Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged will

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

Firefox for Linux will soon support Netflix and Amazon videos | PCWorld - 0 views

  •  
    " Chris Hoffman | @chrisbhoffman Contributor, PCWorld Aug 17, 2016 5:00 AM Firefox 49 for Linux, scheduled for a September 2016 release, will add support for DRM-protected HTML5 videos. Netflix, Amazon Prime, and other streaming services will "just work" in Firefox on Linux, just as they do in Google Chrome. Encrypted media extensions come to Linux"
  •  
    " Chris Hoffman | @chrisbhoffman Contributor, PCWorld Aug 17, 2016 5:00 AM Firefox 49 for Linux, scheduled for a September 2016 release, will add support for DRM-protected HTML5 videos. Netflix, Amazon Prime, and other streaming services will "just work" in Firefox on Linux, just as they do in Google Chrome. Encrypted media extensions come to Linux"
Gonzalo San Gil, PhD.

Copyleft - Wikipedia [Stallman, The GNU Manifesto 1995] - 0 views

  •  
    "An early use of the word "copyleft" was in Tiny Basic's distribution notice "@COPYLEFT ALL WRONGS RESERVED", however, Tiny Basic was not distributed under any form of copyleft distribution terms so the wordplay is the only similarity. The concept of copyleft was described in Richard Stallman's GNU Manifesto in 1983 where he wrote: GNU is not in the public domain. Everyone will be permitted to modify and redistribute GNU, but no distributor will be allowed to restrict its further redistribution. That is to say, proprietary modifications will not be allowed. I want to make sure that all versions of GNU remain free."
  •  
    "An early use of the word "copyleft" was in Tiny Basic's distribution notice "@COPYLEFT ALL WRONGS RESERVED", however, Tiny Basic was not distributed under any form of copyleft distribution terms so the wordplay is the only similarity. The concept of copyleft was described in Richard Stallman's GNU Manifesto in 1983 where he wrote: GNU is not in the public domain. Everyone will be permitted to modify and redistribute GNU, but no distributor will be allowed to restrict its further redistribution. That is to say, proprietary modifications will not be allowed. I want to make sure that all versions of GNU remain free."
Gonzalo San Gil, PhD.

Musk and Friends Launch OpenAI | Community | LinuxInsider - 0 views

  •  
    "What OpenAI Will Do OpenAI's researchers will be encouraged to publish their work, and any patents awarded will be shared with everyone. They will collaborate freely with both institutions and corporate entities. Today's AI systems are outstanding when it comes to pattern recognition problems, but they're limited to those. OpenAI plans to work to remove those constraints until computers eventually can reach human performance on virtually every intellectual task, Brockman and Sutskever wrote. Doing so correctly could be of huge benefit -- or it could cause incalculable harm. OpenAI's investors consider it important to have a leading research institution that "can prioritize a good outcome for all over its own self-interest," they said. "
Gonzalo San Gil, PhD.

Collaboration vs. Competition: why our Future is Open Source - 2 views

  •  
    [Two Neanderthals need a bow and some arrows. Grrmt can build a bow in 5 hours and arrows in 4 hours. Aaaargl can build a bow in 2 hours and arrows in 3 hours. Thus, in order to build what they need, Grrmt will take 5+ 4 = 9 hours, and Aaaargl will take 2 + 3 = 5 hours. 14 hours total will be spent by the both of them. ...]
Gonzalo San Gil, PhD.

Protecode: Open Source Code Will Power 95 Pct. of Companies by 2017 | Open Source Appli... - 0 views

  •  
    "Almost all-95 percent, in fact-of companies will be using open source software by 2017 and the adoption of third-party open source code is increasing steadily. "
  •  
    "Almost all-95 percent, in fact-of companies will be using open source software by 2017 and the adoption of third-party open source code is increasing steadily. "
Wildcat2030 wildcat

Are You An Internet Optimist or Pessimist? The Great Debate over Technology's Impact on... - 11 views

