Skip to main content

Home/ Sensorica Knowledge/ Group items tagged B.

Rss Feed Group items tagged

Tiberius Brastaviceanu

What is an ontology and why we need it - 1 views

  • an ontology designer makes these decisions based on the structural properties of a class.
  • an ontology is a formal explicit description of concepts in a domain of discourse (classes (sometimes called concepts)), properties of each concept describing various features and attributes of the concept (slots (sometimes called roles or properties)), and restrictions on slots (facets (sometimes called role restrictions)). An ontology together with a set of individual instances of classes constitutes a knowledge base. In reality, there is a fine line where the ontology ends and the knowledge base begins.
  • Classes describe concepts in the domain
  • ...16 more annotations...
  • A class can have subclasses that represent concepts that are more specific than the superclass.
  • Here we discuss general issues to consider and offer one possible process for developing an ontology. We describe an iterative approach to ontology development: we start with a rough first pass at the ontology. We then revise and refine the evolving ontology and fill in the details. Along the way, we discuss the modeling decisions that a designer needs to make, as well as the pros, cons, and implications of different solutions.
  • In practical terms, developing an ontology includes: �         defining classes in the ontology, �         arranging the classes in a taxonomic (subclass–superclass) hierarchy, �         defining slots and describing allowed values for these slots, �         filling in the values for slots for instances.
  • We can then create a knowledge base by defining individual instances of these classes filling in specific slot value information and additional slot restrictions.
  • Slots describe properties of classes and instances:
  • There is no one correct way to model a domain— there are always viable alternatives. The best solution almost always depends on the application that you have in mind and the extensions that you anticipate. 2)      Ontology development is necessarily an iterative process. 3)      Concepts in the ontology should be close to objects (physical or logical) and relationships in your domain of interest. These are most likely to be nouns (objects) or verbs (relationships) in sentences that describe your domain.
  • some fundamental rules in ontology design
  • how detailed or general the ontology is going to be
  • what we are going to use the ontology for
  • concepts in the ontology must reflect this reality
  • We suggest starting the development of an ontology by defining its domain and scope. That is, answer several basic questions: �         What is the domain that the ontology will cover? �         For what  we are going to use the ontology? �         For what types of questions the information in the ontology should provide answers? �         Who will use and maintain the ontology?
  • plan to use
  • domain
  • If the people who will maintain the ontology describe the domain in a language that is different from the language of the ontology users, we may need to provide the mapping between the languages.
  • One of the ways to determine the scope of the ontology is to sketch a list of questions that a knowledge base based on the ontology should be able to answer, competency questions
  • These competency questions are just a sketch and do not need to be exhaustive.
Kurt Laitner

