The Internet in Developing Nations: India

Developing nations are both really lucky and unlucky with the internet. While they are able to take advantage of international assistance in leapfrogging previous technologies, they have to struggle with basic issues like electrification and education.

India acts as a wonderful case study. 96% of villages in India are electrified (although only 67% of households actually have access to power) as of October, 2015. This number has, of course, grown in the past year, and has led to a 34.8% penetration of the internet in India, a 30% increase YTD. Millions of middle class Indians have access to the internet.

On July 1st, 2015, Indian Prime Minister Narendra Modi unveiled Digital India – an initiative backed by major tech firms, both domestic and international, to bring India into the digital age, leapfrogging the analog technologies that Western nations were still transitioning out of straight into the internet age. This allowed PM Modi to tackle corruption and galvanize transparency. Good governance via good technologies.

One of the biggest and most innovative initiatives under the umbrella of Digital India was mygov.in. PM Modi uses this platform religiously to publicize government initiatives, post his bi-monthly radio addresses to the nation via SoundCloud, and request feedback and suggestions from every day citizens. The website hosts nationally recognized and valued referendums, though none with legal value, and has led to major reforms, including the recent banning of the ₹500 and ₹1000 notes, which was a suggestion from an average citizen. To increase transparency, the government also implemented attendance.gov.in, forcing 4.8 million public servants to biometrically identify when they arrived at work and when they left. This has had the effect of, at the very least, instilling fear in public servants, getting them to reduce absences.

Further digitization has been in pushing all government transactions online in an “Amazon-ification” of government purchases, including moving tenders and RFPs online. The entire system is moving towards transparency and clarity, with the PM advocating for a cashless society to tackle corruption even further.

The PM’s Office has also pushed the Aadhaar system, a giant online, biometric identification system for almost all Indians, that was first pushed by the previous government. This then leads to the big question of the century: is all of this digitization safe? With hundreds of millions of citizens’ information and biometric data online, a huge honey pot is just ripe for breaking into. So far, no large scale hack has been reported, but, with actors such as Pakistan and China in play, anything can happen. Ultimately, as always with software, the battle will be between efficiency and security.

Civic Technology

Today in our seminar, we had the opportunity to speak with David Eaves, a government tech advocate and a professor at the Harvard Kennedy School. He discussed the potentials, fears, and issues of technology in government.

As Eaves puts it, Information Technology has shifted from a “does your computer work?” strategy to a “how can we get it to work for you” thought-process. We’re shifting from IT to Digital, where technology has become its own sector, rather than under the CFO who’d view it as naught but a cost. In this way, we can focus more on governance and making products better for the user.

Eaves stressed how important it is for the user experience to be valued first and foremost: the customer is always right. Before, governments purchased softwares solely based on what is the cheapest one. Now, the customer matters. Products are/should be designed for users. We need to ask the question, “how can I make this work for a citizen of my population”. Eaves mentioned the CalFresh case study where they were able to turn a 100+ questionnaire into a 9 question one, slashing the time it took to take from 45 minutes. I attended an event earlier in the year with Jascha Franklin-Hodge, the CTO of the City of Boston, and the head of the website team, who discussed how each portion of the website was scrapped and redesigned for better user experiences based on user-testing, field-testing, and surveys. They’ve also made immense amounts of data open to the public for access and for information.

Based on case studies around the world, governments have been shifting the Request for Procurement (RFP) process to a more agile framework, especially in smaller localities. This means breaking up RFPs into several smaller modules and moving forward with those with several contractors, and then hiring a single consultant who packages all of those into one big wrapper. Eaves says that this increases competition and efficiency. I’ve noticed that this same process is used in general construction projects around the world. While building a metro rail system, one contractor may work on pillars, another on track laying, another on signaling, and yet another on the actual rakes; however, in technology, I fear that this system may not be smart. Every module may be constructed in dramatically different ways, with varying languages and implementations. If such standards are agreed to before development, of course, these issues could be ironed over.

There is also a huge concern over privacy and security. If the government makes data more available or starts collecting more data (as they already have) to simplify processes, what if someone hacks into the “honey pot” and gains all the information? Or, is it fair for the government to have all this information about me? I could contend, yes, to a certain degree. The fact is that if someone really wanted your information, they would get it from other means. And, if you wanted to hide all of your personal information, you could do some with other means. The average citizen will rarely be impacted by government surveillance so long as they don’t commit a crime. So long as security measures are actively taken, the privacy and security issues don’t bother me too much.

