education levels, occupations, and socio-economic status of the parents. [5] For example, Trucano, M. “Worst practice in ICT use in education,” 2010, accessed at http://blogs.worldbank.org/edutech/worst-practice [6] Some of the core challenges identified by Worldreader.org and others include the upfront costs of e-readers, need for on-going training and support to teachers, students, and communities, buy-in of school systems and local governments to deploy technology and content, insufficient relevant materials in e-book format, and consistent access to electricity and mobile networks. [7] Elley, W.B. (Ed.). (1994). The IEA Study of Reading Literacy: Achievement and Instruction in Thirty-two School Systems. Oxford: Pergamon Press. Downloads Download Paper Authors Anda AdamsJacques van der Gaag Image Source: © Fabrizio Bensch / Reuters Full Article
book The New Campaign Finance Sourcebook By webfeeds.brookings.edu Published On :: Sat, 01 Oct 2005 00:00:00 -0400 Brookings Institution Press 2005 292pp. This completely revised and expanded update of Campaign Finance Reform: A Sourcebook provides the definitive exposition of federal campaign finance regulation. Written by four of the nation's most influential analysts on politics and money, The New Campaign Finance Sourcebook presents a thorough overview and analysis of campaign finance policy and practices, including the history of campaign finance regulation state of campaign finance law and the implementation of BCRA constitutional and regulatory issues in the campaign finance debate current practices and trends in the financing of federal elections public financing of presidential elections rules for campaigning on the internet alternative approaches to reform. The New Campaign Finance Sourcebook has also been integrated with the popular and useful Brookings website on campaign finance to provide a timely, interactive tool for policymakers, journalists, campaign professionals, and scholars. The Brookings Institution has been a leader in analyzing campaign finance and this important new book is an essential addition to that proud tradition. ABOUT THE AUTHORS Anthony Corrado Daniel R. Ortiz Daniel R. Ortiz is the John Allan Love Professor of Law and Horace W. Goldsmith Research Professor at the University of Virginia School of Law. Thomas E. Mann Trevor Potter Downloads Sample Chapter Ordering Information: {9ABF977A-E4A6-41C8-B030-0FD655E07DBF}, 978-0-8157-0005-0, $26.95 Add to Cart Full Article
book The Study of the Distributional Outcomes of Innovation: A Book Review By webfeeds.brookings.edu Published On :: Mon, 05 Jan 2015 07:30:00 -0500 Editors Note: This post is an extended version of a previous post. Cozzens, Susan and Dhanaraj Thakur (Eds). 2014. Innovation and Inequality: Emerging technologies in an unequal world. Northampton, Massachusetts: Edward Elgar. Historically, the debate on innovation has focused on the determinants of the pace of innovation—on the premise that innovation is the driver of long-term economic growth. Analysts and policymakers have taken less interest on how innovation-based growth affects income distribution. Less attention even has received the question of how innovation affects other forms of inequality such as economic opportunity, social mobility, access to education, healthcare, and legal representation, or inequalities in exposure to insalubrious environments, be these physical (through exposure to polluted air, water, food or harmful work conditions) or social (neighborhoods ridden with violence and crime). The relation between innovation, equal political representation and the right for people to have a say in the collective decisions that affect their lives can also be added to the list of neglect. But neglect has not been universal. A small but growing group of analysts have been working for at least three decades to produce a more careful picture of the relationship between innovation and the economy. A distinguished vanguard of this group has recently published a collection of case studies that illuminates our understanding of innovation and inequality—which is the title of the book. The book is edited by Susan Cozzens and Dhanaraj Thakur. Cozzens is a professor in the School of Public Policy and Vice Provost of Academic Affairs at Georgia Tech. She has studied innovation and inequality long before inequality was a hot topic and led the group that collaborated on this book. Thakur is a faculty member of the school College of Public Service and Urban Affairs at Tennessee State University (while writing the book he taught at the University of West Indies in Jamaica). He is an original and sensible voice in the study of social dimensions of communication technologies. We’d like to highlight here three aspects of the book: the research design, the empirical focus, and the conceptual framework developed from the case studies in the book. Edited volumes are all too often a collection of disparate papers, but not in this case. This book is patently the product of a research design that probes the evolution of a set of technologies across a wide variety of national settings and, at the same time, it examines the different reactions to new technologies within specific countries. The second part of the book devotes five chapters to study five emerging technologies—recombinant insulin, genetically modified corn, mobile phones, open-source software, and tissue culture—observing the contrasts and similarities of their evolution in different national environments. In turn, part three considers the experience of eight countries, four of high income—Canada, Germany, Malta, and the U.S.—and four of medium or low income—Argentina, Costa Rica, Jamaica, and Mozambique. The stories in part three tell how these countries assimilated these diverse technologies into to their economies and policy environments. The second aspect to highlight is the deliberate choice of elements for empirical focus. First, the object of inquiry is not all of technology but a discreet set of emerging technologies gaining a specificity that would otherwise be negated if they were to handle the unwieldy concept of “technology” broadly construed. At the same time, this choice reveals the policy orientation of the book because these new entrants have just started to shape the socio-technical spaces they inhabit while the spaces of older technologies have likely ossified. Second, the study offers ample variance in terms of jurisdictions under study, i.e. countries of all income levels; a decision that makes at the same time theory construction more difficult and the test of general premises more robust.