Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged allowing

Rss Feed Group items tagged

Ferananda Ibarra

Network organisation for the 21st century : turbulence - 4 views

  • On the Virtues of Being Popular In any network, some nodes are more connected than others, making them ‘hubs’. This is a recurring pattern in the evolution of successful networks, ranging from the world wide web to many natural ecosystems. A ‘hub’ is not just a node with a few more connections than a usual node; a hub has connections to many other nodes – many quite distant – and also connects many disparate nodes (nodes of very different types). If you were to count all the connections each node has, you would get a mathematical distribution called a ‘power-law’ distribution with relatively few hyper-connected nodes – hubs – and a ‘long tail’ of less connected nodes.
  • Unlike networks that have a normal or random distribution of connections, networks that have a power-law distribution of connections are ‘scale-free,’ which means that no matter how many more nodes are added to the network, the dynamics and structure remain the same. This seems to be a sweet spot in the evolution of networks for stability and efficiency. The network can get bigger without drastic changes to its function.
  • The Surprising Strength of the Long Tail There is a looming contradiction: how can we have hubs and still have a strong network of dense connections that is not dependent on them? Don’t hubs lead to the emergence of permanent, entrenched leaders, centralisation and other well-documented problems? There is something of a tension here: the point is not simply that we should develop hubs, but that we have to simultaneously ensure that the hubs are never allowed to become static, and that they’re at least partially redundant. Sounds complicated, but healthy and resilient networks aren’t characterised simply by the presence of hubs, but also by the ability of hubs to change over time, and the replacement of previous hubs by apparently quite similar hubs.
  • ...10 more annotations...
  • The long tail does not drop off into nothingness (which would be the ‘exponential’ rather than ‘power-law’ distribution), where there are a few hubs and every other node has almost no connections. Instead, the long tail is extensive, consisting of small groups of dense connections, going ever onwards. In fact, the vast majority of the connections in the network are not in the hub, but in the long tail. One clear example is that of book-selling in the 21st century: the majority of Amazon.com’s book sales are not in the best-seller list, but in those millions of titles in the long tail that only a few people order. Every successful movement must be built on dense local connections. It is these dense local connections that support the dynamic creation of hubs.
  • In a perfect world, every node would be a hub – we would all easily connect with any other person and be able to communicate. However, creating connections takes time and energy, so nodes that are more long-standing or just have more spare time will naturally become hubs
  • The Construction of Collective Intelligence Hubs tend to evolve naturally in well-functioning networks – but we can accelerate the process of network development
  • Collective intelligence requires a commons of collective representations and memory accessible to the network, and so digital representations on the internet are idea
    • Ferananda Ibarra
       
      That is exactly what they can do! Currencies as currents, as symbols of value enabling and making flows visible. Allowing us to see the tracks of the pheromones, the activities, the streams, the right signals, the hubs. We will be able to measure, trace value much more precisely. We will then be able to compose flows into landscapes (scapes) of that which is interesting for a node, for a hub, for a group or machine. Scapes will allow us to display information in unimaginable ways. Our collective intelligence right there, in the blink of an eye. We will be able to see wholes instead of parts, make patterns more visible.
  • You can imagine this on an individual level: a person using their mobile phone to remember the phone numbers of their friends. With easy access and reliability, the phone almost seems part of your intelligence. Just extend this so that the part of your mind that is extended into the environment is accessible and even modifiable by other people, and collective intelligence begins.
  • This use of the environment to store collective intelligence allows for the easier creation of hubs.
  • Collective intelligence allows highly organised successful actions to be performed by individuals who, with limited memory and knowledge, would otherwise be unable to become hubs.
  • Unfortunately people can’t become hubs without largely re-inventing the wheel. It might be irritating for existing hubs, but it’s true. Being a hub requires more than just introductions, it requires information, skills, knowledge, and a memory of the past. However, we can accelerate this process by decentring as much of the connections and knowledge as possible away from individual humans and onto the environment, whether this environment be books, websites, songs, maps, videos, and a myriad of yet un-thought-of representational forms. A useful example is the pheromone trace of the ant, reinforced as more ants use a particular trail. The mere act of ‘leaving a trail’ shows how individuals with limited memory can use the shaping of the environment as an external memory.
  • A key focus for improving our collective intelligence would be a few central websites compiling analyses of social movements and events, alongside practical pieces from key hubs and organisers on how particular events were pulled off. A collective ratings approach would allow people to quickly find needles in the electronic haystack, via Digg-It-style ‘I like this article’ tags, or collaborative bookmarking, allowing different users to see each other’s bookmarked webpages. Of course some of these types of things exist, with tagging systems well developed on sites of magazines, newspapers and blogs. However, no current website performs the function of an analysis and learning hub
  • If we are to act swiftly and sustain momentum we will need to create collective intelligence – the ability to create accurate records of events, distribute them widely, analyse success and failure, and to pass on skills and knowledge.
Gonzalo San Gil, PhD.

Copyleft - Wikipedia [Stallman, The GNU Manifesto 1995] - 0 views

  •  
    "An early use of the word "copyleft" was in Tiny Basic's distribution notice "@COPYLEFT ALL WRONGS RESERVED", however, Tiny Basic was not distributed under any form of copyleft distribution terms so the wordplay is the only similarity. The concept of copyleft was described in Richard Stallman's GNU Manifesto in 1983 where he wrote: GNU is not in the public domain. Everyone will be permitted to modify and redistribute GNU, but no distributor will be allowed to restrict its further redistribution. That is to say, proprietary modifications will not be allowed. I want to make sure that all versions of GNU remain free."
  •  
    "An early use of the word "copyleft" was in Tiny Basic's distribution notice "@COPYLEFT ALL WRONGS RESERVED", however, Tiny Basic was not distributed under any form of copyleft distribution terms so the wordplay is the only similarity. The concept of copyleft was described in Richard Stallman's GNU Manifesto in 1983 where he wrote: GNU is not in the public domain. Everyone will be permitted to modify and redistribute GNU, but no distributor will be allowed to restrict its further redistribution. That is to say, proprietary modifications will not be allowed. I want to make sure that all versions of GNU remain free."
Gonzalo San Gil, PhD.

Library of Congress Might Become a Piracy Hub, RIAA Warns - TorrentFreak [# ! Note...] - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! RIAAvsLibraries... # ! What's Next...? # ! :(
  •  
    Ernesto on August 27, 2016 C: 78 News The U.S. Copyright Office is considering expanding the mandatory deposit requirement for publishers, so that record labels would also have to submit their online-only music to the Library of Congress. The Library would then allow the public to access the music. The RIAA, however, warns that this plan introduces some serious piracy concerns.
  •  
    Ernesto on August 27, 2016 C: 78 News The U.S. Copyright Office is considering expanding the mandatory deposit requirement for publishers, so that record labels would also have to submit their online-only music to the Library of Congress. The Library would then allow the public to access the music. The RIAA, however, warns that this plan introduces some serious piracy concerns.
Gonzalo San Gil, PhD.

Sony is the only remaining hurdle to cross-platform play, developers say | Ars Technica UK - 0 views

  •  
    "Back in March, Microsoft announced that it would allow generic cross-platform play on its Xbox Live network. The move was essentially a public challenge for Sony to similarly open up the PlayStation Network, allowing for multiplayer matches involving more than one type of console for what would essentially be the first time."
Gonzalo San Gil, PhD.

Configuring WINE with Winetricks | linuxconfig.org - 0 views

  •  
    "If winecfg is a screwdriver, winetricks is a power drill. They both have their place, but winetricks is just a much more powerful tool. Actually, it even has the ability to launch winecfg. While winecfg gives you the ability to change the settings of WINE itself, winetricks gives you the ability to modify the actual Windows layer. It allows you to install important components like .dlls and system fonts as well as giving you the capability to edit the Windows registry. It also has a task manager, an uninstall utility, and file browser. Even though winetricks can do all of this, the majority of the time, you're going to be using it to manage dlls and Windows components."
  •  
    "If winecfg is a screwdriver, winetricks is a power drill. They both have their place, but winetricks is just a much more powerful tool. Actually, it even has the ability to launch winecfg. While winecfg gives you the ability to change the settings of WINE itself, winetricks gives you the ability to modify the actual Windows layer. It allows you to install important components like .dlls and system fonts as well as giving you the capability to edit the Windows registry. It also has a task manager, an uninstall utility, and file browser. Even though winetricks can do all of this, the majority of the time, you're going to be using it to manage dlls and Windows components."
Gonzalo San Gil, PhD.

Tools To Password Protect Folder In Linux - LinuxAndUbuntu - 0 views

  •  
    "Most of the time, having a password protected user is all you need to keep your files private and protected from prying eyes. There are those few times when you need to allow access to your account to another person, sometimes there are folders or files you would like to keep away from being accessed. Now we can password protect folder with several handy tools. In the Windows world, these tools are quite easily available for Windows but today we will look at a few options available for the Linux user."
  •  
    "Most of the time, having a password protected user is all you need to keep your files private and protected from prying eyes. There are those few times when you need to allow access to your account to another person, sometimes there are folders or files you would like to keep away from being accessed. Now we can password protect folder with several handy tools. In the Windows world, these tools are quite easily available for Windows but today we will look at a few options available for the Linux user."
Gonzalo San Gil, PhD.

How to Install Linux on a Windows Machine With UEFI Secure Boot | Linux.com | The sourc... - 0 views

  •  
    "This BIOS replacement, UEFI, caused some serious problems with "alternative" platforms. For some time, it was thought UEFI would render Linux uninstallable on any system certified for Windows 8 and up. Eventually Microsoft saw fit to require vendors to include a switch that allowed users to disable UEFI, so that their favorite Linux distribution could be installed. And then some Linux distributions set out to fully support Secure Boot (Red Hat, Ubuntu, SUSE, to name a few). "
  •  
    "This BIOS replacement, UEFI, caused some serious problems with "alternative" platforms. For some time, it was thought UEFI would render Linux uninstallable on any system certified for Windows 8 and up. Eventually Microsoft saw fit to require vendors to include a switch that allowed users to disable UEFI, so that their favorite Linux distribution could be installed. And then some Linux distributions set out to fully support Secure Boot (Red Hat, Ubuntu, SUSE, to name a few). "
Gonzalo San Gil, PhD.

Russian Copyright Law Allows Entire News Site To Be Shut Down Over A Single Copied Arti... - 0 views

  •  
    "from the funny-how-that-works dept We've noted for a long time now that copyright laws are regularly used as a tool for censorship. In Russia, abusing copyright law for censorship and to harass political opponents has become standard. Remember how the Russian government teamed up with Microsoft to use questionable copyright claims to intimidate government critics? And then how the MPAA gleefully got into bed with Russia's media censor to celebrate copyright? Of course, Russia also expanded its ability to use copyright to censor the internet, following pressure from short-sighted US diplomats, demanding that Russia better "respect" copyright laws. "
  •  
    "from the funny-how-that-works dept We've noted for a long time now that copyright laws are regularly used as a tool for censorship. In Russia, abusing copyright law for censorship and to harass political opponents has become standard. Remember how the Russian government teamed up with Microsoft to use questionable copyright claims to intimidate government critics? And then how the MPAA gleefully got into bed with Russia's media censor to celebrate copyright? Of course, Russia also expanded its ability to use copyright to censor the internet, following pressure from short-sighted US diplomats, demanding that Russia better "respect" copyright laws. "
Gonzalo San Gil, PhD.

Internet Archive Seeks to Defend Against Wrongful Copyright Takedowns - TorrentFreak [#... - 0 views

  •  
    " By Andy on March 23, 2016 C: 25 Breaking As a non-profit library of millions of free books, movies, software and music, the Internet Archive has a keen interest in copyright law. In a submission to the U.S. Copyright Office the Archive says since the major studios often send invalid notices, they're suggesting a change in the law to allow content to remain up while disputes are settled."
  •  
    " By Andy on March 23, 2016 C: 25 Breaking As a non-profit library of millions of free books, movies, software and music, the Internet Archive has a keen interest in copyright law. In a submission to the U.S. Copyright Office the Archive says since the major studios often send invalid notices, they're suggesting a change in the law to allow content to remain up while disputes are settled."
Gonzalo San Gil, PhD.

Code School - Try Git - 0 views

  •  
    "1.1 Got 15 minutes and want to learn Git? Git allows groups of people to work on the same documents (often code) at the same time, and without stepping on each other's toes. It's a distributed version control system. Our terminal prompt below is currently in an octobox directory. To initialize a Git repository here, type the following command: git init"
  •  
    [... Git allows groups of people to work on the same documents (often code) at the same time, and without stepping on each other's toes. It's a ...]
Gonzalo San Gil, PhD.

GCHQ allowed to spy on MPs and peers, secret court rules | Ars Technica UK - 0 views

  •  
    " IPT says politicians can be surveilled like public citizens, overturning "Wilson Doctrine.""
Gonzalo San Gil, PhD.

Unmanagement and unleadership | All Things Open 2014 lightning talk with Luis Ibanez | ... - 0 views

  •  
    "You can help foster this in your community, or employees, or teammates by not being too helpful and allowing people to pitch in."
  •  
    "You can help foster this in your community, or employees, or teammates by not being too helpful and allowing people to pitch in."
Gonzalo San Gil, PhD.

What is the open source way? | opensource.com - 0 views

  •  
    [The open source way is... Open exchange We can learn more from each other when information is open. A free exchange of ideas is critical to creating an environment where people are allowed to learn and use existing information toward creating new ideas. ...]
  •  
    [The open source way is... Open exchange We can learn more from each other when information is open. A free exchange of ideas is critical to creating an environment where people are allowed to learn and use existing information toward creating new ideas. ...]
Gonzalo San Gil, PhD.

Home : Open Source Social Network - 0 views

  •  
    "Opensource-Socialnetwork (OSSN) is a social networking software written in PHP. It allows you to make a social networking website and helps your members build social relationships, with people who share similar professional or personal interests."
  •  
    "Opensource-Socialnetwork (OSSN) is a social networking software written in PHP. It allows you to make a social networking website and helps your members build social relationships, with people who share similar professional or personal interests."
Gonzalo San Gil, PhD.

[# ! Hyper-Thec.] How to Manage Kernel Modules in Linux - 0 views

  •  
    "by Babak Mammadov · Published October 30, 2016 · Updated October 30, 2016 When we install Linux Like operating system at that time Linux kernel install most of device driver's modules and after the installation it also allows us to install new device drivers as modules using the commands modprobe and insmod."
Gonzalo San Gil, PhD.

How to Monitor Progress of (Copy/Backup/Compress) Data using 'pv' Command - 0 views

  •  
    "When making backups, coping/moving large files on your Linux system, you may want to monitor the progress of an on going operation. Many terminal tools do not have the functionality to allow you to view progress information when a command is running in a pipe. Read Also: Advance Copy Command to Show Progress Bar While Copying Files in Linux"
Gonzalo San Gil, PhD.

How To Overclock ASUS Eee PC 901 and 1000h | Gatzet.com - 0 views

  •  
    "October 20th, 2008 · 8 Comments ASUS Eee PC 901 and 1000h normally delivered with "Asus Super Hybrid Engine" software. This software allows user to increase the Atom CPU clock speed up to 1.7 GHz or to decrease the clock speed down to 1.2 GHz for conserving battery reason. The Asus Super Hybrid Engine works really great for most of Eee PC user, but some user simply want more possibility to overclock their Eee PC. Fortunately there is another tool to boost your Asus Eee PC into turbo mode. Enjoy the overclocking result. "
Gonzalo San Gil, PhD.

8.2. Managing System Services [Red Hat] - 0 views

  •  
    "8.2. Managing System Services Note To expand your expertise, you might also be interested in the Red Hat System Administration II (RH134) training course. Previous versions of Red Hat Enterprise Linux, which were distributed with SysV init or Upstart, used init scripts located in the /etc/rc.d/init.d/ directory. These init scripts were typically written in Bash, and allowed the system administrator to control the state of services and daemons in their system. In Red Hat Enterprise Linux 7, these init scripts have been replaced with service units. "
Wildcat2030 wildcat

Findings - Jaron Lanier Is Rethinking the Open Nature of the Internet - NYTimes.com - 11 views

  •  
    "When does the wisdom of crowds give way to the meanness of mobs? In the 1990s, Jaron Lanier was one of the digital pioneers hailing the wonderful possibilities that would be realized once the Internet allowed musicians, artists, scientists and engineers around the world to instantly share their work. Now, like a lot of us, he is having second thoughts. Mr. Lanier, a musician and avant-garde computer scientist - he popularized the term "virtual reality" - wonders if the Web's structure and ideology are fostering nasty group dynamics and mediocre collaborations. His new book, "You Are Not a Gadget," is a manifesto against "hive thinking" and "digital Maoism," by which he means the glorification of open-source software, free information and collective work at the expense of individual creativity."
  • ...4 more comments...
  •  
    This paragraph - "To save those endangered species, Mr. Lanier proposes rethinking the Web's ideology, revising its software structure and introducing innovations like a universal system of micropayments. (To debate reforms, go to Tierney Lab at nytimes.com/tierneylab." from this article is exactly how I imagine moving our project forward. But, who knows how to do it?
  •  
    I have some ideas Jack, but it's not finished, let's finish it together
  •  
    Sounds good ...
  •  
    We can flesh it out when I visit :-) over some wine, I think I have to do that soon.
  •  
    Still 30-below! lol
  •  
    it's a balmy -11 now, breaking out the beach shorts tomorrow
Wildcat2030 wildcat

The Knowledge Conduit | Knowledge Matters - 3 views

  •  
    "First, you should observe that there are two distinct domains - the descriptive domain and the predictive domain - and that data and information belong to the descriptive domain. I like Davenport and Prusaks' (1998, pp 2-3) definition of data as being "a set of discrete, objective facts existing in symbolic form that have not been interpreted". The symbolic form may be text, images, or pre-processed code. Data is usually organised into structured records, however it lacks context. The declaration 'Iron melts at 1,538 degrees Celsius.' is a data statement because it has no context. In this model when data is enriched by adding context it may become information. Information is data with a message, and therefore has a receiver and sender. It is data with relevance and purpose that is useful for a particular task, and is meant to enlighten the receiver and shape their outlooks or insights. Information results in an action that allows the data to be applied to a specific set of circumstances and to be employed effectively. Data only becomes information after it has been interpreted by the receiver. Furthermore information is descriptive. For example the statement 'Newcastle steel-mill's smelter temperature has been set at 2,300 degrees Celsius.' conveys information because it has been enriched by context. The enrichment from data to information is a 'know what and how' procedure that results in an understanding of relationships and patterns. However, information by itself remains descriptive and without additional data or information it cannot be used to predict an event or outcome."
1 - 20 of 28 Next ›
Showing 20 items per page