Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged others

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

Canonical's and Red Hat's Shameful War Against One Another… and Against the A... - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! Guess who (& why) can be behind... # ! feeding a warped conflict in the core of # ! the #FreeSotware environment... [# ! Note: Look how 'some' treat their ''friends'... http://fossbytes.com/microsoft-buys-canonical-kills-ubuntu-linux-forever/ # ! and guess how they can behave with their rivals... # ! ...and what all this conflict represents for the Digital Community, as a whole...]
  •  
    "Summary: In an effort to trip each other up and in order to become the 'industry standard', Canonical and Red Hat hurt each other and alienate the media (what's left of it)"
  •  
    "Summary: In an effort to trip each other up and in order to become the 'industry standard', Canonical and Red Hat hurt each other and alienate the media (what's left of it)"
Gonzalo San Gil, PhD.

Microsoft & Education: The Song Remains the Same | FOSS Force - 0 views

  •  
    "Ken Starks It's the way of The Internet. What was once a raging firefight between two or more factions, is now a topic dead and forgotten somewhere on Slashdot or within other piles of forgotten Internetia. What was once a topic or cause over which to go to war, now only survives as fodder for The Oatmeal or other hip and funny sites. I'm talking about former the-tempests-in-a-teapot for such things as: #systemd #Mir #it_is_GNU/Linux_you_luddite Well, you get the idea…"
  •  
    "Ken Starks It's the way of The Internet. What was once a raging firefight between two or more factions, is now a topic dead and forgotten somewhere on Slashdot or within other piles of forgotten Internetia. What was once a topic or cause over which to go to war, now only survives as fodder for The Oatmeal or other hip and funny sites. I'm talking about former the-tempests-in-a-teapot for such things as: #systemd #Mir #it_is_GNU/Linux_you_luddite Well, you get the idea…"
Wildcat2030 wildcat

A Brief History of Collaboration - 1 views

  •  
    The networked information economy improves the practical capacities of individuals along three dimensions: (1) it improves their capacity to do more for and by themselves; (2) it enhances their capacity to do more in loose commonality with others, without being constrained to organize their relationship through a price system or in traditional hierarchical models of social and economic organization; and (3) it improves the capacity of individuals to do more in formal organizations that operate outside the market sphere. This enhanced autonomy is at the core of all the other improvements I describe. Individuals are using their newly expanded practical freedom to act and cooperate with others in ways that improve the practiced experience of democracy, justice and development, a critical culture, and community. ... [M]y approach heavily emphasizes individual action in nonmarket relations. Much of the discussion revolves around the choice between markets and nonmarket social behavior. In much of it, the state plays no role, or is perceived as playing a primarily negative role, in a way that is alien to the progressive branches of liberal political thought. In this, it seems more of a libertarian or an anarchistic thesis than a liberal one. I do not completely discount the state, as I will explain. But I do suggest that what is special about our moment is the rising efficacy of individuals and loose, nonmarket affiliations as agents of political economy.
Ferananda Ibarra

Network organisation for the 21st century : turbulence - 4 views

  • On the Virtues of Being Popular In any network, some nodes are more connected than others, making them ‘hubs’. This is a recurring pattern in the evolution of successful networks, ranging from the world wide web to many natural ecosystems. A ‘hub’ is not just a node with a few more connections than a usual node; a hub has connections to many other nodes – many quite distant – and also connects many disparate nodes (nodes of very different types). If you were to count all the connections each node has, you would get a mathematical distribution called a ‘power-law’ distribution with relatively few hyper-connected nodes – hubs – and a ‘long tail’ of less connected nodes.
  • Unlike networks that have a normal or random distribution of connections, networks that have a power-law distribution of connections are ‘scale-free,’ which means that no matter how many more nodes are added to the network, the dynamics and structure remain the same. This seems to be a sweet spot in the evolution of networks for stability and efficiency. The network can get bigger without drastic changes to its function.
  • The Surprising Strength of the Long Tail There is a looming contradiction: how can we have hubs and still have a strong network of dense connections that is not dependent on them? Don’t hubs lead to the emergence of permanent, entrenched leaders, centralisation and other well-documented problems? There is something of a tension here: the point is not simply that we should develop hubs, but that we have to simultaneously ensure that the hubs are never allowed to become static, and that they’re at least partially redundant. Sounds complicated, but healthy and resilient networks aren’t characterised simply by the presence of hubs, but also by the ability of hubs to change over time, and the replacement of previous hubs by apparently quite similar hubs.
  • ...10 more annotations...
  • The long tail does not drop off into nothingness (which would be the ‘exponential’ rather than ‘power-law’ distribution), where there are a few hubs and every other node has almost no connections. Instead, the long tail is extensive, consisting of small groups of dense connections, going ever onwards. In fact, the vast majority of the connections in the network are not in the hub, but in the long tail. One clear example is that of book-selling in the 21st century: the majority of Amazon.com’s book sales are not in the best-seller list, but in those millions of titles in the long tail that only a few people order. Every successful movement must be built on dense local connections. It is these dense local connections that support the dynamic creation of hubs.
  • In a perfect world, every node would be a hub – we would all easily connect with any other person and be able to communicate. However, creating connections takes time and energy, so nodes that are more long-standing or just have more spare time will naturally become hubs
  • The Construction of Collective Intelligence Hubs tend to evolve naturally in well-functioning networks – but we can accelerate the process of network development
  • Collective intelligence requires a commons of collective representations and memory accessible to the network, and so digital representations on the internet are idea
    • Ferananda Ibarra
       