[i] We can add that the book avoids sweeping generalizations. Third, they focus on technological projects and their champions, a choice that increases the rigor of the empirical analysis. This choice, naturally, narrows the space of generality but the lessons are more precise and the conjectures are presented with according modesty. The combination of a solid design and clear empirical focus allow the reader to obtain a sense of general insight from the cases taken together that could not be derived from any individual case standing alone. Economic and technology historians have tackled the effects of technological advancement, from the steam engine to the Internet, but those lessons are not easily applicable to the present because emerging technologies intimate at a different kind of reconfiguration of economic and social structures. It is still too early to know the long-term effects of new technologies like genetically modified crops or mobile phone cash-transfers, but this book does a good job providing useful concepts that begin to form an analytical framework. In addition, the mix of country case studies subverts the disciplinary separation between the economics of innovation (devoted mostly to high-income countries) and development studies (interested in middle and low income economies). As a consequence of these selections, the reader can draw lessons that are likely to apply to technologies and countries other than the ones discussed in this book. The third aspect we would like to underscore in this review is the conceptual framework. Cozzens, Thakur and their colleagues have done a service to anyone interested in pursuing the empirical and theoretical analysis of innovation and inequality. For these authors, income distribution is only one part of the puzzle. They observe that inequalities are also part of social, ethnic, and gender cleavages in society. Frances Stewart, from Oxford University, introduced the notion of horizontal inequalities or inequalities at the social group level (for instance, across ethnic groups or genders). She developed the concept to contrast vertical inequalities or inequalities operating at the individual level (such as household income or wealth). The authors of this book borrow Stewart’s concept and pay attention to horizontal inequalities in the technologies they examine and observe that new technologies enter marketplaces that are already configured under historical forms of exclusion. A dramatic example is the lack of access to recombinant insulin in the U.S., because it is expensive and minorities are less likely to have health insurance (see Table 3.1 in p. 80).[ii] Another example is how innovation opens opportunities for entrepreneurs but closes them for women in cultures that systematically exclude women from entrepreneurial activities. Another key concept is that of complementary assets. A poignant example is the failure of recombinant insulin to reach poor patients in Mozambique who are sent home with old medicine even though insulin is subsidized by the government. The reason why doctors deny the poor the new treatment is that they don’t have the literacy and household resources (e.g. a refrigerator, a clock) necessary to preserve the shots, inject themselves periodically, and read sugar blood levels. Technologies aimed at fighting poverty require complementary assets to be already in place and in the absence of them, they fail to mitigate suffering and ultimately ameliorate inequality. Another illustration of the importance of complementary assets is given by the case of Open Source Software. This technology has a nominal price of zero; however, only individuals who have computers and the time, disposition, and resources to learn how to use open source operative systems benefit. Likewise, companies without the internal resources to adapt open software will not adopt it and remain economically tied to proprietary software. These observations lead to two critical concepts elaborated in the book: distributional boundaries and the inequalities across technological transitions. Distributional boundaries refer to the reach of the benefits of new technologies, boundaries that could be geographic (as in urban/suburban or center/periphery) or across social cleavages or incomes levels. Standard models of technological diffusion assume the entire population will gradually adopt a new technology, but in reality the authors observe several factors intervene in limiting the scope of diffusion to certain groups. The most insidious factors are monopolies that exercise sufficient control over markets to levy high prices. In these markets, the price becomes an exclusionary barrier to diffusion. This is quite evident in the case of mobile phones (see table 5.1, p. 128) where monopolies (or oligopolies) have market power to create and maintain a distributional boundary between post-pay and high-quality for middle and high income clients and pre-pay and low-quality for poor customers. This boundary renders pre-pay plans doubly regressive because the per-minute rates are higher than post-pay and phone expenses represent a far larger percentage in poor people’s income. Another example of exclusion happens in GMOs because in some countries subsistence farmers cannot afford the prices for engineering seeds; a disadvantage that compounds to their cost and health problems as they have to use more and stronger pesticides. A technological transition, as used here, is an inflection point in the adoption of a technology that re-shapes its distributional boundaries. When smart phones were introduced, a new market for second-hand or hand-down phones was created in Maputo; people who could not access the top technology get stuck with a sub-par system. By looking at tissue culture they find that “whether it provides benefits to small farmers as well as large ones depends crucially on public interventions in the lower-income countries in our study” (p. 190). In fact, farmers in Costa Rica enjoy much better protections compare to those in Jamaica and Mozambique because the governmental program created to support banana tissue culture was designed and implemented as an extension program aimed at disseminating know-how among small-farmers and not exclusively to large multinational-owned farms. When introducing the same technology, because of this different policy environment, the distributional boundaries were made much more extensive in Costa Rica. This is a book devoted to present the complexity of the innovation-inequality link. The authors are generous in their descriptions, punctilious in the analysis of their case studies, and cautious and measured in their conclusions. Readers who seek an overarching theory of inequality, a simple story, or a test of causality, are bound to be disappointed. But those readers may find the highest reward from carefully reading all the case studies presented in this book, not only because of the edifying richness of the detail herein but also because they will be invited to rethink the proper way to understand and address the problem of inequality.[iii] [i] These are clearly spelled out: “we assumed that technologies, societies, and inequalities co-evolved; that technological projects are always inherently distributional; and that the distributional aspects of individual projects and portfolios of projects are open to choice.” (p. 6) [ii] This problem has been somewhat mitigated since the Affordable Healthcare Act entered into effect. [iii] Kevin Risser contributed to this posting. Authors Walter D. Valdivia Image Source: © Akhtar Soomro / Reuters Full Article
