Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged access

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

U.S. Congress must act on government hacking, reject Rule 41 - Access Now - 0 views

  •  
    "Washington D.C. - Access Now today calls upon the U.S. Congress to reject a new rule that will expand the Federal Bureau of Investigation's (FBI) hacking operations. The call comes as the Supreme Court of the United States reported a change in the Federal Rules of Criminal Procedure, specifically Rule 41, to Congress. The change enables the FBI to hack into computers regardless of where they are located, and to hack into the computers belonging to the victims of botnet operations. Access Now strongly opposes the update to Rule 41."
  •  
    "Washington D.C. - Access Now today calls upon the U.S. Congress to reject a new rule that will expand the Federal Bureau of Investigation's (FBI) hacking operations. The call comes as the Supreme Court of the United States reported a change in the Federal Rules of Criminal Procedure, specifically Rule 41, to Congress. The change enables the FBI to hack into computers regardless of where they are located, and to hack into the computers belonging to the victims of botnet operations. Access Now strongly opposes the update to Rule 41."
Gonzalo San Gil, PhD.

Social and political movements related to the P2P (participatory), open (open access to... - 1 views

  •  
    [A directory of social and political movements related to the P2P (participatory), open (open access to knowledge), and 'commons' paradigms. Please read: Mapping a Coalition for the Commons. By Philippe Aigrain.]
Gonzalo San Gil, PhD.

Tools To Password Protect Folder In Linux - LinuxAndUbuntu - 0 views

  •  
    "Most of the time, having a password protected user is all you need to keep your files private and protected from prying eyes. There are those few times when you need to allow access to your account to another person, sometimes there are folders or files you would like to keep away from being accessed. Now we can password protect folder with several handy tools. In the Windows world, these tools are quite easily available for Windows but today we will look at a few options available for the Linux user."
  •  
    "Most of the time, having a password protected user is all you need to keep your files private and protected from prying eyes. There are those few times when you need to allow access to your account to another person, sometimes there are folders or files you would like to keep away from being accessed. Now we can password protect folder with several handy tools. In the Windows world, these tools are quite easily available for Windows but today we will look at a few options available for the Linux user."
Gonzalo San Gil, PhD.

To Make Open Access Work, We Need to Do More Than Liberate Journal Articles | Wired Opi... - 3 views

  •  
    [In the days since the tragedy of Aaron Swartz's suicide, many academics have been posting open-access PDFs of their research. It's an act of solidarity with Swartz's crusade to liberate (in most cases publicly funded) knowledge for all to read. ...]
  •  
    *Collective Intelligence" ~ Open Knowledge
Gonzalo San Gil, PhD.

Standards Body Whines That People Who Want Free Access To The Law Probably Also Want 'F... - 0 views

  •  
    "from the bad-ansi,-bad dept You would think that "the law" is obviously part of the public domain. It seems particularly crazy to think that any part of the law itself might be covered by copyright, or (worse) locked up behind some sort of paywall where you cannot read it. Carl Malamud has spent many years working to make sure the law is freely accessible... and he's been sued a bunch of times and is still in the middle of many lawsuits, including one from the State of Georgia for publishing its official annotated code (the state claims the annotations are covered by copyright)."
Gonzalo San Gil, PhD.

Social and political movements related to the P2P (participatory), open (open access to... - 5 views

  •  
    [A directory of social and political movements related to the P2P (participatory), open (open access to knowledge), and 'commons' paradigms. ...]
  •  
    This looks interesting, but when I click the link I just get a jpg image.... Is that what you intended? or is there supposed to be a webpage attached? Thanks. --Richard
Gonzalo San Gil, PhD.

Linux Process Table Tutorial | Linux Servers and Security Howtos - Chris Binnie - 0 views

  •  
    A fundamental design feature of Unix-like Operating Systems is that many of a system's resources are accessible via the filesystem, as a file. For example the "procfs" pseudo-filesystem offers us access to all kinds of valuable treasures.
Gonzalo San Gil, PhD.

Section 1201 of the DMCA Cannot Pass Constitutional Scrutiny | Electronic Frontier Foun... - 0 views

  •  
    "Section 1201 of the Digital Millennium Copyright Act forbids a wide range of speech, from remix videos that rely upon circumvention, to academic security research, to publication of software that can help repair your car or back up your favorite show. It potentially implicates the entire range of speech that relies on access to copyrighted works or describes flaws in access controls-even where that speech is clearly noninfringing."
Gonzalo San Gil, PhD.

Institute for Responsible Technology - GMO Myths and Truths report - 0 views

  •  
    "Executive Summary GMO Myths and Truths report Genetically modified (GM) crops are promoted on the basis of a range of far-reaching claims from the GM crop industry and its supporters. They say that GM crops: Are an extension of natural breeding and do not pose different risks from naturally bred crops Are safe to eat and can be more nutritious than naturally bred crops Are strictly regulated for safety Increase crop yields Reduce pesticide use Benefit farmers and make their lives easier Bring economic benefits Benefit the environment Can help solve problems caused by climate change Reduce energy use Will help feed the world. However, a large and growing body of scientific and other authoritative evidence shows that these claims are not true. On the contrary, evidence presented in this report indicates that GM crops: Are laboratory-made, using technology that is totally different from natural breeding methods, and pose different risks from non-GM crops Can be toxic, allergenic or less nutritious than their natural counterparts Are not adequately regulated to ensure safety Do not increase yield potential Do not reduce pesticide use but increase it Create serious problems for farmers, including herbicide-tolerant "superweeds", compromised soil quality, and increased disease susceptibility in crops Have mixed economic effects Harm soil quality, disrupt ecosystems, and reduce biodiversity Do not offer effective solutions to climate change Are as energy-hungry as any other chemically-farmed crops Cannot solve the problem of world hunger but distract from its real causes - poverty, lack of access to food and, increasingly, lack of access to land to grow it on. Based on the evidence presented in this report, there is no need to take risks with GM crops when effective, readily available, and sustainable solutions to the problems that GM technology is claimed to address already
Gonzalo San Gil, PhD.

5 benefits of using revision control in political groups | Opensource.com - 0 views

  •  
    "... The principles that drive the open source movement are principles that concern everything from the right to share, to a coherent view on privacy; from the right of access to explore and modify work under the hood, to a belief in the power of openness and collaboration; and principles such as a belief in commons, in altruism, and in free access to education and information. ..."
Gonzalo San Gil, PhD.

To ensure security and privacy, open source software is required - 0 views

  •  
    "Having access to the source code is an undeniable benefit in ensuring the security of a piece of software"
  •  
    "Having access to the source code is an undeniable benefit in ensuring the security of a piece of software"
Gonzalo San Gil, PhD.

Library of Congress Might Become a Piracy Hub, RIAA Warns - TorrentFreak [# ! Note...] - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! RIAAvsLibraries... # ! What's Next...? # ! :(
  •  
    Ernesto on August 27, 2016 C: 78 News The U.S. Copyright Office is considering expanding the mandatory deposit requirement for publishers, so that record labels would also have to submit their online-only music to the Library of Congress. The Library would then allow the public to access the music. The RIAA, however, warns that this plan introduces some serious piracy concerns.
  •  
    Ernesto on August 27, 2016 C: 78 News The U.S. Copyright Office is considering expanding the mandatory deposit requirement for publishers, so that record labels would also have to submit their online-only music to the Library of Congress. The Library would then allow the public to access the music. The RIAA, however, warns that this plan introduces some serious piracy concerns.
Gonzalo San Gil, PhD.

How to access your Google Drive account from Linux command line using Gdrive - 0 views

  •  
    "While Google Drive is no doubt one of the most popular (if not the most popular) cloud storage services available today, what's really sad is that there is no official Drive client available for Linux. But that doesn't mean there are no alternatives - in fact the awesome Linux/open-source community has developed several unofficial Google Drive clients, some of which we've already discussed here at HowtoForge."
  •  
    "While Google Drive is no doubt one of the most popular (if not the most popular) cloud storage services available today, what's really sad is that there is no official Drive client available for Linux. But that doesn't mean there are no alternatives - in fact the awesome Linux/open-source community has developed several unofficial Google Drive clients, some of which we've already discussed here at HowtoForge."
Gonzalo San Gil, PhD.

The Internet Without Connection, Free Endless OS For Emerging Markets - Forbes - 0 views

  •  
    " There are four billion people on the planet without PCs or access to affordable personal computers. That figure should surely be tempered with some contextualization i.e. not everybody actually wants to have an Internet connection and many traditional, native or bucolic ways of live do still exist on the planet"
  •  
    " There are four billion people on the planet without PCs or access to affordable personal computers. That figure should surely be tempered with some contextualization i.e. not everybody actually wants to have an Internet connection and many traditional, native or bucolic ways of live do still exist on the planet"
Gonzalo San Gil, PhD.

7 Tools to Encrypt/Decrypt and Password Protect Files in Linux - 0 views

  •  
    "Encryption is the process of encoding files in such a way that only those who are authorized can access it. Mankind is using encryption from ages even when computers were not in existence. During war they would pass some kind of message that only their tribe or those who are concerned were able to understand."
  •  
    "Encryption is the process of encoding files in such a way that only those who are authorized can access it. Mankind is using encryption from ages even when computers were not in existence. During war they would pass some kind of message that only their tribe or those who are concerned were able to understand."
my serendipities

Group Intelligence, Enhancement, and Extended Minds - 3 views

  • What, then, determines how smart a group of collaborating individuals is? The researchers find three individual-level features that correlate in a statistically significant way to collective intelligence.
  • First, the greater the social sensitivity of group members, the smarter the group. Second, the more turn-taking within the group, the better the group performs. And third, the more women in the group, the higher the group IQ.
  • groups with more women are smarter because women tend to be more socially sensitive than men.
  • ...7 more annotations...
  • increasing the information-sharing abilities of group members using ā€œelectronic collaborative toolsā€ might enhance the intelligence of the group itself (without necessarily increasing the intelligence of individual group members).
  • increasing the raw intelligence of individual group members cannot guarantee a smarter group. A group of cognitively enhanced individuals with extremely high IQs (because of their enhancement) thus might fail to outperform a group of ā€œnormalsā€ if those ā€œnormalsā€ prove to be more socially sensitive than their enhanced rivals.
  • the central component of the extended mind thesis is called the Parity Principle. It states that ā€œif, as we confront some task, a part of the world functions as a process which, were it to go on in the head, we would have no hesitation in accepting as part of the cognitive process, then that part of the world is (for that time) part of the cognitive process.ā€
  • Thus, according to the Parity Principle, inanimate objects like a pad of paper, a calculator, a computer, Wikipedia, an iPhone, and so on, can all, under just the right conditions, constitute a literal component of one’s cognitive system – of one’s mind.
  • another mind can indeed become a feature of one’s own cognitive system (on the condition that the Parity Principle is true
  • Our minds are made in such a way that trauma, and negative experience is slowly buried up, or forgotten. Our minds do seem designed with self preservation measures to try and protect our psyche. Now with a memory that is always accurate, and that is always accessible, what will that do to our minds? My concern is what our limitations add to our selves. I am unsure of what the world would be like if I didn't forget things. There are somethings we choose to forget, or ignore, or believe despite the evidence. Our emotions do seem somewhat disconnected from our experiences, especially as time goes on. Stockholm Syndrome is a wonderful example, despite the worst possible conditions a loyalty and an affection grows between a captor and their captive.
  • With the ability to share memories, or worse, to forcibly access others memories, this wonderful world enhancement will help us build, may be utterly devoid of privacy. A world where nothing is sacred, except knowledge, and that you may no longer own your own life. Simply, everyone's life, everyone's knowledge and everyone's experiences, may simply become public domain.
  •  
    Hmmm... I enjoyed this article. My experience of the extended mind is that it is not enclosed in a groups collective intelligence but part of the morphogenic field. Our global brain. We can access any time. There is one piece he mentions about: But there's also the more speculative possibility, not mentioned by Woolley et al, of enhancing the social sensitivity of group members. What would happen if group members took, for instance, a pharmaceutical of some sort that enabled them to be more socially sensitive towards each other? What if some sophisticated technology were available that augmented the individual's ability to better listen to the ideas of others - to let others have time to speak and to be intellectually open to opposing views? I began to test this in group settings with a good amount of success. It is difficult to measure though. I have tested with flower essences. http://www.laviedelarose.com one particular called shasta daisy which supports individuals and groups to achieve an ever deepening sense of community and experience of Oneness. My seminars are mostly about mind (topics like socialmedia, collective intelligence, new economy) yet I try to make them integral and include other body/mind, spirit. We do meditate. In the seminars where I don“t use the flowers there is a different feeling to it. Its very difficult to describe. Its a sense of a field.
Ferananda Ibarra

