Exploring the Impact of Technology and Innovation in Developing Countries

Developing Country Technology

Subscribe to Developing Country Technology: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Developing Country Technology: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

The news started hitting California early Saturday morning with an SMS alarm on my mobile phone – a major earthquake struck Chile, and there was a potential of tsunami activity in California and Hawaii (as well as the rest of the Pacific). First stop – CNN. The news source was right on the story, with real time information flowing into the newsroom from, not on-scene journalists, but through Twitter and Facebook updates. Another SMS message hits the phone letting me know there was a Twitter list at #hitsunami, and the discussion would include all the most current news related to tsunami preparations in Hawaii. Also gave a link to a web page that was broadcasting a live feed from KHON in Honolulu until the station integrated their feed on the KHON home page. Back to CNN, cell phone videos began pouring in from Santiago and Concepcion. CNN began broadcasting directly ... (more)

Social Media Enabling Asia

The Huffington Post recently posted a blog by Thomas Crampton highlighting some of the differences between social media use in Asian countries vs. the United States. Much of it driven by broadband deployment in technically advanced countries like South Korea, Japan, and Hong Kong (yes, I know…), much of it a burning desire by young people in developing countries who want to expand their social and intellectual evolution. Indonesia is now the second largest user of Facebook in the world. Poor broadband access (generally), low disposable income to buy personal computers, and moral... (more)

Are Public Mail Systems a Danger in Developing Countries?

Over the past two years I’ve interviewed dozens of government ICT managers in countries throughout Asia, the Caribbean, and Europe.  One of the surprising items collected during the interviews is the large number of government employees – some at the highest levels, using public mail systems for their professional communications. While this might appear as a non-issue with some, others might find it both a security issue (by using a foreign commercial company to process and store government correspondence), as well as an identity issue (by using an [email protected] or [email protected].. (more)

A Look into Moldova’s ICT Community with Ana Chirita

We first met Ana Chirita while surveying ICT companies in Moldova for a national cloud computing project.  As Executive Director of the Moldovan Association of Private ICT Companies, Ana provided introductions to local companies, industry background, and aggressive follow-on support to our project.  As an advocate and evangelist for her community, Ana plays an important role in developing Moldova’s ICT industry.  You can listen to the entire interview on audio here. John Savageau: This morning we have Ms. Ana Chirita who is the Executive Director of the Moldovan Association of P... (more)

Citizen Journalism Continues Journey into Unchartered Space

Nobody can foresee events such as natural disasters. They happen, are often tragic, and history records the event as a snapshot in time. Sometimes that history is based on well-documented photos, videos, and personal observations, and sometimes it is recorded as reality determined by persons or governments with an agenda different than presenting empirical truth. The government in Egypt recently tried disrupting communications by temporarily stopping Internet and phone access, as well as attempting (in some cases violently) to restrict or limit access to demonstrations by journa... (more)

Content / Context / Device Aware Cloud Data Protection

In this two-part blog, I am going to talk about the Intel Cloud Data protection solution that helps our customers utilize their data, in both a context and content-aware manner. This is a newer set of technologies that has hit the market in the last few years. In the past, we used to think just encrypting the transport layer (such as TLS/SSL) was good enough. Given the complex nature of services and API composition, we quickly realized that it was not enough. Then we moved to protect the messages (most of the time,  the entire message), or at a field level to protect the specifi... (more)