      That is exactly what they can do! Currencies as currents, as symbols of value enabling and making flows visible. Allowing us to see the tracks of the pheromones, the activities, the streams, the right signals, the hubs. We will be able to measure, trace value much more precisely. We will then be able to compose flows into landscapes (scapes) of that which is interesting for a node, for a hub, for a group or machine. Scapes will allow us to display information in unimaginable ways. Our collective intelligence right there, in the blink of an eye. We will be able to see wholes instead of parts, make patterns more visible.
  • You can imagine this on an individual level: a person using their mobile phone to remember the phone numbers of their friends. With easy access and reliability, the phone almost seems part of your intelligence. Just extend this so that the part of your mind that is extended into the environment is accessible and even modifiable by other people, and collective intelligence begins.
  • This use of the environment to store collective intelligence allows for the easier creation of hubs.
  • Collective intelligence allows highly organised successful actions to be performed by individuals who, with limited memory and knowledge, would otherwise be unable to become hubs.
  • Unfortunately people can’t become hubs without largely re-inventing the wheel. It might be irritating for existing hubs, but it’s true. Being a hub requires more than just introductions, it requires information, skills, knowledge, and a memory of the past. However, we can accelerate this process by decentring as much of the connections and knowledge as possible away from individual humans and onto the environment, whether this environment be books, websites, songs, maps, videos, and a myriad of yet un-thought-of representational forms. A useful example is the pheromone trace of the ant, reinforced as more ants use a particular trail. The mere act of ‘leaving a trail’ shows how individuals with limited memory can use the shaping of the environment as an external memory.
  • A key focus for improving our collective intelligence would be a few central websites compiling analyses of social movements and events, alongside practical pieces from key hubs and organisers on how particular events were pulled off. A collective ratings approach would allow people to quickly find needles in the electronic haystack, via Digg-It-style ‘I like this article’ tags, or collaborative bookmarking, allowing different users to see each other’s bookmarked webpages. Of course some of these types of things exist, with tagging systems well developed on sites of magazines, newspapers and blogs. However, no current website performs the function of an analysis and learning hub
  • If we are to act swiftly and sustain momentum we will need to create collective intelligence – the ability to create accurate records of events, distribute them widely, analyse success and failure, and to pass on skills and knowledge.
Gonzalo San Gil, PhD.

Free or "Malayang" software is a human right | Association for Progressive Communications - 0 views

  •  
    "Author's name: Sarah Escandor-Tomas Philippines Free software is a human right. Freedom to run the software. Freedom to study and change the software. Freedom to redistribute. Freedom to redistribute with changes. The four freedoms that define free software have become essential human rights that must never be taken away from anyone except as a punishment for wrongdoing. Human rights depend on each other; if you lose one human right it becomes hard to defend the others. [...] With non-free software all your other human rights become hard to defend."
Gonzalo San Gil, PhD.