Network organisation for the 21st century : turbulence - 4 views

  • On the Virtues of Being Popular In any network, some nodes are more connected than others, making them ā€˜hubs’. This is a recurring pattern in the evolution of successful networks, ranging from the world wide web to many natural ecosystems. A ā€˜hub’ is not just a node with a few more connections than a usual node; a hub has connections to many other nodes – many quite distant – and also connects many disparate nodes (nodes of very different types). If you were to count all the connections each node has, you would get a mathematical distribution called a ā€˜power-law’ distribution with relatively few hyper-connected nodes – hubs – and a ā€˜long tail’ of less connected nodes.
  • Unlike networks that have a normal or random distribution of connections, networks that have a power-law distribution of connections are ā€˜scale-free,’ which means that no matter how many more nodes are added to the network, the dynamics and structure remain the same. This seems to be a sweet spot in the evolution of networks for stability and efficiency. The network can get bigger without drastic changes to its function.
  • The Surprising Strength of the Long Tail There is a looming contradiction: how can we have hubs and still have a strong network of dense connections that is not dependent on them? Don’t hubs lead to the emergence of permanent, entrenched leaders, centralisation and other well-documented problems? There is something of a tension here: the point is not simply that we should develop hubs, but that we have to simultaneously ensure that the hubs are never allowed to become static, and that they’re at least partially redundant. Sounds complicated, but healthy and resilient networks aren’t characterised simply by the presence of hubs, but also by the ability of hubs to change over time, and the replacement of previous hubs by apparently quite similar hubs.
  • ...10 more annotations...
  • The long tail does not drop off into nothingness (which would be the ā€˜exponential’ rather than ā€˜power-law’ distribution), where there are a few hubs and every other node has almost no connections. Instead, the long tail is extensive, consisting of small groups of dense connections, going ever onwards. In fact, the vast majority of the connections in the network are not in the hub, but in the long tail. One clear example is that of book-selling in the 21st century: the majority of Amazon.com’s book sales are not in the best-seller list, but in those millions of titles in the long tail that only a few people order. Every successful movement must be built on dense local connections. It is these dense local connections that support the dynamic creation of hubs.
  • In a perfect world, every node would be a hub – we would all easily connect with any other person and be able to communicate. However, creating connections takes time and energy, so nodes that are more long-standing or just have more spare time will naturally become hubs
  • The Construction of Collective Intelligence Hubs tend to evolve naturally in well-functioning networks – but we can accelerate the process of network development
  • Unfortunately people can’t become hubs without largely re-inventing the wheel. It might be irritating for existing hubs, but it’s true. Being a hub requires more than just introductions, it requires information, skills, knowledge, and a memory of the past. However, we can accelerate this process by decentring as much of the connections and knowledge as possible away from individual humans and onto the environment, whether this environment be books, websites, songs, maps, videos, and a myriad of yet un-thought-of representational forms. A useful example is the pheromone trace of the ant, reinforced as more ants use a particular trail. The mere act of ā€˜leaving a trail’ shows how individuals with limited memory can use the shaping of the environment as an external memory.
  • You can imagine this on an individual level: a person using their mobile phone to remember the phone numbers of their friends. With easy access and reliability, the phone almost seems part of your intelligence. Just extend this so that the part of your mind that is extended into the environment is accessible and even modifiable by other people, and collective intelligence begins.
  • This use of the environment to store collective intelligence allows for the easier creation of hubs.
  • Collective intelligence allows highly organised successful actions to be performed by individuals who, with limited memory and knowledge, would otherwise be unable to become hubs.
  • Collective intelligence requires a commons of collective representations and memory accessible to the network, and so digital representations on the internet are idea
    • Ferananda Ibarra
       
      That is exactly what they can do! Currencies as currents, as symbols of value enabling and making flows visible. Allowing us to see the tracks of the pheromones, the activities, the streams, the right signals, the hubs. We will be able to measure, trace value much more precisely. We will then be able to compose flows into landscapes (scapes) of that which is interesting for a node, for a hub, for a group or machine. Scapes will allow us to display information in unimaginable ways. Our collective intelligence right there, in the blink of an eye. We will be able to see wholes instead of parts, make patterns more visible.
  • A key focus for improving our collective intelligence would be a few central websites compiling analyses of social movements and events, alongside practical pieces from key hubs and organisers on how particular events were pulled off. A collective ratings approach would allow people to quickly find needles in the electronic haystack, via Digg-It-style ā€˜I like this article’ tags, or collaborative bookmarking, allowing different users to see each other’s bookmarked webpages. Of course some of these types of things exist, with tagging systems well developed on sites of magazines, newspapers and blogs. However, no current website performs the function of an analysis and learning hub
  • If we are to act swiftly and sustain momentum we will need to create collective intelligence – the ability to create accurate records of events, distribute them widely, analyse success and failure, and to pass on skills and knowledge.
Gonzalo San Gil, PhD.

Apple Music Didn't Kill Spotify. Amazon's New Streaming Service Won't, Either. | Katie ... - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! .... and none of them killed piracy... # ! like 'piracy' (#sharing)... That hasn't 'killed the music', # ! either. # ! Industry, please:Quit Th e Drama # ! (That You, like Media, like so much), # ! Start fair (Culture-Respecting) businesses... # ! And Go On. [# ! Via Katie Carroll @ LinkedIn https://uk.linkedin.com/in/kredcarroll]
  •  
    "Amazon is working on a 'Spotify killer'. Sound familiar? Apple Music was hailed as such by basically everyone. Google's All Access was called the same, back in 2013. Even Tidal got the label. And now it's Amazon's turn. As first "
  •  
    "Amazon is working on a 'Spotify killer'. Sound familiar? Apple Music was hailed as such by basically everyone. Google's All Access was called the same, back in 2013. Even Tidal got the label. And now it's Amazon's turn. As first "
Gonzalo San Gil, PhD.

5 signs your Web application has been hacked | ITworld - 0 views

  •  
    "hacked FREE Become An Insider Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more. Other Insider Recommendations Java 101 primer: Composition and inheritance 6 simple tricks for protecting your passwords Free course: "JavaScript: The Good Parts" Free Course: The Dark Side of Technology Careers Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all"
  •  
    "hacked FREE Become An Insider Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more. Other Insider Recommendations Java 101 primer: Composition and inheritance 6 simple tricks for protecting your passwords Free course: "JavaScript: The Good Parts" Free Course: The Dark Side of Technology Careers Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all"
Gonzalo San Gil, PhD.

What is free software? - GNU Project - Free Software Foundation [# ! The Four Freedoms]... - 0 views

  •  
    [0 -Run 1 - (See, access source) Study 2 - redistribute copies 3 - redistribute YOUR MODIFIED copies] "The Free Software Definition The free software definition presents the criteria for whether a particular software program qualifies as free software. From time to time we revise this definition, to clarify it or to resolve questions about subtle issues. See the History section below for a list of changes that affect the definition of free software. "
1 - 20 of 51 Next › Last »
Showing 20 items per page