At least Britain sort of got it half right. There, to make life easier for stores selling age-restricted items there’s a “Challenge 21″ programme, so anyone looking 21 or under is asked for ID, even if the products are restricted to over-18s. Tesco and other large chain stores championed a “Challenge 25″ programme just in case someone slipped through the net. Finally some idiot in the seaside resort of Blackpool came up with the idea of “Challenge 30″, which is roundly lambasted across Britain.
But at least these outlets demand high-integrity forms of ID such as driving licences. In the US you can show a picture of your dog pasted on the back of a chocolate biscuit and they’re likely to accept it.
That’s because no-one really knows why they are asking for ID in the first place, and no-one up the chain tells them – mainly because they don’t know either. Everyone just goes through the motions. There’s no way to verify the validity of ID, so everyone just plods along with the security theatre.
Simon Davis, “How a dog and some chocolate biscuits reveal an identity crisis in America”
Author: Christopher Parsons
Policy wonk. Torontonian. Photographer. Not necessarily in that order.
2013.3.2
In Jewel, the Obama administration has already twice invoked the “state secrets” privilege, a mechanism left behind from the McCarthy-era persecution of Communist sympathizers which effectively lets the government ‘turn off’ the Constitution and the justice system whenever they feel that a case might jeopardize national security. The administration has promised to limit its use of the privilege to situations which present the potential for “significant harm” to the country. But that promise obviously hasn’t stopped them from deflecting recent challenges to warrantless wiretapping and other government counterterrorism initiatives — like indefinite detention provisions, or the secret program for targeted killings carried out by drones — nor will it necessarily restrain future administrations from doing the same.
Jewel may be the last chance for meaningful judicial review of the wiretapping programs in the foreseeable future. Failing that, the only remaining response for journalists and others dealing in sensitive overseas communications may be exactly what digital activists have been advocating for decades: widespread personal encryption. But aside from being somewhat impractical, the necessity of encrypted communications would more broadly underscore just how thoroughly the legal system has failed to protect citizens from unnecessary intrusion.
Joshua Kopstein, “Denied in the Supreme Court, warrantless wiretap opponents are losing ground fast: Does secret surveillance violate the Constitution? Sorry, that’s a secret”
- hosted email for small business
- office 365 small business
- office 365 small business premium
- office 365 enterprise e1
- office 365 midsize business
- office 365 enterprise e3
- office 365 proplus
- office 365 enterprise (plan e4)
- education plan a2
- education plan a3
- education plan a4
- exchange online (plan 1)
- exchange online (plan 2)
- office 365 suite (plan e1)
- office 365 suite (plan e3)
- kiosk plan 1
- office 365 home premium
- office home & student 2013
- office home & business 2013
- office professional 2013
Focus.
I thought that this was a joke. Someone exaggerating Microsoft’s actual product offerings.
I was wrong.
2013.3.1
I meet up with my friend Dan Pashman, who hosts the Sporkful podcast and whom you hear sometimes on Weekend Edition Sunday. He believes poutine would be better if it were served with the gravy on the side, so you could mete out perfect bites and avoid sogginess. I tell him you could also ask for a bunch of cans of paint instead of Starry Night, but I’ll trust van Gogh on it.
Ianan Chillag, “Dispatch From Poutine Fest, Chicago’s ‘Love Letter’ To Canada”
The report finds plenty of blame to go around. The ultimate cause of the fiasco, it says, was the fact the grant implementers did not conduct a capacity or use study before spending $24 million. They also used a “legally unauthorized purchasing process” to buy the routers, which resulted in only modest competition for the bid. Finally, Cisco is accused of knowingly selling the state larger routers than it needed and of showing a “wanton indifference to the interests of the public.”
Getting any of the money back seems unlikely at this point, but the legislative auditor does have one solid recommendation to make. The State Purchasing division should determine whether Cisco’s actions in this matter fall afoul of section 5A-3-33d of the West Virginia Code, and whether the company should be barred from bidding on future projects.
Cisco tells Ars “the criticism of the State is misplaced and fails to recognize the forward-looking nature of their vision. The positive impact of broadband infrastructure on education, job creation, and economic development is well established, and we are committed to working with the State to realize these benefits for the people of West Virginia now and into the future.”
As for that $5+ million the state could have saved—it would have paid for 104 additional miles of fiber.
Nate Anderson, “Why a one-room West Virginia library runs a $20,000 Cisco router: Cisco, West Virginia wasted $5M on enterprise-class routers”
SEO vs Good Content
![]()
Robb Lewis lays out everything you need to understand about the SEO industry in < 256 characters.
I’ve been with “professionals” who jeer at notions that content matters, or that you can get people to care/read anything longer than 300-500 words. Been told that my long form writing is a death sentence if I want to disseminate ideas. Words can’t express how glad I am I never took their “advice”.
2013.3.1
A few years ago, he [Ken Anderson, Intel ethnographer] conducted an ethnographic study of “temporality,” about the perception of the passage and scarcity of time—noting how Americans he studied had come to perceive busy-ness and lack of time as a marker of well-being. “We found that in social interaction, virtually everyone would claim to be ‘busy,’ and that everyone close to them would be ‘busy’ too,” he told me. But in fact, coordinated studies of how these people used technology suggested that when they used their computers, they tended to do work only in short bursts of a few minutes at a time, with the rest of the time devoted to something other than what we might identify as work. “We were designing computers, and the spec at the time was to use the computer to the max for two hours,” Anderson says. “We had to make chips that would perform at that level. You don’t want them to overheat. But when we came back, we figured that we needed to rethink this, because people’s time is not quite what we imagine.” For a company that makes microchip processors, this discovery has had important consequences for how to engineer products—not only for users who constantly need high-powered computing for long durations, but for people who just think they do.
Graeme Wood, Anthropology Inc.
Speaks volumes about why social sciences are so important to development and engineering processes.
![]()
“When I apply a new CSS for the first time” by Martin Valasek
2013.2.28
… test version of a data-mining tool in Delta’s offices, and he was surprised by the technology’s power to collect vast amounts of personal information using one start point. Jackson volunteered his Social Security number and watched the tool retrieve his address, the names of his neighbours, his wife’s name, and the date they were married, all from publicly available information. Some of the Delta employees had been test subjects already, and when his own personal information stated popping up for all to see, Jackson joked he’d seen enough. But the demo convinced him that the government had to have this capacity. Not because he wanted it. But because he was afraid he couldn’t do his job without it.
Shane Harris, The Watchers: The Rise of America’s Surveillance State