5 signs your Web application has been hacked | ITworld - 0 views

  •  
    "hacked FREE Become An Insider Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more. Other Insider Recommendations Java 101 primer: Composition and inheritance 6 simple tricks for protecting your passwords Free course: "JavaScript: The Good Parts" Free Course: The Dark Side of Technology Careers Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all"
  •  
    "hacked FREE Become An Insider Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more. Other Insider Recommendations Java 101 primer: Composition and inheritance 6 simple tricks for protecting your passwords Free course: "JavaScript: The Good Parts" Free Course: The Dark Side of Technology Careers Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all"
my serendipities

Group Intelligence, Enhancement, and Extended Minds - 3 views

  • What, then, determines how smart a group of collaborating individuals is? The researchers find three individual-level features that correlate in a statistically significant way to collective intelligence.
  • First, the greater the social sensitivity of group members, the smarter the group. Second, the more turn-taking within the group, the better the group performs. And third, the more women in the group, the higher the group IQ.
  • groups with more women are smarter because women tend to be more socially sensitive than men.
  • ...7 more annotations...
  • increasing the information-sharing abilities of group members using “electronic collaborative tools” might enhance the intelligence of the group itself (without necessarily increasing the intelligence of individual group members).
  • increasing the raw intelligence of individual group members cannot guarantee a smarter group. A group of cognitively enhanced individuals with extremely high IQs (because of their enhancement) thus might fail to outperform a group of “normals” if those “normals” prove to be more socially sensitive than their enhanced rivals.
  • the central component of the extended mind thesis is called the Parity Principle. It states that “if, as we confront some task, a part of the world functions as a process which, were it to go on in the head, we would have no hesitation in accepting as part of the cognitive process, then that part of the world is (for that time) part of the cognitive process.”
  • Thus, according to the Parity Principle, inanimate objects like a pad of paper, a calculator, a computer, Wikipedia, an iPhone, and so on, can all, under just the right conditions, constitute a literal component of one’s cognitive system – of one’s mind.
  • another mind can indeed become a feature of one’s own cognitive system (on the condition that the Parity Principle is true
  • Our minds are made in such a way that trauma, and negative experience is slowly buried up, or forgotten. Our minds do seem designed with self preservation measures to try and protect our psyche. Now with a memory that is always accurate, and that is always accessible, what will that do to our minds? My concern is what our limitations add to our selves. I am unsure of what the world would be like if I didn't forget things. There are somethings we choose to forget, or ignore, or believe despite the evidence. Our emotions do seem somewhat disconnected from our experiences, especially as time goes on. Stockholm Syndrome is a wonderful example, despite the worst possible conditions a loyalty and an affection grows between a captor and their captive.
  • With the ability to share memories, or worse, to forcibly access others memories, this wonderful world enhancement will help us build, may be utterly devoid of privacy. A world where nothing is sacred, except knowledge, and that you may no longer own your own life. Simply, everyone's life, everyone's knowledge and everyone's experiences, may simply become public domain.
  •  
    Hmmm... I enjoyed this article. My experience of the extended mind is that it is not enclosed in a groups collective intelligence but part of the morphogenic field. Our global brain. We can access any time. There is one piece he mentions about: But there's also the more speculative possibility, not mentioned by Woolley et al, of enhancing the social sensitivity of group members. What would happen if group members took, for instance, a pharmaceutical of some sort that enabled them to be more socially sensitive towards each other? What if some sophisticated technology were available that augmented the individual's ability to better listen to the ideas of others - to let others have time to speak and to be intellectually open to opposing views? I began to test this in group settings with a good amount of success. It is difficult to measure though. I have tested with flower essences. http://www.laviedelarose.com one particular called shasta daisy which supports individuals and groups to achieve an ever deepening sense of community and experience of Oneness. My seminars are mostly about mind (topics like socialmedia, collective intelligence, new economy) yet I try to make them integral and include other body/mind, spirit. We do meditate. In the seminars where I don´t use the flowers there is a different feeling to it. Its very difficult to describe. Its a sense of a field.
Gonzalo San Gil, PhD.

WordPress 4.4.1 Updates for XSS (and 52 other issues) - InternetNews. [# ! Note] - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! Why it will be so many attacks to anything that is transparent, effective, of free access and constructed by a 'disinterested' community...?
  •  
    "January 07, 2016 The first WordPress update of 2016 is out and like many other incremental updates, it is being triggered by a security vulnerability. The single security issue being patched in WordPress 4.4.1 is a cross site scripting vulnerability that could have potentially enabled a site compromised."
  •  
    "January 07, 2016 The first WordPress update of 2016 is out and like many other incremental updates, it is being triggered by a security vulnerability. The single security issue being patched in WordPress 4.4.1 is a cross site scripting vulnerability that could have potentially enabled a site compromised."
Gonzalo San Gil, PhD.

Demolishing Heisenberg with clever math and experiments | Ars Technica - 1 views

  •  
    [Heisenberg's uncertainty principle turns up everywhere in quantum mechanics. The idea is that certain types of measurements like position and momentum are paired. By measuring one of the pair, we generate uncertainty in the other. This is also referred to as quantum back-action: the thing you are measuring pushes back on the measuring system, which generates uncertainty in some other property. This fundamental idea has some serious consequences when it comes to measuring very small stuff, like gravitational waves. ...]
Gonzalo San Gil, PhD.

Institute for Responsible Technology - GMO Myths and Truths report - 0 views

  •  
    "Executive Summary GMO Myths and Truths report Genetically modified (GM) crops are promoted on the basis of a range of far-reaching claims from the GM crop industry and its supporters. They say that GM crops: Are an extension of natural breeding and do not pose different risks from naturally bred crops Are safe to eat and can be more nutritious than naturally bred crops Are strictly regulated for safety Increase crop yields Reduce pesticide use Benefit farmers and make their lives easier Bring economic benefits Benefit the environment Can help solve problems caused by climate change Reduce energy use Will help feed the world. However, a large and growing body of scientific and other authoritative evidence shows that these claims are not true. On the contrary, evidence presented in this report indicates that GM crops: Are laboratory-made, using technology that is totally different from natural breeding methods, and pose different risks from non-GM crops Can be toxic, allergenic or less nutritious than their natural counterparts Are not adequately regulated to ensure safety Do not increase yield potential Do not reduce pesticide use but increase it Create serious problems for farmers, including herbicide-tolerant "superweeds", compromised soil quality, and increased disease susceptibility in crops Have mixed economic effects Harm soil quality, disrupt ecosystems, and reduce biodiversity Do not offer effective solutions to climate change Are as energy-hungry as any other chemically-farmed crops Cannot solve the problem of world hunger but distract from its real causes - poverty, lack of access to food and, increasingly, lack of access to land to grow it on. Based on the evidence presented in this report, there is no need to take risks with GM crops when effective, readily available, and sustainable solutions to the problems that GM technology is claimed to address already
Gonzalo San Gil, PhD.

What is open source? Licensing, history, and more | Opensource.com - 0 views

  •  
    How to teach others about open source "Recently, I had the pleasure of attending a talk by Gina Likins from Red Hat at the 2015 Consortium for Computing Sciences in Colleges (CCSC): South Central conference about teaching open source"
  •  
    How to teach others about open source "Recently, I had the pleasure of attending a talk by Gina Likins from Red Hat at the 2015 Consortium for Computing Sciences in Colleges (CCSC): South Central conference about teaching open source"
Wildcat2030 wildcat

Some Social Skills May Be Genetic | Wired Science | Wired.com - 0 views

  •  
    "Social butterflies who shine at parties may get their edge from special genes that make them experts at recognizing faces. Scientists have found the strongest evidence to date that genes govern how well we keep track of who's who. The findings suggest that face-recognition and other cognitive skills may be separate from each other, and independent of general intelligence. This could help explain what makes one person good at math but bad at music, or good at spatial navigation but bad at language "People have wondered for a long time what makes one person cognitively different from another person," said cognitive psychologist Nancy Kanwisher of MIT, coauthor of the study published Jan. 7 in Current Biology. "Our study is one tiny piece of the answer to this question." The ability to recognize faces is not just handy for cocktail parties, it's crucial for distinguishing friend from foe and facilitating social interactions. If face recognition increases our ability to fend off predators and find mates, there is an evolutionary drive to encode this ability in our genes. To test this, Kanwisher's team looked at whether the ability to recognize faces runs in the family. They found that identical twins, who share 100 percent of their genes, were more similar in their face-recognition ability than fraternal twins, who share only 50 percent of their genes. This suggests the ability to recognize faces is heritable."
Wildcat2030 wildcat

Carnegie Mellon uses social networking to tap collective intelligence of online study g... - 2 views

  •  
    "Taking their cue from social media, educators at Carnegie Mellon University have developed a social networking application called Classroom Salon that engages students in online learning communities that effectively tap the collective intelligence of groups. Thousands of high school and university students used Classroom Salon (CLS), http://www.classroomsalon.org/, this past academic year to share their ideas about texts, news articles and other reading materials or their critiques of each others' writings. With the support of the Next Generation Learning Challenges initiative, funded by the Bill & Melinda Gates Foundation and the William and Flora Hewlett Foundation, CLS will be used in an innovative experiment at the University of Baltimore to see if it can help students who are in danger of failing introductory courses or otherwise dropping out of college. "Sites such as Facebook and Twitter have captured the attention of young people in a way that blogs and online discussion forums have not," said Ananda Gunawardena, associate teaching professor in the Computer Science Department, who developed CLS with David S. Kaufer, professor of English. "With Classroom Salon, we've tried to capture the sense of connectedness that makes social media sites so appealing, but within a framework that that allows groups to explore texts deeply. So it's not just social networking for the sake of socializing but enhancing the student experience as readers and writers.""
Gonzalo San Gil, PhD.

