Algorithms in Africa
Eleven years ago I installed a computer system at a vocational training and development center in Tutume, Botswana. Tutume is a rural village on the northeastern edge of the Kgalagadi desert in southern Africa. The computer was intended to help this organization, known as Tutume Brigades, catch up on its bookkeeping for several business units crucial to the local economy. Businesses included a brick-making unit, carpentry workshop, auto repair garage, sorghum mill, school uniform production unit, tractor hire and vegetable garden. For the local village and the surrounding catchment era, the Brigades were literally the only game in the bush for commodities, trade skills, training and employment opportunities.
When I arrived in Tutume, I was a pure novice in the field of foreign assistance. I was also a mid-career financial professional, with several years of experience in nonprofit and health-care management in the United States. And like most aid workers new on the ground in Africa, I knew what was best. In my assessment of the center, I believed a computer was essential to get a handle on the Brigades' financial position, which otherwise consisted of eight separate sets of badly maintained manual ledgers, over nine months in arrears. Except for the bank statements of eight separate checking accounts (and even the bank statements proved unreliable), we had no way of knowing if the center had any money. Every time we had to make payroll or buy another truckload of cement, we were in the heart of fiscal darkness.
Over the course of the next several months, I proceeded to computerize the records and train local staff in basic operation of the system. By the end of the first year, the financial records of the center were timely and accurate. Moreover, other staff members were beginning to use the computer for tasks such as word processing and spreadsheets. Many of these employees had never even used a typewriter before.
If I were to tell no more of this story and fade here to one of the glorious Kgalagadi sunsets, this might be called a win. Although set in the predawn (and pre-Linux) history of the Internet era, today this would be described as a small success story of “bridging the digital divide” in Africa—like I was a regular Albert Schweitzer of the Information Age or something.
But the truth is not so simple, and the issues of foreign assistance are not so trivial. The fact is, I am not proud of this story. Because as my time in Tutume went on, I realized I had blundered badly, to the point of putting the Brigades in serious jeopardy. I began to ask myself such basic questions as: What would happen to the computer after I left? Was the staff fully capable of operating the system independently? Would backups be maintained and performed rigorously? Were skills sufficient to troubleshoot problems and reinstall the system if necessary? If the equipment failed or was stolen, could the center afford to replace it? And what would the center do when the staff I had trained for so long were lured away by more lucrative jobs in the big city?
These questions all led to the same answer: the Brigades would be left in even worse shape than I found them. Rather than gaining empowerment, independence and enablement, they would more than likely be left powerless, dependent and possibly ruined. And all because of my own cultural myopia, despite my good intentions.
It is axiomatic in the field of foreign assistance that the aid program will take credit for the successes, while failures are blamed on the host country. The psychology of failure can then be even more severe and long-lasting than the loss of the project. While I was working in Tutume, for example, a friend of mine was working in the village of Lobatse in southern Botswana. Seven years earlier, an aid organization from northern Europe had decided a wool sweater factory would be just the ticket for the economic development of the village. Of course, northern Europeans are fond of nice wool sweaters and very likely have great need for them, particularly in the colder climes of northern Europe. The market for wool sweaters is less extensive in the sweltering and sparsely populated Kgalagadi desert, however. After seven years of subsidizing the losses of the operation, the aid organization finally decided it was never going to be sustainable, and they pulled the plug on the effort. My friend's unenviable assignment was to put all the women out of work, sell the facility and liquidate the equipment. It was hard for many of the women not to feel that the fault was somehow their own.
Fortunately for Brigades in Tutume, such failure was averted. As the story there continues, once I realized the risks, I spent the next several months converting the accounting system back to manual ledgers, hiring and training additional staff in bookkeeping procedures and enabling them to use the computer primarily as a support system, rather than as the central financial database.
But what do these stories from Tutume and Lobatse have to do with Linux and emerging markets? The rest of this article will consider that question.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- The Humble Hacker?
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- The US Government and Open-Source Software
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide