{"version":"1.0","provider_name":"CHM","provider_url":"https:\/\/computerhistory.org","author_name":"tluong","author_url":"https:\/\/computerhistory.org\/blog\/author\/tluong\/","title":"The Other Internet, Part II: Cambridge to Kenya","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"whfnESKJ1V\"><a href=\"https:\/\/computerhistory.org\/blog\/the-other-internet-part-ii-cambridge-to-kenya\/\">The Other Internet, Part II: Cambridge to Kenya<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/computerhistory.org\/blog\/the-other-internet-part-ii-cambridge-to-kenya\/embed\/#?secret=whfnESKJ1V\" width=\"600\" height=\"338\" title=\"&#8220;The Other Internet, Part II: Cambridge to Kenya&#8221; &#8212; CHM\" data-secret=\"whfnESKJ1V\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/computerhistory.org\/wp-content\/uploads\/2019\/07\/nick_hughes.jpg","thumbnail_width":800,"thumbnail_height":451,"description":"With his clipped red hair, freckled ruddy skin, and open yet no-nonsense manner, Nick Hughes could play a British army officer in the movies. But this quietly effective former geologist is the architect of the world\u2019s leading mobile payment system, one that has changed daily life in Kenya and offers a possible glimpse into the future for many in the developing world. As readers saw in Part I of this posting, where we interviewed Maasai herdsmen about their use of mobile phones, M-PESA is the ubiquitous service that now moves over a quarter of the entire country\u2019s GDP and holds nearly half of its people\u2019s savings."}