All in all, government has always been an extremely inefficient engine. And, if any steps can be taken to simplify processes and make the system better, I’m all for them.

Tech in Politics

Over the past summer, I volunteered with Congresswoman Barbara Comstock’s (R-VA-10) reelection campaign, going to festivals, phone-banking, and going door-to-door. Republicans have a history of having strong, grassroots, ground-games, in a way that Democrats, excluding Presidential races since Obama in 2008, have failed to emulate. Republicans have data going back decades about voting records and tendencies. We were armed with mobile apps when we went door to door that told us what path to take, which houses to go to, which houses had Democrats and which have Republicans, and who could be convinced to jump the aisle. These statistics, in my experienced, proved highly valuable and accurate. While walking around neighborhoods, or calling homes, I would often be amazed by how precise the calculations and predictions were. We were able to tailor our pitches based on what we gleaned from the application, and we inputted what we learned from the potential voter back into the application, training the system for future users.

Elections have become increasingly data driven, targeting potential voters from the get-go, and not wasting time with party loyalists. Political advertisements have taken information from users’ tendencies and preferences to target their views, in the same way that Wal-Mart or Target (ha pun intended) would single out users’ traits. For example, as a college student, I’ve seen motley Bernie Sanders ads about college debt; however, I have yet to see an ad about social security.

Further, social media has begun to play an unprecedented role in elections. Republican Nominee for the President of the United States Donald Trump (wow, it’s honestly worse thinking of him with that formal title) can command the news cycle for weeks with a single Tweet. And, that’s his entire strategy: use buzzwords and crazy ideas to remain the headline. This also allows politicians to interact with the youth, as both Trump and Secretary Clinton are highly active on all forms of social media, ranging from Instagram to Facebook to Snapchat. In this way, they can access voters in their more personal fields, while they’re socializing and relaxing, rather than while they’re actively seeking news and information.

This, however, furthers social media echo chambers. The Wall Street Journal is able to compare Liberal and Conservative viewpoints on certain news issues based on the types of posts potential voters see on their Facebook News Feeds. Potential voters Tweet, Share, and Post media that they believe in, even they will do nothing to change your friends’ minds. Ultimately, you only see the posts for pages that Facebook and Twitter believe you will like or do like; thus, you will only see one side of the story. Either you’ll see NowThis videos, or you’ll see Breitbart report videos. There’s very little in between, albeit most of the nation is moderate, leading to increased partisanship and polarity.

The Singularity

What happens when Artificial Intelligence becomes as smart as us? Avengers 2: Age of Ultron wants us to believe that, for the sake of protecting humanity, the robots will try to destroy humanity.

That makes sense.

As computers grow more and more advanced, we keep reaching points that we weren’t supposed to. Computers were not supposed to be able to do anything they weren’t explicitly told to do. Until they did. Computers were not supposed to be able to beat us at chess. Until they did. Computers were not supposed to be able to play and win at Go. Until they did.

Computers, however, have a vastly different style of learning, aptly named, machine learning. Humans learn in two ways: 1. Through experiences that allow humans to form connections and memories; 2. By intuitively connecting multiple different experiences in a subconscious way. Machines need to be more explicit. They learn by taking hundreds, if not billions, of input cases and parsing them to form judgements on past inputs and expected cases. Machines make educated guesses, based on previous decisions that users accepted, and calculate a probability for each potential output based on how potentially useful it is. The machine then outputs the best possible answer.

In my sophomore year, I took a class on Artificial Intelligence where we had to code a machine learning tic-tac-toe solver. The process was simple: create a structure that would parse through all the submitted test cases, calculate the frequencies/probabilities of winning for each case,  and, while actually playing the game, run through all the possible moves and judge which one would likely lead to a victory. In this simple way, I was able to develop a tic-tac-toe AI that I could never beat (which, in all fairness, isn’t saying much because I’m terrible at tic-tac-toe).

We don’t really need to replicate human intelligence. Its long as we’re reaching this end goal of being able to solve problems, the process doesn’t matter. The actual biochemical processes of the human mind are irrelevant.