Asia Times Online :: Nondominium - the Caspian solution - 0 views

  • A Caspian partnership The proposal is that the littoral states should form a Caspian Foundation legal entity, and commit to that entity all existing rights in respect of the use, and the fruits of use (usufruct), of the Caspian Sea, and everything on it, in it, or under it. The Caspian Foundation would act as custodian or steward and the nations would have agreed governance rights of veto. This negative or passive veto right of stewardship is very different from conventional property rights of absolute ownership and temporary use under condominium. Moreover, it does not have the active power of control held under common law by a trustee on behalf of beneficiaries, and the legal complexities and management conflicts which go with it. The Caspian Foundation would be a subscriber to a Caspian Partnership framework agreement between the nations, investors of money or money's worth, and a consortium of service providers. This Caspian Partnership would not be yet another international organization, with everything that goes with that. It would not own anything, employ anyone or contract with anyone: it would simply be an associative framework agreement within which Caspian nations self-organize to the common purpose of the sustainable development of the Caspian Sea.
  • Nondominium - the Caspian solution By Chris Cook Twenty-first century problems cannot be solved with 20th century solutions. Nowhere is that saying so true as in territorial disputes where oil and gas are involved. The riches of the Caspian Sea have been the subject of dispute for years, and relatively simple - but still intractable - binary issues between Iran and Russia are now multiplied by the conflicting claims of what are now five littoral Caspian nations: Azerbaijan, Iran; Kazakhstan; Russia and Turkmenistan. Their claims relate not just to rights on the Caspian Sea surface, but to rights in the sea, and above all to the rights to the treasures that lie under it. There are two 20th century legal approaches: international law //ad information var tf_adModel = "FEV"; var tf_adType = "InBannerVideo"; var tf_commonLocation = "http://cdnx.tribalfusion.com/media/common/expand/"; //leave this variable as it is var tf_cookieFlash = "http://cdnx.tribalfusion.com/media/common/TFSObj_v2s"; var tf_isExpansionHandle = true; var tf_floatAdScriptPath = "http://cdnx.tribalfusion.com/media/common/floating/TF_FloatAdLibrary.js"; var tf_zoomFlash = "http://cdnx.tribalfusion.com/media/common/floating/TFScale_v1"; var tf_banner = { "flag" : "inBanner", "width" : 300, "height" : 250, "widthExpanded" : 600, "heightExpanded" : 450, "widthFloating" : 950, "heightFloating" : 570, "iWin" : [ ], "flashFile" : "http://cdnx.tribalfusion.com/media/4523336/Glow_Banner_Square_Template_V201", extraFlashVars:"tf_showPanelonLoad=true&tf_phase2=false", "video_expand" : "http://cdnx.tribalfusion.com/media/4523336/video.flv", "imageFile" : "http://cdnx.tribalfusion.com/media/4523336/300.jpg", "video" : "http://cdnx.tribalfusion.com/media/4523336/video.flv", "clickTag" : "http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=tf&c=20&mc=click&pli=8816678&PluID=0&ord=619093658", "clickTag1" : "http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=tf&c=20&mc=click&pli=8816678&PluID=0&ord=619093658", "clickTag2" : "http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=tf&c=20&mc=click&pli=8816678&PluID=0&ord=619093658", "socialNetworks" : [ ], "video_expand_start" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=0pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_midpoint" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=50pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_firstQuartile" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=25pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_thirdQuartile" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=75pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_complete" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=100pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_mute" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=MuteLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_unmute" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=UnmuteLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_pause" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=PauseLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_rewind" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=RewindLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_resume" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=ResumeLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_replay" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=ReplayLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_fullscreen" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=FSLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_close" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=VCloseLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "clickTag_tracking" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=ClickLive&ord=619093658&custom1=Save 3 Now(Click Tag)&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;ph:@phase@", "clickTag1_tracking" : "http:
  • A Caspian partnership The proposal is that the littoral states should form a Caspian Foundation legal entity, and commit to that entity all existing rights in respect of the use, and the fruits of use (usufruct), of the Caspian Sea, and everything on it, in it, or under it. The Caspian Foundation would act as custodian or steward and the nations would have agreed governance rights of veto. This negative or passive veto right of stewardship is very different from conventional property rights of absolute ownership and temporary use under condominium. Moreover, it does not have the active power of control held under common law by a trustee on behalf of beneficiaries, and the legal complexities and management conflicts which go with it. The Caspian Foundation would be a subscriber to a Caspian Partnership framework agreement between the nations, investors of money or money's worth, and a consortium of service providers. This Caspian Partnership would not be yet another international organization, with everything that goes with that. It would not own anything, employ anyone or contract with anyone: it would simply be an associative framework agreement within which Caspian nations self-organize to the common purpose of the sustainable development of the Caspian Sea.
  • ...1 more annotation...
  • A Caspian partnership The proposal is that the littoral states should form a Caspian Foundation legal entity, and commit to that entity all existing rights in respect of the use, and the fruits of use (usufruct), of the Caspian Sea, and everything on it, in it, or under it. The Caspian Foundation would act as custodian or steward and the nations would have agreed governance rights of veto. This negative or passive veto right of stewardship is very different from conventional property rights of absolute ownership and temporary use under condominium. Moreover, it does not have the active power of control held under common law by a trustee on behalf of beneficiaries, and the legal complexities and management conflicts which go with it. The Caspian Foundation would be a subscriber to a Caspian Partnership framework agreement between the nations, investors of money or money's worth, and a consortium of service providers. This Caspian Partnership would not be yet another international organization, with everything that goes with that. It would not own anything, employ anyone or contract with anyone: it would simply be an associative framework agreement within which Caspian nations self-organize to the common purpose of the sustainable development of the Caspian Sea.
Justin McCollen

Learning Spill Risk Management - 1 views

started by Justin McCollen on 15 Jan 13 no follow-up yet
Justin McCollen

Top Quality Spill Control Products and Services - 2 views

Bunding

started by Justin McCollen on 01 Mar 13 no follow-up yet
Tiberius Brastaviceanu

Mantrap (access control) - Wikipedia, the free encyclopedia - 0 views

  • A mantrap, air lock, sally port or access control vestibule is a physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens.
Francois Bergeron

Cell Tester Opens the Window of Discovery | Product Information | Articles - 0 views

  • Written by Lisa J Fulghum    Physiologic Mechanisms in Cardiac Myocytes and Skeletal Muscle Cells The revolutionary Cell Tester SI-CTS200 is a new research tool for cellular investiga
  • The revolutionary Cell Tester SI-CTS200 is a new research tool for cellular investigation that can (without any changes) be used for one single living cell, for a small multi-cellular preparation and for single or larger skinned muscle strip preparations. Translational experiments from the single living cells to the intact multi-cellular level can be accomplished.
  • The Cell Tester offers: Integral microtweezer apparatus that facilitates cellular attachment Two integrated piezo manipulators are included Bio-compatible adhesive (MyoTak™) included Unique rotational stage that allows for easy cellular alignment, improved experimental throughput (shown in the image above) Ultra-quiet force transducer included Linear displacement motor stretches or compresses cells with 25nm precision Fits ANY inverted microscope Use native cuvette or ANY 35mm glass bottom dish
  •  
    The revolutionary Cell Tester SI-CTS200 is a new research tool
Francois Bergeron

sigrok - 1 views

  • The sigrok project aims at creating a portable, cross-platform, Free/Libre/Open-Source signal analysis software suite that supports various device types (e.g. logic analyzers, oscilloscopes, and many more). It is licensed under the terms of the GNU GPL, version 3 or later.
  •  
    suggested by Jonathan
Tiberius Brastaviceanu

