Skip to main content

Home/ Sensorica Knowledge/ Group items tagged IDE

Rss Feed Group items tagged

Kurt Laitner

Asia Times Online :: Nondominium - the Caspian solution - 0 views

  • A Caspian partnership The proposal is that the littoral states should form a Caspian Foundation legal entity, and commit to that entity all existing rights in respect of the use, and the fruits of use (usufruct), of the Caspian Sea, and everything on it, in it, or under it. The Caspian Foundation would act as custodian or steward and the nations would have agreed governance rights of veto. This negative or passive veto right of stewardship is very different from conventional property rights of absolute ownership and temporary use under condominium. Moreover, it does not have the active power of control held under common law by a trustee on behalf of beneficiaries, and the legal complexities and management conflicts which go with it. The Caspian Foundation would be a subscriber to a Caspian Partnership framework agreement between the nations, investors of money or money's worth, and a consortium of service providers. This Caspian Partnership would not be yet another international organization, with everything that goes with that. It would not own anything, employ anyone or contract with anyone: it would simply be an associative framework agreement within which Caspian nations self-organize to the common purpose of the sustainable development of the Caspian Sea.
  • Nondominium - the Caspian solution By Chris Cook Twenty-first century problems cannot be solved with 20th century solutions. Nowhere is that saying so true as in territorial disputes where oil and gas are involved. The riches of the Caspian Sea have been the subject of dispute for years, and relatively simple - but still intractable - binary issues between Iran and Russia are now multiplied by the conflicting claims of what are now five littoral Caspian nations: Azerbaijan, Iran; Kazakhstan; Russia and Turkmenistan. Their claims relate not just to rights on the Caspian Sea surface, but to rights in the sea, and above all to the rights to the treasures that lie under it. There are two 20th century legal approaches: international law //ad information var tf_adModel = "FEV"; var tf_adType = "InBannerVideo"; var tf_commonLocation = "http://cdnx.tribalfusion.com/media/common/expand/"; //leave this variable as it is var tf_cookieFlash = "http://cdnx.tribalfusion.com/media/common/TFSObj_v2s"; var tf_isExpansionHandle = true; var tf_floatAdScriptPath = "http://cdnx.tribalfusion.com/media/common/floating/TF_FloatAdLibrary.js"; var tf_zoomFlash = "http://cdnx.tribalfusion.com/media/common/floating/TFScale_v1"; var tf_banner = { "flag" : "inBanner", "width" : 300, "height" : 250, "widthExpanded" : 600, "heightExpanded" : 450, "widthFloating" : 950, "heightFloating" : 570, "iWin" : [ ], "flashFile" : "http://cdnx.tribalfusion.com/media/4523336/Glow_Banner_Square_Template_V201", extraFlashVars:"tf_showPanelonLoad=true&tf_phase2=false", "video_expand" : "http://cdnx.tribalfusion.com/media/4523336/video.flv", "imageFile" : "http://cdnx.tribalfusion.com/media/4523336/300.jpg", "video" : "http://cdnx.tribalfusion.com/media/4523336/video.flv", "clickTag" : "http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=tf&c=20&mc=click&pli=8816678&PluID=0&ord=619093658", "clickTag1" : "http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=tf&c=20&mc=click&pli=8816678&PluID=0&ord=619093658", "clickTag2" : "http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=tf&c=20&mc=click&pli=8816678&PluID=0&ord=619093658", "socialNetworks" : [ ], "video_expand_start" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=0pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_midpoint" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=50pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_firstQuartile" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=25pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_thirdQuartile" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=75pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_complete" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=100pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_mute" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=MuteLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_unmute" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=UnmuteLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_pause" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=PauseLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_rewind" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=RewindLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_resume" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=ResumeLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_replay" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=ReplayLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_fullscreen" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=FSLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_close" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=VCloseLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "clickTag_tracking" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=ClickLive&ord=619093658&custom1=Save 3 Now(Click Tag)&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;ph:@phase@", "clickTag1_tracking" : "http:
  • A Caspian partnership The proposal is that the littoral states should form a Caspian Foundation legal entity, and commit to that entity all existing rights in respect of the use, and the fruits of use (usufruct), of the Caspian Sea, and everything on it, in it, or under it. The Caspian Foundation would act as custodian or steward and the nations would have agreed governance rights of veto. This negative or passive veto right of stewardship is very different from conventional property rights of absolute ownership and temporary use under condominium. Moreover, it does not have the active power of control held under common law by a trustee on behalf of beneficiaries, and the legal complexities and management conflicts which go with it. The Caspian Foundation would be a subscriber to a Caspian Partnership framework agreement between the nations, investors of money or money's worth, and a consortium of service providers. This Caspian Partnership would not be yet another international organization, with everything that goes with that. It would not own anything, employ anyone or contract with anyone: it would simply be an associative framework agreement within which Caspian nations self-organize to the common purpose of the sustainable development of the Caspian Sea.
  • ...1 more annotation...
  • A Caspian partnership The proposal is that the littoral states should form a Caspian Foundation legal entity, and commit to that entity all existing rights in respect of the use, and the fruits of use (usufruct), of the Caspian Sea, and everything on it, in it, or under it. The Caspian Foundation would act as custodian or steward and the nations would have agreed governance rights of veto. This negative or passive veto right of stewardship is very different from conventional property rights of absolute ownership and temporary use under condominium. Moreover, it does not have the active power of control held under common law by a trustee on behalf of beneficiaries, and the legal complexities and management conflicts which go with it. The Caspian Foundation would be a subscriber to a Caspian Partnership framework agreement between the nations, investors of money or money's worth, and a consortium of service providers. This Caspian Partnership would not be yet another international organization, with everything that goes with that. It would not own anything, employ anyone or contract with anyone: it would simply be an associative framework agreement within which Caspian nations self-organize to the common purpose of the sustainable development of the Caspian Sea.
Francois Bergeron