book Five books you should read to better understand Islam By webfeeds.brookings.edu Published On :: Tue, 15 Dec 2015 11:38:00 -0500 After a recent talk about my ISIS book, one of the audience members asked, “What can I read to help me not hate Islam?” I don’t think it’s a scholar’s job to persuade others to love or hate any culture. But the question was sincere, so I suggested some books that have helped me better understand Islam. I also put the question to Twitter. Below is some of what I and others came up with. Two cautions before we dive in: First, the list is obviously not exhaustive and I’ve left out overly apologetic books—in my experience, they only increase the skeptical reader’s suspicion that she’s being suckered. Second, people on Twitter gave me great suggestions but I’ve only included those I’ve read and can vouch for: Muhammad and the Quran: Two of the best books you’ll ever read about Muhammad and the Quran are also the shortest: The Koran: A Very Short Introduction and Muhammad, both by Michael Cook. He writes with great wit and deep scholarship. Other scriptures: Most non-Muslims are unaware that Islamic scripture is more than the Quran. It includes a vast collection of words and deeds attributed to Muhammad by later authors. These scriptures are sort of like the Gospels, and Muslim scholars fight over their authenticity like Christian scholars debate about the accuracy of Matthew, Mark, Luke, and John. These extra Islamic scriptures contain most of the teachings that make modern people (Muslims included) uncomfortable about Islam. One of the world’s experts on these scriptures, Jonathan Brown, has written a terrific book about them, Misquoting Muhammad. Rumi: The medieval mystic’s poems about life and death are beautiful and moving, no matter your belief system. I loved his poems so much as an undergrad that I went on to study Middle Eastern languages just so I could read his work in the original. I’m glad I first viewed Islam through the eyes of Rumi and not a group like ISIS. Neither is solely representative of Islam but both draw heavily on its scriptures and reach such different conclusions. The Bible: Many people recommended reading the Bible to decrease hate of Islam. The nerd in me leapt to the least obvious conclusion, “Ah, good idea! Reading some of the rough stuff in the Hebrew Bible is a good way to put a kindred ancient religion like Islam in perspective.” But they meant something a little less complicated: @will_mccants @jenanmoussa Read the bible and learn to love and not to hate. :-) — Dirk Lont (@Denkkracht1) December 12, 2015 It’s a worthy perspective today no matter your faith. Authors William McCants Image Source: © David Gray / Reuters Full Article
book Facebook, Google, and the Future of Privacy and Free Speech By webfeeds.brookings.edu Published On :: Mon, 02 May 2011 00:00:00 -0400 IntroductionIt was 2025 when Facebook decided to post live feeds from public and private surveillance cameras, so they could be searched online. The decision hardly came as a surprise. Ever since Facebook passed the 500 million-member mark in 2010, it found increasing consumer demand for applications that allowed users to access surveillance cameras with publicly accessible IP addresses. (Initially, live feeds to cameras on Mexican beaches were especially popular.) But in the mid-2020s, popular demand for live surveillance camera feeds were joined by demands from the U.S. government that an open circuit television network would be invaluable in tracking potential terrorists. As a result, Facebook decided to link the public and private camera networks, post them live online, and store the video feeds without restrictions on distributed servers in the digital cloud. Once the new open circuit system went live, anyone in the world could log onto the Internet, select a particular street view on Facebook maps and zoom in on a particular individual. Anyone could then back click on that individual to retrace her steps since she left the house in the morning or forward click on her to see where she was headed in the future. Using Facebook’s integrated face recognition app, users could click on a stranger walking down any street in the world, plug her image into the Facebook database to identify her by name, and then follow her movements from door-to-door. Since cameras were virtually ubiquitous in public and commercial spaces, the result was the possibility of ubiquitous identification and surveillance of all citizens virtually anywhere in the world—and by anyone. In an enthusiastic launch, Mark Zuckerberg dubbed the new 24/7 ubiquitous surveillance system “Open Planet.” Open Planet is not a technological fantasy. Most of the architecture for implementing it already exists, and it would be a simple enough task for Facebook or Google, if the companies chose, to get the system up and running: face recognition is already plausible, storage is increasing exponentially; and the only limitation is the coverage and scope of the existing cameras, which are growing by the day. Indeed, at a legal Futures Conference at Stanford in 2007, Andrew McLaughlin, then the head of public policy at Google, said he expected Google to get requests to put linked surveillance networks live and online within the decade. How, he, asked the audience of scholars and technologists, should Google respond? If “Open Planet” went live, would it violate the Constitution? The answer is that it might not under Supreme Court doctrine as it now exists—at least not if it were a purely-private affair, run by private companies alone and without government involvement. Both the First Amendment, which protects free speech, and the Fourth Amendment, which prohibits unreasonable searches and seizures, only restrict actions by the government. On the other hand, if the government directed Open Planet’s creation or used it to track citizens on government-owned, as well as private-sector, cameras, perhaps Facebook might be viewed as the equivalent of a state actor, and therefore restricted by the Constitution. At the time of the framing of the Constitution, a far less intrusive invasion of privacy – namely, the warrantless search of private homes and desk drawers for seditious papers – was considered the paradigmatic case of an unreasonable and unconstitutional invasion of privacy. The fact that 24/7 ubiquitous surveillance may not violate the Constitution today suggests the challenge of translating the framers’ values into a world in which Google and Facebook now have far more power over the privacy and free speech of most citizens than any King, president, or Supreme Court justice. In this essay, I will examine four different areas where the era of Facebook and Google will challenge our existing ideas about constitutional protections for free speech and privacy: ubiquitous surveillance with GPS devices and online surveillance cameras; airport body scanners; embarrassing Facebook photos and the problem of digital forgetting; and controversial YouTube videos. In each area, I will suggest, preserving constitutional values requires a different balance of legal and technological solutions, combined with political mobilization that leads to changes in social norms. Let’s start with Open Planet, and imagine sufficient government involvement to make the courts plausibly consider Facebook’s program the equivalent of state action. Imagine also that the Supreme Court in 2025 were unsettled by Open Planet and inclined to strike it down. A series of other doctrines might bar judicial intervention. The Court has come close to saying that we have no legitimate expectations of privacy in public places, at least when the surveillance technologies in question are in general public use by ordinary members of the public.[1] As mobile camera technology becomes ubiquitous, the Court might hold that the government is entitled to have access to the same linked camera system that ordinary members of the public have become accustomed to browsing. Moreover, the Court has said that we have no expectation of privacy in data that we voluntarily surrender to third parties.