Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged to

Rss Feed Group items tagged

Ferananda Ibarra

Network organisation for the 21st century : turbulence - 4 views

  • On the Virtues of Being Popular In any network, some nodes are more connected than others, making them ‘hubs’. This is a recurring pattern in the evolution of successful networks, ranging from the world wide web to many natural ecosystems. A ‘hub’ is not just a node with a few more connections than a usual node; a hub has connections to many other nodes – many quite distant – and also connects many disparate nodes (nodes of very different types). If you were to count all the connections each node has, you would get a mathematical distribution called a ‘power-law’ distribution with relatively few hyper-connected nodes – hubs – and a ‘long tail’ of less connected nodes.
  • Unlike networks that have a normal or random distribution of connections, networks that have a power-law distribution of connections are ‘scale-free,’ which means that no matter how many more nodes are added to the network, the dynamics and structure remain the same. This seems to be a sweet spot in the evolution of networks for stability and efficiency. The network can get bigger without drastic changes to its function.
  • The Surprising Strength of the Long Tail There is a looming contradiction: how can we have hubs and still have a strong network of dense connections that is not dependent on them? Don’t hubs lead to the emergence of permanent, entrenched leaders, centralisation and other well-documented problems? There is something of a tension here: the point is not simply that we should develop hubs, but that we have to simultaneously ensure that the hubs are never allowed to become static, and that they’re at least partially redundant. Sounds complicated, but healthy and resilient networks aren’t characterised simply by the presence of hubs, but also by the ability of hubs to change over time, and the replacement of previous hubs by apparently quite similar hubs.
  • ...10 more annotations...
  • The long tail does not drop off into nothingness (which would be the ‘exponential’ rather than ‘power-law’ distribution), where there are a few hubs and every other node has almost no connections. Instead, the long tail is extensive, consisting of small groups of dense connections, going ever onwards. In fact, the vast majority of the connections in the network are not in the hub, but in the long tail. One clear example is that of book-selling in the 21st century: the majority of Amazon.com’s book sales are not in the best-seller list, but in those millions of titles in the long tail that only a few people order. Every successful movement must be built on dense local connections. It is these dense local connections that support the dynamic creation of hubs.
  • In a perfect world, every node would be a hub – we would all easily connect with any other person and be able to communicate. However, creating connections takes time and energy, so nodes that are more long-standing or just have more spare time will naturally become hubs
  • The Construction of Collective Intelligence Hubs tend to evolve naturally in well-functioning networks – but we can accelerate the process of network development
  • Unfortunately people can’t become hubs without largely re-inventing the wheel. It might be irritating for existing hubs, but it’s true. Being a hub requires more than just introductions, it requires information, skills, knowledge, and a memory of the past. However, we can accelerate this process by decentring as much of the connections and knowledge as possible away from individual humans and onto the environment, whether this environment be books, websites, songs, maps, videos, and a myriad of yet un-thought-of representational forms. A useful example is the pheromone trace of the ant, reinforced as more ants use a particular trail. The mere act of ‘leaving a trail’ shows how individuals with limited memory can use the shaping of the environment as an external memory.
  • You can imagine this on an individual level: a person using their mobile phone to remember the phone numbers of their friends. With easy access and reliability, the phone almost seems part of your intelligence. Just extend this so that the part of your mind that is extended into the environment is accessible and even modifiable by other people, and collective intelligence begins.
  • This use of the environment to store collective intelligence allows for the easier creation of hubs.
  • Collective intelligence allows highly organised successful actions to be performed by individuals who, with limited memory and knowledge, would otherwise be unable to become hubs.
  • Collective intelligence requires a commons of collective representations and memory accessible to the network, and so digital representations on the internet are idea
    • Ferananda Ibarra
       
