Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged how to

Rss Feed Group items tagged

Wildcat2030 wildcat

The Value of Nothing-Raj Patel » Blog Archive » - 1 views

  •  
    ""This is a deeply thought-provoking book about the dramatic changes we must make to save the planet from financial madness" - Naomi Klein. Opening with Oscar Wilde's observation that "nowadays people know the price of everything and the value of nothing," Patel shows how our faith in prices as a way of valuing the world is misplaced. He reveals the hidden ecological and social costs of a hamburger (as much as $200), and asks how we came to have markets in the first place. Both the corporate capture of government and our current financial crisis, Patel argues, are a result of our democratically bankrupt political system. If part one asks how we can rebalance society and limit markets, part two answers by showing how social organizations, in America and around the globe, are finding new ways to describe the world's worth. If we don't want the market to price every aspect of our lives, we need to learn how such organizations have discovered democratic ways in which people, and not simply governments, can play a crucial role in deciding how we might share our world and its resources in common. This short, timely and inspiring book reveals that our current crisis is not simply the result of too much of the wrong kind of economics. While we need to rethink our economic model, Patel argues that the larger failure beneath the food, climate and economic crises is a political one. If economics is about choices, Patel writes, it isn't often said who gets to make them. The Value of Nothing offers a fresh and accessible way to think about economics and the choices we will all need to make in order to create a sustainable economy and society."
Gonzalo San Gil, PhD.

18 cardinal rules of systems administration | ITworld - 0 views

  •  
    [Rules to live by It's not just knowing how to set up and maintain your servers and understanding how system commands work that makes you a good system administrator -- or even knowing how to fix things when something breaks down, how to monitor performance, how to manage backups, or how to craft superbly clever scripts. It's knowing...]
Gonzalo San Gil, PhD.

Russian Copyright Law Allows Entire News Site To Be Shut Down Over A Single Copied Arti... - 0 views

  •  
    "from the funny-how-that-works dept We've noted for a long time now that copyright laws are regularly used as a tool for censorship. In Russia, abusing copyright law for censorship and to harass political opponents has become standard. Remember how the Russian government teamed up with Microsoft to use questionable copyright claims to intimidate government critics? And then how the MPAA gleefully got into bed with Russia's media censor to celebrate copyright? Of course, Russia also expanded its ability to use copyright to censor the internet, following pressure from short-sighted US diplomats, demanding that Russia better "respect" copyright laws. "
  •  
    "from the funny-how-that-works dept We've noted for a long time now that copyright laws are regularly used as a tool for censorship. In Russia, abusing copyright law for censorship and to harass political opponents has become standard. Remember how the Russian government teamed up with Microsoft to use questionable copyright claims to intimidate government critics? And then how the MPAA gleefully got into bed with Russia's media censor to celebrate copyright? Of course, Russia also expanded its ability to use copyright to censor the internet, following pressure from short-sighted US diplomats, demanding that Russia better "respect" copyright laws. "
Gonzalo San Gil, PhD.

How To Start Learning A Programming Language - LinuxAndUbuntu - 1 views

  •  
    "Have you ever wonder how everything works? From Smartphones Operating Systems to even each and every Linux Distro and every Operating System created by Microsoft and Apple. How does it play my favorite music? How does it save my files to the cloud? How does actually everything works? All this questions are answered with one big bolded and all capital "PROGRAMMING". So, you might be asking yourself, "yeah I know programming runs all but, how should I start and from where?""
Ferananda Ibarra