This also allows us to eschew fearing the Singularity. If the machines aren’t smart in the same way as humans, they will never reach the same type of self-awareness as humans and we can control their thoughts. So long as we limit the bounds of the artificial intelligence by focusing on the problems we want these machines to solve rather than getting them to solve them with “human” methods, we should be able to end up avoiding “self-awareness”.

We don’t need to fear technology so long as we continue to have control.

Everything is Connected

Many East Asian religions and philosophies were developed under the idea that everything is connected to a larger spirit; everything is interconnected and related. The Japanese wrapped up the idea under Shintoism, while the Hindus called it Brahman. Today, we call this idea the Internet of Things: everything is connected to the internet. Under the IoT system, thermostats will communicate with cameras, which will communicate with phones, which will communicate with light bulbs, which will communicate with doorbells.

Source: pixabay.com
Source: pixabay.com

The idea is that by placing sensors around your world, you can develop an ecosystem that works around you, simplifying your life and giving you more time to do things that matter to you. Products like Nest Thermostats are designed to track your habits and your preferences to be able to do things for you. For example, a Nest Theromostat specifically tracks whether you are in or out of the house and regulates the temperature based on that, saving you energy costs. It also tracks the local weather and adjusts the temperature accordingly. And, as it’s connected to the internet, it can be monitored via mobile devices.

With Apple’s HomeKit APIs, your home can be designed to be controlled completely with your iPhone. Philips Hue lightbulbs, Honeywell Lyric thermostats, and Ring doorbells all link to your iPhone and can be controlled by iOS 10’s new Home app; there’s a one-stop-shop for controlling your entire house. While this makes your life easy, the biggest follow up concerns are security and privacy.

No system is infallible. Even the American power grid system is susceptible to cyber-terror attacks. What if someone hacks into your email? They now have access to, well, everything. And, if you’re still stuck on Yahoo, then you’ve potentially already been hacked. In fact, tools for detecting and hacking IoT devices have been flooding underground, dark web forums.

So, the question is, is the convenience worth it? Are we okay with machines making decisions for us and leaving us to do other tasks? Is the trade-off something that we can handle? I guess, this a personal question that every individual considering investing in products will have to answer on their own.

Anyone Can Sell Anything… to Anyone

The internet was never supposed to be used for a commercial purpose; at one point, it was illegal to even send advertising emails. In fact, as Professor Waldo mentioned in class, Laurence Canter and Martha Siegel were among the first to send “spam” emails in 1994. Before this period of time, a certain set of rules were followed on the internet. There was a certain etiquette, or a “netiquette”, if you will, of being polite and avoiding spam. As we now know, the internet is inundated with trolls and advertisements, and the Canter and Siegel email is said to have been the trigger.

Nevertheless, the commercialization and monetization of the internet is not a bad thing. Sure, spam email sucks, but the internet has become the world’s largest and most accessible marketplace, selling everything that you could possibly imagine. Companies like Amazon and EBay have shut down retail giants who seemed intractable in their spaces, such as Borders and even Sears. Consumers have begun to use these stores as showrooms to check out products and then order them from online. In the end, the Consumers win because they have more choice, they have more flexibility, and they have more efficiency. And, best of all, they can do all this while sitting on their bed in their pajamas.

This has sort of led to a philosophy of instant gratification among younger people with myself included, unfortunately. We want stuff done now. Amazon Prime’s two day shipping has spoiled us. Instant communication and a vast swath of immediately available information at our finger-tips has led us to believe that problems can be solved instantaneously. But, alas, this is a bigger issue than can be tackled by a feeble blog post.

Meanwhile, it’s become easier for smaller companies/producers to access a larger base of consumers under the Long Tail Effect. This is probably the coolest part of economics on the internet. Anyone can sell anything… to anyone. Websites like Etsy, Kickstarter, and EBay expose the entire world to products and merchants that they could have never heard of before. Local and regional marketplaces have expanded into nationwide and worldwide marketplaces. Companies like the Dollar Shave Club can go viral and can reach millions of consumers without investing heavily in advertising; the word-of-mouth chain has become infinitely more accessible. Most of these online-only producers sell one or two products.