      That is exactly what they can do! Currencies as currents, as symbols of value enabling and making flows visible. Allowing us to see the tracks of the pheromones, the activities, the streams, the right signals, the hubs. We will be able to measure, trace value much more precisely. We will then be able to compose flows into landscapes (scapes) of that which is interesting for a node, for a hub, for a group or machine. Scapes will allow us to display information in unimaginable ways. Our collective intelligence right there, in the blink of an eye. We will be able to see wholes instead of parts, make patterns more visible.
  • A key focus for improving our collective intelligence would be a few central websites compiling analyses of social movements and events, alongside practical pieces from key hubs and organisers on how particular events were pulled off. A collective ratings approach would allow people to quickly find needles in the electronic haystack, via Digg-It-style ‘I like this article’ tags, or collaborative bookmarking, allowing different users to see each other’s bookmarked webpages. Of course some of these types of things exist, with tagging systems well developed on sites of magazines, newspapers and blogs. However, no current website performs the function of an analysis and learning hub
  • If we are to act swiftly and sustain momentum we will need to create collective intelligence – the ability to create accurate records of events, distribute them widely, analyse success and failure, and to pass on skills and knowledge.
Gonzalo San Gil, PhD.

Guide: Anonymity and Privacy for Advanced Linux Users - Deep Dot Web - 0 views

  •  
    "All Credits go to beac0n, thanks for contacting us and contributing the guide you created! As people requested - here is a link to download this guide as a PDF. Intro The goal is to bring together enough information in one document for a beginner to get started. Visiting countless sites, and combing the internet for information can make it obvious your desire to obtain anonymity, and lead to errors, due to conflicting information. Every effort has been made to make this document accurate. This guide is image heavy so it may take some time to load via Tor."
  •  
    "All Credits go to beac0n, thanks for contacting us and contributing the guide you created! As people requested - here is a link to download this guide as a PDF. Intro The goal is to bring together enough information in one document for a beginner to get started. Visiting countless sites, and combing the internet for information can make it obvious your desire to obtain anonymity, and lead to errors, due to conflicting information. Every effort has been made to make this document accurate. This guide is image heavy so it may take some time to load via Tor."
my serendipities

Group Intelligence, Enhancement, and Extended Minds - 3 views

  • What, then, determines how smart a group of collaborating individuals is? The researchers find three individual-level features that correlate in a statistically significant way to collective intelligence.
  • First, the greater the social sensitivity of group members, the smarter the group. Second, the more turn-taking within the group, the better the group performs. And third, the more women in the group, the higher the group IQ.
  • groups with more women are smarter because women tend to be more socially sensitive than men.
  • ...7 more annotations...
  • increasing the information-sharing abilities of group members using “electronic collaborative tools” might enhance the intelligence of the group itself (without necessarily increasing the intelligence of individual group members).
  • increasing the raw intelligence of individual group members cannot guarantee a smarter group. A group of cognitively enhanced individuals with extremely high IQs (because of their enhancement) thus might fail to outperform a group of “normals” if those “normals” prove to be more socially sensitive than their enhanced rivals.
  • the central component of the extended mind thesis is called the Parity Principle. It states that “if, as we confront some task, a part of the world functions as a process which, were it to go on in the head, we would have no hesitation in accepting as part of the cognitive process, then that part of the world is (for that time) part of the cognitive process.”
  • Thus, according to the Parity Principle, inanimate objects like a pad of paper, a calculator, a computer, Wikipedia, an iPhone, and so on, can all, under just the right conditions, constitute a literal component of one’s cognitive system – of one’s mind.
  • another mind can indeed become a feature of one’s own cognitive system (on the condition that the Parity Principle is true
  • Our minds are made in such a way that trauma, and negative experience is slowly buried up, or forgotten. Our minds do seem designed with self preservation measures to try and protect our psyche. Now with a memory that is always accurate, and that is always accessible, what will that do to our minds? My concern is what our limitations add to our selves. I am unsure of what the world would be like if I didn't forget things. There are somethings we choose to forget, or ignore, or believe despite the evidence. Our emotions do seem somewhat disconnected from our experiences, especially as time goes on. Stockholm Syndrome is a wonderful example, despite the worst possible conditions a loyalty and an affection grows between a captor and their captive.
  • With the ability to share memories, or worse, to forcibly access others memories, this wonderful world enhancement will help us build, may be utterly devoid of privacy. A world where nothing is sacred, except knowledge, and that you may no longer own your own life. Simply, everyone's life, everyone's knowledge and everyone's experiences, may simply become public domain.
  •  
    Hmmm... I enjoyed this article. My experience of the extended mind is that it is not enclosed in a groups collective intelligence but part of the morphogenic field. Our global brain. We can access any time. There is one piece he mentions about: But there's also the more speculative possibility, not mentioned by Woolley et al, of enhancing the social sensitivity of group members. What would happen if group members took, for instance, a pharmaceutical of some sort that enabled them to be more socially sensitive towards each other? What if some sophisticated technology were available that augmented the individual's ability to better listen to the ideas of others - to let others have time to speak and to be intellectually open to opposing views? I began to test this in group settings with a good amount of success. It is difficult to measure though. I have tested with flower essences. http://www.laviedelarose.com one particular called shasta daisy which supports individuals and groups to achieve an ever deepening sense of community and experience of Oneness. My seminars are mostly about mind (topics like socialmedia, collective intelligence, new economy) yet I try to make them integral and include other body/mind, spirit. We do meditate. In the seminars where I don´t use the flowers there is a different feeling to it. Its very difficult to describe. Its a sense of a field.
Amira .

