Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged network

Rss Feed Group items tagged

Ferananda Ibarra

Network organisation for the 21st century : turbulence - 4 views

  • On the Virtues of Being Popular In any network, some nodes are more connected than others, making them ‘hubs’. This is a recurring pattern in the evolution of successful networks, ranging from the world wide web to many natural ecosystems. A ‘hub’ is not just a node with a few more connections than a usual node; a hub has connections to many other nodes – many quite distant – and also connects many disparate nodes (nodes of very different types). If you were to count all the connections each node has, you would get a mathematical distribution called a ‘power-law’ distribution with relatively few hyper-connected nodes – hubs – and a ‘long tail’ of less connected nodes.
  • Unlike networks that have a normal or random distribution of connections, networks that have a power-law distribution of connections are ‘scale-free,’ which means that no matter how many more nodes are added to the network, the dynamics and structure remain the same. This seems to be a sweet spot in the evolution of networks for stability and efficiency. The network can get bigger without drastic changes to its function.
  • The Surprising Strength of the Long Tail There is a looming contradiction: how can we have hubs and still have a strong network of dense connections that is not dependent on them? Don’t hubs lead to the emergence of permanent, entrenched leaders, centralisation and other well-documented problems? There is something of a tension here: the point is not simply that we should develop hubs, but that we have to simultaneously ensure that the hubs are never allowed to become static, and that they’re at least partially redundant. Sounds complicated, but healthy and resilient networks aren’t characterised simply by the presence of hubs, but also by the ability of hubs to change over time, and the replacement of previous hubs by apparently quite similar hubs.
  • ...10 more annotations...
  • The long tail does not drop off into nothingness (which would be the ‘exponential’ rather than ‘power-law’ distribution), where there are a few hubs and every other node has almost no connections. Instead, the long tail is extensive, consisting of small groups of dense connections, going ever onwards. In fact, the vast majority of the connections in the network are not in the hub, but in the long tail. One clear example is that of book-selling in the 21st century: the majority of Amazon.com’s book sales are not in the best-seller list, but in those millions of titles in the long tail that only a few people order. Every successful movement must be built on dense local connections. It is these dense local connections that support the dynamic creation of hubs.
  • In a perfect world, every node would be a hub – we would all easily connect with any other person and be able to communicate. However, creating connections takes time and energy, so nodes that are more long-standing or just have more spare time will naturally become hubs
  • The Construction of Collective Intelligence Hubs tend to evolve naturally in well-functioning networks – but we can accelerate the process of network development
  • Collective intelligence requires a commons of collective representations and memory accessible to the network, and so digital representations on the internet are idea
    • Ferananda Ibarra
       
      That is exactly what they can do! Currencies as currents, as symbols of value enabling and making flows visible. Allowing us to see the tracks of the pheromones, the activities, the streams, the right signals, the hubs. We will be able to measure, trace value much more precisely. We will then be able to compose flows into landscapes (scapes) of that which is interesting for a node, for a hub, for a group or machine. Scapes will allow us to display information in unimaginable ways. Our collective intelligence right there, in the blink of an eye. We will be able to see wholes instead of parts, make patterns more visible.
  • You can imagine this on an individual level: a person using their mobile phone to remember the phone numbers of their friends. With easy access and reliability, the phone almost seems part of your intelligence. Just extend this so that the part of your mind that is extended into the environment is accessible and even modifiable by other people, and collective intelligence begins.
  • This use of the environment to store collective intelligence allows for the easier creation of hubs.
  • Collective intelligence allows highly organised successful actions to be performed by individuals who, with limited memory and knowledge, would otherwise be unable to become hubs.
  • Unfortunately people can’t become hubs without largely re-inventing the wheel. It might be irritating for existing hubs, but it’s true. Being a hub requires more than just introductions, it requires information, skills, knowledge, and a memory of the past. However, we can accelerate this process by decentring as much of the connections and knowledge as possible away from individual humans and onto the environment, whether this environment be books, websites, songs, maps, videos, and a myriad of yet un-thought-of representational forms. A useful example is the pheromone trace of the ant, reinforced as more ants use a particular trail. The mere act of ‘leaving a trail’ shows how individuals with limited memory can use the shaping of the environment as an external memory.
  • A key focus for improving our collective intelligence would be a few central websites compiling analyses of social movements and events, alongside practical pieces from key hubs and organisers on how particular events were pulled off. A collective ratings approach would allow people to quickly find needles in the electronic haystack, via Digg-It-style ‘I like this article’ tags, or collaborative bookmarking, allowing different users to see each other’s bookmarked webpages. Of course some of these types of things exist, with tagging systems well developed on sites of magazines, newspapers and blogs. However, no current website performs the function of an analysis and learning hub
  • If we are to act swiftly and sustain momentum we will need to create collective intelligence – the ability to create accurate records of events, distribute them widely, analyse success and failure, and to pass on skills and knowledge.
Gonzalo San Gil, PhD.

Top 10 Open-Source Platforms to Build Your Own Social Network - DzineBlog.com - 0 views

  •  
    "Building a social network isn't an easy task, let alone a successful one. As developers our job is to create, build, and bring to life the gears and functions of a social network. When it comes to marketing, well that's a different department in most cases. We build then later deploy, and in order to develop a highly efficient and functional social network we'll need to use a few tools."
  •  
    "Building a social network isn't an easy task, let alone a successful one. As developers our job is to create, build, and bring to life the gears and functions of a social network. When it comes to marketing, well that's a different department in most cases. We build then later deploy, and in order to develop a highly efficient and functional social network we'll need to use a few tools."
Gonzalo San Gil, PhD.

ONOS - A new carrier-grade SDN network operating system designed for high availability,... - 0 views

  •  
    "ONOS is building a better network The Open Network Operating System (ONOS) is a software defined networking (SDN) OS for service providers that has scalability, high availability, high performance and abstractions to make it easy to create apps and services. The platform is based on a solid architecture and has quickly matured to be feature rich and production ready. The community has grown to include over 50 partners and collaborators that contribute to all aspects of the project including interesting use cases such as CORD."
  •  
    "ONOS is building a better network The Open Network Operating System (ONOS) is a software defined networking (SDN) OS for service providers that has scalability, high availability, high performance and abstractions to make it easy to create apps and services. The platform is based on a solid architecture and has quickly matured to be feature rich and production ready. The community has grown to include over 50 partners and collaborators that contribute to all aspects of the project including interesting use cases such as CORD."
Gonzalo San Gil, PhD.

SocNetV | OPe Source Social Network Visualizer - 1 views

  •  
    "Social Networks Visualizer (SocNetV) is our project to build a flexible and user-friendly, cross-platform tool for the analysis and visualisation of social networks, targeting primarily the researcher. SocNetV lets you construct social networks with a few clicks on a virtual canvas or load networks of various formats (GraphML, GraphViz, Adjacency (Sociomatrix), Pajek, UCINET, etc) and modify them to suit your needs. "
Gonzalo San Gil, PhD.

Home : Open Source Social Network - 0 views

  •  
    "Opensource-Socialnetwork (OSSN) is a social networking software written in PHP. It allows you to make a social networking website and helps your members build social relationships, with people who share similar professional or personal interests."
  •  
    "Opensource-Socialnetwork (OSSN) is a social networking software written in PHP. It allows you to make a social networking website and helps your members build social relationships, with people who share similar professional or personal interests."
Gonzalo San Gil, PhD.

Free DoS Attack Tools - blackMORE Ops - 0 views

  •  
    "Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. We will review some of the best and free DoS attack tools in this post."
  •  
    "Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. We will review some of the best and free DoS attack tools in this post."
Gonzalo San Gil, PhD.