Displacement | Microstrain - 0 views

  • MicroStrain offers a range of miniature displacement sensors.  These include contact sensors, non-contact sensors, and signal conditioners. Within our contact sensors, we offer gauging, non-gauging, sub-miniature (very small) and micro-miniature (smallest available on the market) displacement sensor designs.  MicroStrain displacement/position sensors are known as DVRTs (Differential Variable Reluctance Transducers) which are half-bridge LVDTs (Linear Variable Differential Transformers).  Our DVRTs deliver a very high linear stroke range to body length ratio, and can be used in environments where traditional LVDTs are too large.  MicroStrain’s miniature displacement transducers are extremely robust, capable of operating at temperatures up to 175°C in corrosive media such as saline, oil, and brake fluid.  The near frictionless design enables sensors to operate over millions of cycles without wear or degradation in signal quality.
  • croStrain offers a range of miniature displacement sensors.  These include contact sensors, non-contact sensors, and signal conditioners. Within our contact sensors, we offer gauging, non-gauging, sub-miniature (very small) and micro-miniature (smallest available on the market) displacement sensor designs.  MicroStrain displacement/position sensors are known as DVRTs (Differential Variable Reluctance Transducers) which are half-bridge LVDTs (Linear Variable Differential Transformers).  Our DVRTs deliver a very high linear stroke range to body length ratio, and can be used in environments where traditional LVDTs are too large.  MicroStrain’s miniature displacement transducers are extremely robust, capable of operating at temperatures up to 175°C in corrosive media such as saline, oil, and brake fluid.  The near frictionless design enables sensors to operate over millions of cycles without wear or degradation in signal quality. MicroStrain’s displacement sensing products including transducers, signal conditioners, and motherboards. These systems provide highly precise measurement solutions. MicroStrain’s contact displacement transducers deliver highly precise linear measurements with an extremely small, miniature design.  Both gauging and non-gauging displacement transducers are available. Our non-contact displacement transducers are designed to measure the displacement and proximity of a metal target without physical contact. MicroStrain offers wireless, analog, and digital output DVRT signal conditioners. Signal conditioners are required for use with MicroStrain DVRT displacement sensors.   .familyNav1, .familyNav2, .familyNav3, .familyNav4 { background: none repeat scroll 0 0 #CCCCCC; color: #FFFFFF; display: block; font-size: 14px; margin: 1px 0; padding: 6px 0 3px 6px; text-decoration: none; } .familyNav1:hover, .familyNav2:hover, .familyNav3:hover, .familyNav4:hover { opacity:1.0; filter:alpha(opacity=100); } .familyNav1:hover, .familyNav1.live { background:#0468AD; } .familyNav2:hover, .familyNav2.live{ background:#32641E; } .familyNav3:hover, .familyNav3.live{ background:#B55A11; } .familyNav4:hover, .familyNav4.live{ background:#76285D; } .familySub { margin: -1px 0 0; opacity:0.7; filter:alpha(opacity=80); font-size:12px; } .familySub img { width: 22px; } WIRELESS SENSOR NETWORKS
Kurt Laitner

Inequality: Why egalitarian societies died out - opinion - 30 July 2012 - New Scientist - 0 views

  • FOR 5000 years, humans have grown accustomed to living in societies dominated by the privileged few. But it wasn't always this way. For tens of thousands of years, egalitarian hunter-gatherer societies were widespread. And as a large body of anthropological research shows, long before we organised ourselves into hierarchies of wealth, social status and power, these groups rigorously enforced norms that prevented any individual or group from acquiring more status, authority or resources than others.*
  • How, then, did we arrive in the age of institutionalised inequality? That has been debated for centuries. Philosopher Jean-Jacques Rousseau reasoned in 1754 that inequality was rooted in the introduction of private property. In the mid-19th century, Karl Marx and Friedrich Engels focused on capitalism and its relation to class struggle. By the late 19th century, social Darwinists claimed that a society split along class lines reflected the natural order of things - as British philosopher Herbert Spencer put it, "the survival of the fittest". (Even into the 1980s there were some anthropologists who held this to be true - arguing that dictators' success was purely Darwinian, providing estimates of the large numbers of offspring sired by the rulers of various despotic societies as support.)
  • But by the mid-20th century a new theory began to dominate. Anthropologists including Julian Steward, Leslie White and Robert Carneiro offered slightly different versions of the following story: population growth meant we needed more food, so we turned to agriculture, which led to surplus and the need for managers and specialised roles, which in turn led to corresponding social classes.
  • ...8 more annotations...
  • One line of reasoning suggests that self-aggrandising individuals who lived in lands of plenty ascended the social ranks by exploiting their surplus - first through feasts or gift-giving, and later by outright dominance
  • At the group level, argue anthropologists Peter Richerson and Robert Boyd, improved coordination and division of labour allowed more complex societies to outcompete the simpler, more equal societies
  • From a mechanistic perspective, others argued that once inequality took hold - as when uneven resource-distribution benefited one family more than others - it simply became ever more entrenched. The advent of agriculture and trade resulted in private property, inheritance, and larger trade networks, which perpetuated and compounded economic advantages.
  • Many theories about the spread of stratified society begin with the idea that inequality is somehow a beneficial cultural trait that imparts efficiencies, motivates innovation and increases the likelihood of survival. But what if the opposite were true?
  • In a demographic simulation that Omkar Deshpande, Marcus Feldman and I conducted at Stanford University, California, we found that, rather than imparting advantages to the group, unequal access to resources is inherently destabilising and greatly raises the chance of group extinction in stable environments.
  • Counterintuitively, the fact that inequality was so destabilising caused these societies to spread by creating an incentive to migrate in search of further resources. The rules in our simulation did not allow for migration to already-occupied locations, but it was clear that this would have happened in the real world, leading to conquests of the more stable egalitarian societies - exactly what we see as we look back in history.
  • In other words, inequality did not spread from group to group because it is an inherently better system for survival, but because it creates demographic instability, which drives migration and conflict and leads to the cultural - or physical - extinction of egalitarian societies.
  • Egalitarian societies may have fostered selection on a group level for cooperation, altruism and low fertility (which leads to a more stable population), while inequality might exacerbate selection on an individual level for high fertility, competition, aggression, social climbing and other selfish traits.
Tiberius Brastaviceanu

Key (lock) - Wikipedia, the free encyclopedia - 0 views

  • Key systems
  • Individually keyed system (KD)[edit] With an individually keyed system, each cylinder can be opened by its unique key
  • Keyed alike (KA)[edit] This system allows for a number of cylinders to be operated by the same key. It is ideally suited to residential and commercial applications such as front and back doors.
  • ...10 more annotations...
  • Common entrance suite / Maison keying (CES)[edit] This system is widely used in apartments, office blocks and hotels. Each apartment (for example) has its own individual key which will not open the doors to any other apartments, but will open common entrance doors and communal service areas. It is often combined with a master-keyed system in which the key is kept by the landlord.
  • Master keyed (MK)
  • A master key operates a set of several locks. Usually, there is nothing special about the key itself, but rather the locks into which it will fit.
  • A practical attack exists to create a working master key for an entire system given only access to a single master-keyed lock, its associated change key, a supply of appropriate key blanks, and the ability to cut new keys. This is described in Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks.[36] However, for systems with many levels of master keys, it may be necessary to collect information from locks in different "subsystems" in order to deduce the master key. Locksmiths may also determine cuts for a replacement master key, when given several different key examples from a given system.
  • Control key
  • A control key is a special key used in removable core locking systems. The control key enables a user, who has very little skill, to remove from the core, with a specific combination, and replace it with a core that has a different combination.
  • Do not duplicate key
  • A "do not duplicate" key (or DND key, for short) is one that has been stamped "do not duplicate", "duplication prohibited
  • Restricted key
  • A restricted keyblank has a keyway for which a manufacturer has set up a restricted level of sales and distribution. Restricted keys are often protected by patent, which prohibits other manufacturers from making unauthorized productions of the key blank. In many cases, customers must provide proof of ID before a locksmith will cut additional keys using restricted blanks. Some companies, such as Medeco High Security Locks, have keyways that are restricted to having keys cut in the factory only. This is done to ensure the highest amount of security. These days, many restricted keys have special in-laid features, such as magnets, different types of metal, or even small computer chips to prevent duplication.
Tiberius Brastaviceanu

