Skip to main content

Home/ Sensorica Knowledge/ Group items tagged IP

Rss Feed Group items tagged

Tiberius Brastaviceanu

Dark Intellectual Property. Why We Need a Kickstarter for Patents - 0 views

  • “dark IP,” the intellectual property (IP) that remains on the shelf: undiscovered, unexplored, untapped
  • our ability to catch so much in the net by dragging the surface (to use Mike Bergman’s analogy) actually still misses the invisible wealth of what lies beneath.
  • But dark IP is different than the other hidden-depths knowledge since it’s also unfair. Because taxpayers paid for much of the research — whether basic understanding with long-term benefits or more applied research with shorter-term benefits — that now lies collecting dust on university shelves.
  • ...31 more annotations...
  • the people of the United States spent an average of nearly $40 billion every year supporting institutional research
  • 65 percent of invention disclosure bundles remain, on average, unlicensed and unused … each year.
  • ”…the street finds its own uses for things.”
  • most of the IP (much of which we paid for) isn’t actually on the street, where entrepreneurial folks can do something with it.
  • the overworked and understaffed tech transfer offices
  • their models
  • There’s not necessarily room for exploration and discovery
  • byzantine bureaucracy of large organizations
  • But let’s face it, there’s also the hoarding and the overprotecting
  • So much IP is generated that it’s far too much for any one entity to ever make sense of
  • very few people are aware of — let alone able to access — an invention outside the social circle of its inventors, the scientific community involved, or even the “crowd” that’s sometimes harnessed in open innovation
  • we need new ways of democratizing it
  • Not democratizing the IP itself — institutions should still own and generate profits from the intellectual property they’ve created — but democratizing the ways in which we allow this IP to be discovered and licensed.
  • idea contests
  • marketplaces
  • competitions to find uses for on-the-shelf IP
  • missing out on the transformative potential of what technology can do here
  • promoting new ways of interacting around intellectual property
  • Marblar, where I’m an advisor
    • Tiberius Brastaviceanu
       
      The guy is not entirely for open innovation but proposes an intermediary model to democratize the use of IP
  • This turns off the average entrepreneur, who doesn’t have the patience and bandwidth to engage in all the unnecessary overhead of searching, browsing, and licensing IP.
  • Many small startups don’t even bother with IP
  • Another missing piece is ways of allowing the crowd to interact with each other and decide which technologies should be licensed
  • bidding wars
    • Tiberius Brastaviceanu
       
      competitive dynamic for acquiring IP and using it effectively. This doesn't solve the problem, because some companies will still buy it for defensive purposes or block others from using it, unlike with truly open innovation. 
  • Most of the examples I listed above haven’t changed much over the past decade or broken into the mainstream.
  • why not a Kickstarter for IP?
  • Such a website would bring together not just funds and transactions, but communities — with their attendant feedback mechanisms — that are interested in creating something novel around unused patents.
  • such a model would help get the ideas of a few into the minds of many.
  • open up the currently closed shelf to virtual browsing
  • inventions are not only ‘filed’ or ‘granted’ but ‘browsed’ or ‘licensed’.
Tiberius Brastaviceanu

Proposal - Food SFS-08-2014 - 1 views

  • development of more resource-efficient and sustainable food production and processing
  • competitive and innovative
    • Tiberius Brastaviceanu
       
      We are proposing collaborative ways, here the accent is put on competitive ways 
    • Tiberius Brastaviceanu
       
      We are proposing collaborative methods. Here, the accent is put on COMPETITIVE ways for a "sustainable circular economy"
  • ...29 more annotations...
  • reduction in water and energy use
  • gas emissions and waste generation
  • improving the efficiency
  • ensuring or improving shelf life, food safety and quality
  • competitive eco-innovative processes should be developed
  • sustainable circular economy
  • Intellectual Property (IP)
  • In phase 1, a feasibility study
  • technological/practical as well as economic viability of an innovation idea/concept with considerable novelty to the industry sector
  • to establish a solid high-potential innovation project
  • increase profitability of the enterprise through innovation
  • increase the return in investment in innovation activities
  • The proposal should contain an initial business plan based on the proposed idea/concept.
  • apply to phase 1 with a view to applying to phase 2 at a later date, or directly to phase 2.
  • EUR 50,000. Projects should last around 6 months
    • Tiberius Brastaviceanu
       