Network organisation for the 21st century : turbulence - 4 views

  • On the Virtues of Being Popular In any network, some nodes are more connected than others, making them ‘hubs’. This is a recurring pattern in the evolution of successful networks, ranging from the world wide web to many natural ecosystems. A ‘hub’ is not just a node with a few more connections than a usual node; a hub has connections to many other nodes – many quite distant – and also connects many disparate nodes (nodes of very different types). If you were to count all the connections each node has, you would get a mathematical distribution called a ‘power-law’ distribution with relatively few hyper-connected nodes – hubs – and a ‘long tail’ of less connected nodes.
  • Unlike networks that have a normal or random distribution of connections, networks that have a power-law distribution of connections are ‘scale-free,’ which means that no matter how many more nodes are added to the network, the dynamics and structure remain the same. This seems to be a sweet spot in the evolution of networks for stability and efficiency. The network can get bigger without drastic changes to its function.
  • The Surprising Strength of the Long Tail There is a looming contradiction: how can we have hubs and still have a strong network of dense connections that is not dependent on them? Don’t hubs lead to the emergence of permanent, entrenched leaders, centralisation and other well-documented problems? There is something of a tension here: the point is not simply that we should develop hubs, but that we have to simultaneously ensure that the hubs are never allowed to become static, and that they’re at least partially redundant. Sounds complicated, but healthy and resilient networks aren’t characterised simply by the presence of hubs, but also by the ability of hubs to change over time, and the replacement of previous hubs by apparently quite similar hubs.
  • ...10 more annotations...
  • The long tail does not drop off into nothingness (which would be the ‘exponential’ rather than ‘power-law’ distribution), where there are a few hubs and every other node has almost no connections. Instead, the long tail is extensive, consisting of small groups of dense connections, going ever onwards. In fact, the vast majority of the connections in the network are not in the hub, but in the long tail. One clear example is that of book-selling in the 21st century: the majority of Amazon.com’s book sales are not in the best-seller list, but in those millions of titles in the long tail that only a few people order. Every successful movement must be built on dense local connections. It is these dense local connections that support the dynamic creation of hubs.
  • In a perfect world, every node would be a hub – we would all easily connect with any other person and be able to communicate. However, creating connections takes time and energy, so nodes that are more long-standing or just have more spare time will naturally become hubs
  • The Construction of Collective Intelligence Hubs tend to evolve naturally in well-functioning networks – but we can accelerate the process of network development
  • Collective intelligence requires a commons of collective representations and memory accessible to the network, and so digital representations on the internet are idea
    • Ferananda Ibarra
       
      That is exactly what they can do! Currencies as currents, as symbols of value enabling and making flows visible. Allowing us to see the tracks of the pheromones, the activities, the streams, the right signals, the hubs. We will be able to measure, trace value much more precisely. We will then be able to compose flows into landscapes (scapes) of that which is interesting for a node, for a hub, for a group or machine. Scapes will allow us to display information in unimaginable ways. Our collective intelligence right there, in the blink of an eye. We will be able to see wholes instead of parts, make patterns more visible.
  • You can imagine this on an individual level: a person using their mobile phone to remember the phone numbers of their friends. With easy access and reliability, the phone almost seems part of your intelligence. Just extend this so that the part of your mind that is extended into the environment is accessible and even modifiable by other people, and collective intelligence begins.
  • This use of the environment to store collective intelligence allows for the easier creation of hubs.
  • Collective intelligence allows highly organised successful actions to be performed by individuals who, with limited memory and knowledge, would otherwise be unable to become hubs.
  • Unfortunately people can’t become hubs without largely re-inventing the wheel. It might be irritating for existing hubs, but it’s true. Being a hub requires more than just introductions, it requires information, skills, knowledge, and a memory of the past. However, we can accelerate this process by decentring as much of the connections and knowledge as possible away from individual humans and onto the environment, whether this environment be books, websites, songs, maps, videos, and a myriad of yet un-thought-of representational forms. A useful example is the pheromone trace of the ant, reinforced as more ants use a particular trail. The mere act of ‘leaving a trail’ shows how individuals with limited memory can use the shaping of the environment as an external memory.
  • A key focus for improving our collective intelligence would be a few central websites compiling analyses of social movements and events, alongside practical pieces from key hubs and organisers on how particular events were pulled off. A collective ratings approach would allow people to quickly find needles in the electronic haystack, via Digg-It-style ‘I like this article’ tags, or collaborative bookmarking, allowing different users to see each other’s bookmarked webpages. Of course some of these types of things exist, with tagging systems well developed on sites of magazines, newspapers and blogs. However, no current website performs the function of an analysis and learning hub
  • If we are to act swiftly and sustain momentum we will need to create collective intelligence – the ability to create accurate records of events, distribute them widely, analyse success and failure, and to pass on skills and knowledge.
Gonzalo San Gil, PhD.