[2] In cases where digital images are captured on cameras owned by third parties and stored in the digital cloud—that is, on distributed third party servers--we have less privacy than citizens took for granted at the time of the American founding. And although the founders expected a degree of anonymity in public, that expectation would be defeated by the possibility of 24/7 surveillance on Facebook. The doctrinal seeds of a judicial response to Open Planet, however, do exist. A Supreme Court inclined to strike down ubiquitous surveillance might draw on recent cases involving decisions by the police to place a GPS tracking device on the car of a suspect without a warrant, tracking his movements 24/7. The Supreme Court has not yet decided whether prolonged surveillance, in the form of “dragnet-type law enforcement practices” violates the Constitution.[3] Three federal circuits have held that the use of a GPS tracking device to monitor someone’s movements in a car over a prolonged period is not a search because we have no expectations of privacy in our public movements.[4] But in a visionary opinion in 2010, Judge Douglas Ginsburg of the U.S. Court of Appeals disagreed. Prolonged surveillance is a search, he recognized, because no reasonable person expects that his movements will be continuously monitored from door to door; all of us have a reasonable expectation of privacy in the “whole” of our movements in public. [5] Ginsburg and his colleagues struck down the warrantless GPS surveillance of a suspect that lasted 24 hours a day for nearly a month on the grounds that prolonged, ubiquitous tracking of citizen’s movements in public is constitutionally unreasonable. “Unlike one’s movements during a single journey, the whole of one’s movements over the course of a month is not actually exposed to the public because the likelihood anyone will observe all those movements is effectively nil,” Ginsburg wrote. Moreover, “That whole reveals more – sometimes a great deal more – than does the sum of its parts.”[6] Like the “mosaic theory” invoked by the government in national security cases, Ginsburg concluded that “Prolonged surveillance reveals types of information not revealed by short-term surveillance, such as what a person does repeatedly, what he does not do, and what he does ensemble. These types of information can each reveal more about a person than does any individual trip viewed in isolation.”[7] Ginsburg understood that 24/7 ubiquitous surveillance differs from more limited tracking not just in degree but in kind – it looks more like virtual stalking than a legitimate investigation – and therefore is an unreasonable search of the person. Because prolonged surveillance on “Open Planet” potentially reveals far more about each of us than 24/7 GPS tracking does, providing real time images of all our actions, rather than simply tracking the movements of our cars, it could also be struck down as an unreasonable search of our persons. And if the Supreme Court struck down Open Planet on Fourth Amendment grounds, it might be influenced by the state regulations of GPS surveillance that Ginsburg found persuasive, or by Congressional attempts to regulate Facebook or other forms of 24/7 surveillance, such as the Geolocational Privacy and Surveillance Act proposed by Sen. Ron Wyden (D-OR) that would require officers to get a warrant before electronically tracking cell phones or cars.[8] The Supreme Court in 2025 might also conceivably choose to strike down Open Planet on more expansive grounds, relying not just on the Fourth Amendment, but on the right to autonomy recognized in cases like Casey v. Planned Parenthood and Lawrence v. Texas. The right to privacy cases, beginning with Griswold v. Connecticut and culminating in Roe v. Wade and Lawrence, are often viewed as cases about sexual autonomy, but in Casey and Lawrence, Justice Anthony Kennedy recognized a far more sweeping principle of personal autonomy that might well protect individuals from totalizing forms of ubiquitous surveillance. Imagine an opinion written in 2025 by Justice Kennedy, still ruling the Court and the country at the age of 89. “In our tradition the State is not omnipresent in the home. And there are other spheres of our lives and existence, outside the home, where the State should not be a dominant presence,” Kennedy wrote in Lawrence. “Freedom extends beyond spatial bounds. Liberty presumes an autonomy of self that includes freedom of thought, belief, expression, and certain intimate conduct.”[9] Kennedy’s vision of an “autonomy of self” that depends on preventing the state from becoming a “dominant presence” in public as well as private places might well be invoked to prevent the state from participating in a ubiquitous surveillance system that prevents citizens from defining themselves and expressing their individual identities. Just as citizens in the Soviet Union were inhibited from expressing and defining themselves by ubiquitous KGB surveillance, Kennedy might hold, the possibility of ubiquitous surveillance on “Open Planet” also violates the right to autonomy, even if the cameras in question are owned by the private sector, as well as the state, and a private corporation provides the platform for their monitoring. Nevertheless, the fact that the system is administered by Facebook, rather than the Government, might be an obstacle to a constitutional ruling along these lines. And if Kennedy (or his successor) struck down “Open Planet” with a sweeping vision of personal autonomy that didn’t coincide with the actual values of a majority of citizens in 2025, the decision could be the Roe of virtual surveillance, provoking backlashes from those who don’t want the Supreme Court imposing its values on a divided nation. Would the Supreme Court, in fact, strike down “Open Planet” in 2025? If the past is any guide, the answer may depend on whether the public, in 2025, views 24/7 ubiquitous surveillance as invasive and unreasonable, or whether citizens have become so used to ubiquitous surveillance on and off the web, in virtual space and real space, that the public demands “Open Planet” rather than protesting against it. I don’t mean to suggest that the Court actually reads the polls. But in the age of Google and Facebook, technologies that thoughtfully balance privacy with free expression and other values have tended to be adopted only when companies see their markets as demanding some kind of privacy protection, or when engaged constituencies have mobilized in protest against poorly designed architectures and demanded better ones, helping to create a social consensus that the invasive designs are unreasonable. The paradigmatic case of the kind of political mobilization on behalf of constitutional values that I have in mind is presented by my second case: the choice between the naked machine and the blob machine in airport security screening. In 2002, officials at Orlando International airport first began testing the millimeter wave body scanners that are currently at the center of a national uproar. The designers of the scanners at Pacific Northwest Laboratories offered U.S. officials a choice: naked machines or blob machines? The same researchers had developed both technologies, and both were equally effective at identifying contraband. But, as their nicknames suggest, the former displays graphic images of the human body, while the latter scrambles the images into a non-humiliating blob.