Collaborations: The rise of research networks : Nature : Nature Publishing Group - 0 views

  • Co-authorship has been increasing inexorably3, 4. Recently it has exploded.
  • Collaboration is normally a good thing from a wider public perspective. Knowledge is better transferred and combined by collaboration, and co-authored papers tend to be cited more frequently
  • The first paper with 1,000 authors was published in 2004
  • ...33 more annotations...
  • a paper with 3,000 authors came in 2008
  • By last year, a total of 120 physics papers had more than 1,000 authors and 44 had more than 3,000
  • independent contributions to joint efforts, usually in the form of data, that involve only weak intellectual interaction
  • Papers with hundreds of co-authors contribute to the apparent pervasiveness of collaboration between countries.
  • Consequently, distinguishing Malta's own science performance is already impossible. This blurring of national distinctiveness could be a growing issue.
  • The rapid growth of each nation's research base and regional links, driven by relatively strong economies investing in innovation, will undoubtedly produce a regional research labour force to be reckoned with by 2020
  • China's rapid growth since 2000 is leading to closer research collaboration with Japan
  • Taiwan
  • South Korea
  • Australia
  • Asia-Pacific region
  • India has a growing research network with Japan, South Korea and Taiwan, although it is not as frequent a collaborator with China as one might expect
  • Middle East, Egypt and Saudi Arabia have a strong research partnership that is drawing in neighbours including Tunisia and Algeria.
  • Latin America has an emerging research network focused around Brazil,
  • has doubled its collaboration with Argentina, Chile and Mexico in the past five years
  • Africa has three distinct networks: in southern Africa, in French-speaking countries in West Africa and in English-speaking nations in East Africa.
  • proximity is just one of several factors in networks
  • use paths of least resistance to partnership, rather than routes that might provide other strategic gains
  • Commonwealth countries
  • have adopted similar research structures
  • Students
  • proximity
  • lower cost of living
  • generous government scholarships
  • Job opportunities
  • countries in science's old guard must drop their patrician tendencies, open up clear communication channels and join in with new alliances as equal participants before they find themselves the supplicants.
  • Collaboration between the public and private sectors has become more apparent because of government interest in exploiting research for economic competitiveness. Some data show that industrial investment in research seems to be dropping — perhaps a reaction to the recession, but the trend seems to be long term, at least in the United Kingdom9
  • Incentives for collaborative innovation investment that draws directly on the science base would be a good start.
  • So what are the costs and benefits of collaboration? It provides access to resources, including funding, facilities and ideas. It will be essential for grand challenges in physics, environment and health to have large, international teams supported by major facilities and rich data, which encourage the rapid spread of knowledge.
  • Research networks are a tool of international diplomacy.
  • As for costs, collaboration takes time and travel and means a shared agenda
  • The risk is that international, national and institutional agendas may become driven by the same bland establishment consensus.
  • The iconoclastic, the maverick and the marginal may find a highly collaborative world a difficult place to flourish
  •  
    "Co-authorship has been increasing inexorably3, 4. Recently it has exploded."
Tiberius Brastaviceanu

Horizon 2020 - European Commission - 0 views

  • Latest news and events Register and come to the METRIC Final Conference! Event date: 19/03/2015 Brussels, Belgium The objective of the Final Conference is to present key findings on regional Transport Innovation Frameworks, measuring and explaining the performance of regional innovation frameworks, meta-analysis of main principles and typology for regional innovation, regional strategy plan and recommendations. Read more
    • abrankhalid
       
      hello group
    • Tiberius Brastaviceanu
       
      kjdsfhg vndfhgfskgdhskfghls
    • abrankhalid
       
      iudghfisdhfijshdfishiwgeifuhwiudfssdf
Tiberius Brastaviceanu

'Anti-Troll' Marblar Unites NASA Patents, Samsung to Crowdsource New Products - 1 views

  • can be found in NASA technology, and the new crowdsourcing website Marblar is taking advantage of that to find the next big thing.
  • The site Wednesday announced that several hundred patents from NASA and other organizations would be available for its users to play with.
  • many companies' research and development departments spend millions of dollars on such patents, more than 95 percent of them sit unused.
  • ...19 more annotations...
  • what if people saw the patents
  • aying dormant
  • new ways that we can incorporate these patents into new products?"
  • Marblar also obtained access to many patents from the University of Pennsylvania and from ETRI,
  • The site also partnered with Samsung,
  • or its potential to bring the patents of Marblar users to life.
  • Any idea that Samsung likes could find its way into Samsung technology, with 10 percent of the royalties going to the Marblar users who brought it to life
    • Tiberius Brastaviceanu
       
      Samsong decides what to develop or not... this is still top down, when it comes to choosing the technology to be developed. But at least the list of ideas has been curated and refined.
    • Tiberius Brastaviceanu
       
      Using the crowd to curate and refine ideas/inventions
  • The contributors to a Marblar project might be helping an inventor out of the goodness of their heart, but they also stand to gain if a particular product gets the green light. Marblar rewards users who provide useful data or information by giving them "marbles," the websites namesake currency.
    • Tiberius Brastaviceanu
       
      They do have some sort of value accounting system in place. See the open value network model http://valuenetwork.referata.com/wiki/Value_accounting_system 
  • In the spirit of crowdsourcing, other Marblar users can help out a particular inventor whose idea they want to see come to life.
  • "As you submit product ideas and contribute market data or technical data, you get more marbles," Perez said.
    • Tiberius Brastaviceanu
       
      Quirky developed prototyping, manufacturing and distribution capabilities
  • The more marbles a person earns, the bigger the cut he or she gets in the royalty check if the product makes it to market.
  • Another website, Quirky
  • have a store dedicated to selling its users products
  • patents have become more associated with litigation than productivity.
  • "Patent trolls buy up patents to extract money, with no intention of actually creating a product," he said. "Marblar is like the anti-troll. We're looking for new ways to commercialize."
Francois Bergeron

Poly(methyl methacrylate) - Wikipedia, the free encyclopedia - 0 views

  • Names PMMA has been sold under a variety of brand names and generic names. It is often generically called acrylic glass,[6] although it is chemically unrelated to glass. It is sometimes called simply acrylic, although acrylic can also refer to other polymers or copolymers containing polyacrylonitrile. Other notable trade names include: Plexiglas
  • Acrylic paint essentially consists of PMMA suspended in water; however since PMMA is hydrophobic, a substance with both hydrophobic and hydrophilic groups needs to be added to facilitate the suspension.
  • Plastic optical fiber used for short distance communication is made from PMMA, and perfluorinated PMMA, clad with fluorinated PMMA, in situations where its flexibility and cheaper installation costs outweigh its poor heat tolerance and higher attenuation over glass fiber.
Tiberius Brastaviceanu