Collective Intelligence: The Need for Synthesis by Kingsley Dennis | Between Both Worlds - 1 views

  • To upgrade our thinking patterns is a beginning step to an upgrade in human consciousness, and is necessary if we are to succeed in adapting to our rapidly and inevitably changing world. In other words, if we don’t enact a change, or learn to adapt to the incoming energies of change and transformation, our presence is likely to be no longer required, or needed. It is a sobering thought. The human species has entered a period of profound, fundamental, and unprecedented change. It needs to acquire new skills in order to co-exist with an environment that is itself undergoing profound change within the larger fabric of living systems - planetary, solar, and galactic. We need to upgrade our capacities in order to have the internal resistance to an upgrade in energies. Not to do so may result, quite literally, in us blowing a species-fuse! Whichever way we look at it, we are in need of preparation. If we are not prepared, that which manifests as truth may very well seem like science-fiction. And it needs to be stressed that our future depends to a large degree upon the ability to renew our perceptions about the world. It is a question of how our inner vision can be brought in balance with (and in support to) the impacts of a changing environment. If there is enough ‘critical mass’ of mind-change then there is a better possibility that shifting energies will be experienced less chaotically. Evolutionary biologist Elizabeth Sahtouris expresses the same sentiment when she writes
Wildcat2030 wildcat

Are You An Internet Optimist or Pessimist? The Great Debate over Technology's Impact on... - 11 views