How to Debug Your Brain and Build Better Habits - 0 views

  •  
    "Wouldn't it be great if you could debug your brain as though it were bad code? We might not be able to reprogram ourselves, but we can use the principles of debugging to help ourselves build better habits. Here's how to debug your brain." [# ! #OpenSource Your #Mind... # ! #Free Your #Life]
  •  
    "Wouldn't it be great if you could debug your brain as though it were bad code? We might not be able to reprogram ourselves, but we can use the principles of debugging to help ourselves build better habits. Here's how to debug your brain."
Gonzalo San Gil, PhD.

How to use open source in the classroom | Opensource.com - 0 views

  •  
    # ! The #sooner the #better # ! … #society #learns #Openness. # ! #Get #IT, #Share it, #Enjoy it. [Lobbying for open source and Linux in schools Posted 15 Sep 2014 by EmielBrok school supplies for back to school ] "About eight years ago, I started lobbying to bring more Linux and open source software to high schools and higher IT vocational institutions in the Netherlands and Belgium. Here's how I did it and what you can learn from it to do the same where you live."
  •  
    [Lobbying for open source and Linux in schools Posted 15 Sep 2014 by EmielBrok school supplies for back to school ] "About eight years ago, I started lobbying to bring more Linux and open source software to high schools and higher IT vocational institutions in the Netherlands and Belgium. Here's how I did it and what you can learn from it to do the same where you live."
my serendipities

Group Intelligence, Enhancement, and Extended Minds - 3 views

  • What, then, determines how smart a group of collaborating individuals is? The researchers find three individual-level features that correlate in a statistically significant way to collective intelligence.
  • First, the greater the social sensitivity of group members, the smarter the group. Second, the more turn-taking within the group, the better the group performs. And third, the more women in the group, the higher the group IQ.
  • groups with more women are smarter because women tend to be more socially sensitive than men.
  • ...7 more annotations...
  • increasing the information-sharing abilities of group members using “electronic collaborative tools” might enhance the intelligence of the group itself (without necessarily increasing the intelligence of individual group members).
  • increasing the raw intelligence of individual group members cannot guarantee a smarter group. A group of cognitively enhanced individuals with extremely high IQs (because of their enhancement) thus might fail to outperform a group of “normals” if those “normals” prove to be more socially sensitive than their enhanced rivals.
  • the central component of the extended mind thesis is called the Parity Principle. It states that “if, as we confront some task, a part of the world functions as a process which, were it to go on in the head, we would have no hesitation in accepting as part of the cognitive process, then that part of the world is (for that time) part of the cognitive process.”
  • Thus, according to the Parity Principle, inanimate objects like a pad of paper, a calculator, a computer, Wikipedia, an iPhone, and so on, can all, under just the right conditions, constitute a literal component of one’s cognitive system – of one’s mind.
  • another mind can indeed become a feature of one’s own cognitive system (on the condition that the Parity Principle is true
  • Our minds are made in such a way that trauma, and negative experience is slowly buried up, or forgotten. Our minds do seem designed with self preservation measures to try and protect our psyche. Now with a memory that is always accurate, and that is always accessible, what will that do to our minds? My concern is what our limitations add to our selves. I am unsure of what the world would be like if I didn't forget things. There are somethings we choose to forget, or ignore, or believe despite the evidence. Our emotions do seem somewhat disconnected from our experiences, especially as time goes on. Stockholm Syndrome is a wonderful example, despite the worst possible conditions a loyalty and an affection grows between a captor and their captive.
  • With the ability to share memories, or worse, to forcibly access others memories, this wonderful world enhancement will help us build, may be utterly devoid of privacy. A world where nothing is sacred, except knowledge, and that you may no longer own your own life. Simply, everyone's life, everyone's knowledge and everyone's experiences, may simply become public domain.
  •  
    Hmmm... I enjoyed this article. My experience of the extended mind is that it is not enclosed in a groups collective intelligence but part of the morphogenic field. Our global brain. We can access any time. There is one piece he mentions about: But there's also the more speculative possibility, not mentioned by Woolley et al, of enhancing the social sensitivity of group members. What would happen if group members took, for instance, a pharmaceutical of some sort that enabled them to be more socially sensitive towards each other? What if some sophisticated technology were available that augmented the individual's ability to better listen to the ideas of others - to let others have time to speak and to be intellectually open to opposing views? I began to test this in group settings with a good amount of success. It is difficult to measure though. I have tested with flower essences. http://www.laviedelarose.com one particular called shasta daisy which supports individuals and groups to achieve an ever deepening sense of community and experience of Oneness. My seminars are mostly about mind (topics like socialmedia, collective intelligence, new economy) yet I try to make them integral and include other body/mind, spirit. We do meditate. In the seminars where I don´t use the flowers there is a different feeling to it. Its very difficult to describe. Its a sense of a field.
Gonzalo San Gil, PhD.

How to master the Linux terminal with core commands | TechRadar - 0 views

  •  
    "By Linux Format How To Discover the core commands for file and text handling and networking"
  •  
    "By Linux Format How To Discover the core commands for file and text handling and networking"
Gonzalo San Gil, PhD.

Why you should avoid 'vanity metrics' and measure what matters | Opensource.com - 0 views

  •  
    "Metrics. Measures. How high? How low? How fast? How slow? Ever since the dawn of humankind, we've had an innate and insatiable desire to measure and compare. We started with the Egyptian cubit and the Mediterranean traders' grain in the 3rd millennium BC. Today we have clicks per second, likes, app downloads, stars, and a zillion other ways to measure what we do. "
Amira .

Collective Intelligence: The Need for Synthesis by Kingsley Dennis | Between Both Worlds - 1 views

  • To upgrade our thinking patterns is a beginning step to an upgrade in human consciousness, and is necessary if we are to succeed in adapting to our rapidly and inevitably changing world. In other words, if we don’t enact a change, or learn to adapt to the incoming energies of change and transformation, our presence is likely to be no longer required, or needed. It is a sobering thought. The human species has entered a period of profound, fundamental, and unprecedented change. It needs to acquire new skills in order to co-exist with an environment that is itself undergoing profound change within the larger fabric of living systems - planetary, solar, and galactic. We need to upgrade our capacities in order to have the internal resistance to an upgrade in energies. Not to do so may result, quite literally, in us blowing a species-fuse! Whichever way we look at it, we are in need of preparation. If we are not prepared, that which manifests as truth may very well seem like science-fiction. And it needs to be stressed that our future depends to a large degree upon the ability to renew our perceptions about the world. It is a question of how our inner vision can be brought in balance with (and in support to) the impacts of a changing environment. If there is enough ‘critical mass’ of mind-change then there is a better possibility that shifting energies will be experienced less chaotically. Evolutionary biologist Elizabeth Sahtouris expresses the same sentiment when she writes
Gonzalo San Gil, PhD.

Linux Security Guide (extended version) - Linux Audit - 0 views

  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
Gonzalo San Gil, PhD.

How do I pick an open source license for my project? | Opensource.com - 0 views

  •  
    "Ask Safia is the place to go for answers to your open source community-related questions. Whether you are nervous about submitting your first pull request to a project, or wondering how to write effective bug reports, Safia is here to help with practical, detailed, beginner-friendly answers. So what are you waiting for? Ask Safia."
  •  
    "Ask Safia is the place to go for answers to your open source community-related questions. Whether you are nervous about submitting your first pull request to a project, or wondering how to write effective bug reports, Safia is here to help with practical, detailed, beginner-friendly answers. So what are you waiting for? Ask Safia."
Gonzalo San Gil, PhD.

