You are here: Home

Search results for open access

RSS Subscribe to an always-updated RSS feed.

1881 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Transcript of the Opening Ceremony, WCIT-2012
by Snehashish Ghosh published Dec 03, 2012 last modified Dec 03, 2012 01:57 PM
Rough live-transcript of the Opening Ceremony of the World Conference on International Telecommunications, 2012 (WCIT-12) held on December 3, 2012.
Located in Internet Governance / Resources
Transcript of the Plenary 1, WCIT-12
by Snehashish Ghosh published Dec 03, 2012
Rough live-transcript of the first plenary session of the World Conference on International Telecommunications, 2012 (WCIT-12) held on December 3, 2012.
Located in Internet Governance / Resources
Blog Entry Transformaking 2015 : International Summit on Critical and Transformative Making, Yogyakarta
by Sharath Chandra Ram published Sep 20, 2015 last modified Jun 18, 2016 06:00 PM — filed under: ,
Transformaking 2015 brought together makers, scientist, hackers, bricoleurs, researchers, artists, designers and other interdisciplinary practitioners from across the globe in a series of Residency and Research Program, Symposium, Exhibition, Fair, and Satellite Projects. It was held from August 10 to September 20, 2015. Transformaking 2015 was organized by HONF Foundation & CATEC (Culture Arts Technoloy Empowerment Community) in partnership with the Centre for Internet & Society (CIS), Common Room, Crosslab, and Nicelab.
Located in Access to Knowledge / Blogs
Blog Entry Transparency in Surveillance
by Vipul Kharbanda published Jan 23, 2016 — filed under: , ,
Transparency is an essential need for any democracy to function effectively. It may not be the only requirement for the effective functioning of a democracy, but it is one of the most important principles which need to be adhered to in a democratic state.
Located in Internet Governance / Blog
Blog Entry TTT 2015
by Tanveer Hasan published Dec 05, 2015 last modified Dec 15, 2015 07:36 AM — filed under: , , , ,
The Centre for Internet & Society's Access to Knowledge team (CIS-A2K) conducted a four day training workshop for Wikimedians all over India in order to facilitate conducting and organising outreach activities for promotion of Wikimedia activities within Indian language communities. Wikimedians from 21 language communities had participated in this training workshop including Wikipedians working for Nepali and Maithili Wikipedia.
Located in Access to Knowledge / Blogs
File Tunis Agenda for the Information Society
by Prasad Krishna published Sep 17, 2012
The Tunis Agenda dated November 18, 2005.
Located in Internet Governance
Blog Entry Typing in Indic Languages from Mobiles made Easy!
by Subhashish Panigrahi published Nov 19, 2012 last modified Jul 17, 2013 09:02 AM — filed under: , , , ,
A new app is up for typing in Indic languages from mobile phones. This is is available online at: http://bitly.com/indictyping and supports on iOS. Android version is to be released soon.
Located in Openness / Blog
Blog Entry UID Project in India - Some Possible Ramifications
by Liliyan published Aug 11, 2010 last modified Mar 21, 2012 10:13 AM — filed under:
Having a standard for decentralized ID verification rather than a centralized database that would more often than not be misused by various authorities will solve ID problems, writes Liliyan in this blog entry. These blog posts to be published in a series will voice the expert opinions of researchers and critics on the UID project and present its unique shortcomings to the reader.
Located in Internet Governance / Blog
UID: The World’s Largest Biometric Database
by Prasad Krishna published Jul 23, 2011 — filed under:
At the start of his presentation, Sunil Abraham pointed to two aerial drawings of cybercafes: one where each computer was part of a private booth, and one where the computers were in the open so the screens would be visible to any one. Which layout would be more friendly to women, and why, Abraham wanted to know. Some participants selected the first option, liking the idea of the privacy, while others liked the second option so that the cybercafe owner would be able to monitor users’ activities.
Located in News & Media
Blog Entry UIDAI Practices and the Information Technology Act, Section 43A and Subsequent Rules
by Elonnai Hickok published Feb 25, 2014 last modified Mar 06, 2014 07:00 AM — filed under: , ,
UIDAI practices and section 43A of the IT Act are analyzed in this post.
Located in Internet Governance / Blog