Pebble is a perfect example of a product taking off from Kickstarter and growing into a full-scale company. It began as a small project that Eric Migicovsky took through the Y-Combinator project to turn into a larger company. Eventually, due to failing to gather investors after a rebranding, Pebble moved to crowd-funding via Kickstarter and blew up into the multi-million dollar company it is today with several products.

The internet has, simply, become the coolest place to buy and sell products.

Networking Like Networking

Networking with people seems very similar to networking with, uh, networks. Imagine a general pool of people like you or me who are seeking jobs. These people don’t really know what they’re doing, but they’re capable of meeting people at different events. This pool is like the basic internet/ARPAnet. Now, there are two ways that this pool can be accessed: 1. Either someone from a hiring company can reach out to someone from the job pool or 2. Someone from the applicant pool can reach out to the network that they are seeking to access.

The first case is like a local network reaching out to the overall internet system. While someone from the company is connecting to interact with job applicants in the networking for a job situation, the local network is sending information to the overall network in the computer networking situation. The second case, on the other hand, is the exact opposite, with a job seeker going through the overall internet to connect with the other company, just like how a host/network connects to another network.

But, along the way, both have to go through a recruiter or at least some employee at the company who has access to both the applicant and the company. This is similar to a gateway, which links a network to the overall internet. The gateway acts as a, well, gateway for the network to the internet!

Now, if only this analogizing could get me a real job…

On another note, I was really intrigued by the conversation we had in our seminar about domains and IP addresses. Having built and deployed several websites myself, I was surprised by the complexities and all the different moving parts involved on the back-end. When you’re developing and publishing a website, you only really see what you yourself have constructed, with the rest of the network-side code hidden by your web-host (other than the server-side code that you’ve written yourself).

I’m also very much looking forward to future discussions about economics and privacy!

The Freedom to Grow

When Kleinrock was able to message a friend over the ARPAnet to retrieve his shaver, the stage was set for the ARPAnet to become the internet today for communication, commerce, and information. As it seems, when products are developed, oftentimes they are used less for their intended purposes and more to solve pertinent problems. For example, super glue was developed initially for gun sights. And then its adhesiveness was discovered! It became more useful for fixing broken parts and getting fingers stuck together. Using new technologies for accomplishing tasks validates inventions and gives them a higher purpose past its original, intended use.

This use of ARPAnet and freedom to use ARPAnet led to a dramatically important precedent: the casualness of the internet. The internet is not a formal place; it feels like an extension of our every day lives full of work and play. But, this culture could not have been possible without the academics who worked on the ARPAnet outside of the military structure that it had been initially developed under. The developers started off by giving it a light-hearted and open feel, as evidenced even by RFC, which, while setting the standards for the internet, did so not as an authority, but as a peer, requesting suggestions and, well, comments.

This informality, of course, did translate into modern-day trolling. So, if you’re ever angered by YouTube comment trolls, it seems like you can blame the developers’ flaming each other. Flame wars began over everything, as they do today (peep Reddit). Even when the problems were big, the flame wars were disproportionate. Developers would fight over everything from address headers to the infamous Big Endian/Little Endian debate (fun fact: no one won). And, yet, while flame wars and trolling are representative of the human urge to fight, they also represent how open and free the internet has been from the beginning. From the get go, the internet has been about being useful, whether that’s with messaging or transferring files. This culture allowed it to grow and develop and allowed users to use it as a platform to develop on.

Take the Space Industry, for example. Rockets require massive amounts of technology and high capital costs. This means that growth and development is slow. Safety standards slow it down even further. The only recently retired Space Shuttle was using technology from the 80s, having never reached its target of bringing flight costs to less than $25,000 a flight at a frequency of 20 times a year. In fact, it barely hit 10% of either of the latter target. Now, of course, SpaceX, Blue Origin, and international organizations like ISRO are finally bringing competition to the table, but the growth is still slow. Most of the development was driven by the government and government contracts because of the high barriers of entry. On the other hand, the internet was designed so that anyone with a computer could get on and improve it/develop on it.

So that’s what they did. People like BBN engineers who were able to mess with “loop tests” and spook telephone repair men by telling them where lines were down from across the country were the pioneers in developing technologies; people just playing around and messing with stuff because they have the freedom and will to do so.