  •  
    "The impact of technological change on culture, learning, and morality has long been the subject of intense debate, and every technological revolution brings out a fresh crop of both pessimists and pollyannas. Indeed, a familiar cycle has repeat itself throughout history whenever new modes of production (from mechanized agriculture to assembly-line production), means of transportation (water, rail, road, or air), energy production processes (steam, electric, nuclear), medical breakthroughs (vaccination, surgery, cloning), or communications techniques (telegraph, telephone, radio, television) have appeared on the scene. The cycle goes something like this. A new technology appears. Those who fear the sweeping changes brought about by this technology see a sky that is about to fall. These "techno-pessimists" predict the death of the old order (which, ironically, is often a previous generation's hotly-debated technology that others wanted slowed or stopped). Embracing this new technology, they fear, will result in the overthrow of traditions, beliefs, values, institutions, business models, and much else they hold sacred. The pollyannas, by contrast, look out at the unfolding landscape and see mostly rainbows in the air. Theirs is a rose-colored world in which the technological revolution du jour is seen as improving the general lot of mankind and bringing about a better order. If something has to give, then the old ways be damned! For such "techno-optimists," progress means some norms and institutions must adapt-perhaps even disappear-for society to continue its march forward. Our current Information Revolution is no different. It too has its share of techno-pessimists and techno-optimists. Indeed, before most of us had even heard of the Internet, people were already fighting about it-or at least debating what the rise of the Information Age meant for our culture, society, and economy."
  • ...5 more comments...
  •  
    I'm definitely an optimist...
  •  
    yes, so am I, but somehow lately I feel it is not enough..
  •  
    I think I fall into his category of 'pragmatic optimism-- "...The sensible middle ground position is "pragmatic optimism": We should embrace the amazing technological changes at work in today's Information Age but do so with a healthy dose of humility and appreciation for the disruptive impact pace and impact of that change.'" There's enough cool new stuff out there to warrant concepting a bright future, but that has to be tempered with the knowledge that nothing is perfect, and humans have a tendency to make good things bad all the time. I always refer back to the shining happy images that were concocted back in the 40's and 50's that predicted a wondrous new future with cars, and highways, and air travel, yet failed to foresee congestion, pollution, and urban sprawl. Yin and Yang in everything, right?
  •  
    I don't believe in dichotomies, thus I am both at the same time. I prepare for both digital nirvana and the end of civilization and collapse of techology at the same time. I am here discussing the future of work with all of you, but I have a disaster kit in the basement and a plan with friends and family where to meet at a fertile plot of land with lots of water (I call it Kurtopia). I would recommend all of you do the same. Of course you must also carry on based on the status quo (don't quit work and cash the retirement funds and buy gold coins), as well as react to any variation in between. Crystal balls are a waste of attention. Consider all scenarios, make plans, then throw them away and react to circumstances as they are presented. Understand that plans are merely insurance policies and come with a cost to attention on the present. They are robust but not optimized. Considering the spectrum from optimistic to pessimistic, if we assume a bell curve distribution of probability (with the stops across the bottom being discrete and independent), I would say these days, for me the bell is flattening, it is less and less likely that the status quo will survive. I would go so far as to say perhaps the bell is inverted. This could be interpreted as a polarization - one of the pessimists positions - except that I don't believe that the person experiencing the optimistic paradigm will necessarily be a different person than the one experiencing the negative, thus don't subscribe to the position that technology will result in a new classism.
  •  
    nice collection of articles listed in this article, I've missed some of them so will go remedy that situation now
  •  
    does Kurtopia need someone to mow the lawn?
  •  
    no, but we do need someone to take our throm-dib-u-lator apart though
Wildcat2030 wildcat

Virtual Reality and Social Networks Will Be a Powerful Combination - IEEE Spectrum - 3 views

  •  
    "Half a billion people around the world spend more than 20 hours a week "wearing" avatars, that is, using digital representations of themselves. Did you know that a virtual representation of a politician could be more convincing than the politician himself? That your heart beats just as fast when your girlfriend winks at you from your computer screen as when she walks into the room? That if you make your onscreen surrogate mimic your friend's head movements, he's more likely to do what you say? Within three years, many online interactions will not simply involve passages of text typed on a keyboard but will instead be rich exchanges involving sophisticated representations of ourselves. Those digital beings are called avatars, and today at least half a billion people around the world are routinely socializing through them over the Internet, for example in online games."
Ferananda Ibarra

Network organisation for the 21st century : turbulence - 4 views

  • On the Virtues of Being Popular In any network, some nodes are more connected than others, making them ‘hubs’. This is a recurring pattern in the evolution of successful networks, ranging from the world wide web to many natural ecosystems. A ‘hub’ is not just a node with a few more connections than a usual node; a hub has connections to many other nodes – many quite distant – and also connects many disparate nodes (nodes of very different types). If you were to count all the connections each node has, you would get a mathematical distribution called a ‘power-law’ distribution with relatively few hyper-connected nodes – hubs – and a ‘long tail’ of less connected nodes.
  • Unlike networks that have a normal or random distribution of connections, networks that have a power-law distribution of connections are ‘scale-free,’ which means that no matter how many more nodes are added to the network, the dynamics and structure remain the same. This seems to be a sweet spot in the evolution of networks for stability and efficiency. The network can get bigger without drastic changes to its function.
  • The Surprising Strength of the Long Tail There is a looming contradiction: how can we have hubs and still have a strong network of dense connections that is not dependent on them? Don’t hubs lead to the emergence of permanent, entrenched leaders, centralisation and other well-documented problems? There is something of a tension here: the point is not simply that we should develop hubs, but that we have to simultaneously ensure that the hubs are never allowed to become static, and that they’re at least partially redundant. Sounds complicated, but healthy and resilient networks aren’t characterised simply by the presence of hubs, but also by the ability of hubs to change over time, and the replacement of previous hubs by apparently quite similar hubs.
  • ...10 more annotations...
  • The long tail does not drop off into nothingness (which would be the ‘exponential’ rather than ‘power-law’ distribution), where there are a few hubs and every other node has almost no connections. Instead, the long tail is extensive, consisting of small groups of dense connections, going ever onwards. In fact, the vast majority of the connections in the network are not in the hub, but in the long tail. One clear example is that of book-selling in the 21st century: the majority of Amazon.com’s book sales are not in the best-seller list, but in those millions of titles in the long tail that only a few people order. Every successful movement must be built on dense local connections. It is these dense local connections that support the dynamic creation of hubs.
  • In a perfect world, every node would be a hub – we would all easily connect with any other person and be able to communicate. However, creating connections takes time and energy, so nodes that are more long-standing or just have more spare time will naturally become hubs
  • The Construction of Collective Intelligence Hubs tend to evolve naturally in well-functioning networks – but we can accelerate the process of network development
  • Collective intelligence requires a commons of collective representations and memory accessible to the network, and so digital representations on the internet are idea
    • Ferananda Ibarra
       
      That is exactly what they can do! Currencies as currents, as symbols of value enabling and making flows visible. Allowing us to see the tracks of the pheromones, the activities, the streams, the right signals, the hubs. We will be able to measure, trace value much more precisely. We will then be able to compose flows into landscapes (scapes) of that which is interesting for a node, for a hub, for a group or machine. Scapes will allow us to display information in unimaginable ways. Our collective intelligence right there, in the blink of an eye. We will be able to see wholes instead of parts, make patterns more visible.
  • You can imagine this on an individual level: a person using their mobile phone to remember the phone numbers of their friends. With easy access and reliability, the phone almost seems part of your intelligence. Just extend this so that the part of your mind that is extended into the environment is accessible and even modifiable by other people, and collective intelligence begins.
  • This use of the environment to store collective intelligence allows for the easier creation of hubs.
  • Collective intelligence allows highly organised successful actions to be performed by individuals who, with limited memory and knowledge, would otherwise be unable to become hubs.
  • Unfortunately people can’t become hubs without largely re-inventing the wheel. It might be irritating for existing hubs, but it’s true. Being a hub requires more than just introductions, it requires information, skills, knowledge, and a memory of the past. However, we can accelerate this process by decentring as much of the connections and knowledge as possible away from individual humans and onto the environment, whether this environment be books, websites, songs, maps, videos, and a myriad of yet un-thought-of representational forms. A useful example is the pheromone trace of the ant, reinforced as more ants use a particular trail. The mere act of ‘leaving a trail’ shows how individuals with limited memory can use the shaping of the environment as an external memory.
  • A key focus for improving our collective intelligence would be a few central websites compiling analyses of social movements and events, alongside practical pieces from key hubs and organisers on how particular events were pulled off. A collective ratings approach would allow people to quickly find needles in the electronic haystack, via Digg-It-style ‘I like this article’ tags, or collaborative bookmarking, allowing different users to see each other’s bookmarked webpages. Of course some of these types of things exist, with tagging systems well developed on sites of magazines, newspapers and blogs. However, no current website performs the function of an analysis and learning hub
  • If we are to act swiftly and sustain momentum we will need to create collective intelligence – the ability to create accurate records of events, distribute them widely, analyse success and failure, and to pass on skills and knowledge.
Bill Tracer

Will the Internet Achieve Sentience? - 1 views

  •  
    A speculative work of non-fiction that explores the idea that as the Internet increases in complexity that it may soon become a self-aware consciousness being. When this happens, what sort of consequences might there be? What kind of relationship could we have with such a being? Will we be at odds with it, or will we be able to establish a sort of symbiotic relationship with this synthetic being?
Gonzalo San Gil, PhD.

TTIP expected to fail after US demands revealed in unprecedented leak | Ars Technica UK - 0 views

  •  
    "Bernd Lange, the chairman of the European Parliament's important trade committee, has indicated that he now expects the Transatlantic Trade and Investment Partnership (TTIP) negotiations will probably fail, following a major leak of confidential documents from the talks."
  •  
    "Bernd Lange, the chairman of the European Parliament's important trade committee, has indicated that he now expects the Transatlantic Trade and Investment Partnership (TTIP) negotiations will probably fail, following a major leak of confidential documents from the talks."
Gonzalo San Gil, PhD.

Proposed Open Source Everything Sub-Categories « Public Intelligence Blog - 0 views

    • Gonzalo San Gil, PhD.
       
      [# Via Sepp Hasslberger x FB's P2P Grouup...]
  •  
    [With over 1,000 pages already rostered under the Category open, we see a need to agree upon and implement a sub-categorization scheme that will help group related personalities, projects, technologies, and goals. Below is a list of proposed sub-categories offered for discussion (will post this bit to social media): ...]
Gonzalo San Gil, PhD.

Threats and Challenges to Cooperative Economies: Platform Cooperativism Conference | MI... - 1 views

  •  
    "The first lesson from her work is that it's important to get the value proposition correct. Many of the nonprofits aren't delivering value to people, and the thing that will get people engaged will be if it's valuable to them. For-profits are nailing the value proposition for consumers, which is why consumers are flocking to them."
Gonzalo San Gil, PhD.

Rootkit Security: The Next Big Challenge - EnterpriseStorageForum.com - 0 views

  •  
    [... It has been sixteen months since I retired - or thought I was retiring - from my monthly column. A lot has happened since. First, my company was purchased by Seagate, and I am now part of the Seagate Government Solutions organization. That, of course, now changes what I write about in this column a bit as I am now a vendor, but I am still going to deal with the big issues facing storage and data movement. I will do my best to continue to not mention vendors unless I am referencing things that are in the news. Secondly, this will not be a monthly column - I'll likely post something every few months. And lastly, I want to thank those who have written in and asked me to keep writing. Thank you! The topic this month is going to be rootkits, which are nasty security issues that I think we all need to start thinking about, as well as what to do about them. ...]
Gonzalo San Gil, PhD.

Facts, Not Fear: The Truth About Encryption by Techdirt - Beacon - 0 views

  •  
    Techdirt will go beyond the talking points & fear mongering to bring facts to the debate - and we'll go even further, creating an ad campaign that reaches millions to better educate everyone about the importance of encryption. 95%funded so far23days left $9,504raised so far Back this work *This project will only be funded if $10,000 is raised by Mar 26th, 8:52pm CET
Gonzalo San Gil, PhD.

Cultural and Social Values Meaning Differences with Examples | SLN - 0 views

  •  
    "Fri, 09/12/2014 - 02:51 -- Umar Farooq There two different types of values Define Cultural Values Cultural values are hereditary and form core of the culture. List of cultural values include customs, rituals conventions, styles and fashions which are remain in the core culture. The values hold supreme position among them. These values give a shape to the culture and the society. These are very difficult to change because they remain in embedded of social institutions and the social norms. These are the ideals of society. These are remain in the memory of our elders, in old books, in religious and ethical literature. These are sometimes, referred as the values of the old people or the values of the past. They can -be said as the traditions of our life. The deviation from cultural values creates serious social problems. If these are ignored in social life there will be a gap between 'two generations and the son will be separated from his father. But it happens seldom in rapidly changing societies. The neurotic conditions develop due to dissatisfaction in social conditions which lead to frustration."
Gonzalo San Gil, PhD.

How Long Will Desktop Linux Last? - Datamation - 0 views

  •  
    "I've been a desktop Linux user for seventeen years. For eight of those years, I haven't had a copy of Windows installed on any machine in the house."
  •  
    "I've been a desktop Linux user for seventeen years. For eight of those years, I haven't had a copy of Windows installed on any machine in the house."
Gonzalo San Gil, PhD.

Linux Security Guide (extended version) - Linux Audit - 0 views

  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
Gonzalo San Gil, PhD.

Apple must repay $14.5 billion in underpaid taxes in Ireland | ITworld - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! ... Meanwhile, in the #OpenSource / #FreeSoftware development W@rld... https://mako.cc/writing/funding_volunteers/funding_volunteers.html
  •  
    Apple's tax benefits in Ireland are illegal, and the company will have to pay up to €13 billion (US$14.5 billion) in back taxes, plus interest.
  •  
    Apple's tax benefits in Ireland are illegal, and the company will have to pay up to €13 billion (US$14.5 billion) in back taxes, plus interest.
Gonzalo San Gil, PhD.

Tools To Password Protect Folder In Linux - LinuxAndUbuntu - 0 views

  •  
    "Most of the time, having a password protected user is all you need to keep your files private and protected from prying eyes. There are those few times when you need to allow access to your account to another person, sometimes there are folders or files you would like to keep away from being accessed. Now we can password protect folder with several handy tools. In the Windows world, these tools are quite easily available for Windows but today we will look at a few options available for the Linux user."
  •  
    "Most of the time, having a password protected user is all you need to keep your files private and protected from prying eyes. There are those few times when you need to allow access to your account to another person, sometimes there are folders or files you would like to keep away from being accessed. Now we can password protect folder with several handy tools. In the Windows world, these tools are quite easily available for Windows but today we will look at a few options available for the Linux user."
Gonzalo San Gil, PhD.

U.S. Congress must act on government hacking, reject Rule 41 - Access Now - 0 views

  •  
    "Washington D.C. - Access Now today calls upon the U.S. Congress to reject a new rule that will expand the Federal Bureau of Investigation's (FBI) hacking operations. The call comes as the Supreme Court of the United States reported a change in the Federal Rules of Criminal Procedure, specifically Rule 41, to Congress. The change enables the FBI to hack into computers regardless of where they are located, and to hack into the computers belonging to the victims of botnet operations. Access Now strongly opposes the update to Rule 41."
  •  
    "Washington D.C. - Access Now today calls upon the U.S. Congress to reject a new rule that will expand the Federal Bureau of Investigation's (FBI) hacking operations. The call comes as the Supreme Court of the United States reported a change in the Federal Rules of Criminal Procedure, specifically Rule 41, to Congress. The change enables the FBI to hack into computers regardless of where they are located, and to hack into the computers belonging to the victims of botnet operations. Access Now strongly opposes the update to Rule 41."
1 - 20 of 102 Next › Last »
Showing 20 items per page