I just returned after spending a wonderful evening with a German Socialist Activist. It was a wonderful evening because I got to understand many of his arguments and we started discussing them openly; without never aiming at a consensus. I just got back home and saw the following video: Stephen Colbert Takes on Occupy Wall Street
Category: Government
Last day to Pre-Order the DVD of a Great Movie!

|
Today is the Last Day to Pre-Order the DVD of the movie “Atlas Shrugged Part 1” (watch the trailer), which was inspired by The most wonderful fiction book ever written (and my favorite). I strongly recommend you to buy it and enjoy the movie! GUARANTEE to be shipped by NOV. 8th If you buy the DVD today, you get to to guarantee yours for the release date on November 8th. Don’t delay. PRE-ORDER NOW.
BLU-RAY The Atlas Shrugged Special Edition Blu-Ray, which combines ALL of the exclusive content from ALL of the Special Edition DVDs (and then some), will not be available for pre-order until mid-November with a release date pending for late November. HOWEVER, you can pre-order the standard edition 20th Century Fox version of the Blu-Ray on Amazon right now for release day delivery on Nov. 8th. It won’t be nearly as content rich as the Special Edition but, if you simply can’t wait for the movie, problem solved. |
Fight internet censorship and IP address blockades
Is Internet a neutral zone? Is it a network that runs freely in any place of the world? Or is it controlled and regulated by governments and companies?
Sadly, it is not a free space in which people is able of doing whatever they rationally please. Internet is to a large degree a networked controlled and its globalizing effects are constantly been limited by the regulations and institutions of the countries from which we access it. Specially in countries that have had a long history of citizen’s censorship and IP address controls. CPJ‘s list of these countries that have managed to control the most it’s citizens freedom is #1 Iran, #2 Belarus, #3 Cuba, #4 Ethiopia, #5 Burma, #6 China, #7 Tunisia under Ben Ali, #8 Egypt under Mubarak (still continues being so), #9 Syria and #10 Russia.
Also, as noted in Wikipedia in 2006, Reporters without Borders (Reporters sans frontières, RSF), a Paris-based international non-governmental organization that advocates freedom of the press, started publishing a list of “Enemies of the Internet”. The organization classifies a country as an enemy of the internet because “all of these countries mark themselves out not just for their capacity to censor news and information online but also for their almost systematic repression of Internet users.” In 2007 a second list of countries “Under Surveillance” (originally “Under Watch”) was added. Both lists are updated annually.
Enemies of the Internet:
Burma
China (excluding Hong Kong and Macau)
Cuba
Iran
North Korea
Saudi Arabia
Syria
Turkmenistan
Uzbekistan
Vietnam
Internet censorship by country
As mentioned by Danny O’Brien in CPJ, “The world’s worst online oppressors are using an array of tactics, some reflecting astonishing levels of sophistication, others reminiscent of old-school techniques. From China’s high-level malware attacks to Syria’s brute-force imprisonments, this may be only the dawn of online oppression.”
Now, the principle in discussion here is what can we do to act freely in the Web? First, there are some services that enable you to block the origin of your IP address (learn what an IP is at the end of the post) and to access many websites by hiding your country of origin; one private and free service is HMA! or How to Bypass Internet Censorship. But the most important one’s are the following online agencies and organizations that are working to inform and educate internet users of their rights and obligations:
- Electronic Frontier Foundation,
- Technology for transparency network,
- OpenNet Initiative,
- Reporters Without Borders,
- Freedom House,
- U.S. State Department Bureau of Democracy,
- Chilling Effects – A joint project of the Electronic Frontier Foundation and several U.S. university law schools and clinics
- CIRCAMP, Cospol Internet Related Child Abusive Material Project, a project of the European Chiefs of Police Task Force to combat commercial and organized distribution of child pornography
- Electronic Frontier Foundation – An international non-profit digital rights advocacy and legal organization
- Financial Coalition Against Child Pornography – A coalition of credit card issuers and Internet services companies that seeks to eliminate commercial child pornography by taking action on the payment systems that fund these operation.
- Global Internet Freedom Consortium (GIFC) – A consortium of organizations that develop and deploy anti-censorship technologies
- International Freedom of Expression Exchange(IEFX) – A global network of non-governmental organizations that promotes and defends the right to freedom of expression
- Tunisia Monitoring Group – A coalition within IFEX that monitors free expression in Tunisia
- Internet Governance Forum (IGF) – A United Nations multi-stakeholder policy dialogue initiative
- OpenNet Initiative – A joint project to monitor and report on Internet filtering and surveillance practices by nations
- Peacefire, a U.S.-based website dedicated to “preserving First Amendment rights for Internet users, particularly those younger than 18”
- The Pirate Party – a political movement that aims to reform laws regarding copyright and patents, strengthen the right to privacy, and increase the transparency of state administration
- Reporters sans frontières (Reporters Without Borders) – A France-based international non-governmental organization that advocates freedom of the press
What is an IP address:
Every device connected to the public Internet is assigned a unique number known as an Internet Protocol (IP) address. IP addresses consist of four numbers separated by periods (also called a ‘dotted-quad’) and look something like 127.0.0.1.
Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user’s general location. vía: http://whatismyipaddress.com/
Latest news and Related articles
- Detained Bloggers and Journalists in Syria: the list gets longer (advocacy.globalvoicesonline.org)
- Syria Uses Gear From U.S. Firm to Block Web (online.wsj.com)
- Beware: Skype users prone to security breach (thestar.com)
Video: A History of Economic Booms and Busts
When an economy falls into a recession, we typically observe a cluster of people making similar investment mistakes. According to historian Stephen Davies, these investment errors occur because governments or central banks manipulate the supply of money. These manipulations place artificial downward pleasure on interest rates, creating false signals that entice individuals to invest in what end up being unprofitable ventures. Booms and busts are not a new phenomenon of this century, but rather, have occurred throughout history both in America and around the globe.
Related articles
- Why sound money is important – and the Bank must go (abolishthebank.wordpress.com)
- 2 minute explanation of boom and bust (abolishthebank.wordpress.com)
- Blame the Fed for the Financial Crisis ~ Ron Paul… (gunnyg.wordpress.com)
- Winners And Losers: The New Economy (zerohedge.com)
- Blame Government, Not Greed – and, Please, Ignore Central Banking (jhaines6.wordpress.com)
- Wide Spread Economic Panic – The Economy And You (profitonknowledge.com)
Paper on “Craftying analytical tools to study institutional change”
[S]hared understandings by actors about enforced prescriptions concerning what actions (or outcomes) are required, prohibited, or permitted.
[Rules] are linguistic statements containing prescriptions similar to norms, but rules carry an additional, assigned sanction if forbidden actions are taken and observed by a monitor (Commons, 1924).
Norms are prescriptions about actions or outcomes that are not focused primarily on short-term material payoffs to self. A participant who holds a truth- telling norm gains an internal reward (that can be modeled as an additional value added to their utility function) for telling the truth even when material payoffs would be greater when telling a lie (Crawford and Ostrom, 2005).
Some of the lessons coming out of our institutional analyses in Nepal and elsewhere show that resource users who have relative autonomy to design their own rules for governing and managing common-pool resources frequently achieve better economic (as well as more equitable) outcomes than when experts do this for them.
How do rules originate on farmer irrigation systems?
Farmers in old and established systems tell researchers that they do not know much about the origin of the rules they use. In Bali, for example, rules are encoded in a sacred religious system and are monitored and enforced by priests (Lansing, 1991, 2006).
[T]he evolution of a rule system is not synonymous with progress. Certainly, evolutionary processes do not entail a priori judgments on the outcome. Evolutionary processes do involve, however, the generation of new alternatives, selection among new and old combinations of structural attributes, and retention of those combinations of attributes that are successful in a particular environment. In evolving biological systems, genotypic structures are changed through blind variation or directed variation (such as in the case of the domestication of many species of plants and animals). In evolving human-based rule systems, rule configurations within an action situation can change as a result of many self-conscious or unconscious mechanisms, including trial-and-error efforts, especially in collective-action processes. In some instances, the capacity of the biophysical resource system to buffer abuse from trial-and- error of different rule systems seems to play a necessary but not sufficient role in the emergence of successful self-governed rule systems (Basurto, 2008; Basurto and Coleman, 2010). Mechanisms for change in rule configurations can be roughly divided into relatively self-conscious and unconscious processes of change. Among examples of self-conscious processes that are frequently mentioned in the literature are those driven by imitation (Richerson and Boyd, 2005). Imitation of rules used by others can lead to rule evolution over time, especially if the farmers from multiple irrigation systems in a region regularly interact in a local market or other regular meeting place.
Imitation of entire rule systems that are thought of as ‘successful’ can also take place at the constitutional-choice level, such as the case of the adoption of the US National Parks’ law system by the Costa Rican nascent national park system. Other self- conscious processes of change in rule systems include some cases of external development interventions, such as when external aid support is conditioned to changes in local institutions based on foreign views of fairness, productivity, democracy, or development itself.
Competitive processes can also lead some users to self-consciously favor some institutional arrangements over others. Similarly, conflict over the interpretation of rules is also a process that frequently leads to self-conscious change.
Most self-conscious processes of change are based on the ability of humans to learn (Henry, 2009), such as when members of a rural fishing community organize to modify rules to control levels of exploitation based on past experiences (Basurto, 2005).
Unconscious processes of change include forgetting, like when there is a very large number of rules and no one ‘remembers’ them all without extensive research, or when laws are never practiced. The same phenomena are observed when certain taboos disappear through language loss, cognitive dissonance, technological change, or non-enforcement. These mechanisms can slowly erode rule systems, which then wither away and eventually can be replaced by new practices and norms of behavior (Kofinas, 2005).
Our dependence on language to communicate and the inherent ambiguity of language can lead to a number of unconscious processes of rule change as well. Rules are composed of mere words and, as Vincent Ostrom (1997) has frequently pointed out, words are not always understood by everyone with the same meaning (see also 2008a, 2008b). A guard may not understand the rules the same way as users. A guard, for example, may interpret rules that place heavy costs on the guard in contrast to those rules that involve low costs. Babbling equilibrium problems are widespread, even among scholars studying rules and norms systems! And, it is a key problem for the social sciences (E. Ostrom, 2005: 179).
Dopfer et al. (2004) view an economic system as a population of rules, a structure of rules, and a process of rules, where the micro domain refers to the individual carriers of rules and the systems they organize, the macro consists of the population structure of systems of meso, which is where processes of rule change take place.
It is worth restating that it would be naıve to assume that any evolutionary process always leads to better outcomes. In biological systems, competition among populations of diverse species led to the weeding out of many individuals over time who were outcompeted for mates and food in a given environment.