Co-Creating as Disruption to the Dominant Cultural Framework » Wirearchy - 0 views

  • more open people processes
  • Participative processes like Open Space, World Cafes, Unconferences, Peer Circles
  • Barcamps, Wordcamps, Govcamps, Foo Camps, Unconferences, high-end celebrity-and-marketing-and venture-capital ‘experience’ markets, new cultural and artistic festivals with technology-and-culture-making themes
  • ...45 more annotations...
  • maker faires
  • community-and-consensus building, organizing for activism and fundraising
  • The impetus behind this explosion is both technological and sociological
  • Technological
  • information technology and the creation and evolution of the Internet and the Web
  • appearance, development and evolution of social tools, web services, massive storage, and the ongoing development of computer-and-smart-devices development
  • Sociological
  • People are searching for ways to find others with similar interests and motivations so that they can engage in activities that help them learn, find work, grow capabilities and skills, and tackle vexing social and economic problems
  • get informed and take action
  • Developing familiarity and practice with open and collaborative processes
  • play and work together
  • rules about self-management, operate democratically, and produce results grounded in ownership and the responsibilities that have been agreed upon by the ‘community’
  • The relationships and flows of information can be transferred to online spaces and often benefit from wider connectivity.
  • Today, our culture-making activities are well engaged in the early stages of cultural mutation
  • What’s coming along next ?  “Smart” devices and Internet everywhere in our lives ?  Deep(er) changes to the way things are conceived, carried out, managed and used ?  New mental models ?  Or, will we discover real societal limits to what can be done given the current framework of laws, institutions and established practices with which people are familiar and comfortable ?
  • Shorter cycle-based development and release
  • Agile development
  • It is clear evidence that the developmental and learning dynamics generated by continuous or regular feedback loops are becoming the norm in areas of activity in which change and short cycles of product development are constants.
  • The Internet of Things (IoT)
  • clothes, homes, cars, buildings, roads, and a wide range of other objects that have a place in peoples’ daily life activities
  • experiencing major growth, equally in terms of hardware, software and with respect to the way the capabilities are configured and used
  • The IoT concept is being combined with the new-ish concepts of Open Data and Big Data
  • ethical, political and social impact policy decisions
  • that key opportunities associated with widespread uptake of the IoT are derived from the impact upon peoples’ activities and lives
  • ‘we’ are on our way towards more integrated eco-systems of issues, people and technologies
  • participation and inclusion enabled by interconnectedness are quickly becoming the ‘new rules’
  • What the Future May Hold
  • the ‘scenario planning’ approach
  • world’s politics, economics, anthropology, technology, psychology, sociology and philosophy
  • A scenario planning exercise carried out by the Rockefeller Foundation
  • Clearly these early (and now not-so-weak) signals and patterns tell us that the core assumptions and principles that have underpinned organized human activities for most of the past century
  • are being changed by the combinations and permutations of new, powerful, inexpensive and widely accessible information-processing technologies
  • The short description of each scenario reinforces the perception that we are both individually and collectively in transition from a linear, specialized, efficiency-driven paradigm towards a paradigm based on continuous feedback loops and principles of participation, both large and small in scope.
  • cultural ‘mutation’
  • Wirearchy
  • a dynamic two-way flow of power and authority based on knowledge, trust, credibility and a focus on results, enabled by interconnected people and technology.
  • the role of social media and smart mobile devices in the uprisings in Egypt, Libya and elsewhere in the Middle East
  • The roots of organizational development (OD) are in humanistic psychology and sociology action and ethnographic and cybernetic/ socio-technical systems theory.  It’s a domain that emerged essentially as a counter-balance to the mechanistic and machine-metaphor-based core assumptions about the organized activities in our society.
  • Organizational development principles are built upon some basic assumptions about human motivations, engagement and activities.
  • Participative Work Design – The Six Criteria
  • in recent years created models that help clarify how to evaluate and respond to the continuous turbulence and ambiguity generated by participating in interconnected flows of information.
  • contexts characterized by either Simple, Complicated or Chaotic dynamics (from complexity theory fundamentals). Increasingly, Complexity is emerging as a key definer of the issues, problems and opportunities faced by our societies.
  • peer-to-peer movement(s) unfolding around the world
  • Co-creating in a wide range of forms, processes and purpose may become an effective and important antidote to the spreading enclosure of human creative activity.
  • But .. the dominant models of governance, commercial ownership and the use and re-use of that which is co-created by people are going to have to undergo much more deep change in order to disrupt the existing paradigm of proprietary commercial creation and the model of socio-economic power that this paradigm enables and carries today.
Kurt Laitner

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
Tiberius Brastaviceanu

Proposal - Food SFS-08-2014 - 1 views

  • development of more resource-efficient and sustainable food production and processing
  • competitive and innovative
    • Tiberius Brastaviceanu
       
      We are proposing collaborative ways, here the accent is put on competitive ways 
    • Tiberius Brastaviceanu
       
      We are proposing collaborative methods. Here, the accent is put on COMPETITIVE ways for a "sustainable circular economy"
  • ...29 more annotations...
  • reduction in water and energy use
  • gas emissions and waste generation
  • improving the efficiency
  • ensuring or improving shelf life, food safety and quality
  • competitive eco-innovative processes should be developed
  • sustainable circular economy
  • Intellectual Property (IP)
  • In phase 1, a feasibility study
  • technological/practical as well as economic viability of an innovation idea/concept with considerable novelty to the industry sector
  • to establish a solid high-potential innovation project
  • increase profitability of the enterprise through innovation
  • increase the return in investment in innovation activities
  • The proposal should contain an initial business plan based on the proposed idea/concept.
  • apply to phase 1 with a view to applying to phase 2 at a later date, or directly to phase 2.
  • EUR 50,000. Projects should last around 6 months
    • Tiberius Brastaviceanu
       
      Phase 1 has a classical language. We would need to mask our true identity and beliefs writing this grant proposal. I don't think it's for us... But this is only my opinion. 
  • In phase 2, innovation projects will be supported that address the specific challenge of Sustainable Food Security
  • demonstrate high potential in terms of company competitiveness and growth underpinned by a strategic business plan
    • Tiberius Brastaviceanu
       
      This is more about individual companies and their competitive advantage. Not about networks and not about collaboration and sharing. 
    • Tiberius Brastaviceanu
       
      Moreover, they put emphasis on IP protection and ownership, when we must talk about commons, knowledge commons applied to agriculture, sharing platforms, etc. 
  • Proposals shall be based on an elaborated business plan either developed through phase 1 or another means.
  • Particular attention must be paid to IP protection and ownership
  • Successful beneficiaries will be offered coaching and mentoring support during phase 1 and phase 2.
  • Enhancing profitability
  • competitive solutions
  • global business opportunities
  • sustainable
  • turnover
  • IP management
  • return on investment and profit
Tiberius Brastaviceanu

BeagleBone Black ID: 1278 - $45.00 : Adafruit Industries, Unique & fun DIY electronics ... - 2 views

    • Tiberius Brastaviceanu
       
      Ronan bla bla bla
  • If you liked the BeagleBone, you will love the next gen BeagleBone Black! With a blistering 1GHz processor, 512MB onboard DDR3 RAM, built in 2GB storage with pre-installed Linux operating system (no microSD card required!), and best of all, the addition of a MicroHDMI connector for audio/video output. This is a ultra-powered embedded computer that can fit in a mint tin. Note: As of June 4, 2013, 1pm ET Adafruit is shipping Rev A5B.
  • n on supported accessories as we test them for compatibility. For now we suggest picking up a 5V 2A power supply and a micro-HDMI cable. If you want to use it 'head-less', a USB console cable is suggested as the 'Black does not have an onboard USB-to-Serial converter
Tiberius Brastaviceanu

Chubb detector lock - Wikipedia, the free encyclopedia - 0 views

  • A Chubb detector lock is a type of lever tumbler lock with an integral security feature, a form of relocker, which frustrates unauthorised access attempts and indicates to the lock's owner that it has been interfered with. When someone tries to pick the lock or to open it using the wrong key, the lock is designed to jam in a locked state until (depending on the lock) either a special regulator key or the original key is inserted and turned in a different direction. This alerts the owner to the fact that the lock has been tampered with.
Tiberius Brastaviceanu

