Another dot in the blogosphere?

Posts Tagged ‘internet

Video source

I am looking forward to watching Werner Herzog’s documentary, Lo and Behold: Reveries of the Connected World, which premieres 19 August.

In his interview with TechCrunch, Herzog provided candid and provocative answers that offer lessons for those of us in schooling and education.

When asked whether he considered the Internet good or evil, Herzog replied that it was neutral and that it was humans that made the difference. This comes from a man who does not own a smartphone. Compared to some leaders in schooling and education that I know, his response is an enlightened one.

His thoughts on virtual reality (VR): We should not simply transfer existing methods to the medium. Again, this was a pearl of wisdom that few possess unless they realise that technology is not just about doing the same things differently. It is also about change.

His best response was what technology held for the future of the classroom. With a twinkle in his eye, Herzog simply replied that the face-to-face classroom was the best venue for releasing “criminal energy”. This is so different from how teachers see their current classrooms.

Probably one of the most well-known movie memes is Jack Nicholson’s character shouting “”You can’t handle the truth!” in A Few Good Men.

Video source

Today I reflect on something “truthier” than the truth.

One of the most talked about news bites yesterday and the day before was how Singapore’s public servants will have limited Internet access in government offices in a year’s time.

The news spilled from our shores thanks to the same Internet pipes that will run dry in those offices. CNET reported this:

“There is no right or wrong approach around banning the internet,” says Tony Jarvis, Check Point Software Technologies’ chief strategist for threat prevention APAC, Middle East & Africa. “At first glance, the decision to ban internet access might seem extreme. However, it is important to note that this decision will have been made after careful review.”

He says that the removal of internet access will bring “the benefit of reducing exposure to many threats” at the cost of productivity and organisational efficacy.

There was a fallout among those who will be affected by this policy. Here are examples from a TODAY report:

Calling the move regressive, civil and public servants TODAY spoke to said cutting off Internet access in such a manner was also disruptive.

“It’s like saying ‘your house could get burgled, but don’t spend money upgrading security features like cameras or locks; just move out’,” said one civil servant, who did not want to be named.

Another civil servant who also wanted to remain anonymous said: “I feel like there are relatively simpler solutions but they just decided to use the nuclear option.”

A public servant said that without Internet access on personal work computers, it would be unfair to expect public servants to have to pay for their own mobile data to carry out the work.

A spokesman for the local agency responsible for move responded that the policy “should not be seen as a move backwards”.

I wonder if he would have back-peddled if he could feel the collective disbelief of workers, public servants or not, sweep his way.

The agency prepared a poster that highlighted five myths and five corresponding truths about the move.

I wonder if the agency can handle the “truthier” truths I offer in response to each of their “truths”.

  1. Any agency-provided device will be crippled. That is why the rest of the world has moved on to BYOD. Even if you BYOD, agencies can stifle or block wireless signals. Sometimes they need not do anything; the poor reception is security enough.
  2. SharePoint is an alternative? Is the phrase “enterprise tools” now synonymous with poor design and usability?
  3. Is there a condescending tone to “separating Internet surfing”? As in, disconnected activity is work while your surfing is not serious or important. Modern and connected workers need to “surf” in order to work. Do not take my word for it. Conduct studies and measure it.
  4. Are their email servers are going to be able to distinguish classified and unclassified messages? If so, good for them. Are there no other ways to copy, transport, or manipulate classified messages? If so, they must ban BYOD outright.
  5. There had better not be a drop in e-services and citizen engagement. Otherwise the people will complain and their feedback will go nowhere because the public servants cannot surf the Internet.

In short, the effort looks like one of reducing connectivity, providing options with poor usability, siloing work tasks instead of integrating them, letting policy dominate logic, and travelling back in time. How is limiting Internet access to workers not a move backwards in policy and practice?

All this is not to say that we should ignore computer security. However, there could have been more measured responses.

If you detect a cockroach nest in your otherwise spotless house, you do not chase everyone out, prevent people from bringing food home, or dictate that food only be eaten in an outhouse. You take more reasonable and everyday actions like bagging and promptly disposing of rubbish, storing food properly, and showing others in the household know how to do these things.