Beyond Blockchain: Simple Scalable Cryptocurrencies - The World of Deep Wealth - Medium - 0 views

  • I clarify the core elements of cryptocurrency and outline a different approach to designing such currencies rooted in biomimicry
  • This post outlines a completely different strategy for implementing cryptocurrencies with completely distributed chains
  • Rather than trying to make one global, anonymous, digital cash
  • ...95 more annotations...
  • we are interested in the resilience that comes from building a rich ecosystem of interoperable currencies
  • What are the core elements of a modern cryptocurrency?
  • Digital
  • Holdings are electronic and only exist and operate by virtue of a community’s agreement about how to interpret digital bits according to rules about operation and accounting of the currency.
  • Trustless
  • don’t have to trust a 3rd party central authority
  • Decentralized
  • Specifically, access, issuance, transaction accounting, rules & policies, should be collectively visible, known, and held.
  • Cryptographic
  • This cryptographic structure is used to enable a variety of people to host the data without being able to alter it.
  • Identity
  • there must be a way to associate these bits with some kind of account, wallet, owner, or agent who can use them
  • Other things that many take for granted in blockchains may not be core but subject to decisions in design and implementation, so they can vary between implementations
  • It does not have to be stored in a synchronized global ledger
  • does not have to be money. It may be a reputation currency, or data used for identity, or naming, etc
  • Its units do not have to be cryptographic tokens or coins
  • It does not have to protect the anonymity of users, although it may
  • if you think currency is only money, and that money must be artificially scarce
  • Then you must tackle the problem of always tracking which coins exist, and which have been spent. That is one approach — the one blockchain takes.
  • You might optimize for anonymity if you think of cryptocurrency as a tool to escape governments, regulations, and taxes.
  • if you want to establish and manage membership in new kinds of commons, then identity and accountability for actions may turn out to be necessary ingredients instead of anonymity.
  • In the case of the MetaCurrency Project, we are trying to support many use cases by building tools to enable a rich ecosystem of communities and current-sees (many are non-monetary) to enhance collective intelligence at all scales.
  • Managing consensus about a shared reality is a central challenge at the heart of all distributed computing solutions.
  • If we want to democratize money by having cryptocurrencies become a significant and viable means of transacting on a daily basis, I believe we need fundamentally more scalable approaches that don’t require expensive, dedicated hardware just to participate.
  • We should not need system wide consensus for two people to do a transaction in a cryptocurrency
  • Blockchain is about managing a consensus about what was “said.” Ceptr is about distributing a consensus about how to “speak.”
  • how nature gets the job done in massively scalable systems which require coordination and consistency
  • Replicate the same processes across all nodes
  • Empower every node with full agency
  • Hold this transformed state locally and reliably
  • Establish protocols for interaction
  • Each speaker of a language carries the processes to understand sentences they hear, and generate sentences they need
  • we certainly don’t carry some kind of global ledger of everything that’s ever been said, or require consensus about what has been said
  • Language IS a communication protocol we learn by emulating the processes of usage.
  • Dictionaries try to catch up when the usage
  • there is certainly no global ledger with consensus about the state of trillions of cells. Yet, from a single zygote’s copy of DNA, our cells coordinate in a highly decentralized manner, on scales of trillions, and without the latency or bottlenecks of central control.
  • Imagine something along the lines of a Java Virtual Machine connected to a distributed version of Github
  • Every time this JVM runs a program it confirms the hash of the code it is about to execute with the hash signed into the code repository by its developers
  • This allows each node that intends to be honest to be sure that they’re running the same processes as everyone else. So when two parties want to do a transaction, and each can have confidence their own code, and the results that your code produces
  • Then you treat it as authoritative and commit it to your local cryptographically self-validating data store
  • Allowing each node to treat itself as a full authority to process transactions (or interactions via shared protocols) is exactly how you empower each node with full agency. Each node runs its copy of the signed program/processes on its own virtual machine, taking the transaction request combined with the transaction chains of the parties to the transaction. Each node can confirm their counterparty’s integrity by replaying their transactions to produce their current state, while confirming signatures and integrity of the chain
  • If both nodes are in an appropriate state which allows the current transaction, then they countersign the transaction and append to their respective chains. When you encounter a corrupted or dishonest node (as evidenced by a breach of integrity of their chain — passing through an invalid state, broken signatures, or broken links), your node can reject the transaction you were starting to process. Countersigning allows consensus at the appropriate scale of the decision (two people transacting in this case) to lock data into a tamper-proof state so it can be stored in as many parallel chains as you need.
  • When your node appends a mutually validated and signed transaction to its chain, it has updated its local state and is able to represent the integrity of its data locally. As long as each transaction (link in the chain) has valid linkages and countersignatures, we can know that it hasn’t been tampered with.
  • If you can reliably embody the state of the node in the node itself using Intrinsic Data Integrity, then all nodes can interact in parallel, independent of other interactions to maximize scalability and simultaneous processing. Either the node has the credits or it doesn’t. I don’t have to refer to a global ledger to find out, the state of the node is in the countersigned, tamper-proof chain.
  • Just like any meaningful communication, a protocol needs to be established to make sure that a transaction carries all the information needed for each node to run the processes and produce a new signed and chained state. This could be debits or credits to an account which modify the balance, or recoding courses and grades to a transcript which modify a Grade Point Average, or ratings and feedback contributing to a reputation score, and so on.
  • By distributing process at the foundation, and leveraging Intrinsic Data Integrity, our approach results in massive improvements in throughput (from parallel simultaneous independent processing), speed, latency, efficiency, and cost of hardware.
  • You also don’t need to incent people to hold their own record — they already want it.
  • Another noteworthy observation about humans, cells, and atoms, is that each has a general “container” that gets configured to a specific use.
  • Likewise, the Receptors we’ve built are a general purpose framework which can load code for different distributed applications. These Receptors are a lightweight processing container for the Ceptr Virtual Machine Host