      Phase 1 has a classical language. We would need to mask our true identity and beliefs writing this grant proposal. I don't think it's for us... But this is only my opinion. 
  • In phase 2, innovation projects will be supported that address the specific challenge of Sustainable Food Security
  • demonstrate high potential in terms of company competitiveness and growth underpinned by a strategic business plan
    • Tiberius Brastaviceanu
       
      This is more about individual companies and their competitive advantage. Not about networks and not about collaboration and sharing. 
    • Tiberius Brastaviceanu
       
      Moreover, they put emphasis on IP protection and ownership, when we must talk about commons, knowledge commons applied to agriculture, sharing platforms, etc. 
  • Proposals shall be based on an elaborated business plan either developed through phase 1 or another means.
  • Particular attention must be paid to IP protection and ownership
  • Successful beneficiaries will be offered coaching and mentoring support during phase 1 and phase 2.
  • Enhancing profitability
  • competitive solutions
  • global business opportunities
  • sustainable
  • turnover
  • IP management
  • return on investment and profit
Tiberius Brastaviceanu

Tech transfer, open innovation, IP and academia - Google Drive - 1 views

  •  
    I work on this doc, mainly with Greg, documenting our approach to liberate dark IP from academia
Tiberius Brastaviceanu

AMPE - 0 views

  •  
    A10 10.1" IPS Touch Screen Android 4.0 Tablet PC w/ HDMI / TF / WiFi / Camera - Black (16GB) - Free Shipping - DealExtreme
Tiberius Brastaviceanu

Tibi's CASZH T10 quad core MTK6589 GPS 3G WCDMA/2G GSM SIM Card Slot Phone call Androi... - 0 views

  •  
    This is the one that I ordered, waiting to receive it to provide feedback. quad core MTK6589 GPS 3G WCDMA/2G GSM SIM Card Slot Phone call Android 4.2 IPS 10.1 inch Capacitive Tablet PC-in Tablet PROBLEMS I had some problems with the power jack, it breaks very easily. I repaired it myself. After, the screen started to have problems, insensitive stripes. After, I dropped the tablet and it chipped the screen a bit and the screen became totally unresponsive. POSITIVE POINTS light weight, works well, battery/autonomy OK NEGATIVE COMMENTS No flash for pictures/videos No magnetic compass, no orientation sensors, but it has an accelerometer.
Tiberius Brastaviceanu

Evolving Towards a Partner State in an Ethical Economy - 0 views

  • In the  emerging institutional model of peer production
  • we can distinguish an interplay between three partners
  • a community of contributors that create a commons of knowledge, software or design;
  • ...46 more annotations...
  • There is a clear institutional division of labour between these three players
  • a set of "for-benefit institutions' which manage the 'infrastructure of cooperation'
  • an enterpreneurial coalition that creates market value on top of that commons;
  • Can we also learn something about the politics of this new mode of value creation
  • Is there perhaps a new model of power and democracy co-evolving out of these new social practices, that may be an answer to the contemporary crisis of democracy
  • we are witnessing a new model for the state. A 'P2P' state, if you will.
  • The post-democratic logic of community
  • these communities are not democracies
  • because democracy, and the market, and hierarchy, are modes of allocation of scarce resources
  • Such communities are truly poly-archies and the type of power that is held in them is meritocratic, distributed, and ad hoc.
  • Everyone can contribute without permission, but such a priori permissionlessness is  matched with mechanisms for 'a posteriori'  communal validation, where those with recognized expertise and that are accepted by the community, the so-called 'maintainers' and the 'editors',  decide
  • These decisions require expertise, not communal consensus
  • tension between inclusiveness of participation and selection for excellence
  • allowing for maximum human freedom compatible with the object of cooperation. Indeed, peer production is always a 'object-oriented' cooperation, and it is the particular object that will drive the particular form chosen for its 'peer governance' mechanisms
  • The main allocation mechanism in such project, which replaces the market, the hierarchy and democracy,  is a 'distribution of tasks'
  • no longer a division of labor between 'jobs', and the mutual coordination works through what scientist call 'stigmergic signalling'
  • work environment is designed to be totally open and transparent
  • every participating individual can see what is needed, or not and decide accordingly whether to undertake his/her particular contribution
  • this new model
  • has achieved capacities both for global coordination, and for the small group dynamics that are characteristic of human tribal forms and that it does this without 'command and control'! In fact, we can say that peer production has enabled the global scaling of small-group dynamics.
  • And they have to be, because an undemocratic institution would also discourage contributions by the community of participants.
    • Kurt Laitner
       