Social Network Analysis | Coursera.org - 1 views

  •  
    "This course will use social network analysis, both its theory and computational tools, to make sense of the social and information networks that have been fueled and rendered accessible by the internet."
Wildcat2030 wildcat

Carnegie Mellon uses social networking to tap collective intelligence of online study g... - 2 views

  •  
    "Taking their cue from social media, educators at Carnegie Mellon University have developed a social networking application called Classroom Salon that engages students in online learning communities that effectively tap the collective intelligence of groups. Thousands of high school and university students used Classroom Salon (CLS), http://www.classroomsalon.org/, this past academic year to share their ideas about texts, news articles and other reading materials or their critiques of each others' writings. With the support of the Next Generation Learning Challenges initiative, funded by the Bill & Melinda Gates Foundation and the William and Flora Hewlett Foundation, CLS will be used in an innovative experiment at the University of Baltimore to see if it can help students who are in danger of failing introductory courses or otherwise dropping out of college. "Sites such as Facebook and Twitter have captured the attention of young people in a way that blogs and online discussion forums have not," said Ananda Gunawardena, associate teaching professor in the Computer Science Department, who developed CLS with David S. Kaufer, professor of English. "With Classroom Salon, we've tried to capture the sense of connectedness that makes social media sites so appealing, but within a framework that that allows groups to explore texts deeply. So it's not just social networking for the sake of socializing but enhancing the student experience as readers and writers.""
Gonzalo San Gil, PhD.

Sony is the only remaining hurdle to cross-platform play, developers say | Ars Technica UK - 0 views

  •  
    "Back in March, Microsoft announced that it would allow generic cross-platform play on its Xbox Live network. The move was essentially a public challenge for Sony to similarly open up the PlayStation Network, allowing for multiplayer matches involving more than one type of console for what would essentially be the first time."
Gonzalo San Gil, PhD.

Social and political movements related to the P2P (participatory), open (open access to... - 1 views

  •  
    [A directory of social and political movements related to the P2P (participatory), open (open access to knowledge), and 'commons' paradigms. Please read: Mapping a Coalition for the Commons. By Philippe Aigrain.]
Gonzalo San Gil, PhD.

Best Linux Intranet Solutions - Datamation - 0 views

  •  
    "The best open source Intranet solutions offer various approaches to networked office communication."
  •  
    "The best open source Intranet solutions offer various approaches to networked office communication."
Gonzalo San Gil, PhD.

Key principles of an open organization | Opensource.com - 0 views

  •  
    "They say life imitates art. But, I believe life imitates technology. Look at distributed systems, decentralized computing, open source, and lean principles. With these and other technical initiatives, we've pushed boundaries and improved our applications, our networks, our companies, and our lives."
  •  
    "They say life imitates art. But, I believe life imitates technology. Look at distributed systems, decentralized computing, open source, and lean principles. With these and other technical initiatives, we've pushed boundaries and improved our applications, our networks, our companies, and our lives."
Gonzalo San Gil, PhD.

How to master the Linux terminal with core commands | TechRadar - 0 views

  •  
    "By Linux Format How To Discover the core commands for file and text handling and networking"
  •  
    "By Linux Format How To Discover the core commands for file and text handling and networking"
Gonzalo San Gil, PhD.

Alison Powell on Open-Source Cultures and Free Software Advocacy - Commons Transition [... - 0 views

  •  
    "Alison Powell is an Assistant Professor in the Department of Media & Communications in the London School of Economics. Her research examines the history and future of openness within new media. Alison's research explores open-source cultures including community wireless networks, free software advocates and people interested in open sourcing knowledge including hardware design."
  •  
    "Alison Powell is an Assistant Professor in the Department of Media & Communications in the London School of Economics. Her research examines the history and future of openness within new media. Alison's research explores open-source cultures including community wireless networks, free software advocates and people interested in open sourcing knowledge including hardware design."
Gonzalo San Gil, PhD.

Be a civic hacker for your community | Opensource.com - 0 views

  •  
    "There is a civic hacker in you! He or she is in there... I promise! Today, technology has evolved into a perfect storm of open source tools, code, social networks, and lots of data. Civic technologists thrive on all of these getting together with like-minded hackers and turning all these sources into useful applications, websites and visualizations."
  •  
    "There is a civic hacker in you! He or she is in there... I promise! Today, technology has evolved into a perfect storm of open source tools, code, social networks, and lots of data. Civic technologists thrive on all of these getting together with like-minded hackers and turning all these sources into useful applications, websites and visualizations."
Gonzalo San Gil, PhD.

Why the software world needs a 'no-fly zone' for patents | ITworld - 1 views

  •  
    "Now 10 years old, the Open Invention Network protects more than 2,000 software packages By Katherine Noyes"
  •  
    "Credit: flickr/Bob Bob Now 10 years old, the Open Invention Network protects more than 2,000 software packages Katherine Noyes By Katherine Noyes"
Wildcat2030 wildcat

A Brief History of Collaboration - 1 views

  •  
    The networked information economy improves the practical capacities of individuals along three dimensions: (1) it improves their capacity to do more for and by themselves; (2) it enhances their capacity to do more in loose commonality with others, without being constrained to organize their relationship through a price system or in traditional hierarchical models of social and economic organization; and (3) it improves the capacity of individuals to do more in formal organizations that operate outside the market sphere. This enhanced autonomy is at the core of all the other improvements I describe. Individuals are using their newly expanded practical freedom to act and cooperate with others in ways that improve the practiced experience of democracy, justice and development, a critical culture, and community. ... [M]y approach heavily emphasizes individual action in nonmarket relations. Much of the discussion revolves around the choice between markets and nonmarket social behavior. In much of it, the state plays no role, or is perceived as playing a primarily negative role, in a way that is alien to the progressive branches of liberal political thought. In this, it seems more of a libertarian or an anarchistic thesis than a liberal one. I do not completely discount the state, as I will explain. But I do suggest that what is special about our moment is the rising efficacy of individuals and loose, nonmarket affiliations as agents of political economy.
Wildcat2030 wildcat

Virtual Reality and Social Networks Will Be a Powerful Combination - IEEE Spectrum - 3 views

  •  
    "Half a billion people around the world spend more than 20 hours a week "wearing" avatars, that is, using digital representations of themselves. Did you know that a virtual representation of a politician could be more convincing than the politician himself? That your heart beats just as fast when your girlfriend winks at you from your computer screen as when she walks into the room? That if you make your onscreen surrogate mimic your friend's head movements, he's more likely to do what you say? Within three years, many online interactions will not simply involve passages of text typed on a keyboard but will instead be rich exchanges involving sophisticated representations of ourselves. Those digital beings are called avatars, and today at least half a billion people around the world are routinely socializing through them over the Internet, for example in online games."
Gonzalo San Gil, PhD.

How to Deal With Information Overload | LifeHack.org - 0 views

  •  
    "Up until recently, there was no such thing as information overload, but with 24 hour news cycles, blogs, social networks, viral videos and more, it's hard not to have your mind bogged down with news, messages, trivia and the like"
  •  
    "Up until recently, there was no such thing as information overload, but with 24 hour news cycles, blogs, social networks, viral videos and more, it's hard not to have your mind bogged down with news, messages, trivia and the like"
Gonzalo San Gil, PhD.

Beware: Piracy Defense Lawyers Can Be "Trolls" Too - TorrentFreak [# ! Note] - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! Copyright Enforcement is, sadly, corrupting The Law... ... The Justice... The Coexistence. # ! And, as You may see, it seems that everybody is benefiting from 'Piracy' (beyond the mentioned Defense Attorneys...): From Musicians for the extra promotion; Collecting Societies and Audiovisual Producers getting Grants from Governments and Governments themselves, acquiring 'extra control' over Media... and The Culture itself, promoting Censorship with the excuse of the 'Protection of The Intellectual Property'...
  •  
    " Ernesto on February 8, 2016 C: 37 News Every month hundreds of people are sued for sharing copyrighted media through file-sharing networks, mostly BitTorrent. This practice is big business for copyright holders and lawyers alike. Unfortunately, however, not all defense attorneys appear to have the best interests of their clients at heart."
  •  
    " Ernesto on February 8, 2016 C: 37 News Every month hundreds of people are sued for sharing copyrighted media through file-sharing networks, mostly BitTorrent. This practice is big business for copyright holders and lawyers alike. Unfortunately, however, not all defense attorneys appear to have the best interests of their clients at heart."
1 - 20 of 52 Next › Last »
Showing 20 items per page