Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged example

Rss Feed Group items tagged

1More

[# ! #Open #Tech:] How to Use 'cat' and 'tac' Commands with Examples in Linux - 0 views

  •  
    "This article is a part of our Linux Tricks and Tips series, in this article we will cover some basic usage of cat command (most frequently used command in Linux) and tac (reverse of cat command - print files in reverse order) with some practical examples"
2More

Is the FOSS Infrastructure Crumbling? | FOSS Force - 0 views

  •  
    "Christine Hall It appears as if much of the open source infrastructure we depend on is suffering from neglect. That's the message brought to the SouthEast LinuxFest (SELF) by David Nally. Listening to his talk, "The Tragedy of Open Source," it was hard not to think that some of our infrastructure projects are beginning to resemble some disintegrating municipal water and sewer systems, or maybe compare his examples with our crumbling roads and bridges."
  •  
    "Christine Hall It appears as if much of the open source infrastructure we depend on is suffering from neglect. That's the message brought to the SouthEast LinuxFest (SELF) by David Nally. Listening to his talk, "The Tragedy of Open Source," it was hard not to think that some of our infrastructure projects are beginning to resemble some disintegrating municipal water and sewer systems, or maybe compare his examples with our crumbling roads and bridges."
1More

Cultural and Social Values Meaning Differences with Examples | SLN - 0 views

  •  
    "Fri, 09/12/2014 - 02:51 -- Umar Farooq There two different types of values Define Cultural Values Cultural values are hereditary and form core of the culture. List of cultural values include customs, rituals conventions, styles and fashions which are remain in the core culture. The values hold supreme position among them. These values give a shape to the culture and the society. These are very difficult to change because they remain in embedded of social institutions and the social norms. These are the ideals of society. These are remain in the memory of our elders, in old books, in religious and ethical literature. These are sometimes, referred as the values of the old people or the values of the past. They can -be said as the traditions of our life. The deviation from cultural values creates serious social problems. If these are ignored in social life there will be a gap between 'two generations and the son will be separated from his father. But it happens seldom in rapidly changing societies. The neurotic conditions develop due to dissatisfaction in social conditions which lead to frustration."
1More

Tips for learning how to give a presentation | Opensource.com - 0 views

  •  
    "Hack-A-Week is an event my team at Red Hat runs every year to encourage innovation. During that week engineers can work on any project they choose. After the week is over, each engineer gives a short presentation on what they worked on. Some examples are:"
1More

Hackathons bring open source innovation to humanitarian aid | Opensource.com - 0 views

  •  
    " Humanitarian and development aid is about helping people suffering from both short-term and long-term problems. These problems can be natural (e.g., droughts, floods, and earthquakes) as well as man-made (e.g., poverty, war, and oppression). A recent example of a humanitarian crisis is the refugee situation in Europe, and the disorder in Syria and its surrounding region."
1More

Doing for User Space What We Did for Kernel Space | Linux Journal - 0 views

  •  
    "Jul 06, 2016 By Doc Searls in Community Identity kernel Privacy I believe the best and worst thing about Linux is its hard distinction between kernel space and user space. Without that distinction, Linux never would have become the most leveraged operating system in the world. Today, Linux has the largest range of uses for the largest number of users-most of whom have no idea they are using Linux when they search for something on Google or poke at their Android phones. Even Apple stuff wouldn't be what it is (for example, using BSD in its computers) were it not for Linux's success. "
1More

Linux Process Table Tutorial | Linux Servers and Security Howtos - Chris Binnie - 0 views

  •  
    A fundamental design feature of Unix-like Operating Systems is that many of a system's resources are accessible via the filesystem, as a file. For example the "procfs" pseudo-filesystem offers us access to all kinds of valuable treasures.
1More

Shell Scripting Boot Camp - Freedom Penguin - 0 views

  •  
    "Spend enough time on the command line and you'll eventually want to do many tasks…that take some intricate commands…repeatedly. A good example of this, is making thumbnails of photos. Basically, our workhorse of this script is not ImageMagick (which provides convert, identify and mogrify), but the for loop in bash itself. Ready? Grab your pen-knife and let's whittle out a script:"
1More

6 management styles and when best to use them - The Leaders Tool Kit - Leaders in Heels - 0 views

  •  
    "Think back on your career and the managers you have had. I am sure that you have had good managers and others who were maybe not so great. When I ask people to list what made the good managers "good", most of the examples they give me are to do with behaviour, or style." [# ! Via Alfred Hankell's http://www.scoop.it/t/women-on-the-go]
1More

The Knowledge Conduit | Knowledge Matters - 3 views

  •  
    "First, you should observe that there are two distinct domains - the descriptive domain and the predictive domain - and that data and information belong to the descriptive domain. I like Davenport and Prusaks' (1998, pp 2-3) definition of data as being "a set of discrete, objective facts existing in symbolic form that have not been interpreted". The symbolic form may be text, images, or pre-processed code. Data is usually organised into structured records, however it lacks context. The declaration 'Iron melts at 1,538 degrees Celsius.' is a data statement because it has no context. In this model when data is enriched by adding context it may become information. Information is data with a message, and therefore has a receiver and sender. It is data with relevance and purpose that is useful for a particular task, and is meant to enlighten the receiver and shape their outlooks or insights. Information results in an action that allows the data to be applied to a specific set of circumstances and to be employed effectively. Data only becomes information after it has been interpreted by the receiver. Furthermore information is descriptive. For example the statement 'Newcastle steel-mill's smelter temperature has been set at 2,300 degrees Celsius.' conveys information because it has been enriched by context. The enrichment from data to information is a 'know what and how' procedure that results in an understanding of relationships and patterns. However, information by itself remains descriptive and without additional data or information it cannot be used to predict an event or outcome."
1More

Virtual Reality and Social Networks Will Be a Powerful Combination - IEEE Spectrum - 3 views

  •  
    "Half a billion people around the world spend more than 20 hours a week "wearing" avatars, that is, using digital representations of themselves. Did you know that a virtual representation of a politician could be more convincing than the politician himself? That your heart beats just as fast when your girlfriend winks at you from your computer screen as when she walks into the room? That if you make your onscreen surrogate mimic your friend's head movements, he's more likely to do what you say? Within three years, many online interactions will not simply involve passages of text typed on a keyboard but will instead be rich exchanges involving sophisticated representations of ourselves. Those digital beings are called avatars, and today at least half a billion people around the world are routinely socializing through them over the Internet, for example in online games."
14More

Network organisation for the 21st century : turbulence - 4 views

  • On the Virtues of Being Popular In any network, some nodes are more connected than others, making them ‘hubs’. This is a recurring pattern in the evolution of successful networks, ranging from the world wide web to many natural ecosystems. A ‘hub’ is not just a node with a few more connections than a usual node; a hub has connections to many other nodes – many quite distant – and also connects many disparate nodes (nodes of very different types). If you were to count all the connections each node has, you would get a mathematical distribution called a ‘power-law’ distribution with relatively few hyper-connected nodes – hubs – and a ‘long tail’ of less connected nodes.
  • Unlike networks that have a normal or random distribution of connections, networks that have a power-law distribution of connections are ‘scale-free,’ which means that no matter how many more nodes are added to the network, the dynamics and structure remain the same. This seems to be a sweet spot in the evolution of networks for stability and efficiency. The network can get bigger without drastic changes to its function.
  • The Surprising Strength of the Long Tail There is a looming contradiction: how can we have hubs and still have a strong network of dense connections that is not dependent on them? Don’t hubs lead to the emergence of permanent, entrenched leaders, centralisation and other well-documented problems? There is something of a tension here: the point is not simply that we should develop hubs, but that we have to simultaneously ensure that the hubs are never allowed to become static, and that they’re at least partially redundant. Sounds complicated, but healthy and resilient networks aren’t characterised simply by the presence of hubs, but also by the ability of hubs to change over time, and the replacement of previous hubs by apparently quite similar hubs.
  • ...10 more annotations...
  • The long tail does not drop off into nothingness (which would be the ‘exponential’ rather than ‘power-law’ distribution), where there are a few hubs and every other node has almost no connections. Instead, the long tail is extensive, consisting of small groups of dense connections, going ever onwards. In fact, the vast majority of the connections in the network are not in the hub, but in the long tail. One clear example is that of book-selling in the 21st century: the majority of Amazon.com’s book sales are not in the best-seller list, but in those millions of titles in the long tail that only a few people order. Every successful movement must be built on dense local connections. It is these dense local connections that support the dynamic creation of hubs.
  • In a perfect world, every node would be a hub – we would all easily connect with any other person and be able to communicate. However, creating connections takes time and energy, so nodes that are more long-standing or just have more spare time will naturally become hubs
  • The Construction of Collective Intelligence Hubs tend to evolve naturally in well-functioning networks – but we can accelerate the process of network development
  • Collective intelligence requires a commons of collective representations and memory accessible to the network, and so digital representations on the internet are idea
    • Ferananda Ibarra
       
      That is exactly what they can do! Currencies as currents, as symbols of value enabling and making flows visible. Allowing us to see the tracks of the pheromones, the activities, the streams, the right signals, the hubs. We will be able to measure, trace value much more precisely. We will then be able to compose flows into landscapes (scapes) of that which is interesting for a node, for a hub, for a group or machine. Scapes will allow us to display information in unimaginable ways. Our collective intelligence right there, in the blink of an eye. We will be able to see wholes instead of parts, make patterns more visible.
  • You can imagine this on an individual level: a person using their mobile phone to remember the phone numbers of their friends. With easy access and reliability, the phone almost seems part of your intelligence. Just extend this so that the part of your mind that is extended into the environment is accessible and even modifiable by other people, and collective intelligence begins.
  • This use of the environment to store collective intelligence allows for the easier creation of hubs.
  • Collective intelligence allows highly organised successful actions to be performed by individuals who, with limited memory and knowledge, would otherwise be unable to become hubs.
  • Unfortunately people can’t become hubs without largely re-inventing the wheel. It might be irritating for existing hubs, but it’s true. Being a hub requires more than just introductions, it requires information, skills, knowledge, and a memory of the past. However, we can accelerate this process by decentring as much of the connections and knowledge as possible away from individual humans and onto the environment, whether this environment be books, websites, songs, maps, videos, and a myriad of yet un-thought-of representational forms. A useful example is the pheromone trace of the ant, reinforced as more ants use a particular trail. The mere act of ‘leaving a trail’ shows how individuals with limited memory can use the shaping of the environment as an external memory.
  • A key focus for improving our collective intelligence would be a few central websites compiling analyses of social movements and events, alongside practical pieces from key hubs and organisers on how particular events were pulled off. A collective ratings approach would allow people to quickly find needles in the electronic haystack, via Digg-It-style ‘I like this article’ tags, or collaborative bookmarking, allowing different users to see each other’s bookmarked webpages. Of course some of these types of things exist, with tagging systems well developed on sites of magazines, newspapers and blogs. However, no current website performs the function of an analysis and learning hub
  • If we are to act swiftly and sustain momentum we will need to create collective intelligence – the ability to create accurate records of events, distribute them widely, analyse success and failure, and to pass on skills and knowledge.
1More

[# ! #Free #Tech:] 10 Useful Chaining Operators in Linux with Practical Examples - 0 views

  •  
    "Chaining of Linux commands means, combining several commands and make them execute based upon the behaviour of operator used in between them. "

Other Collective Intelligence Diigo Groups and On-Line Communities - 6 views

started by John Graves on 17 Feb 13 no follow-up yet
1More

Madrid City Adopts Strong Transparency and Lobby Regulation Rules - Access Info Europe ... - 0 views

  •  
    "Madrid City Adopts Strong Transparency and Lobby Regulation Rules Madrid, 27 July 2016 - The Madrid City Council today approved one of the most progressive sub-national transparency regimes in Europe, encompassing proactive publication on a broad scale, the right to request information, including via anonymous requests, and a strong lobby regulation that requires the registration of lobbyists before they meet with public officials."
5More

7 Excuses For Not Using Linux -- And Why They're Wrong - Datamation [# ! 2 notes] - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! Oh, many people complain about the lack of features that... have never used... ;)
    • Gonzalo San Gil, PhD.
       
      # ! ... bla, bla: essentially, is that people are misinformed... probably with the intention to keep 'em trapped in the proprietary -limiting and flippant- clutches...
    • Gonzalo San Gil, PhD.
       
      [... For example, you still can't fill out PDF forms...] # ! ??? wth! :( try pdfedit... :)
  •  
    [ Posted May 6, 2015 By Bruce Byfield Submit Feedback » More Articles » Every since Linux first became popular, articles have been condemning its shortcomings. Hardly a month goes by without someone explaining what Linux lacks, or how it needs a particular feature, application, or service to be usable-- and, as often as not, the complaints are misguided.]
  •  
    [ Posted May 6, 2015 By Bruce Byfield Submit Feedback » More Articles » Every since Linux first became popular, articles have been condemning its shortcomings. Hardly a month goes by without someone explaining what Linux lacks, or how it needs a particular feature, application, or service to be usable-- and, as often as not, the complaints are misguided.]
11More

Group Intelligence, Enhancement, and Extended Minds - 3 views

  • What, then, determines how smart a group of collaborating individuals is? The researchers find three individual-level features that correlate in a statistically significant way to collective intelligence.
  • First, the greater the social sensitivity of group members, the smarter the group. Second, the more turn-taking within the group, the better the group performs. And third, the more women in the group, the higher the group IQ.
  • groups with more women are smarter because women tend to be more socially sensitive than men.
  • ...7 more annotations...
  • increasing the information-sharing abilities of group members using “electronic collaborative tools” might enhance the intelligence of the group itself (without necessarily increasing the intelligence of individual group members).
  • increasing the raw intelligence of individual group members cannot guarantee a smarter group. A group of cognitively enhanced individuals with extremely high IQs (because of their enhancement) thus might fail to outperform a group of “normals” if those “normals” prove to be more socially sensitive than their enhanced rivals.
  • the central component of the extended mind thesis is called the Parity Principle. It states that “if, as we confront some task, a part of the world functions as a process which, were it to go on in the head, we would have no hesitation in accepting as part of the cognitive process, then that part of the world is (for that time) part of the cognitive process.”
  • Thus, according to the Parity Principle, inanimate objects like a pad of paper, a calculator, a computer, Wikipedia, an iPhone, and so on, can all, under just the right conditions, constitute a literal component of one’s cognitive system – of one’s mind.
  • another mind can indeed become a feature of one’s own cognitive system (on the condition that the Parity Principle is true
  • Our minds are made in such a way that trauma, and negative experience is slowly buried up, or forgotten. Our minds do seem designed with self preservation measures to try and protect our psyche. Now with a memory that is always accurate, and that is always accessible, what will that do to our minds? My concern is what our limitations add to our selves. I am unsure of what the world would be like if I didn't forget things. There are somethings we choose to forget, or ignore, or believe despite the evidence. Our emotions do seem somewhat disconnected from our experiences, especially as time goes on. Stockholm Syndrome is a wonderful example, despite the worst possible conditions a loyalty and an affection grows between a captor and their captive.
  • With the ability to share memories, or worse, to forcibly access others memories, this wonderful world enhancement will help us build, may be utterly devoid of privacy. A world where nothing is sacred, except knowledge, and that you may no longer own your own life. Simply, everyone's life, everyone's knowledge and everyone's experiences, may simply become public domain.
  •  
    Hmmm... I enjoyed this article. My experience of the extended mind is that it is not enclosed in a groups collective intelligence but part of the morphogenic field. Our global brain. We can access any time. There is one piece he mentions about: But there's also the more speculative possibility, not mentioned by Woolley et al, of enhancing the social sensitivity of group members. What would happen if group members took, for instance, a pharmaceutical of some sort that enabled them to be more socially sensitive towards each other? What if some sophisticated technology were available that augmented the individual's ability to better listen to the ideas of others - to let others have time to speak and to be intellectually open to opposing views? I began to test this in group settings with a good amount of success. It is difficult to measure though. I have tested with flower essences. http://www.laviedelarose.com one particular called shasta daisy which supports individuals and groups to achieve an ever deepening sense of community and experience of Oneness. My seminars are mostly about mind (topics like socialmedia, collective intelligence, new economy) yet I try to make them integral and include other body/mind, spirit. We do meditate. In the seminars where I don´t use the flowers there is a different feeling to it. Its very difficult to describe. Its a sense of a field.
3More

Will Obama Finally Order Corporations With Federal Contracts To Reveal Their Political ... - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! ... for whom the politicians -really- work...? # ! A big step towards transparency... # ! Let's spread the example...
  •  
    [After years of delay, reformers say the time to act is now. ...]
  •  
    [After years of delay, reformers say the time to act is now. ...]
1 - 18 of 18
Showing 20 items per page