Free-Form Authority Models - P2P Foundation - 0 views

  • ‘authority models’in peer production, contrasts owner-centric authority models from free-form models
  • define the authority models at work in such projects. The models define access and the workflow, and whether there is any quality control.
  • the owner-centric model, entries can only be modified with the permission of a specific ‘owner’ who has to defend the integrity of his module.
  • ...11 more annotations...
  • The free-form model connotes more of a sense that all users are on the “same level," and that expertise will be universally recognized and deferred to.
  • the owner-centric authority model assumes the owner is the de facto expert in the topic at hand
  • In the case of the Wikipedia, the adherents of the owner-centric model, active in the pre-Wikipedia "Nupedia" model, lost out, and presumable, the success of Wikipedia has proven them wrong
  • dominance of difficult people, trolls, and their enablers
  • Far too much credence and respect accorded to people who in other Internet contexts would be labelled "trolls."
  • Wikipedia has, to its credit, done something about the most serious trolling and other kinds of abuse: there is an Arbitration Committee that provides a process whereby the most disruptive users of Wikipedia can be ejected from the project. But there are myriad abuses and problems that never make it to mediation, let alone arbitration.
  • most people working on Wikipedia--the constant fighting can be so off-putting as to drive them away
  • any person who can and wants to work politely with well-meaning
  • root problem: anti-elitism, or lack of respect for expertise.
  • Wikipedia lacks the habit or tradition of respect for expertise
  • nearly everyone with much expertise but little patience will avoid editing Wikipedia
  •  
    from p2p foundation 
Tiberius Brastaviceanu

Federated Decision Making v1.0.pdf - Google Docs - 0 views

  •  
    A concept introduced b Roy Zuninga, tibi's contact
Kurt Laitner

Inequality: Why egalitarian societies died out - opinion - 30 July 2012 - New Scientist - 0 views

  • FOR 5000 years, humans have grown accustomed to living in societies dominated by the privileged few. But it wasn't always this way. For tens of thousands of years, egalitarian hunter-gatherer societies were widespread. And as a large body of anthropological research shows, long before we organised ourselves into hierarchies of wealth, social status and power, these groups rigorously enforced norms that prevented any individual or group from acquiring more status, authority or resources than others.*
  • How, then, did we arrive in the age of institutionalised inequality? That has been debated for centuries. Philosopher Jean-Jacques Rousseau reasoned in 1754 that inequality was rooted in the introduction of private property. In the mid-19th century, Karl Marx and Friedrich Engels focused on capitalism and its relation to class struggle. By the late 19th century, social Darwinists claimed that a society split along class lines reflected the natural order of things - as British philosopher Herbert Spencer put it, "the survival of the fittest". (Even into the 1980s there were some anthropologists who held this to be true - arguing that dictators' success was purely Darwinian, providing estimates of the large numbers of offspring sired by the rulers of various despotic societies as support.)
  • But by the mid-20th century a new theory began to dominate. Anthropologists including Julian Steward, Leslie White and Robert Carneiro offered slightly different versions of the following story: population growth meant we needed more food, so we turned to agriculture, which led to surplus and the need for managers and specialised roles, which in turn led to corresponding social classes.
  • ...8 more annotations...
  • One line of reasoning suggests that self-aggrandising individuals who lived in lands of plenty ascended the social ranks by exploiting their surplus - first through feasts or gift-giving, and later by outright dominance
  • At the group level, argue anthropologists Peter Richerson and Robert Boyd, improved coordination and division of labour allowed more complex societies to outcompete the simpler, more equal societies
  • From a mechanistic perspective, others argued that once inequality took hold - as when uneven resource-distribution benefited one family more than others - it simply became ever more entrenched. The advent of agriculture and trade resulted in private property, inheritance, and larger trade networks, which perpetuated and compounded economic advantages.
  • Many theories about the spread of stratified society begin with the idea that inequality is somehow a beneficial cultural trait that imparts efficiencies, motivates innovation and increases the likelihood of survival. But what if the opposite were true?
  • In a demographic simulation that Omkar Deshpande, Marcus Feldman and I conducted at Stanford University, California, we found that, rather than imparting advantages to the group, unequal access to resources is inherently destabilising and greatly raises the chance of group extinction in stable environments.
  • Counterintuitively, the fact that inequality was so destabilising caused these societies to spread by creating an incentive to migrate in search of further resources. The rules in our simulation did not allow for migration to already-occupied locations, but it was clear that this would have happened in the real world, leading to conquests of the more stable egalitarian societies - exactly what we see as we look back in history.
  • In other words, inequality did not spread from group to group because it is an inherently better system for survival, but because it creates demographic instability, which drives migration and conflict and leads to the cultural - or physical - extinction of egalitarian societies.
  • Egalitarian societies may have fostered selection on a group level for cooperation, altruism and low fertility (which leads to a more stable population), while inequality might exacerbate selection on an individual level for high fertility, competition, aggression, social climbing and other selfish traits.
Francois Bergeron

Refined Myograph Systems for Mice and Rats, Lab Refined Myograph Systems - 0 views