The smart thing to do is also the more difficult thing. Before embarking on a multi-pronged strategy, the agency could have asked for stakeholder inputs. Treat people like children and they will behave like them. Treat people like adults who care about their work and you will increase your options.

Among those options will be ideas with strong ownership because they come from the ground up. This is almost always better than poorly understood policies from the top down. That is the truth. Can you handle it?

This tweet woke me up yesterday morning like no alarm clock could.

Here is the short version of the article:

  • By May next year, civil servants* in government offices will only be allowed to access the Internet via dedicated terminals
  • These workers will be allowed to use their own personal mobile devices for “web surfing”
  • “Public servants will be allowed to forward work e-mails to their private accounts, if they need to”
  • The Asia-Pacific executive vice-president of global computing security association, Cloud Security Alliance, described the move as returning to the 1990s
  • The move is by the Infocomm Development Authority (IDA) and could affect 100,000 computers

*These do not include mainstream schools teachers.

Part of me wants to react emotionally and scream why not also limit workers to electricity, water, and toilet breaks? Have the authorities not caught on to the revised hierarchy of needs?

Another part of me is confused. Did the same agency not trumpet our plans to be a Smart Nation?

Are we sending a message that we want the Internet of Things but not the Internet of People? Perhaps it is wise for just objects to communicate with each other. The weakest links tend to be the humans after all. If you do not believe me, imagine what has happened, already happens, and will happen with the forwarding email policy.

Perhaps this is an accidental conspiracy by the IDA to get civil servants to use their own mobile devices. That way government agencies spend less on digital bandwidth and can claim that they have people-centric BYOD programmes. Smart, eh?

Since we like to call these devices smart — smart phones, smart boards, smart rooms — we can stop thinking altogether.


The powers-that-be might not have embraced the fact that the Internet is a socio-technical system. The clampdown is an attempt to minimise stupid human behaviour like security leaks by addressing the technical component. This will still allow ignorant people access to limited terminals and their own “smart” devices.

Where is the long-running, long-term educational or professional development programme in all this? Perhaps there is one and the press found it too mundane to highlight.

Whatever the scenario, anyone who has worked in a large organisation knows how their IT departments operate. Instead of supporting work and learning, they end up determining policy and creating more red tape. They would rather dictate than educate.

Computer security is important in the modern workplace, but it should not be an excuse to revert to dumb or blind practice. The very people that security policies seek to control are the same assets it needs to inform and educate instead.

We need to play the long game of creating a culture of tech-savvy and actually smart practice. A policy like restricting access has immediate returns on the security front, but it does little to nurture a long term culture of trust, critical thinking, and ethical practice.

My cat by Anguskirk, on Flickr
Creative Commons Creative Commons Attribution-Noncommercial-No Derivative Works 2.0 Generic License   by  Anguskirk 

I was a very unhappy broadband customer for the last six days. But I did NOT do something I would normally do and that saved me some embarrassment.

When my Internet connection became intermittent earlier this week, I opted not to call the customer help line. Previous experience reminded me how long that would take and how much longer the response would be after being handed from one party after another.

Instead, I tweeted my information to the ISPs customer care. They said they would get back to me by phone but I did not hear from them. That bought me time to investigate.

When the intermittent connection finally became no connection, I was ready to go on a calling rampage. But something stopped me.

All the usual remedy actions (recycling the power to the boxes in proper time and sequence) did not seem to work. My Internet connection kept dropping, but my home phone (connected to the same box) worked fine.

I disconnected the router and reconnected directly to a desktop. After a few restarts, I had a stable connection to that desktop. I realized that the router was in its death throes.

If I had called the customer care folks and screamed down the line, I would have ended up with egg on my face. Sure, they did not respond as promised. Sure, 99 out of a 100 times this has happened before the fault lay in a factor or incident at their end. This one time my router had failed.

The moral of the story: Take the time, observe closely, get information, connect the dots, solve your own problem.

Video source

There are ideas and then there are IDEAS. Big and seemingly crazy ideas.

Video source

I am glad that some of Google’s money is being put to the good cause of providing Internet access to those who do not have it.