  • Ceptr enables a developer to focus on the rules and transactions for their use case instead of building a whole framework for distributed applications.
  • how units in a currency are issued
  • Most people think that money is just money, but there are literally hundreds of decisions you can make in designing a currency to target particular needs, niches, communities or patterns of flow.
  • Blockchain cryptocurrencies are fiat currencies. They create tokens or coins from nothing
  • These coins are just “spoken into being”
  • the challenging task of
  • ensure there is no counterfeiting or double-spending
  • Blockchain cryptocurrencies are fiat currencies
  • These coins are just “spoken into being”
  • the challenging task of tracking all the coins that exist to ensure there is no counterfeiting or double-spending
  • You wouldn’t need to manage consensus about whether a cryptocoin is spent, if your system created accounts which have normal balances based on summing their transactions.
  • In a mutual credit system, units of currency are issued when a participant extends credit to another user in a standard spending transaction
  • Alice pays Bob 20 credits for a haircut. Alice’s account now has -20, and Bob’s has +20.
  • Alice spent credits she didn’t have! True
  • Managing the currency supply in a mutual credit system is about managing credit limits — how far people can spend into a negative balance
  • Notice the net number units in the system remains zero
  • One elegant approach to managing mutual credit limits is to set them based on actual demand.
  • concerns about manufacturing fake accounts to game credit limits (Sybil Attacks)
  • keep in mind there can be different classes of accounts. Easy to create, anonymous accounts may get NO credit limit
  • What if I alter my code to give myself an unlimited credit limit, then spend as much as I want? As soon as you pass the credit limit encoded in the shared agreements, the next person you transact with will discover you’re in an invalid state and refuse the transaction.
  • If two people collude to commit an illegal transaction by both hacking their code to allow a normally invalid state, the same still pattern still holds. The next person they try to transact with using untampered code will detect the problem and decline to transact.
  • Most modern community currency systems have been implemented as mutual credit,
  • Hawala is a network of merchants and businessmen, which has been operating since the middle ages, performing money transfers on an honor system and typically settling balances through merchandise instead of transferring money
  • Let’s look at building a minimum viable cryptocurrency with the hawala network as our use case
  • To minimize key management infrastructure, each hawaladar’s public key is their address or identity on the network. To join the network you get a copy of the software from another hawaladar, generate your public and private keys, and complete your personal profile (name, location, contact info, etc.). You call, fax, or email at least 10 hawaladars who know you, and give them your IP address and ask them to vouch for you.
  • Once 10 other hawaladars have vouched for you, you can start doing other transactions because the protocol encoded in every node will reject a transaction chain that doesn’t start with at least 10 vouches
  • seeding your information with those other peers so you can be found by the rest of the network.
  • As described in the Mutual Credit section, at the time of transaction each party audits the counterparty’s transaction chain.
  • Our hawala crypto-clearinghouse protocol has two categories of transactions: some used for accounting and others for routing. Accounting transactions change balances. Routing transactions maintain network integrity by recording information about hawaladar
  • Accounting Transactions create signed data that changes account balances and contains these fields:
  • The final hash of all of the above fields is used as a unique transaction ID and is what each of party signs with their private keys. Signing indicates a party has agreed to the terms of the transaction. Only transactions signed by both parties are considered valid. Nodes can verify signatures by confirming that decryption of the signature using the public key yields a result which matches the transaction ID.
  • Routing Transactions sign data that changes the peers list and contain these fields:
  • As with accounting transactions, the hash of the above fields is used as the transaction’s unique key and the basis for the cryptographic signature of both counterparties.
  • Remember, instead of making changes to account balances, routing transactions change a node’s local list of peers for finding each other and processing.
  • a distributed network of mutual trust
  • operates across national boundaries
  • everyone already keeps and trusts their own separate records
  • Hawaladars are not anonymous
  • “double-spending”
  • It would be possible for someone to hack the code on their node to “forget” their most recent transaction (drop the head of their chain), and go back to their previous version of the chain before that transaction. Then they could append a new transaction, drop it, and append again.
  • After both parties have signed the agreed upon transaction, each party submits the transaction to separate notaries. Notaries are a special class of participant who validate transactions (auditing each chain, ensuring nobody passes through an invalid state), and then they sign an outer envelope which includes the signatures of the two parties. Notaries agree to run high-availability servers which collectively manage a Distributed Hash Table (DHT) servicing requests for transaction information. As their incentive for providing this infrastructure, notaries get a small transaction fee.
  • This approach introduces a few more steps and delays to the transaction process, but because it operates on independent parallel chains, it is still orders of magnitude more efficient and decentralized than reaching consensus on entries in a global ledger
  • millions of simultaneous transactions could be getting processed by other parties and notaries with no bottlenecks.
  • There are other solutions to prevent nodes from dropping the head of their transaction chain, but the approach of having notaries serve out a DHT solves a number of common objections to completely distributed accounting. Having access to reliable lookups in a DHT provides a similar big picture view that you get from a global ledger. For example, you may want a way to look up transactions even when the parties to that transaction are offline, or to be able to see the net system balance at a particular moment in time, or identify patterns of activity in the larger system without having to collect data from everyone individually.
  • By leveraging Intrinsic Data Integrity to run numerous parallel tamper-proof chains you can enable nodes to do various P2P transactions which don’t actually require group consensus. Mutual credit is a great way to implement cryptocurrencies to run in this peered manner. Basic PKI with a DHT is enough additional infrastructure to address main vulnerabilities. You can optimize your solution architecture by reserving reserve consensus work for tasks which need to guarantee uniqueness or actually involve large scale agreement by humans or automated contracts.
  • It is not only possible, but far more scalable to build cryptocurrencies without a global ledger consensus approach or cryptographic tokens.
  •  
    Article written by Arthur Brook, founder of Metacurrency project and of Ceptr.
Tiberius Brastaviceanu

The Baffler - 0 views

  • This tendency to view questions of freedom primarily through the lens of economic competition, to focus on the producer and the entrepreneur at the expense of everyone else, shaped O’Reilly’s thinking about technology.
  • the O’Reilly brand essence is ultimately a story about the hacker as hero, the kid who is playing with technology because he loves it, but one day falls into a situation where he or she is called on to go forth and change the world,
  • His true hero is the hacker-cum-entrepreneur, someone who overcomes the insurmountable obstacles erected by giant corporations and lazy bureaucrats in order to fulfill the American Dream 2.0: start a company, disrupt an industry, coin a buzzword.
  • ...139 more annotations...
  • gospel of individualism, small government, and market fundamentalism
  • innovation is the new selfishness
  • mastery of public relations
  • making it seem as if the language of economics was, in fact, the only reasonable way to talk about the subject
  • memes are for losers; the real money is in epistemes.
  • “Open source software” was also the first major rebranding exercise overseen by Team O’Reill
  • It’s easy to forget this today, but there was no such idea as open source software before 1998; the concept’s seeming contemporary coherence is the result of clever manipulation and marketing.
  • ideological cleavage between two groups
  • Richard Stallman
  • Free Software Foundation, preoccupied with ensuring that users had rights with respect to their computer programs. Those rights weren’t many—users should be able to run the program for any purpose, to study how it works, to redistribute copies of it, and to release their improved version (if there was one) to the public
  • “free software.”
  • association with “freedom” rather than “free beer”
  • copyleft
  • profound critique of the role that patent law had come to play in stifling innovation and creativity.
  • Plenty of developers contributed to “free software” projects for reasons that had nothing to do with politics. Some, like Linus Torvalds, the Finnish creator of the much-celebrated Linux operating system, did so for fun; some because they wanted to build more convenient software; some because they wanted to learn new and much-demanded skills.
  • Stallman’s rights-talk, however, risked alienating the corporate types
  • he was trying to launch a radical social movement, not a complacent business association
  • By early 1998 several business-minded members of the free software community were ready to split from Stallman, so they masterminded a coup, formed their own advocacy outlet—the Open Source Initiative—and brought in O’Reilly to help them rebrand.
  • “open source”
  • The label “open source” may have been new, but the ideas behind it had been in the air for some time.
  • In those early days, the messaging around open source occasionally bordered on propaganda
  • This budding movement prided itself on not wanting to talk about the ends it was pursuing; except for improving efficiency and decreasing costs, those were left very much undefined.
  • extremely decentralized manner, using Internet platforms, with little central coordination.
  • In contrast to free software, then, open source had no obvious moral component.
  • “open source is not particularly a moral or a legal issue. It’s an engineering issue. I advocate open source, because . . . it leads to better engineering results and better economic results
  • While free software was meant to force developers to lose sleep over ethical dilemmas, open source software was meant to end their insomnia.
  • Stallman the social reformer could wait for decades until his ethical argument for free software prevailed in the public debate
  • O’Reilly the savvy businessman had a much shorter timeline: a quick embrace of open source software by the business community guaranteed steady demand for O’Reilly books and events
  • The coup succeeded. Stallman’s project was marginalized. But O’Reilly and his acolytes didn’t win with better arguments; they won with better PR.
  • A decade after producing a singular vision of the Internet to justify his ideas about the supremacy of the open source paradigm, O’Reilly is close to pulling a similar trick on how we talk about government reform.
  • much of Stallman’s efforts centered on software licenses
  • O’Reilly’s bet wa
  • the “cloud”
  • licenses would cease to matter
  • Since no code changed hands
  • So what did matter about open source? Not “freedom”
  • O’Reilly cared for only one type of freedom: the freedom of developers to distribute software on whatever terms they fancied.
  • the freedom of the producer
  • who must be left to innovate, undisturbed by laws and ethics.
  • The most important freedom,
  • is that which protects “my choice as a creator to give, or not to give, the fruits of my work to you, as a ‘user’ of that work, and for you, as a user, to accept or reject the terms I place on that gift.”
  • O’Reilly opposed this agenda: “I completely support the right of Richard [Stallman] or any individual author to make his or her work available under the terms of the GPL; I balk when they say that others who do not do so are doing something wrong.”
  • The right thing to do, according to O’Reilly, was to leave developers alone.
  • According to this Randian interpretation of open source, the goal of regulation and public advocacy should be to ensure that absolutely nothing—no laws or petty moral considerations—stood in the way of the open source revolution
  • Any move to subject the fruits of developers’ labor to public regulation
  • must be opposed, since it would taint the reputation of open source as technologically and economically superior to proprietary software
  • the advent of the Internet made Stallman’s obsession with licenses obsolete
  • Many developers did stop thinking about licenses, and, having stopped thinking about licenses, they also stopped thinking about broader moral issues that would have remained central to the debates had “open source” not displaced “free software” as the paradigm du jour.
  • Profiting from the term’s ambiguity, O’Reilly and his collaborators likened the “openness” of open source software to the “openness” of the academic enterprise, markets, and free speech.
  • “open to intellectual exchange”
  • “open to competition”
  • “For me, ‘open source’ in the broader sense means any system in which open access to code lowers the barriers to entry into the market”).
  • “Open” allowed O’Reilly to build the largest possible tent for the movement.
  • The language of economics was less alienating than Stallman’s language of ethics; “openness” was the kind of multipurpose term that allowed one to look political while advancing an agenda that had very little to do with politics
  • highlight the competitive advantages of openness.
  • the availability of source code for universal examination soon became the one and only benchmark of openness
  • What the code did was of little importance—the market knows best!—as long as anyone could check it for bugs.
  • The new paradigm was presented as something that went beyond ideology and could attract corporate executives without losing its appeal to the hacker crowd.
  • What Raymond and O’Reilly failed to grasp, or decided to overlook, is that their effort to present open source as non-ideological was underpinned by a powerful ideology of its own—an ideology that worshiped innovation and efficiency at the expense of everything else.
  • What they had in common was disdain for Stallman’s moralizing—barely enough to justify their revolutionary agenda, especially among the hacker crowds who were traditionally suspicious of anyone eager to suck up to the big corporations that aspired to dominate the open source scene.
  • linking this new movement to both the history of the Internet and its future
  • As long as everyone believed that “open source” implied “the Internet” and that “the Internet” implied “open source,” it would be very hard to resist the new paradigm
  • Telling a coherent story about open source required finding some inner logic to the history of the Internet
  • “If you believe me that open source is about Internet-enabled collaboration, rather than just about a particular style of software license,”
  • everything on the Internet was connected to everything else—via open source.
  • The way O’Reilly saw it, many of the key developments of Internet culture were already driven by what he called “open source behavior,” even if such behavior was not codified in licenses.
  • No moralizing (let alone legislation) was needed; the Internet already lived and breathed open source
  • apps might be displacing the browser
  • the openness once taken for granted is no more
  • Openness as a happenstance of market conditions is a very different beast from openness as a guaranteed product of laws.
  • One of the key consequences of linking the Internet to the world of open source was to establish the primacy of the Internet as the new, reinvented desktop
  • This is where the now-forgotten language of “freedom” made a comeback, since it was important to ensure that O’Reilly’s heroic Randian hacker-entrepreneurs were allowed to roam freely.
  • Soon this “freedom to innovate” morphed into “Internet freedom,” so that what we are trying to preserve is the innovative potential of the platform, regardless of the effects on individual users.
  • Lumping everything under the label of “Internet freedom” did have some advantages for those genuinely interested in promoting rights such as freedom of expression
  • Forced to choose between preserving the freedom of the Internet or that of its users, we were supposed to choose the former—because “the Internet” stood for progress and enlightenment.
  • infoware
  • Yahoo
  • their value proposition lay in the information they delivered, not in the software function they executed.
  • The “infoware” buzzword didn’t catch on, so O’Reilly turned to the work of Douglas Engelbart
  • to argue that the Internet could help humanity augment its “collective intelligence” and that, once again, open source software was crucial to this endeavor.
  • Now it was all about Amazon learning from its customers and Google learning from the sites in its index.
  • The idea of the Internet as both a repository and incubator of “collective intelligence”
  • in 2004, O’Reilly and his business partner Dale Dougherty hit on the idea of “Web 2.0.” What did “2.0” mean, exactly?
  • he primary goal was to show that the 2001 market crash did not mean the end of the web and that it was time to put the crash behind us and start learning from those who survived.
  • Tactically, “Web 2.0” could also be much bigger than “open source”; it was the kind of sexy umbrella term that could allow O’Reilly to branch out from boring and highly technical subjects to pulse-quickening futurology
  • O’Reilly couldn’t improve on a concept as sexy as “collective intelligence,” so he kept it as the defining feature of this new phenomenon.
  • What set Web 2.0 apart from Web 1.0, O’Reilly claimed, was the simple fact that those firms that didn’t embrace it went bust
  • find a way to harness collective intelligence and make it part of their business model.
  • By 2007, O’Reilly readily admitted that “Web 2.0 was a pretty crappy name for what’s happening.”
  • O’Reilly eventually stuck a 2.0 label on anything that suited his business plan, running events with titles like “Gov 2.0” and “Where 2.0.” Today, as everyone buys into the 2.0 paradigm, O’Reilly is quietly dropping it
  • assumption that, thanks to the coming of Web 2.0, we are living through unique historical circumstances
  • Take O’Reilly’s musings on “Enterprise 2.0.” What is it, exactly? Well, it’s the same old enterprise—for all we know, it might be making widgets—but now it has learned something from Google and Amazon and found a way to harness “collective intelligence.”
  • tendency to redescribe reality in terms of Internet culture, regardless of how spurious and tenuous the connection might be, is a fine example of what I call “Internet-centrism.”
  • “Open source” gave us the “the Internet,” “the Internet” gave us “Web 2.0,” “Web 2.0” gave us “Enterprise 2.0”: in this version of history, Tim O’Reilly is more important than the European Union
  • For Postman, each human activity—religion, law, marriage, commerce—represents a distinct “semantic environment” with its own tone, purpose, and structure. Stupid talk is relatively harmless; it presents no threat to its semantic environment and doesn’t cross into other ones.
  • Since it mostly consists of falsehoods and opinions
  • it can be easily corrected with facts
  • to say that Tehran is the capital of Iraq is stupid talk
  • Crazy talk, in contrast, challenges a semantic environment, as it “establishes different purposes and assumptions from those we normally accept.” To argue, as some Nazis did, that the German soldiers ended up far more traumatized than their victims is crazy talk.
  • For Postman, one of the main tasks of language is to codify and preserve distinctions among different semantic environments.
  • As he put it, “When language becomes undifferentiated, human situations disintegrate: Science becomes indistinguishable from religion, which becomes indistinguishable from commerce, which becomes indistinguishable from law, and so on.
  • pollution
  • Some words—like “law”—are particularly susceptible to crazy talk, as they mean so many different things: from scientific “laws” to moral “laws” to “laws” of the market to administrative “laws,” the same word captures many different social relations. “Open,” “networks,” and “information” function much like “law” in our own Internet discourse today.
  • For Korzybski, the world has a relational structure that is always in flux; like Heraclitus, who argued that everything flows, Korzybski believed that an object A at time x1 is not the same object as object A at time x2
  • Our language could never properly account for the highly fluid and relational structure of our reality—or as he put it in his most famous aphorism, “the map is not the territory.”
  • Korzybski argued that we relate to our environments through the process of “abstracting,” whereby our neurological limitations always produce an incomplete and very selective summary of the world around us.
  • nothing harmful in this per se—Korzybski simply wanted to make people aware of the highly selective nature of abstracting and give us the tools to detect it in our everyday conversations.
  • Korzybski developed a number of mental tools meant to reveal all the abstracting around us
  • He also encouraged his followers to start using “etc.” at the end of their statements as a way of making them aware of their inherent inability to say everything about a given subject and to promote what he called the “consciousness of abstraction.”
  • There was way too much craziness and bad science in Korzybski’s theories
  • but his basic question
  • “What are the characteristics of language which lead people into making false evaluations of the world around them?”
  • Tim O’Reilly is, perhaps, the most high-profile follower of Korzybski’s theories today.
  • O’Reilly openly acknowledges his debt to Korzybski, listing Science and Sanity among his favorite books
  • It would be a mistake to think that O’Reilly’s linguistic interventions—from “open source” to “Web 2.0”—are random or spontaneous.
  • There is a philosophy to them: a philosophy of knowledge and language inspired by Korzybski. However, O’Reilly deploys Korzybski in much the same way that the advertising industry deploys the latest findings in neuroscience: the goal is not to increase awareness, but to manipulate.
  • O’Reilly, of course, sees his role differently, claiming that all he wants is to make us aware of what earlier commentators may have overlooked. “A metaphor is just that: a way of framing the issues such that people can see something they might otherwise miss,
  • But Korzybski’s point, if fully absorbed, is that a metaphor is primarily a way of framing issues such that we don’t see something we might otherwise see.
  • In public, O’Reilly modestly presents himself as someone who just happens to excel at detecting the “faint signals” of emerging trends. He does so by monitoring a group of überinnovators that he dubs the “alpha geeks.” “The ‘alpha geeks’ show us where technology wants to go. Smart companies follow and support their ingenuity rather than trying to suppress it,
  • His own function is that of an intermediary—someone who ensures that the alpha geeks are heard by the right executives: “The alpha geeks are often a few years ahead of their time. . . . What we do at O’Reilly is watch these folks, learn from them, and try to spread the word by writing down (
  • The name of his company’s blog—O’Reilly Radar—is meant to position him as an independent intellectual who is simply ahead of his peers in grasping the obvious.
  • “the skill of writing is to create a context in which other people can think”
  • As Web 2.0 becomes central to everything, O’Reilly—the world’s biggest exporter of crazy talk—is on a mission to provide the appropriate “context” to every field.
  • In a fascinating essay published in 2000, O’Reilly sheds some light on his modus operandi.
  • The thinker who emerges there is very much at odds with the spirit of objectivity that O’Reilly seeks to cultivate in public
  • meme-engineering lets us organize and shape ideas so that they can be transmitted more effectively, and have the desired effect once they are transmitted
  • O’Reilly meme-engineers a nice euphemism—“meme-engineering”—to describe what has previously been known as “propaganda.”
  • how one can meme-engineer a new meaning for “peer-to-peer” technologies—traditionally associated with piracy—and make them appear friendly and not at all threatening to the entertainment industry.
  • O’Reilly and his acolytes “changed the canonical list of projects that we wanted to hold up as exemplars of the movement,” while also articulating what broader goals the projects on the new list served. He then proceeds to rehash the already familiar narrative: O’Reilly put the Internet at the center of everything, linking some “free software” projects like Apache or Perl to successful Internet start-ups and services. As a result, the movement’s goal was no longer to produce a completely free, independent, and fully functional operating system but to worship at the altar of the Internet gods.
  • Could it be that O’Reilly is right in claiming that “open source” has a history that predates 1998?
  • Seen through the prism of meme-engineering, O’Reilly’s activities look far more sinister.
  • His “correspondents” at O’Reilly Radar don’t work beats; they work memes and epistemes, constantly reframing important public issues in accordance with the templates prophesied by O’Reilly.
  • Or take O’Reilly’s meme-engineering efforts around cyberwarfare.
  • Now, who stands to benefit from “cyberwarfare” being defined more broadly? Could it be those who, like O’Reilly, can’t currently grab a share of the giant pie that is cybersecurity funding?
  • Frank Luntz lists ten rules of effective communication: simplicity, brevity, credibility, consistency, novelty, sound, aspiration, visualization, questioning, and context.
  • Thus, O’Reilly’s meme-engineering efforts usually result in “meme maps,” where the meme to be defined—whether it’s “open source” or “Web 2.0”—is put at the center, while other blob-like terms are drawn as connected to it.
  • The exact nature of these connections is rarely explained in full, but this is all for the better, as the reader might eventually interpret connections with their own agendas in mind. This is why the name of the meme must be as inclusive as possible: you never know who your eventual allies might be. “A big part of meme engineering is giving a name that creates a big tent that a lot of people want to be under, a train that takes a lot of people where they want to go,”
  • News April 4 mail date March 29, 2013 Baffler party March 6, 2013 Žižek on seduction February 13, 2013 More Recent Press I’ve Seen the Worst Memes of My Generation Destroyed by Madness io9, April 02, 2013 The Baffler’s New Colors Imprint, March 21, 2013
  • There is considerable continuity across O’Reilly’s memes—over time, they tend to morph into one another.
Tiberius Brastaviceanu

Smart key - Wikipedia - 0 views

  • Keyless Go
  • The system works by having a series of LF (low frequency 125 kHz) transmitting antennas both inside and outside the vehicle. The external antennas are located in the door handles. When the vehicle is triggered, either by pulling the handle or touching the handle, an LF signal is transmitted from the antennas to the key. The key becomes activated if it is sufficiently close and it transmits its ID back to the vehicle via RF (Radio frequency >300 MHz) to a receiver located in the vehicle. If the key has the correct ID, the PASE module unlocks the vehicle.
  • transmitting low frequency LF signals via the 125 kHz power amplifier block receiving radio frequency RF signals (> 300 MHz) from the built-in ISM receiver block encrypting and decrypting all relevant data signals (security) communicating relevant interface signals with other electronic control units microcontroller
Tiberius Brastaviceanu

Value network - Wikipedia - 0 views

  • a business analysis perspective
  • describes
  • resources within and between businesses
  • ...38 more annotations...
  • nodes in a value network represent people
  • nodes are connected by interactions that represent tangible and intangible deliverables
  • Value networks exhibit interdependence
  • Companies have both internal and external value networks.[1]
  • customers or recipients, intermediaries, stakeholders, complementary, open innovation networks and suppliers
  • key activities
  • processes and relationships that cut across internal boundaries
  • Value is created through exchange and the relationships between roles
  • F&S's value networks consists of these components
  • customers
  • Some service the customers all use, and enables interaction between the customers
  • service
  • contracts that enables access to the service
  • the network formed by phone users
  • example
  • example
  • car insurance company
  • how a company understands itself
  • value creation process
  • value creating system
  • all stakeholders co-produce value
  • systematic social innovation
  • strategy as
  • the Value Network to emerge as a mental model
  • Verna Allee defines value networks [5] as any web of relationships that generates both tangible and intangible value through complex dynamic exchanges between two or more individuals, groups or organizations. Any organization or group of organizations engaged in both tangible and intangible exchanges can be viewed as a value network, whether private industry, government or public sector.
  • Allee developed Value network analysis, a whole systems mapping and analysis approach to understanding tangible and intangible value creation among participants in an enterprise system
  • participants, transactions and tangible and intangible deliverables that together form a value network.
  • knowledge
  • benefits
  • favors
  • know-how
  • policy
  • planning
  • process
  • biological organisms, including humans, function in a self-organizing mode internally and externally
  • no central “boss” to control this dynamic activity
  • The purpose of value networks is to create the most benefit for the people involved in the network (5)
    • Tiberius Brastaviceanu
       
      Verna starts with relationships. I think this is wrong. Perceived value and how to get  to it determines the type of relationships we forge with other people with whom we robe shoulders.  
Francois Bergeron

Conference Detail for Industrial and Commercial Applications of Smart Structures Techno... - 0 views

  •  
    "Three-axis distributed fiber optic strain measurement in 3D woven composite structures   Paper 8690-6 Time: 1:50 PM - 2:10 PM Author(s): Matt Castellucci, Evan M. Lally, Sandra Klute, Luna Innovations Inc. (United States); David Lowry, NASA Johnson Space Ctr. (United States) Hide Abstract Add to My Schedule  Recent advancements in composite materials technologies have broken further from traditional designs and require advanced instrumentation and analysis capabilities. Success or failure is highly dependent on design analysis and manufacturing processes. By monitoring smart structures throughout manufacturing and service life, residual and operational stresses can be assessed and structural damage identified. Composite smart structures can be manufactured by integrating fiber optic sensors into existing composite materials processes such as layup, filament winding and three-dimensional weaving. In this work optical fiber was integrated into 3D woven composite parts at a commercial woven products manufacturing facility. The fiber was then used to monitor the structures during a VARTM manufacturing process, and subsequent static and dynamic testing. Low cost telecommunications-grade optical fiber acts as the sensor using a high resolution commercial Optical Frequency Domain Reflectometer (OFDR) system providing distributed strain measurement at spatial resolutions as low as 2mm. Strain measurements using the optical fiber sensors are correlated to resistive strain gauge measurements during static structural loading."
Kurt Laitner

Graphene supercapacitors: Small, cheap, energy-dense replacements for batteries. - Slat... - 0 views

  • Then something unexpectedly amazing happened. Maher El-Kady, a graduate student in chemist Richard Kaner’s lab at UCLA, wondered what would happen if he placed a sheet of graphite oxide—an abundant carbon compound—under a laser. And not just any laser, but a really inexpensive one, something that millions of people around the world already have—a DVD burner containing a technology called LightScribe, which is used for etching labels and designs on your mixtapes. As El-Kady, Kaner, and their colleagues described in a paper published last year in Science, the simple trick produced very high-quality sheets of graphene, very quickly, and at low cost.
  •  
    old article I thought I had shared, anybody care to try this out? LOL
Francois Bergeron

safer industrial robots - robot skin - 0 views

  •  
    Clément Gosselin, prof in robotics and mechatronics shows improvements and the the famous robot skin
Francois Bergeron

food safety test on a chip - 1 views

  •  
    food safety test on a chip
Francois Bergeron

Télé-Québec : Code Chastenay - 0 views

  •  
    new ENGAGE grant ? :)
Francois Bergeron

Evanescent Optics INC. - 0 views

  •  
    Polarization Maintaining Variable Ratio Evanescent Wave Couplers
1 - 20 of 77 Next › Last »
Showing 20 items per page