  • The  pre-calibrated amplifier eliminates the need to calibrate with weights.
  • The system includes base, vertical support, bath support, micromanipulator block, micro- manipulator handle, muscle  supports rods, 1 pr/feet for rings, 25 μm and 100 μm Stainless Steel (3 m), 1 pr/hooks, 20 clips for strips, single myograph  bath and the TRN001 transducer.
  • Applications:• Pharmacological Effects• Receptors• Vaso-Mechanics• Pathology• Tissue Biopsies• GI Motility• Respiratory Airway Mechanics• Reproductive Physiology• Intracellular Ions with Fluorescence• Electrophysiological Measurements
  • ...1 more annotation...
  • Basic Myograph for rings and strips 1 $7,385
Francois Bergeron

iWorx :: Customers - 0 views

  • Colleges and Universities Using iWorx Physiology Teaching Kits
  • CANADA Alliance University College Brandon University Camosun College Canadian College of Naturopathic Medicine Carleton University Concordia University, College of Alberta Cornell College Durham College John Abbott College Malaspina University McMaster University OntarioTechnical St. Francis Xavier University St. Peter's College Toronto Rehab Institute Trinity Western University Universite Laval University College of the Cariboo University of British Columbia University of Guelph University of New Brunswick University of Ontario Institute of Technology University of Ottawa University of Saskatchewan University of Toronto University of Waterloo University of Windsor University of Victoria
Francois Bergeron

Poly(methyl methacrylate) - Wikipedia, the free encyclopedia - 0 views

  • Names PMMA has been sold under a variety of brand names and generic names. It is often generically called acrylic glass,[6] although it is chemically unrelated to glass. It is sometimes called simply acrylic, although acrylic can also refer to other polymers or copolymers containing polyacrylonitrile. Other notable trade names include: Plexiglas
  • Acrylic paint essentially consists of PMMA suspended in water; however since PMMA is hydrophobic, a substance with both hydrophobic and hydrophilic groups needs to be added to facilitate the suspension.
  • Plastic optical fiber used for short distance communication is made from PMMA, and perfluorinated PMMA, clad with fluorinated PMMA, in situations where its flexibility and cheaper installation costs outweigh its poor heat tolerance and higher attenuation over glass fiber.
Tiberius Brastaviceanu

ICT-37-2014 - 0 views

  • provide support to a large set of early stage high risk innovative SMEs in the ICT sector
  • Focus will be on SME proposing innovative ICT concept, product and service applying new sets of rules, values and models which ultimately disrupt existing markets.
  • disruptive ideas
  • ...27 more annotations...
  • prototyping
  • validation and demonstration
  • deployment
  • Proposed projects should have a potential for disruptive innovation and fast market up-take in ICT.
  • interesting for entrepreneurs and young innovative companies
  • bearing a strong EU dimension.
  • Participants can apply to Phase 1 with a view to applying to Phase 2 at a later date, or directly to Phase 2.
  • In phase 1, a feasibility study
  • services and technologies or new market applications of existing technologies
  • Intellectual Property (IP) management
  • increase profitability
  • The proposal should contain an initial business plan based on the proposed idea/concept.
  • EUR 50.000. Projects should last around 6 months
    • Tiberius Brastaviceanu
       
      I don't understand why they call it Open (ODI) when they also talk about Intellectual Property. 
  • company competitiveness
  • prototyping
  • demonstration
  • readiness and maturity for market introduction
  • may also include some research
  • For technological innovation a Technology Readiness Levels of 6 or above
  • Proposals shall be based on an elaborated business plan
  • Proposals shall contain a specification for the outcome of the project, including a first commercialisation plan, and criteria for success.
    • Tiberius Brastaviceanu
       
      We are not a SME and have no classical commercialization plan. We can form an Exchange Firm for example, and offer services for OVNi for example, helping local food networks, providing them infrastructure. But in that case, the business plan for the Exchange Firm should contain a revenue model. Who is going to pay for the deployment of the OVNi in order to make the Exchange Firm commercially viable in the eyes of the Commission?  
  • coaching and mentoring support during phase 1 and phase 2
  • growth plan and maximising it through internationalisation
  • Enhancing profitability and growth performance of SMEs by combining and transferring new and existing knowledge into innovative, disruptive and competitive solutions
  • Open Disruptive Innovation Scheme
  •  
    "Specific Challenge: The challenge is to provide support to a large set of early stage high risk innovative SMEs in the ICT sector. Focus will be on SME proposing innovative ICT concept, product and service applying new sets of rules, values and models which ultimately disrupt existing markets."
Kurt Laitner