I just wonder:

  • if this was someone’s 20% time project
  • how many times potential collaborators rejected the idea
  • how far outside the box ideas need to be for them to work
  • what lessons we will learn from it whether it succeeds or fails

It is almost the weekend and here is something lighthearted.

[Youtube source] [Vimeo source]

At the end of 2011, a boy decided to propose to a girl.

What was uniquely early 21st century about it was the Internet memes that the guy used in his proposal. (If you need to catch up on memes, visit 9gag regularly or try this app.)

Video source

Another boy proposed to another girl, but this time the guy used stop-motion LEGO minifigs to make his intentions known.

Stop-motion has been around since movies were black and white. LEGO has been around for about as long. But stop-motion was not something that the layperson could do easily or conveniently. Today we have tools like JellyCam on the Mac and iTimeLapse on the iPhone to make short stop-motion movies.

We really should stop labelling the time we live in as the Information Age as it reeks of consumption. We are in the Creation and Interaction Age!

As a side note, I think that most Singaporeans will have this reaction: Spoil market! All I can say is I am glad that I am happily married and do not have to think of outdoing proposals like these!

The problem with urbexing by shaundon, on Flickr
Creative Commons Attribution-Noncommercial-Share Alike 2.0 Generic License  by  shaundon 

A former teacher trainee of mine contacted me recently because she could not believe what she was experiencing in school.

She had just started her teaching practicum and was upset to learn that she could not use her own computer to access the Internet via the school’s network. She emailed me to verify if this was policy.

At the moment it is. A non-sanctioned personal computer cannot be part of the MOE network due to security protocols.

Only full-time teachers might be provided with laptops that are recognized by the network. But to add insult to injury, the teachers are unlikely to have administrative rights to the laptop.

So my former trainee and her personal laptop are in limbo, right? Not always. Some schools provide alternatives like shared PCs or wireless access for personal computers.

The problem lies with a one-size-fits-all approach to providing Internet access even though there are different types of teachers and an assortment of Internet-capable devices.

Take my wife as an example. A few years ago, my wife decided to return to teaching as an adjunct teacher. There are other types of educators: teaching assistants, relief teachers, part-timers, para-educators like counsellors and education service vendors, etc.

While these folks might spend significant amounts of time on school premises, they are not given equal access to the Internet. The schools might be bound by MOE policy or they enforce their own.

Mobile Devices Galore! by schoschie, on Flickr
Creative Commons Attribution-Share Alike 2.0 Generic License  by  schoschie 

These educators and service providers bring their own laptops, netbooks, slates, smartphones and other devices. From a policymaker’s or administrator’s point of view, this is a security nightmare. From a professional educator’s point of view, this might represent untapped learning opportunities.

So what are these educators to do? I recommend they help themselves.

When my wife’s Macbook was not authorized on the school’s wireless network (or when a classroom was out of wifi range), she tethered her iPhone to the laptop in order to show YouTube videos to seed discussion.

So look at what you have first before lamenting about what you don’t. Don’t underestimate the impact of the growing BYOD (bring your own device) movement. If BYOD does not cut it, write a grant to get the funding you need to innovate.

SingTel by xcode, on Flickr
Creative Commons Attribution-Noncommercial-No Derivative Works 2.0 Generic License  by  xcode 

With the grant money you could get a 3G USB dongle plus 3G subscription and a “mifi” device (we have the Huawei and Dlink devices in Singapore). You plug the former into the latter and use the combination to create ad hoc networks for you and your students to use. This can be done anywhere a reliable 3G signal is available.

A final tip: Educate your Head of ICT or align yourself to a progressive one. The ones I have met (and the ones I managed to influence) have found innovative ways to balance security with access.

Eventually policies can change. Guests on the NIE campus can now get wifi access by SMS (see 27 Apr 11 item). UNISIM has an entirely free and public network that is separate from its other networks.

Until policies change, help yourself. Then do something to change backward policies.

Click to see all the nominees!

QR code

Get a mobile QR code app to figure out what this means!

My tweets


Usage policy

%d bloggers like this: