Open Tech Today - Top Stories

Saturday, October 28, 2006

YouTube, iPods and Internet Artistry

Unlike most teenagers for whom virtual interaction with strangers via MySpace is as natural as, well, speeding tickets, I am still amazed when I find myself interacting with someone who I only “met” on the Internet – could be someone who commented on this blog … or even someone I “know” only from the cover of a music CD.

I had 2 separate but similar experiences with this recently.

Two weeks ago, I was trying to create a music video playlist on YouTube to mimic my favorite iPod playlist.

I was searching for a video of Pagode do Maracanã by Kátia Moraes, a phenomenal Brasilian singer now living in LA. You can hear the song (and others) here.

So, I was searching for her video, and failing.

But I did discover a backstage video of Katia and her fellow bandmembers in Pure Samba rehearsing. Among the comments below the video was a poster named “katiamoraes.” Right, so I emailed her. And soon found myself enjoying an ongoing exchange with an artist who up until that moment I had only admired silently from afar. Weird, and wonderful.

My first encounter with Internet artistry was even stranger.

I had lost a cassette tape with one of my all-time favorite albums by a now defunct reggae/ska band called the Blue Riddim Band.

The tape I lost was "Alive in Jamaica” – a live recording of their 1982 concert at Jamaica’s annual (and legendary) Reggae Sunsplash.

A brilliant musical moment under a full moon. And I only had an empty cassette box as a painful reminder of it.

Enter the Internet. I googled the band and sent “out of the blue” emails to anyone who had mentioned them online. Crazy … but not useless. I found someone on MySpace who has mp3 versions of all the songs on "Alive in Jamaica," as well as an earlier album. Jackpot! In celebration, I posted a favorite Blue Riddim song on my blog (where it remains).

Hit play and enjoy Nancy Reagan

Not long after that, I received my own “out of the blue” email from someone named Howard -- he was the original guitarist in Blue Riddim Band. We exchanged a bunch of emails about the band, their Sunsplash concerts and how on earth I ended up so obsessed with their music and a lost tape. Even got me hooked up with some underground concert tapes of Blue Riddim.

Cool ... and totally unimaginable without the Internet.

Friday, October 27, 2006

Why Do Militaries Love Open Source?

National security agencies seem to understand what most government agencies do not yet – open technologies (open standards, open architecture and open source software) must figure prominently in mission critical systems and solutions.

Proprietary tech companies frequently argue that open source is unsuitable for military and security agencies. Clearly, defense agencies around the world disagree. And their actions speak louder than vendor words. Then again, their words speak pretty loudly too …

U.S.: A recent Department of Defense report entitled Open Technology Development Roadmap Plan says it plainly: “[Open source] and open source development technologies are important to the National Security and National Interest of the United States.” Specifically, open standards and targeted use of open source are vital for:

o Enhancing the military’s agility to adapt to changing needs and capabilities.
o Securing infrastructure and increasing security by having greater technical visibility into software in defense networks.
o Enabling rapid response to changes in technology and the actions of adversaries.
o Facilitating more efficient use of resources through collaboration and code sharing.

True, defense agencies study everything. However, this is not just an academic exercise. Defense agencies around the world – friend and foe alike – are moving from study to adoption of open technologies faster than most other government agencies. This is true despite (or rather BECAUSE of) security concerns. They are leaders in open technologies.

Open source will be core to the U.S. Army's Future Combat System of robotic reconnaissance; mobile command and control platforms; ground and air missile platforms; and advanced targeting systems.

The U.S. military is not alone.

China: Its military was an early adopter of open source to guard against “back door” access and malicious code putting vital military information at risk.

Russia: Its Ministry of Defense and Ministry of Internal Affairs depend on a domestically developed, Linux-based operating system, not only to provide greater network security but also to end Russia’s dependence on foreign software production.

South Korea: Its military is investing some $400 million won to build an education center for open source software and establish systems to run war-game simulations and other defense exercises.

France: Ministry of Defense and Ministry of Interior are both open source users, to gain security-through-diversity in technology and avoid dependencies on any one technology (or vendor). Today, while 80% of French gendarmes use OpenOffice for daily work, the Ministry of Defense is funding a project to boost the security certification of Linux.

Finland: The Ministry of Defense, to ensure stability and security in key operational processes, uses open source to handle messaging, its intranet and other core services.

Vietnam: Under a directive from the Prime Minister, the Ministry of Defense is directly engaged in the experimental application and development of open source software for defense purposes.

You might expect open source to be a tough sell to national security agencies. After all, it provides you and your enemies access to source code. But it is not. What attracts militaries to open source?

o The transparency of open source builds trust in the software.

o It enables an agency to break lock-in and regain control over software maintenance, upgrades and costs.

o It helps build self-reliance in software needed for critical weapon system development.

o Open source is ideal for militaries because it is technically flexible and customizable, giving them tactical agility.

National security agencies often have advantages over other agencies – they usually have substantial IT security expertise and resources in house. Still, less endowed public agencies have options. They can invest in long-term training for personnel. They can use public - private partnerships to access expertise.

What do defense agencies know that others have yet to learn? Organizations of any real size need to integrate open source into their technical architecture and overall business strategy.