Crowding Out - P2P Foundation - 1 views

  • The curve indicates that while workers will initially chose to work more when paid more per hour, there is a point after which rational workers will choose to work less
    • Kurt Laitner
       
      in other words, people are financially motivated until they are financially secure, then other motivations come in
  • "leaders" elsewhere will come and become your low-paid employees
  • At that point, the leaders are no longer leaders of a community, and they turn out to be suckers after all, working for pittance, comparatively speaking
    • Kurt Laitner
       
      so part of the dynamic is that everyone is paid fairly, if not there is the feeling of exploitation
  • ...36 more annotations...
  • under certain structural conditions non-price-based production is extraordinarily robust
    • Kurt Laitner
       
      which are... abundance?
  • There is, in fact, a massive amount of research that supports the idea that when you pay people to do something for you, they stop enjoying it, and distrust their own motivations. The mysterious something that goes away, and that “Factor X” even has a name: intrinsic motivation.
    • Kurt Laitner
       
      the real question though is why, and whether it is the paying them that is the problem, or perhaps how that is determined, and who else gets what on what basis..  if you have to have them question the fairness of the situation, they will likely check out
  • giving rewards to customers can actually undermine a company’s relationship with them
  • It just is not so easy to assume that because people behave productively in one framework (the social process of peer production that is Wikipedia, free and open source software, or Digg), that you can take the same exact behavior, with the same exact set of people, and harness them to your goals by attaching a price to what previously they were doing in a social process.
  • Extrinsic rewards suggest that there is actually an instrumental relationship at work, that you do the activity in order to get something else
  • If you pay me for it, it must be work
    • Kurt Laitner
       
      only because a dichotomy of work and play exists in western culture
  • It’s what we would call a robust effect. It shows up in many contexts. And there’s been considerable testing to try to find out exactly why it works. A major school of thought is that there is an “Overjustification Effect.” (http://kozinets.net/archives/133)
    • Kurt Laitner
       
      yes, why is key
  • interesting examples of an effect called crowding
  • Offering financial rewards for contributions to online communities basically means mixing external and intrinsic motivation.
  • A good example is children who are paid by their parents for mowing the family lawn. Once they expect to receive money for that task, they are only willing to do it again if they indeed receive monetary compensation. The induced unwillingness to do anything for free may also extend to other household chores.
  • Once ‘gold-stars’ were introduced as a symbolic reward for a certain amount of time spent practicing the instrument, the girl lost all interest in trying new, difficult pieces. Instead of aiming at improving her skills, her goal shifted towards spending time playing well-learned, easy pieces in order to receive the award (Deci with Flaste 1995)
    • Kurt Laitner
       
      this is a more troubling example, as playing the harder pieces is also practicing - I would take this as a more complex mechanism at work - perhaps the reinterpretation by the girl that all playing was considered equal, due to the pricing mechanism, in which case the proximal solution would be to pay more for more complex pieces, or for levels of achievement - the question remains of why the extrinsic reward was introduced in the first place (unwillingness to practice as much as her parents wanted?) - which would indicate intrinsic motivation was insufficient in this case
  • Suddenly, she managed to follow the prescription, as her own (intrinsic) motivation was recognized and thereby reinforced.
    • Kurt Laitner
       
      or perhaps the key was to help her fit the medication into her day, which she was having trouble with...
  • The introduction of a monetary fine transforms the relationship between parents and teachers from a non-monetary into a monetary one
    • Kurt Laitner
       
      absolutely, in some sense the guilt of being late is replaced by a rationalization that you are paying them - it is still a rationalization, and parents in this case need to be reminded that staff have lives too to reinforce the moral suasion
  • "The effects of external interventions on intrinsic motivation have been attributed to two psychological processes: (a) Impaired self-determination. When individuals perceive an external intervention to reduce their self-determination, they substitute intrinsic motivation by extrinsic control. Following Rotter (1966), the locus of control shifts from the inside to the outside of the person affected. Individuals who are forced to behave in a specific way by outside intervention, feel overjustified if they maintained their intrinsic motivation. (b) Impaired self-esteem. When an intervention from outside carries the notion that the actor's motivation is not acknowledged, his or her intrinsic motivation is effectively rejected. The person affected feels that his or her involvement and competence is not appreciated which debases its value. An intrinsically motivated person is taken away the chance to display his or her own interest and involvement in an activity when someone else offers a reward, or commands, to undertake it. As a result of impaired self-esteem, individuals reduce effort.
    • Kurt Laitner
       
      these are finally very useful - so from (a) as long as self determination is maintained (actively) extrinsic reward should not shut down intrinsic motivation AND (b) so long as motivations are recognized and reward dimensions OTHER THAN financial continue to operate, extrinsic reward should not affect intrinsic motivation
  • External interventions crowd-out intrinsic motivation if the individuals affected perceive them to be controlling
    • Kurt Laitner
       
      emphasis on "if" and replacing that with "in so far as"
  • External interventions crowd-in intrinsic motivation if the individuals concerned perceive it as supportive
    • Kurt Laitner
       
      interesting footnote
  • In that case, self-esteem is fostered, and individuals feel that they are given more freedom to act, thus enlarging self-determination
    • Kurt Laitner
       
      so effectively a system needs to ensure it is acting on all dimensions of reward, or at least those most important to the particular participant, ego (pride, recognition, guilt reduction, feeling needed, being helpful, etc), money (sustenance, beyond which it is less potent), meaning/purpose etc.  If one ran experiments controlling for financial self sufficiency, then providing appreciation and recognition as well as the introduced financial reward, they might yield different results
  • cultural categories that oppose marketplace modes of behavior (or “market logics”) with the more family-like modes of behavior of caring and sharing that we observe in close-knit communities (”community logics”)
    • Kurt Laitner
       
