Above, a counter-protest by students at Duke University supporting the notion that "Tibet belongs to China, andï»¿ will always belong to China."
A Chinese student at Duke who participated in pro-Tibet protests on campus -- after befriending her Tibetan dorm-mate -- has become the target of brutal online and offline attacks. Thousands of nationalist Chinese thugs (some claiming to be Duke students) see her actions as "traitorous," and have threatened her with personal attacks in comment threads and, apparently, in person.
Online, the bullies have posted her photograph, her US phone number, Chinese identity card number, her parents' address and home number in China. Offline, her parents' home in Qingdao is said to have been attacked with rocks, and her parents are now in hiding.
John Kennedy of the Global Voices blog has posted some of the comments and threats to her and her family here. (coverage also here, thanks Nick)
National security advisor Stephen Hadley speaks on ABC about the Olympics and how it relates to the Tibet situation. He calls Tibet "Nepal." The kicker is that George Stephanopoulos does not catch the gaffe even after it is repeated 8 times.
Where are our petabyte drives? Brian Hayes takes us through the reasons storage is “stuck” in the low terabytes. The tl;dr is that we got such exceptional capacity growth in the late 90s and early 00s we don’t need much more right now, so the focus since then has been on SSDs, networking, interfaces, etc, […]
Amélie Lamont, a former staffer at website-hosting startup Squarespace, writes that she often found herself disregarded and disrespected by her colleagues. One comment in particular, though, set her reeling — and came to exemplify her experiences there.
In this episode of the Flash Forward podcast we travel to a future where humans have decided to eradicate the most dangerous animal on the planet: mosquitos. How would we do it? Is it even possible? And what are the consequences? Flash Forward: RSS | iTunes | Twitter | Facebook | Web | Patreon We […]
White hat hackers get paid to find holes in their own employers’ online systems, and plug those holes before they become serious security risks. It’s a job that pays handsomely…mostly because few job candidates, even experienced IT professionals, have the skills to scamper over firewalls and infiltrate the deepest recesses of a battle-tested network. But […]
Why buy one of those expensive and confusing universal remotes, clogged with enough buttons to launch a space shuttle, when you could accomplish the same electronic control right on your favorite mobile device? The Blumoo Universal Remote, now just $52.99 in the Boing Boing Store, harnesses the audio power of all your household equipment right […]
You may not love Microsoft Word, but you’ve definitely used it. Other than being one of the most ubiquitous programs on the planet, it’s been the go-to word processing system for more than a quarter-century because it’s as basic as it gets. But occasionally, you’ve got assignments that beg for a lot more options than simple […]