This is John Radcliff's Typepad Profile.
Join Typepad and start following John Radcliff's activity
Join Now!
Already a member? Sign In
John Radcliff
Dallas, Texas
Love living life in the information age!
Interests: bowling, baseball, networking, online research, playing video games, social events, and parties!
Recent Activity
Economic conditions can force people to take extreme measures. In the book called Transmission, by Hari Kunzru, Arjun gets hired on as a virus technician who gets sub contracted out by another company and is getting paid next to nothing. He tells his family that he is the head of... Continue reading
Posted Mar 2, 2012 at John D Radcliff
Some of these news people and politicians have had to work hard to make it to the top and some have not. JFK and George Bush Junior did not have to work hard to make it as president due to their families status. Theodore Rossevelt and Harry Truman had to... Continue reading
Posted Feb 3, 2012 at John D Radcliff
Facebook has created new jobs here in the U.S. and abroad in many countries. Just take a look at their job board: http://www.facebook.com/careers/?view=location. When a company files for an IPO, they are seeking to raise more money from investors so that they can expand which will in the end create... Continue reading
Posted Feb 2, 2012 at John D Radcliff
Great! Thank you for the compliment and let me know when your blog is up. I would love to see it!
Toggle Commented Jan 31, 2012 on Laws and the internet in Libya at John D Radcliff
John Radcliff is now following Account Deleted
Jan 31, 2012
I got this picture from searching on Google Images and there were no copyright or usage restrictions on this image. Thank you for the inquiry!
Image
The middle east has several first and second generation measures to regulate internet access and online activities. This includes laws and regulations, technical filtering, physical restrictions, surveillance and monitoring, and harassment and arrests. There are alot of laws and regulations used to control access which include laws that start with... Continue reading
Posted May 4, 2011 at John D Radcliff
Image
The internet cannot be controlled by laws or threats that are made by governments. Take the quote from Code 2.0 by Lawrence Lessig, "The claim for cyberspace was not just that government would not regulate cyberspace - it was that government could not regulate cyberspace. Cyberspace was, by nature, unavoidably... Continue reading
Posted May 1, 2011 at John D Radcliff
Image
"Code will be a central tool in this analysis. It will present the greatest threat to both liberal and libertarian ideals, as well as their greatest promise. We can build, or architect, or code cyberspace to allow those values to disappear. Code is never found; it is only ever made,... Continue reading
Posted Apr 24, 2011 at John D Radcliff
Image
"To begin with, many of us at some stage in our lives will have taped a CD or TV program, photocopied a book or made use of copied software. For most of us, there is a world of difference between this kind of activity and crimes like rape, murder or... Continue reading
Posted Apr 18, 2011 at John D Radcliff
Image
"Hence, then, is a large lesson about the relationship between a well-functioning system of free expression and citizen's well-being. Free speech and free press are not mere luxuries or tastes of the most educated classes; they increase the like-lihood that government will actually be serving people's interests (Republic.com 2.0, p.... Continue reading
Posted Apr 16, 2011 at John D Radcliff
Image
When reading the book, "Here Comes Everybody, by Clay Sharky", the first chapter starts off with the story of a Stolen Sidekick cell phone. A woman, Ivanna, lost her phone and a girl by the name of Sasha found the phone and started to use the phone for her own... Continue reading
Posted Apr 11, 2011 at John D Radcliff
Image
Even though the internet does not stop bombs or regimes, it is interesting how countries now stop the internet and or cell phone service in a country when a demonstration or revolution takes place. For example, the Libyan government, who owns the cell phone and internet service provider companies, shut... Continue reading
Posted Apr 6, 2011 at John D Radcliff
John Radcliff is now following Mark Simmons
Apr 5, 2011
Image
"In internet governance, the term security now encompasses a host of problems, perhaps too many to fit properly under one word. It includes the fight against spam, viruses, and phishing. It refers to bugs in protocols and operating systems on computers, mobile phones, and other devices that create opportunities for... Continue reading
Posted Apr 4, 2011 at John D Radcliff
John Radcliff is now following Account Deleted
Apr 1, 2011
John Radcliff is now following Account Deleted
Apr 1, 2011
John Radcliff is now following Jgilbert
Apr 1, 2011
John Radcliff is now following Almekhlafi
Apr 1, 2011
John Radcliff is now following Account Deleted
Apr 1, 2011
John Radcliff is now following Account Deleted
Apr 1, 2011
John Radcliff is now following Account Deleted
Apr 1, 2011
Image
“Control is not simply manipulation, but rather modulation. One does not simply control a device, a situation, or a group of people; rather, “control” is what enables a relation to a device, a situation, or a group. “People are lines,” Deluze suggests. As lines, people thread together social, political, and... Continue reading
Posted Mar 31, 2011 at John D Radcliff
Image
Is there privacy for people today or are we always in the public eye? Are we always connected or being watched even when we think we are not? The rise and use of cell phones has had an astounding effect on our privacy especially now since all cell phones come... Continue reading
Posted Mar 27, 2011 at John D Radcliff
Image
Hasan Elahi was stopped and questioned by Homeland Security when flying back to the United States from a Transience Project. The reason for his detention was "suspicious movement after 9/11." and he was labeled as a suspected terrorist. Data on Hasan, like his cell phone records, were anonymized which made... Continue reading
Posted Mar 23, 2011 at John D Radcliff