[10] Since both versions of the scanners promise the same degree of security, any sane attempt to balance privacy and safety would seem to favor the blob machines over the naked machines. And that’s what European governments chose. Most European airport authorities have declined to adopt body scanners at all, because of persuasive evidence that they’re not effective at detecting low-density contraband such as the chemical powder PETN that the trouser bomber concealed in his underwear on Christmas day, 2009. But the handful of European airports that have adopted body scanners, such as Schiphol airport in Amsterdam, have opted for a version of the blob machine. This is in part due to the efforts of European privacy commissioners, such as Germany’s Peter Schaar, who have emphasized the importance of designing body scanners in ways that protect privacy. The U.S. Department of Homeland Security made a very different choice. It deployed the naked body scanners without any opportunity for public comment—then appeared surprised by the backlash. Remarkably, however, the backlash was effective. After a nationwide protest inspired by the Patrick Henry of the anti-Naked Machines movement, a traveler who memorably exclaimed “Don’t Touch my Junk,” President Obama called on the TSA to go back to the drawing board. And a few months after authorizing the intrusive pat downs, in February 2011, the TSA announced that it would begin testing, on a pilot basis, versions of the very same blob machines that the agency had rejected nearly a decade earlier. According to the latest version, to be tested in Las Vegas and Washington, D.C, the TSA will install software filters on its body scanner machines that detects potential threat items and indicates their location on a generic, blob like outline of each passenger that will appear on a monitor attached to the machine. Passengers without suspicious items will be cleared as “OK,” those with suspicious items will be taken aside for additional screening. The remote rooms in which TSA agents view images of the naked body will be eliminated. According to news reports, TSA began testing the filtering software in the fall of 2010 – precisely when the protests against the naked machines went viral. If the filtering software is implemented across the country, converting naked machines into blob machines, the political victory for privacy will be striking. Of course, it’s possible that courts might strike down the naked machines as unreasonable and unconstitutional, even without the political protests. In a 1983 opinion upholding searches by drug-sniffing dogs, Justice Sandra Day O’Connor recognized that a search is most likely to be considered constitutionally reasonable if it is very effective at discovering contraband without revealing innocent but embarrassing information.[11] The backscatter machines seem, under O'Connor's view, to be the antithesis of a reasonable search: They reveal a great deal of innocent but embarrassing information and are remarkably ineffective at revealing low-density contraband. It’s true that the government gets great deference in airports and at the borders, where routine border searches don’t require heightened suspicion. But the Court has held that non-routine border searches, such as body cavity or strip searches, do require a degree of individual suspicion. And although the Supreme Court hasn't evaluated airport screening technology, lower courts have emphasized, as the U.S. Court of Appeals for the 9th Circuit ruled in 2007, that "a particular airport security screening search is constitutionally reasonable provided that it 'is no more extensive nor intensive than necessary, in the light of current technology, to detect the presence of weapons or explosives.'"[12] It’s arguable that since the naked machines are neither effective nor minimally intrusive – that is, because they might be designed with blob machine like filters that promise just as much security while also protecting privacy – that courts might strike them down. As a practical matter, however, both lower courts and the Supreme Court seem far more likely to strike down strip searches that have inspired widespread public opposition – such as the strip search of a high school girl wrongly accused of carrying drugs, which the Supreme Court invalidated by a vote of 8-1,[13] then they are of searches that, despite the protests of a mobilized minority, the majority of the public appears to accept. The tentative victory of the blob machines over the naked machines, if it materializes, provides a model for successful attempts to balance privacy and security: government can be pressured into striking a reasonable balance between privacy and security by a mobilized minority of the public when the privacy costs of a particular technology are dramatic, visible, widely distributed, and people experience the invasions personally as a kind of loss of control over the conditions of their own exposure. But can we be mobilized to demand a similarly reasonable balance when the threats to privacy come not from the government but from private corporations and when those responsible for exposing too much personal information about us are none other than ourselves? When it comes to invasions of privacy by fellow citizens, rather than by the government, we are in the realm not of autonomy but of dignity and decency. (Autonomy preserves a sphere of immunity from government intrusion in our lives; dignity protects the norms of social respect that we accord to each other.) And since dignity is a socially constructed value, it’s unlikely to be preserved by judges--or by private corporations--in the face of the expressed preferences of citizens who are less concerned about dignity than exposure. This is the subject of our third case, which involves a challenge that, in big and small ways, is confronting millions of people around the globe: how best to live our lives in a world where the Internet records everything and forgets nothing—where every online photo, status update, Twitter post and blog entry by and about us can be stored forever.[14] Consider the case of Stacy Snyder. Four years ago, Snyder, then a 25-year-old teacher in training at Conestoga Valley High School in Lancaster, Pa., posted a photo on her MySpace page that showed her at a party wearing a pirate hat and drinking from a plastic cup, with the caption “Drunken Pirate.” After discovering the page, her supervisor at the high school told her the photo was “unprofessional,” and the dean of Millersville University School of Education, where Snyder was enrolled, said she was promoting drinking in virtual view of her under-age students. As a result, days before Snyder’s scheduled graduation, the university denied her a teaching degree. Snyder sued, arguing that the university had violated her First Amendment rights by penalizing her for her (perfectly legal) after-hours behavior. But in 2008, a federal district judge rejected the claim, saying that because Snyder was a public employee whose photo didn’t relate to matters of public concern, her “Drunken Pirate” post was not protected speech.[15] When historians of the future look back on the perils of the early digital age, Stacy Snyder may well be an icon. With Web sites like LOL Facebook Moments, which collects and shares embarrassing personal revelations from Facebook users, ill-advised photos and online chatter are coming back to haunt people months or years after the fact. Technological advances, of course, have often presented new threats to privacy. In 1890, in perhaps the most famous article on privacy ever written, Samuel Warren and Louis Brandeis complained that because of new technology — like the Kodak camera and the tabloid press — “gossip is no longer the resource of the idle and of the vicious but has become a trade.”[16] But the mild society gossip of the Gilded Age pales before the volume of revelations contained in the photos, video and chatter on social-media sites and elsewhere across the Internet. Facebook, which surpassed MySpace in 2008 as the largest social-networking site, now has more than 500 million members, or 22 percent of all Internet users, who spend more than 500 billion minutes a month on the site. Facebook users share more than 25 billion pieces of content each month (including news stories, blog posts and photos), and the average user creates 70 pieces of content a month. Today, as in Brandeis’s day, the value threatened by gossip on the Internet – whether posted by us our by others – is dignity. (Brandeis called it an offense against honor.) But American law has never been good at regulating offenses against dignity – especially when regulations would clash with other values, such as protections for free speech. And indeed, the most ambitious proposals in Europe to create new legal rights to escape your past on the Internet are very hard to reconcile with the American free speech tradition. The cautionary tale here is Argentina, which has dramatically expanded the liability of search engines like Google and Yahoo for offensive photographs that harm someone’s reputation. Recently, an Argentinean judge held Google and Yahoo liable for causing “moral harm” and violating the privacy of Virginia Da Cunha, a pop star, by indexing pictures of her that were linked to erotic content. The ruling against Google and Yahoo was overturned on appeal in August, but there are at least 130 similar cases pending in Argentina to force search engines to remove or block offensive content. In the U.S., search engines are protected by the Communications Decency Act, which immunizes Internet service providers from hosting content posted by third parties. But as liability against search engines expands abroad, it will seriously curtain free speech: Yahoo says that the only way to comply with injunctions about is to block all sites that refer to a particular plaintiff.[17] In Europe, recent proposals to create a legally enforceable right to escape your past have come from the French. The French data commissioner, Alex Turc, who has proposed a right to oblivion – namely a right to escape your past on the Internet. The details are fuzzy, but it appears that the proposal would rely on an international body – say a commission of forgetfulness – to evaluate particular take down requests and order Google and Facebook to remove content that, in the view of commissioners, violated an individuals’ dignitary rights. From an American perspective, the very intrusiveness of this proposal is enough to make it implausible: how could we rely on bureaucrats to protect our dignity in cases where we have failed to protect it on our own? Europeans, who have less of a free speech tradition and far more of a tradition of allowing people to remove photographs taken and posted against their will, will be more sympathetic to the proposal. But from the perspective of most American courts and companies, giving people the right selectively to delete their pasts from public discourse would pose unacceptably great threats to free speech. A far more promising solution to the problem of forgetting on the Internet is technological. And there are already small-scale privacy apps that offer disappearing data. An app called TigerText allows text-message senders to set a time limit from one minute to 30 days, after which the text disappears from the company’s servers, on which it is stored, and therefore, from the senders’ and recipients’ phones. (The founder of TigerText, Jeffrey Evans, has said he chose the name before the scandal involving Tiger Woods’s supposed texts to a mistress.)[18] Expiration dates could be implemented more broadly in various ways. Researchers at the University of Washington, for example, are developing a technology called Vanish that makes electronic data “self-destruct” after a specified period of time. Instead of relying on Google, Facebook or Hotmail to delete the data that is stored “in the cloud” — in other words, on their distributed servers — Vanish encrypts the data and then “shatters” the encryption key. To read the data, your computer has to put the pieces of the key back together, but they “erode” or “rust” as time passes, and after a certain point the document can no longer be read. The technology doesn’t promise perfect control — you can’t stop someone from copying your photos or Facebook chats during the period in which they are not encrypted. But as Vanish improves, it could bring us much closer to a world where our data don’t linger forever. Facebook, if it wanted to, could implement expiration dates on its own platform, making our data disappear after, say, three days or three months unless a user specified that he wanted it to linger forever. It might be a more welcome option for Facebook to encourage the development of Vanish-style apps that would allow individual users who are concerned about privacy to make their own data disappear without imposing the default on all Facebook users. So far, however, Zuckerberg, Facebook’s C.E.O., has been moving in the opposite direction — toward transparency, rather than privacy. In defending Facebook’s recent decision to make the default for profile information about friends and relationship status public, Zuckerberg told the founder of the publication TechCrunch that Facebook had an obligation to reflect “current social norms” that favored exposure over privacy. “People have really gotten comfortable not only sharing more information and different kinds but more openly and with more people, and that social norm is just something that has evolved over time,” [19] he said. It’s true that a German company, X-Pire, recently announced the launch of a Facebook app that will allow users automatically to erase designated photos. Using electronic keys that expire after short periods of time, and obtained by solving a Captcha, or graphic that requires users to type in a fixed number combinations, the application ensures that once the time stamp on the photo has expired, the key disappears.[20] X-Pire is a model for a sensible, blob-machine-like solution to the problem of digital forgetting. But unless Facebook builds X-Pire-like apps into its platform – an unlikely outcome given its commercial interests – a majority of Facebook users are unlikely to seek out disappearing data options until it’s too late. X-Pire, therefore, may remain for the foreseeable future a technological solution to a grave privacy problem—but a solution that doesn’t have an obvious market. The courts, in my view, are better equipped to regulate offenses against autonomy, such as 24/7 surveillance on Facebook, than offenses against dignity, such as drunken Facebook pictures that never go away. But that regulation in both cases will likely turn on evolving social norms whose contours in twenty years are hard to predict. Finally, let’s consider one last example of the challenge of preserving constitutional values in the age of Facebook and Google, an example that concerns not privacy but free speech.[21] At the moment, the person who arguably has more power than any other to determine who may speak and who may be heard around the globe isn’t a king, president or Supreme Court justice. She is Nicole Wong, the deputy general counsel of Google, and her colleagues call her “The Decider.” It is Wong who decides what controversial user-generated content goes down or stays up on YouTube and other applications owned by Google, including Blogger, the blog site; Picasa, the photo-sharing site; and Orkut, the social networking site. Wong and her colleagues also oversee Google’s search engine: they decide what controversial material does and doesn’t appear on the local search engines that Google maintains in many countries in the world, as well as on Google.com. As a result, Wong and her colleagues arguably have more influence over the contours of online expression than anyone else on the planet. At the moment, Wong seems to be exercising that responsibility with sensitivity to the values of free speech. Google and Yahoo can be held liable outside the United States for indexing or directing users to content after having been notified that it was illegal in a foreign country. In the United States, by contrast, Internet service providers are protected from most lawsuits involving having hosted or linked to illegal user-generated content. As a consequence of these differing standards, Google has considerably less flexibility overseas than it does in the United States about content on its sites, and its “information must be free” ethos is being tested abroad. For example, on the German and French default Google search engines, Google.de and Google.fr, you can’t find Holocaust-denial sites that can be found on Google.com, because Holocaust denial is illegal in Germany and France. Broadly, Google has decided to comply with governmental requests to take down links on its national search engines to material that clearly violates national laws. But not every overseas case presents a clear violation of national law. In 2006, for example, protesters at a Google office in India demanded the removal of content on Orkut, the social networking site, that criticized Shiv Sena, a hard-line Hindu political party popular in Mumbai. Wong eventually decided to take down an Orkut group dedicated to attacking Shivaji, revered as a deity by the Shiv Sena Party, because it violated Orkut terms of service by criticizing a religion, but she decided not to take down another group because it merely criticized a political party. “If stuff is clearly illegal, we take that down, but if it’s on the edge, you might push a country a little bit,” Wong told me. “Free-speech law is always built on the edge, and in each country, the question is: Can you define what the edge is?” Over the past couple of years, Google and its various applications have been blocked, to different degrees, by 24 countries. Blogger is blocked in Pakistan, for example, and Orkut in Saudi Arabia. Meanwhile, governments are increasingly pressuring telecom companies like Comcast and Verizon to block controversial speech at the network level. Europe and the U.S. recently agreed to require Internet service providers to identify and block child pornography, and in Europe there are growing demands for network-wide blocking of terrorist-incitement videos. As a result, Wong and her colleagues worry that Google’s ability to make case-by-case decisions about what links and videos are accessible through Google’s sites may be slowly circumvented, as countries are requiring the companies that give us access to the Internet to build top-down censorship into the network pipes. It is not only foreign countries that are eager to restrict speech on Google and YouTube. In May, 2006, Joseph Lieberman who has become the A. Mitchell Palmer of the digital age, had his staff contacted Google and demanded that the company remove from YouTube dozens of what he described as jihadist videos. After viewing the videos one by one, Wong and her colleagues removed some of the videos but refused to remove those that they decided didn’t violate YouTube guidelines. Lieberman wasn’t satisfied. In an angry follow-up letter to Eric Schmidt, the C.E.O. of Google, Lieberman demanded that all content he characterized as being “produced by Islamist terrorist organizations” be immediately removed from YouTube as a matter of corporate judgment — even videos that didn’t feature hate speech or violent content or violate U.S. law. Wong and her colleagues responded by saying, “YouTube encourages free speech and defends everyone’s right to express unpopular points of view.” Recently, Google and YouTube announced new guidelines prohibiting videos “intended to incite violence.” That category scrupulously tracks the Supreme Court’s rigorous First Amendment doctrine, which says that speech can be banned only when it poses an imminent threat of producing serious lawless action. Unfortunately, Wong and her colleagues recently retreated from that bright line under further pressure from Lieberman. In November, 2010, YouTube added a new category that viewers can click to flag videos for removal: “promotes terrorism.” There are 24 hours of video uploaded on YouTube every minute, and a series of categories viewers can use to request removal, including “violent or repulsive content” or inappropriate sexual content. Although hailed by Senator Lieberman, the new “promotes terrorism category” is potentially troubling because it goes beyond the narrow test of incitement to violence that YouTube had previously used to flag terrorism related videos for removal. YouTube’s capitulation to Lieberman shows that a user generated system for enforcing community standards will never protect speech as scrupulously as unelected judges enforcing strict rules about when speech can be viewed as a form of dangerous conduct. Google remains a better guardian for free speech than internet companies like Facebook and Twitter, which have refused to join the Global Network Initiative, an industry-wide coalition committed to upholding free speech and privacy. But the recent capitulation of YouTube shows that Google’s “trust us” model may not be a stable way of protecting free speech in the twenty-first century, even though the alternatives to trusting Google – such as authorizing national regulatory bodies around the globe to request the removal of controversial videos – might protect less speech than Google’s “Decider” model currently does. I’d like to conclude by stressing the complexity of protecting constitutional values like privacy and free speech in the age of Google and Facebook, which are not formally constrained by the Constitution. In each of my examples – 24/7 Facebook surveillance, blob machines, escaping your Facebook past, and promoting free speech on YouTube and Google -- it’s possible to imagine a rule or technology that would protect free speech and privacy, while also preserving security—a blob-machine like solution. But in some areas, those blob-machine-like solutions are more likely, in practice, to be adopted then others. Engaged minorities may demand blob machines when they personally