Economics of Abundance - P2P Foundation - 4 views

  •  
    [ Book: Wolfgang Hoeschele. The Economics of Abundance: A Political Economy of Freedom, Equity, and Sustainability. Gower Publishing, 2010 Contents [hide] * 1 Description * 2 Contents * 3 Excerpts o 3.1 Introduction o 3.2 Oppressive Scarcities (pp. 19-20) o 3.3 Conclusions: Strategies for Change o 3.4 Table 9.1: Coalitions for change o 3.5 Resource Use and Property Rights to Minimize Scarcity + 3.5.1 Contributory resource uses + 3.5.2 Neutral resource uses + 3.5.3 Rivalrous resource uses + 3.5.4 Key References on resource use Description "The "economics of abundance" is based on a critique of our present economic system, which finds value only in scarce commodities - i.e., things which can be sold at a high price because demand exceeds supply. Because this economy depends on demand always outstripping supplies, it also depends on "scarcity-generating institutions" - institutions that either manipulate supply or demand in order to keep us in a constant state of need. An economy of abundance seeks to dismantle or reform these scarcity-generating institutions in such a way as to affirm our freedom to live life as art (self-expression to others), social equity (so that everyone can live life as art), and sustainability (so that all life can thrive into the future). Among other things, this implies a much greater role for various forms of shared property, individual and community-level self-reliance, and participatory decision-making." (http://shareable.net/blog/event-the-economics-of-abundance) ]
Gonzalo San Gil, PhD.

What defines an open source project? | Opensource.com - 0 views

  •  
    what truly defines any open source project, making it a unique entity that is different form all other open source projects? I would propose that there are three key elements of any open source project that frame, define, and differentiate that project from all others: the code, the community, and the brand.
Gonzalo San Gil, PhD.

Google Highlights DMCA Abuse in New Copyright Transparency Report - TorrentFreak - 0 views

  •  
    " Ernesto on September 12, 2016 C: 3 News Google has released a new and improved version of its Copyright Transparency Report. The revamped report makes it easier to get insights into over a billion reported URLs. Among other things, Google now specifies how many URLs it does not remove and why, highlighting various cases of DMCA abuse"
  •  
    " Ernesto on September 12, 2016 C: 3 News Google has released a new and improved version of its Copyright Transparency Report. The revamped report makes it easier to get insights into over a billion reported URLs. Among other things, Google now specifies how many URLs it does not remove and why, highlighting various cases of DMCA abuse"
Gonzalo San Gil, PhD.

Firefox for Linux will soon support Netflix and Amazon videos | PCWorld - 0 views

  •  
    " Chris Hoffman | @chrisbhoffman Contributor, PCWorld Aug 17, 2016 5:00 AM Firefox 49 for Linux, scheduled for a September 2016 release, will add support for DRM-protected HTML5 videos. Netflix, Amazon Prime, and other streaming services will "just work" in Firefox on Linux, just as they do in Google Chrome. Encrypted media extensions come to Linux"
  •  
    " Chris Hoffman | @chrisbhoffman Contributor, PCWorld Aug 17, 2016 5:00 AM Firefox 49 for Linux, scheduled for a September 2016 release, will add support for DRM-protected HTML5 videos. Netflix, Amazon Prime, and other streaming services will "just work" in Firefox on Linux, just as they do in Google Chrome. Encrypted media extensions come to Linux"
Gonzalo San Gil, PhD.

Linux Security Guide (extended version) - Linux Audit - 0 views

  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
Gonzalo San Gil, PhD.

Open source is in our DNA | Network World - 0 views

  •  
    "The same thing that compels us to make Linux (and many other projects) free and open source is present in many of humanity's greatest achievements"
  •  
    "The same thing that compels us to make Linux (and many other projects) free and open source is present in many of humanity's greatest achievements"
Gonzalo San Gil, PhD.

Open Source Replacements for Expensive Applications - Datamation - 0 views

  •  
    "These open source apps can replace expensive content creation, accounting, business intelligence, CRM and ERP and other software."
  •  
    "These open source apps can replace expensive content creation, accounting, business intelligence, CRM and ERP and other software."
1 - 20 of 103 Next › Last »
Showing 20 items per page