      are these learned or intrinsic?
  • this is labor, this is work, just do it.
    • Kurt Laitner
       
      except that this cultural meme is already a bias, not a fact
  • When communal logics are in effect, all sorts of norms of reciprocity, sacrifice, and gift-giving come into play: this is cool, this is right, this is fun
    • Kurt Laitner
       
      true, and part of our challenge then is to remove this dichotomy
  • So think about paying a kid to clean up their room, paying parishioners to go to church, paying people in a neighborhood to attend a town hall meeting, paying people to come out and vote. All these examples seem a little strange or forced. Why? Because they mix and match the communal with the market-oriented.
    • Kurt Laitner
       
      and perhaps the problem is simply the conversion to money, rather than simply tracking these activities themselves (went to church 50 times this year!, helped 50 orphans get families!) (the latter being more recognition than reward
  • Payment as disincentive. In his interesting book Freakonomics, economist Steven Levitt describes some counterintuitive facts about payment. One of the most interesting is that charging people who do the wrong thing often causes them to do it more, and paying people to do the right thing causes them to do it less.
    • Kurt Laitner
       
      and tracking them causes them to conform to cultural expectations
  • You direct people _away_ from any noble purpose you have, and instead towards grubbing for dollars
    • Kurt Laitner
       
      and we are left with the challenge, how to work to purpose but still have our scarce goods needs sufficiently provided for?  it has to be for love AND money
  • When people work for a noble purpose, they are told that their work is highly valued. When people work for $0.75/hour, they are told that their work is very low-valued
    • Kurt Laitner
       
      so pay them highly for highly valued labour, and don't forget to recognize them as well... no?
  • you're going to have to fight your way through labour laws and tax issues all the way to bankruptcy
    • Kurt Laitner
       
      this is a non argument, these are just interacting but separate problems, use ether or bitcoin, change legislation, what have you
  • Market economics. If you have open content, I can copy your content to another wiki, not pay people, and still make money. So by paying contributors, you're pricing yourself out of the market.
    • Kurt Laitner
       
      exactly, so use commonsource, they can use it all they want, but they have to flow through benefit (provide attribution, recognition, and any financial reward must be split fairly)
  • You don't have to pay people to do what they want to do anyways. The labour cost for leisure activities is $0. And nobody is going to work on a wiki doing things they don't want to do.
    • Kurt Laitner
       
      wow, exploitative in the extreme - no one can afford to do work for free, it cuts into paid work, family time etc.  if they are passionate about something they will do it for free if they cannot get permission to do it for sustenance, but they still need to sustain themselves, and they are making opportunity cost sacrifices, and if you are in turn making money off of this you are an asshole.. go ahead look in the mirror and say "I am an asshole"
  • No fair system. There's simply no fair, automated and auditable way to divvy up the money
    • Kurt Laitner
       
      this is an utter cop out - figure out what is close enough to fair and iterate forward to improve it, wow
  • too complicated to do automatically. But if you have a subjective system -- have a human being evaluate contributions to an article and portion out payments -- it will be subject to constant challenges, endless debates, and a lot of community frustration.
    • Kurt Laitner
       
      yes to the human evaluation part, but "it's too complicated" is disingenuous at the least
  • Gaming the system. People are really smart. If there's money to be made, they'll figure out how to game your payment system to get more money than they actually deserve
    • Kurt Laitner
       
      yes indeed, so get your metrics right, and be prepared to adjust them as they are gamed - and ultimately, as financial penalties are to BP, even if some people game the system, can we better the gaming of the capitalist system.. it's a low bar I know
  • They'll be trying to get as much money out of you as possible, and you'll be trying to give as little as you can to them
    • Kurt Laitner
       
      it doesn't have to be this way, unless you think that way already
  • If you can't convince people that working on your project is worth their unpaid time, then there's probably something wrong with your project.
    • Kurt Laitner
       
      wow, talk about entrepreneurial taker attitude rationalization
  • People are going to be able to sense that -- it's going to look like a cover-up, something sleazy
    • Kurt Laitner
       
      and getting paid for others free work isn't sleazy, somehow...?
  • Donate.
    • Kurt Laitner
       
      better yet, give yourself a reasonable salary, and give the rest away
  • Thank-you gifts
    • Kurt Laitner
       
      cynical.. here have a shiny bobble you idiot
  • Pay bounties
    • Kurt Laitner
       
      good way to get people to compete ineffectively instead of cooperating on a solution, the lottery mechanism is evil
  •  
    while good issue are brought up in this article, the solutions offered are myopic and the explanations of the observed effects not satisfying
1 - 20 of 27 Next ›
Showing 20 items per page