experience their own privacy being violated; but they may be less likely to rise up against the slow expansion of surveillance cameras, which transform expectations of privacy in public. Judges in the American system may be more likely to resist ubiquitous surveillance in the name of Roe v. Wade-style autonomy than they are to create a legal right to allow people to edit their Internet pasts, which relies on ideas of dignity that in turn require a social consensus that in America, at least, does not exist. As for free speech, it is being anxiously guarded for the moment by Google, but the tremendous pressures, from consumers and government are already making it hard to hold the line at removing only speech that threatens imminent lawless action. In translating constitutional values in light of new technologies, it’s always useful to ask: What would Brandeis do? Brandeis would never have tolerated unpragmatic abstractions, which have the effect of giving citizens less privacy in the age of cloud computing than they had during the founding era. In translating the Constitution into the challenges of our time, Brandeis would have considered it a duty actively to engage in the project of constitutional translation in order to preserve the Framers’ values in a startlingly different technological world. But the task of translating constitutional values can’t be left to judges alone: it also falls to regulators, legislators, technologists, and, ultimately, to politically engaged citizens. As Brandeis put it, “If we would guide by the light of reason, we must let our minds be bold.” [1] See Florida v. Riley, 488 U.S. 445 (1989) (O’Connor, J., concurring). [2] See United States v. Miller, 425 U.S. 435 (1976).[3] See United States v. Knotts, 460 U.S. 276, 283-4 (1983). [4] See United States v. Pineda-Morena, 591 F.3d 1212 (9th Cir. 2010); United States v. Garcia, 474 F.3d 994 (7th Cir. 2007); United States v. Marquez, 605 F.3d 604 (8th Cir. 2010). [5] See United States v. Maynard, 615 F.3d 544 (D.C. Cir 2010). [6] 615 F.3d at 558. [7] Id. at 562.[8] See Declan McCullagh, “Senator Pushes for Mobile Privacy Reform,” CNet News, March 22, 2011, available at http://m.news.com/2166-12_3-20045723-281.html [9] Lawrence v. Texas, 539 U.S. 558, 562 (2003). [10] The discussion of the blob machines is adapted from “Nude Breach,” New Republic, December 13, 2010. [11] United States v. Place, 462 U.S. 696 (1983). [12] U.S. v. Davis, 482 F.2d 893, 913 (9th Cir. 1973).[13] Safford Unified School District v. Redding, 557 U.S. ___ (2009). [14] The discussion of digital forgetting is adapted from “The End of Forgetting,” New York Times Magazine, July 25, 2010. [15]Snyder v. Millersville University, No. 07-1660 (E.D. Pa. Dec. 3, 2008). [16] Brandeis and Warren, “The Right to Privacy,” 4 Harv. L. Rev. 193 (1890).[17] Vinod Sreeharsha, Google and Yahoo Win Appeal in Argentine Case, N.Y. Times, August 20, 2010, B4.[18] See Belinda Luscombe, “Tiger Text: An iPhone App for Cheating Spouses?”, Time.com, Feb. 26, 2010, available at http://www.time.com/time/business/article/0,8599,1968233,00.html [19]Marshall Kirkpatrick, “Facebook’s Zuckerbeg Says the Age of Privacy Is Over,” ReadWriteWeb.com, January 9, 2010, available at http://www.readwriteweb.com/archives/facebooks_zuckerberg_says_the_age_of_privacy_is_ov.php [20] Aemon Malone, “X-Pire Aims to Cut down on Photo D-Tagging on Facebook,” Digital Trends.com, January 17, 2011, available at http://www.digitaltrends.com/social-media/x-pire-adds-expiration-date-to-digital-photos/ [21] The discussion of free speech that follows is adapted from “Google’s Gatekeepers,” New York Times Magazine, November 30, 2008. Downloads Download the Full Paper Authors Jeffrey Rosen Image Source: David Malan Full Article
book Tour Facebook's New Energy Efficient Data Center (Video) By www.treehugger.com Published On :: Mon, 02 May 2011 15:09:00 -0400 Facebook just opened their newest data center, which they've pushed to make as energy efficient as possible. In fact, it even inspired the Open Compute project in which they open source every last detail about the data Full Article Technology
book Do you prefer a paper book or an e-book? (Survey) By www.treehugger.com Published On :: Fri, 09 Jan 2015 07:50:02 -0500 A recent post that claimed readers absorb less from e-books. I wonder (and so do many commenters) if that's really true. Full Article Living
book 'This Changes Everything: Capitalism vs the Climate' (book review) By www.treehugger.com Published On :: Fri, 10 Apr 2015 07:00:00 -0400 Naomi Klein's latest book is about more than just science. She explores the extractivist mentality and historic decisions that have led us to where we now find ourselves, living in a totally unsustainable way. Full Article Science
book Help Create a Twitter Book for Copenhagen By www.treehugger.com Published On :: Tue, 08 Dec 2009 05:08:05 -0500 We all can't go to Copenhagen this week, but there are so many ways to make our voice heard nonetheless. ThisPlace09 is an art and Twitter project that conveys personal thoughts about climate change to the delegates and the Full Article Business
book How About An Entire Book On A Single Poster To Save Paper And Space? By www.treehugger.com Published On :: Thu, 25 Aug 2011 03:22:08 -0400 For a while I have been thinking of getting a Kindle. It saves trees and eliminates the impact of transportation and with Amazon's recycling scheme in place as well as the fairly long lifespan of the Kindle, the problem of e-waste seems less worrying Full Article Living
book Is Apple working on a fuel cell-powered MacBook? By www.treehugger.com Published On :: Tue, 08 Sep 2015 10:28:14 -0400 A new patent filing suggests that the tech giant has fuel cells in mind for future computers and gadgets. Full Article Technology
book 'Achtung Baby: An American Mom on the German Art of Raising Self-Reliant Children' (book review) By www.treehugger.com Published On :: Thu, 08 Feb 2018 10:57:00 -0500 Author Sara Zaske shows that it all comes down to respecting a child's right to independence. Full Article Living
book Book Review: The Future of Nature By www.treehugger.com Published On :: Tue, 09 Oct 2007 15:07:45 -0400 I have been reading two books at once, which is something one shouldn't do, as thoughts about each blend together. One is a dreadful screed by Andrew Keen called "The Cult of the Amateur," decrying the fact that bloggers are "amateurs without formal Full Article Living
book Built on a tilt: climbable bookshelf is also earthquake resistant By www.treehugger.com Published On :: Wed, 06 Dec 2017 15:50:17 -0500 It's wood, it's small, it's resilient. Full Article Design
book Tiny 169 sq. ft. Backyard Reading Retreat is perfect for book lovers By www.treehugger.com Published On :: Fri, 17 Aug 2018 14:35:52 -0400 Built for two bookstore owners, this elegant structure doubles as a place to read and for guests to stay in. Full Article Design
book A long brick house built around books By www.treehugger.com Published On :: Fri, 29 Aug 2014 09:53:06 -0400 It's a good demonstration of how you don't need a lot of smart high tech to build a comfortable house. Full Article Design
book Snoop Dogg Publishes 'Smokable' Songbook of His Greatest Hits By www.treehugger.com Published On :: Tue, 10 Apr 2012 12:06:05 -0400 Snoop Dogg publishes eco-friendly, promotional book of lyrics to his chart-topping hits that you can smoke. Full Article Living