How to Choose the Best Laptop to Install Linux - 0 views

  •  
    " If you want to break away from the yoke of Microsoft, you have to be a savvy hardware shopper. Here's how to find the perfect Linux laptop."
  •  
    " If you want to break away from the yoke of Microsoft, you have to be a savvy hardware shopper. Here's how to find the perfect Linux laptop."
Gonzalo San Gil, PhD.

5 signs your Web application has been hacked | ITworld - 0 views

  •  
    "hacked FREE Become An Insider Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more. Other Insider Recommendations Java 101 primer: Composition and inheritance 6 simple tricks for protecting your passwords Free course: "JavaScript: The Good Parts" Free Course: The Dark Side of Technology Careers Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all"
  •  
    "hacked FREE Become An Insider Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more. Other Insider Recommendations Java 101 primer: Composition and inheritance 6 simple tricks for protecting your passwords Free course: "JavaScript: The Good Parts" Free Course: The Dark Side of Technology Careers Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all"
Gonzalo San Gil, PhD.

How to Install Linux on a Windows Machine With UEFI Secure Boot | Linux.com | The sourc... - 0 views

  •  
    "This BIOS replacement, UEFI, caused some serious problems with "alternative" platforms. For some time, it was thought UEFI would render Linux uninstallable on any system certified for Windows 8 and up. Eventually Microsoft saw fit to require vendors to include a switch that allowed users to disable UEFI, so that their favorite Linux distribution could be installed. And then some Linux distributions set out to fully support Secure Boot (Red Hat, Ubuntu, SUSE, to name a few). "
  •  
    "This BIOS replacement, UEFI, caused some serious problems with "alternative" platforms. For some time, it was thought UEFI would render Linux uninstallable on any system certified for Windows 8 and up. Eventually Microsoft saw fit to require vendors to include a switch that allowed users to disable UEFI, so that their favorite Linux distribution could be installed. And then some Linux distributions set out to fully support Secure Boot (Red Hat, Ubuntu, SUSE, to name a few). "
Gonzalo San Gil, PhD.

The Intellectual Yet Idiot - Medium - 1 views

  •  
    "Nassim Nicholas Taleb What we have been seeing worldwide, from India to the UK to the US, is the rebellion against the inner circle of no-skin-in-the-game policymaking "clerks" and journalists-insiders, that class of paternalistic semi-intellectual experts with some Ivy league, Oxford-Cambridge, or similar label-driven education who are telling the rest of us 1) what to do, 2) what to eat, 3) how to speak, 4) how to think… and 5) who to vote for."
Gonzalo San Gil, PhD.

[#Tech:]How to change LCD brightness from command line (or via script)? - Ask Ubuntu - 0 views

  •  
    " 80 down vote favorite 43 To work around bug #1005495 (changing LCD brightness via hotkeys impossible), I'd like to have one command line query for increasing and one for reducing the brightness of my LCD. I could then map a hotkey to each one of this queries. The problem is: I don't know how to increase and reduce the LCD brightness on the command line. Do you?"
Gonzalo San Gil, PhD.

Top 4 open source bug trackers | Opensource.com - 0 views

  •  
    "Life is full of bugs. No matter how carefully planned, no matter how much time went into design, any project is going to have unforseen issues when the rubber hits the road in the implementation stage. And that's okay. Perhaps the best measure of resiliency for any organization is not how well they handle things when everything is functioning as planned, but rather, how they handle the speed bumps when they come along"
Gonzalo San Gil, PhD.

Top open source tutorials in 2014 | Opensource.com - 0 views

  •  
    "How did you learn how to use open source software? Chances are, you grabbed a Linux live CD or live USB. Maybe you got your hands on the installation package for an interesting piece of software. Then you experimented. You reveled in making mistakes, learned from them, and then repeated the cycle again."
  •  
    "How did you learn how to use open source software? Chances are, you grabbed a Linux live CD or live USB. Maybe you got your hands on the installation package for an interesting piece of software. Then you experimented. You reveled in making mistakes, learned from them, and then repeated the cycle again."
1 - 20 of 147 Next › Last »
Showing 20 items per page