  •  
    "The impact of technological change on culture, learning, and morality has long been the subject of intense debate, and every technological revolution brings out a fresh crop of both pessimists and pollyannas. Indeed, a familiar cycle has repeat itself throughout history whenever new modes of production (from mechanized agriculture to assembly-line production), means of transportation (water, rail, road, or air), energy production processes (steam, electric, nuclear), medical breakthroughs (vaccination, surgery, cloning), or communications techniques (telegraph, telephone, radio, television) have appeared on the scene. The cycle goes something like this. A new technology appears. Those who fear the sweeping changes brought about by this technology see a sky that is about to fall. These "techno-pessimists" predict the death of the old order (which, ironically, is often a previous generation's hotly-debated technology that others wanted slowed or stopped). Embracing this new technology, they fear, will result in the overthrow of traditions, beliefs, values, institutions, business models, and much else they hold sacred. The pollyannas, by contrast, look out at the unfolding landscape and see mostly rainbows in the air. Theirs is a rose-colored world in which the technological revolution du jour is seen as improving the general lot of mankind and bringing about a better order. If something has to give, then the old ways be damned! For such "techno-optimists," progress means some norms and institutions must adapt-perhaps even disappear-for society to continue its march forward. Our current Information Revolution is no different. It too has its share of techno-pessimists and techno-optimists. Indeed, before most of us had even heard of the Internet, people were already fighting about it-or at least debating what the rise of the Information Age meant for our culture, society, and economy."
  • ...5 more comments...
  •  
    I'm definitely an optimist...
  •  
    yes, so am I, but somehow lately I feel it is not enough..
  •  
    I think I fall into his category of 'pragmatic optimism-- "...The sensible middle ground position is "pragmatic optimism": We should embrace the amazing technological changes at work in today's Information Age but do so with a healthy dose of humility and appreciation for the disruptive impact pace and impact of that change.'" There's enough cool new stuff out there to warrant concepting a bright future, but that has to be tempered with the knowledge that nothing is perfect, and humans have a tendency to make good things bad all the time. I always refer back to the shining happy images that were concocted back in the 40's and 50's that predicted a wondrous new future with cars, and highways, and air travel, yet failed to foresee congestion, pollution, and urban sprawl. Yin and Yang in everything, right?
  •  
    I don't believe in dichotomies, thus I am both at the same time. I prepare for both digital nirvana and the end of civilization and collapse of techology at the same time. I am here discussing the future of work with all of you, but I have a disaster kit in the basement and a plan with friends and family where to meet at a fertile plot of land with lots of water (I call it Kurtopia). I would recommend all of you do the same. Of course you must also carry on based on the status quo (don't quit work and cash the retirement funds and buy gold coins), as well as react to any variation in between. Crystal balls are a waste of attention. Consider all scenarios, make plans, then throw them away and react to circumstances as they are presented. Understand that plans are merely insurance policies and come with a cost to attention on the present. They are robust but not optimized. Considering the spectrum from optimistic to pessimistic, if we assume a bell curve distribution of probability (with the stops across the bottom being discrete and independent), I would say these days, for me the bell is flattening, it is less and less likely that the status quo will survive. I would go so far as to say perhaps the bell is inverted. This could be interpreted as a polarization - one of the pessimists positions - except that I don't believe that the person experiencing the optimistic paradigm will necessarily be a different person than the one experiencing the negative, thus don't subscribe to the position that technology will result in a new classism.
  •  
    nice collection of articles listed in this article, I've missed some of them so will go remedy that situation now
  •  
    does Kurtopia need someone to mow the lawn?
  •  
    no, but we do need someone to take our throm-dib-u-lator apart though
Gonzalo San Gil, PhD.

Configuring WINE with Winetricks | linuxconfig.org - 0 views

  •  
    "If winecfg is a screwdriver, winetricks is a power drill. They both have their place, but winetricks is just a much more powerful tool. Actually, it even has the ability to launch winecfg. While winecfg gives you the ability to change the settings of WINE itself, winetricks gives you the ability to modify the actual Windows layer. It allows you to install important components like .dlls and system fonts as well as giving you the capability to edit the Windows registry. It also has a task manager, an uninstall utility, and file browser. Even though winetricks can do all of this, the majority of the time, you're going to be using it to manage dlls and Windows components."
  •  
    "If winecfg is a screwdriver, winetricks is a power drill. They both have their place, but winetricks is just a much more powerful tool. Actually, it even has the ability to launch winecfg. While winecfg gives you the ability to change the settings of WINE itself, winetricks gives you the ability to modify the actual Windows layer. It allows you to install important components like .dlls and system fonts as well as giving you the capability to edit the Windows registry. It also has a task manager, an uninstall utility, and file browser. Even though winetricks can do all of this, the majority of the time, you're going to be using it to manage dlls and Windows components."
Gonzalo San Gil, PhD.

Russian Copyright Law Allows Entire News Site To Be Shut Down Over A Single Copied Arti... - 0 views

  •  
    "from the funny-how-that-works dept We've noted for a long time now that copyright laws are regularly used as a tool for censorship. In Russia, abusing copyright law for censorship and to harass political opponents has become standard. Remember how the Russian government teamed up with Microsoft to use questionable copyright claims to intimidate government critics? And then how the MPAA gleefully got into bed with Russia's media censor to celebrate copyright? Of course, Russia also expanded its ability to use copyright to censor the internet, following pressure from short-sighted US diplomats, demanding that Russia better "respect" copyright laws. "
  •  
    "from the funny-how-that-works dept We've noted for a long time now that copyright laws are regularly used as a tool for censorship. In Russia, abusing copyright law for censorship and to harass political opponents has become standard. Remember how the Russian government teamed up with Microsoft to use questionable copyright claims to intimidate government critics? And then how the MPAA gleefully got into bed with Russia's media censor to celebrate copyright? Of course, Russia also expanded its ability to use copyright to censor the internet, following pressure from short-sighted US diplomats, demanding that Russia better "respect" copyright laws. "
Gonzalo San Gil, PhD.

