Algorithms in Africa
The emergence and spread of AIDS has been devastating to sub-Saharan Africa. Sure, you are probably tired of hearing about it. For one thing, it is so hard to come to grips with the scale of the problem. In the short time since I left Botswana—when AIDS was just beginning to emerge as an issue there—life expectancy has plummeted, from nearly 60 years to barely 40. It is now estimated that as many as 40% of the adults in Zimbabwe are HIV positive. This has been a debilitating setback to the emerging countries of the region, where public health efforts had previously been making remarkable gains.
The epicenter of AIDS in Africa has been Uganda, which was hit first and perhaps hardest. The government of Uganda is considered to have mounted an effective and ongoing public health campaign for its people, and there is hope that the incidence of HIV/AIDS is decreasing. Nevertheless, the consequences of the disease have been severe. One of the biggest problems is the large numbers of children left without parents. In a society where children are traditionally treasured and raised with the supportive assistance of extended families, there are simply too few adults left to care for growing numbers of orphans.
Bram Moolenaar is the author of Vim, one of the most popular open-source text editors, with ports available for just about any platform in existence. Bram had already started Vim when he first went to Uganda in 1994, volunteering to work as a water and sanitation engineer for the Kibaale Children's Centre (KCC).
The center, located in a rural village of southern Uganda, provides food, medical care and education to about 600 children, most of whom have been orphaned by AIDS. The conditions are austere: one book for ten children, a tiny blackboard and a roof with holes.
Bram found that his skills could help at Kibaale, his help made a difference. After a year spent working with the Centre, he wanted to find ways he could continue helping the project while also letting other people know of its existence.
That's when Bram hit on the idea of “charityware” for Vim. The license for Vim says simply: “Vim is Charityware. You can use and copy it as much as you like, but you are encouraged to make a donation to orphans in Uganda. Please read the file doc/uganda.txt for details.”
While using Vim, type :help uganda to get the complete text of the license and a description of the Kibaale Children's Centre.
Beyond this, though, Bram is fairly modest about the project. Although he asks for copies of CD distributions that include Vim, he doesn't appeal to distribution vendors directly for any additional financial support. Bram prefers to remain low key rather than risk annoying people and turning them away from supporting the Uganda project.
Knowing that Linux distributions in use are now in the billions, one may wonder how successful the charityware license has been as a fund-raising method for the Centre. Vim users are asked to make contributions to the International Child Care Fund that Bram and his colleagues have set up specifically to support the KCC project, and the ICCF web site provides annual financial reports. For 1999, donation income totaled about $7,000 US (17,800 Dutch Guilders), up from about $3,500 US in 1998.
These figures may seem rather underwhelming and suggest that the conscience of open-source users and vendors is not as evolved as one may like to think. But the bottom line for Bram is, even at such a modest level, these contributions make a huge difference in what the KCC can accomplish. The funds raised by Vim donors are used to keep the Centre running, maintain and improve the facilities and recently purchased rainwater tanks so that more people have access to clean water.
Bram continues his personal involvement with Kibaale to this day, having made return trips in 1996, 1998 and 2000. This experience gives Bram a thorough grounding in the realities of life in Africa, as well as an understanding of the means of effecting meaningful change. When I asked for his opinions about the digital divide, he said, “I'm afraid I don't know what the digital divide is. Is it about bringing computer-related stuff to Third World countries? Well, the area around Kibaale first needs a good water supply and a phone.”
When asked if he could give any suggestions to those interested in projects supportive of African information technology, Bram replied, “The best suggestion I can make is to work in small groups. A hundred small projects bring more benefit than one project that's a hundred times bigger. The strategy and planning done by people in head offices is a waste of time and money.” The message here is that the strength of any bridge depends upon its integrity.
In the end, Bram is doing what the Open Source movement has been all about from the beginning: working with personal conviction, making a difference where one can and sharing the work one loves with others. These are the ideals of a world seeking connections, the values that can link Linux and the Internet with an orphanage in Uganda. The human connections of these efforts empower people, improve lives and build the solid bridges of understanding among diverse global communities, digital and otherwise.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- Open-Source Project Secretly Funded by CIA
- The Death of RoboVM
- New Container Image Standard Promises More Portable Apps
- Tech Tip: Really Simple HTTP Server with Python
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide