时间:2019-01-12 作者:英语课 分类:2013年VOA慢速英语(四)月


英语课

 



As It Is - Indonesia, where millions of people are using cellphones to help them find jobs


Welcome to another “As It Is” program. I’m Jim Tedder 1 in Washington.  Today we hear from Indonesia, where millions of people are using cellphones to help them find jobs. Then we will have more about pirates off the coast of Somalia, and how they are being held responsible for their crimes. But first, the story of good things from people most of us do not trust.


Johnny Long is known as a computer hacker 3. He is famous for his ability to hack 2, or break into, computer systems. For 15 years, he was paid by governments and companies to hack computer systems and find their weaknesses so security could be improved. In 2009, Mister Long moved his family to Jinja, Uganda, and started an organization called Hackers 4 for Charity.


“I’m a high-tech 5 guy, I hardly have any other skills. I get somebody else to change light bulbs. I’m just not the type that you would think of going to Africa and doing anything.” Now Mister Long’s organization provides a way for hackers around the world to volunteer their skills to help nonprofit organizations that cannot pay for computer help. Many of the organizations are in Uganda and other East African countries. In Uganda, organizations and schools receive free computer training and computer repair.


Mister Long says one of the biggest problems is persuading organizations to work with hackers.


“Most organizations see that word hacker -which we won’t remove from our name, because it’s who we are -and that’s it. End of discussion. Organizations that would normally donate to us won’t donate because they’re fearing a news story.”


Tim Rosenberg has volunteered for two projects with Hackers for Charity.


“We’re not known for our social skills. We’re known for spending hours and days and months in windowless offices interfacing 6 on laptops and computers, and not really moving outside of that bubble. An organization like Hackers for Charity, that provides the ability to start impacting into the wider community and the world, is just a phenomenal opportunity.”


Mister Long says he also hopes the work will change public opinion of hackers.


“We’re able to show hackers aren’t just about mayhem and causing trouble. We’re actually making a difference.”


There is more information about the group at HackersforCharity.org.


An organization fighting hijacking 7 near Somalia’s coast is developing a legal system to permit officials to take pirates captured at sea to court on land. The organization is called the Contact Group on Piracy 8 off the Coast of Somalia. The planned legal system will also include rules about arresting pirates in international waters. Caty Weaver 9 tells us more.


John Steed of the United Nations Political Office for Somalia says the system faces many problems because Somalia is a failed state. He says the country is trying to re-organize itself after many lawless years.


“Somalia does not have the legal framework that the international community would recognize, so most of the prosecutions 10 take place in countries like the Seychelles and Kenya and elsewhere in the region.”  The Contact Group was established in two thousand nine. It includes more than 80 counties and has international groups such as the African Union, the Arab League, the European Union and NATO. The group’s main aims include making sure pirates are brought to justice. More than 1,200 Somali pirates are currently being held in 21 countries.


.


Prisons are available throughout Somalia.  But they are small and cannot hold many people. In addition, trials of accused pirates are rarely held in the country. James Hughes of Britain’s Foreign and Commonwealth 11 Office says the group seeks to have Somali pirates serve sentences in their own country.


“In the shorter term, those convicted in regional states can be returned to Somalia to serve their sentences in Somali prisons. And in the longer term, of course, (the goal) is to develop court and prison capacity in Somalia so that the Somali administration can bring those convicted of piracy to justice at home. Obviously, this will not happen overnight. This is a long-term process”. Pirate attacks off the Somali coast have decreased greatly in the past few years, after international navies started guarding the coast. But, the Contact Group says piracy in the Gulf 12 of Aden and nearby waters continues. It threatens the safe arrival of humanitarian 13 aid to Somalia and the safety of business and supply ships as well as local fishing activities. The International Maritime 14 Bureau says 75 ships were attacked off Somalia in 2012 and 14 were hijacked 15. I’m Caty Weaver.


A twenty-three year old man sells face coverings for about 30 cents each in central Jakarta, Indonesia.  Yet he makes enough money to buy a cell phone that permits him to visit Facebook and Twitter websites. Like many Indonesians, he has found that the device has become an important part of his life. Christopher Cruise has our report.


Rio Sofiyanto says every average person has a cellphone. He likes having one because he can talk to his family when he is away from home. And he is especially pleased that he can use it to listen to music. Mister Sofiyanto’s phone has a keypad that makes it look like a Blackberry.


It is a known as a feature phone or smartphone “lite.”  That is because it is cheaper and cannot perform all the actions of the latest versions of Apple’s iPhone. These devices make up the majority of cell phones sold around the world. The have proven more successful in places like Indonesia, where smartphones cost 700 dollars or more. Although many lower-income users are new to smartphones, they are quickly learning to use the technology.


Eddy 16 Tamboto is the managing director of the Jakarta office of the Boston Consulting Group. He explains the importance of having a mobile phone.


“The way they get to know about employment opportunities, the way they get to know about entrepreneurial opportunities is actually through the mobile phone. So the phone and the smartphone is not just a convenience of indulgence, but actually it’s a big part of a day-to-day necessity.”


Local businessman Aldi Haryopratomo has developed a way for small store owners to sell things like prepaid cellphone minutes and life insurance through text messages. Ruma is the company that developed the technology. The company is working on a system that will notify people about chances for jobs in their area.


Business advisors 17 say Indonesians are explorers who like to try new things, especially when it comes to digital technology.  They are some of the biggest users of Facebook and Twitter. I’m Christopher Cruise.


And I’m Jim Tedder in Washington. Thank you for being with us. Since today is “Barbershop Quartet Day” in the United States, we leave you with a song from the famous American play, “The Music Man.”  You can hear the latest world news at the beginning of the hour on VOA.




n.(干草)翻晒者,翻晒机
  • Jim Tedder has more. 吉姆?特德将给我们做更多的介绍。 来自互联网
  • Jim Tedder tells us more. 吉姆?泰德给我们带来更详细的报道。 来自互联网
n.劈,砍,出租马车;v.劈,砍,干咳
  • He made a hack at the log.他朝圆木上砍了一下。
  • Early settlers had to hack out a clearing in the forest where they could grow crops.早期移民不得不在森林里劈出空地种庄稼。
n.能盗用或偷改电脑中信息的人,电脑黑客
  • The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
  • This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
adj.高科技的
  • The economy is in the upswing which makes high-tech services in more demand too.经济在蓬勃发展,这就使对高科技服务的需求量也在加大。
  • The quest of a cure for disease with high-tech has never ceased. 人们希望运用高科技治疗疾病的追求从未停止过。
衬布,衬头
  • Careful study of the data sheets and a programmable input-output port solve most A/D interfacing problems. 若详细研究一下说明书和可编程序的输入/输出端口,则大部分A/D转换器的接口问题都可得到解决。
  • Detailed techniques will be presented here to solve all the common interfacing problems. 本书将详细介绍解决所有公共接口问题的技术。
n.海盗行为,剽窃,著作权侵害
  • The government has already adopted effective measures against piracy.政府已采取有效措施惩治盗版行为。
  • They made the place a notorious centre of piracy.他们把这地方变成了臭名昭著的海盗中心。
n.织布工;编织者
  • She was a fast weaver and the cloth was very good.她织布织得很快,而且布的质量很好。
  • The eager weaver did not notice my confusion.热心的纺织工人没有注意到我的狼狈相。
起诉( prosecution的名词复数 ); 原告; 实施; 从事
  • It is the duty of the Attorney-General to institute prosecutions. 检察总长负责提起公诉。
  • Since World War II, the government has been active in its antitrust prosecutions. 第二次世界大战以来,政府积极地进行着反对托拉斯的检举活动。 来自英汉非文学 - 政府文件
n.共和国,联邦,共同体
  • He is the chairman of the commonwealth of artists.他是艺术家协会的主席。
  • Most of the members of the Commonwealth are nonwhite.英联邦的许多成员国不是白人国家。
n.海湾;深渊,鸿沟;分歧,隔阂
  • The gulf between the two leaders cannot be bridged.两位领导人之间的鸿沟难以跨越。
  • There is a gulf between the two cities.这两座城市间有个海湾。
n.人道主义者,博爱者,基督凡人论者
  • She has many humanitarian interests and contributes a lot to them.她拥有很多慈善事业,并作了很大的贡献。
  • The British government has now suspended humanitarian aid to the area.英国政府现已暂停对这一地区的人道主义援助。
adj.海的,海事的,航海的,近海的,沿海的
  • Many maritime people are fishermen.许多居于海滨的人是渔夫。
  • The temperature change in winter is less in maritime areas.冬季沿海的温差较小。
劫持( hijack的过去式和过去分词 ); 绑架; 拦路抢劫; 操纵(会议等,以推销自己的意图)
  • The plane was hijacked by two armed men on a flight from London to Rome. 飞机在从伦敦飞往罗马途中遭到两名持械男子劫持。
  • The plane was hijacked soon after it took off. 那架飞机起飞后不久被劫持了。
n.漩涡,涡流
  • The motor car disappeared in eddy of dust.汽车在一片扬尘的涡流中不见了。
  • In Taylor's picture,the eddy is the basic element of turbulence.在泰勒的描述里,旋涡是湍流的基本要素。
n.顾问,劝告者( advisor的名词复数 );(指导大学新生学科问题等的)指导教授
  • The governors felt that they were being strung along by their advisors. 地方长官感到他们一直在受顾问们的愚弄。 来自《现代汉英综合大词典》
  • We will consult together with advisors about her education. 我们将一起和专家商议她的教育事宜。 来自互联网
学英语单词
achmores
acpuired
additional expenses-strikes
agonothetes
ajmalin
amperometric method
andriatry
anesthesia paralysis
antall
application in the planting hole
ardilas
Attert
Balladonia
be on relief
belandre
bluff bit
change password
chase ports
chemically precipitate metal powder
Claudius cells
cocks of the walk
code bases
combine dimensions
continuous casting steel machine
Dealer's Deposits Fund
delete lines command
dermatofibroma
dinitro-fluoroaniline
don bacteria
Dowell
dunker
Eurya metcalfiana
family naticidaes
fatti
feudal-absolutist state
field-weakening region
flow lines
forest assistant
gas and steam combined cycle
go snacks
Google Docs
Haripād
hasten to sb's assistance
hearth number
hull girder vibration
HVDC coupling station
incomparabilities
interrupt analysis
isopathic immunization
Kanasing
kayal
Kyōto-shi
liberty spike
lift scheme
light pole
lightninglike
lunkhead
macoradical
market-maker, marketmaker
morali
Mughayrā'
mutineer
mycosphaerella imperatae
nelan
nil ductility transition
niobian
noncentrosymmetric structure
nonpresence
o?litic limestion
off-colo(u)r product
overall approximation
partial deck
patheticly
pectography
phago-
pico-katals
Placido's disk
polarchy
polyundecylamide fibre
possessioning
projective operator
puzzle ... head
reprivatise
resonance structures
saprobic animal
scalariform marking
simple oxygen system
skin pathology
stator ring
stereocartograf
stick at itiveness
surrenderee
sways
the coming of
trampoosing
type of decay
underground facility arrangement
upward dislocation
vasomotor rhinitis
warty tuberculosis
western
yiz