Institute for Responsible Technology - GMO Myths and Truths report - 0 views

  •  
    "Executive Summary GMO Myths and Truths report Genetically modified (GM) crops are promoted on the basis of a range of far-reaching claims from the GM crop industry and its supporters. They say that GM crops: Are an extension of natural breeding and do not pose different risks from naturally bred crops Are safe to eat and can be more nutritious than naturally bred crops Are strictly regulated for safety Increase crop yields Reduce pesticide use Benefit farmers and make their lives easier Bring economic benefits Benefit the environment Can help solve problems caused by climate change Reduce energy use Will help feed the world. However, a large and growing body of scientific and other authoritative evidence shows that these claims are not true. On the contrary, evidence presented in this report indicates that GM crops: Are laboratory-made, using technology that is totally different from natural breeding methods, and pose different risks from non-GM crops Can be toxic, allergenic or less nutritious than their natural counterparts Are not adequately regulated to ensure safety Do not increase yield potential Do not reduce pesticide use but increase it Create serious problems for farmers, including herbicide-tolerant "superweeds", compromised soil quality, and increased disease susceptibility in crops Have mixed economic effects Harm soil quality, disrupt ecosystems, and reduce biodiversity Do not offer effective solutions to climate change Are as energy-hungry as any other chemically-farmed crops Cannot solve the problem of world hunger but distract from its real causes - poverty, lack of access to food and, increasingly, lack of access to land to grow it on. Based on the evidence presented in this report, there is no need to take risks with GM crops when effective, readily available, and sustainable solutions to the problems that GM technology is claimed to address already
Wildcat2030 wildcat

The Value of Nothing-Raj Patel » Blog Archive » - 1 views

  •  
    ""This is a deeply thought-provoking book about the dramatic changes we must make to save the planet from financial madness" - Naomi Klein. Opening with Oscar Wilde's observation that "nowadays people know the price of everything and the value of nothing," Patel shows how our faith in prices as a way of valuing the world is misplaced. He reveals the hidden ecological and social costs of a hamburger (as much as $200), and asks how we came to have markets in the first place. Both the corporate capture of government and our current financial crisis, Patel argues, are a result of our democratically bankrupt political system. If part one asks how we can rebalance society and limit markets, part two answers by showing how social organizations, in America and around the globe, are finding new ways to describe the world's worth. If we don't want the market to price every aspect of our lives, we need to learn how such organizations have discovered democratic ways in which people, and not simply governments, can play a crucial role in deciding how we might share our world and its resources in common. This short, timely and inspiring book reveals that our current crisis is not simply the result of too much of the wrong kind of economics. While we need to rethink our economic model, Patel argues that the larger failure beneath the food, climate and economic crises is a political one. If economics is about choices, Patel writes, it isn't often said who gets to make them. The Value of Nothing offers a fresh and accessible way to think about economics and the choices we will all need to make in order to create a sustainable economy and society."
Gonzalo San Gil, PhD.

U.S. Congress must act on government hacking, reject Rule 41 - Access Now - 0 views

  •  
    "Washington D.C. - Access Now today calls upon the U.S. Congress to reject a new rule that will expand the Federal Bureau of Investigation's (FBI) hacking operations. The call comes as the Supreme Court of the United States reported a change in the Federal Rules of Criminal Procedure, specifically Rule 41, to Congress. The change enables the FBI to hack into computers regardless of where they are located, and to hack into the computers belonging to the victims of botnet operations. Access Now strongly opposes the update to Rule 41."
  •  
    "Washington D.C. - Access Now today calls upon the U.S. Congress to reject a new rule that will expand the Federal Bureau of Investigation's (FBI) hacking operations. The call comes as the Supreme Court of the United States reported a change in the Federal Rules of Criminal Procedure, specifically Rule 41, to Congress. The change enables the FBI to hack into computers regardless of where they are located, and to hack into the computers belonging to the victims of botnet operations. Access Now strongly opposes the update to Rule 41."
Gonzalo San Gil, PhD.

Linux Security Guide (extended version) - Linux Audit - 0 views

  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
Gonzalo San Gil, PhD.

On Hacking - Richard Stallman - 0 views

  •  
    "Richard Stallman's personal site. https://stallman.org For current political commentary, see the daily political notes. RMS' Bio | The GNU Project On Hacking In June 2000, while visiting Korea, I did a fun hack that clearly illustrates the original and true meaning of the word "hacker". I went to lunch with some GNU fans, and was sitting down to eat some tteokpaekki (*), when a waitress set down six chopsticks right in front of me. It occurred to me that perhaps these were meant for three people, but it was more amusing to imagine that I was supposed to use all six. I did not know any way to do that, so I realized that if I could come up with a way, it would be a hack. I started thinking. After a few seconds I had an idea. "
  •  
    "Richard Stallman's personal site. https://stallman.org For current political commentary, see the daily political notes. RMS' Bio | The GNU Project On Hacking In June 2000, while visiting Korea, I did a fun hack that clearly illustrates the original and true meaning of the word "hacker". I went to lunch with some GNU fans, and was sitting down to eat some tteokpaekki (*), when a waitress set down six chopsticks right in front of me. It occurred to me that perhaps these were meant for three people, but it was more amusing to imagine that I was supposed to use all six. I did not know any way to do that, so I realized that if I could come up with a way, it would be a hack. I started thinking. After a few seconds I had an idea. "
Gonzalo San Gil, PhD.

Julia Reda - Freedom to link threatened by EU court decision and copyright plans [Date:... - 1 views

  •  
    "Today, the European Court of Justice significantly curtailed the freedom to hyperlink - one of the basic building blocks of the web. Together with the new special copyright protection for news articles the European Commission is planning to propose next week, the ability of Europeans to point to things online without having to fear breaking a law is in peril. Could the following message soon be commonplace on the European internet? Read on for details."
  •  
    "Today, the European Court of Justice significantly curtailed the freedom to hyperlink - one of the basic building blocks of the web. Together with the new special copyright protection for news articles the European Commission is planning to propose next week, the ability of Europeans to point to things online without having to fear breaking a law is in peril. Could the following message soon be commonplace on the European internet? Read on for details."
Gonzalo San Gil, PhD.

Tools To Password Protect Folder In Linux - LinuxAndUbuntu - 0 views

  •  
    "Most of the time, having a password protected user is all you need to keep your files private and protected from prying eyes. There are those few times when you need to allow access to your account to another person, sometimes there are folders or files you would like to keep away from being accessed. Now we can password protect folder with several handy tools. In the Windows world, these tools are quite easily available for Windows but today we will look at a few options available for the Linux user."
  •  
    "Most of the time, having a password protected user is all you need to keep your files private and protected from prying eyes. There are those few times when you need to allow access to your account to another person, sometimes there are folders or files you would like to keep away from being accessed. Now we can password protect folder with several handy tools. In the Windows world, these tools are quite easily available for Windows but today we will look at a few options available for the Linux user."
Gonzalo San Gil, PhD.

Top 10 Open-Source Platforms to Build Your Own Social Network - DzineBlog.com - 0 views

  •  
    "Building a social network isn't an easy task, let alone a successful one. As developers our job is to create, build, and bring to life the gears and functions of a social network. When it comes to marketing, well that's a different department in most cases. We build then later deploy, and in order to develop a highly efficient and functional social network we'll need to use a few tools."
  •  
    "Building a social network isn't an easy task, let alone a successful one. As developers our job is to create, build, and bring to life the gears and functions of a social network. When it comes to marketing, well that's a different department in most cases. We build then later deploy, and in order to develop a highly efficient and functional social network we'll need to use a few tools."
Gonzalo San Gil, PhD.

How to Install Linux on a Windows Machine With UEFI Secure Boot | Linux.com | The sourc... - 0 views

  •  
    "This BIOS replacement, UEFI, caused some serious problems with "alternative" platforms. For some time, it was thought UEFI would render Linux uninstallable on any system certified for Windows 8 and up. Eventually Microsoft saw fit to require vendors to include a switch that allowed users to disable UEFI, so that their favorite Linux distribution could be installed. And then some Linux distributions set out to fully support Secure Boot (Red Hat, Ubuntu, SUSE, to name a few). "
  •  
    "This BIOS replacement, UEFI, caused some serious problems with "alternative" platforms. For some time, it was thought UEFI would render Linux uninstallable on any system certified for Windows 8 and up. Eventually Microsoft saw fit to require vendors to include a switch that allowed users to disable UEFI, so that their favorite Linux distribution could be installed. And then some Linux distributions set out to fully support Secure Boot (Red Hat, Ubuntu, SUSE, to name a few). "
Wildcat2030 wildcat

Some Social Skills May Be Genetic | Wired Science | Wired.com - 0 views

  •  
    "Social butterflies who shine at parties may get their edge from special genes that make them experts at recognizing faces. Scientists have found the strongest evidence to date that genes govern how well we keep track of who's who. The findings suggest that face-recognition and other cognitive skills may be separate from each other, and independent of general intelligence. This could help explain what makes one person good at math but bad at music, or good at spatial navigation but bad at language "People have wondered for a long time what makes one person cognitively different from another person," said cognitive psychologist Nancy Kanwisher of MIT, coauthor of the study published Jan. 7 in Current Biology. "Our study is one tiny piece of the answer to this question." The ability to recognize faces is not just handy for cocktail parties, it's crucial for distinguishing friend from foe and facilitating social interactions. If face recognition increases our ability to fend off predators and find mates, there is an evolutionary drive to encode this ability in our genes. To test this, Kanwisher's team looked at whether the ability to recognize faces runs in the family. They found that identical twins, who share 100 percent of their genes, were more similar in their face-recognition ability than fraternal twins, who share only 50 percent of their genes. This suggests the ability to recognize faces is heritable."
Gonzalo San Gil, PhD.

Rootkit Security: The Next Big Challenge - EnterpriseStorageForum.com - 0 views

  •  
    [... It has been sixteen months since I retired - or thought I was retiring - from my monthly column. A lot has happened since. First, my company was purchased by Seagate, and I am now part of the Seagate Government Solutions organization. That, of course, now changes what I write about in this column a bit as I am now a vendor, but I am still going to deal with the big issues facing storage and data movement. I will do my best to continue to not mention vendors unless I am referencing things that are in the news. Secondly, this will not be a monthly column - I'll likely post something every few months. And lastly, I want to thank those who have written in and asked me to keep writing. Thank you! The topic this month is going to be rootkits, which are nasty security issues that I think we all need to start thinking about, as well as what to do about them. ...]
Gonzalo San Gil, PhD.

How do I pick an open source license for my project? | Opensource.com - 0 views

  •  
    "Ask Safia is the place to go for answers to your open source community-related questions. Whether you are nervous about submitting your first pull request to a project, or wondering how to write effective bug reports, Safia is here to help with practical, detailed, beginner-friendly answers. So what are you waiting for? Ask Safia."
  •  
    "Ask Safia is the place to go for answers to your open source community-related questions. Whether you are nervous about submitting your first pull request to a project, or wondering how to write effective bug reports, Safia is here to help with practical, detailed, beginner-friendly answers. So what are you waiting for? Ask Safia."
Gonzalo San Gil, PhD.

ONOS - A new carrier-grade SDN network operating system designed for high availability,... - 0 views

  •  
    "ONOS is building a better network The Open Network Operating System (ONOS) is a software defined networking (SDN) OS for service providers that has scalability, high availability, high performance and abstractions to make it easy to create apps and services. The platform is based on a solid architecture and has quickly matured to be feature rich and production ready. The community has grown to include over 50 partners and collaborators that contribute to all aspects of the project including interesting use cases such as CORD."
  •  
    "ONOS is building a better network The Open Network Operating System (ONOS) is a software defined networking (SDN) OS for service providers that has scalability, high availability, high performance and abstractions to make it easy to create apps and services. The platform is based on a solid architecture and has quickly matured to be feature rich and production ready. The community has grown to include over 50 partners and collaborators that contribute to all aspects of the project including interesting use cases such as CORD."
1 - 20 of 637 Next › Last »
Showing 20 items per page