      disagree, there are many ways to ethically distribute governance, not just democracy
  • Hence, an increased exodus of productive  capacities, in the form of direct use value production, outside the existing system of monetization, which only operates at its margins.
  • Where there is no tension between supply and demand, their can be no market, and no capital accumulation
  • Facebook and Google users create commercial value for their platforms, but only very indirectly and they are not at all rewarded for their own value creation.
  • Since what they are creating is not what is commodified on the market for scarce goods, there is no return of income for these value creators
  • This means that social media platforms are exposing an important fault line in our system
  • If you did not contribute, you had no say, so engagement was and is necessary.
    • Kurt Laitner
       
      key divergence from birth/process citizenship driven democracy
  • ⁃   At the core of value creation are various commons, where the innovations are deposited for all humanity to share and to build on ⁃   These commons are enabled and protected through nonprofit civic associations, with as national equivalent the Partner State, which empowers and enables that social production ⁃   Around the commons emerges a vibrant commons-oriented economy undertaken by different kinds of ethical companies, whose legal structures ties them to the values and goals of the commons communities, and not absentee and private shareholders intent of maximising profit at any cost
  • the citizens deciding on the optimal shape of their provisioning systems.
    • Kurt Laitner
       
      ie value equations..?
  • Today, it is proto-mode of production which is entirely inter-dependent with the system of capital
  • Is there any possibility to create a really autonmous model of peer production, that could create its own cycle of reproduction?
  • contribute
    • Kurt Laitner
       
      defined as?
    • Tiberius Brastaviceanu
       
      "ad hoc": perhaps based on context, needs and everyone's understanding of the situation
  • and whose mission is the support of the commons and its contributors
  • In this way, the social reproduction of commoners would no longer depend on the accumulation cycle of capital, but on its own cycle of value creation and realization
  • Phyles are mission-oriented, purpose-driven, community-supportive entities that operate in the market, on a global scale, but work for the commons.
  • peer production license, which has been proposed by Dmytri Kleiner.
  • Thijs Markus writes  so eloquently about Nike in the Rick Falkvinge blog, if you want to sell $5 shoes for $150 in the West, you better have one heck of a repressive IP regime in place.
  • Hence the need for SOPA/PIPA , ACTA'S and other attempts to criminalize the right to share.
  • An economy of scope exists between the production of two goods when two goods which share a CommonCost are produced together such that the CommonCost is reduced.
  • shared infrastructure costs
  • 2) The current system beliefs that innovations should be privatized and only available by permission or for a hefty price (the IP regime), making sharing of knowledge and culture a crime; let's call this feature, enforced 'artificial scarcity'.
  • 1) Our current system is based on the belief of infinite growth and the endless availability of resources, despite the fact that we live on a finite planet; let's call this feature, runaway 'pseudo-abundance'.
  • So what are the economies of scope of the new p2p age? They come in two flavours: 1) the mutualizing of knowledge and immaterial resources 2) the mutualizing of material productive resources
  • how does global governance look like in P2P civilization?
  • conflicts between contributors
  • are not decided by authoritarian fiat, but by 'negotiated coordination'.
Tiberius Brastaviceanu

Access control - Wikipedia, the free encyclopedia - 0 views

  • The act of accessing may mean consuming, entering, or using.
  • Permission to access a resource is called authorization.
  • Locks and login credentials are two analogous mechanisms of access control.
  • ...26 more annotations...
  • Geographical access control may be enforced by personnel (e.g., border guard, bouncer, ticket checker)
  • n alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country
  • access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons
  • can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap.
  • Physical access control is a matter of who, where, and when
  • Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.[citation needed] Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked
  • Credential
  • Access control system operation
  • The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input
  • There are three types (factors) of authenticating information:[2] something the user knows, e.g. a password, pass-phrase or PIN something the user has, such as smart card or a key fob something the user is, such as fingerprint, verified by biometric measurement
  • Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios
  • When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked.
  • A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a biometric feature) or some combination of these items. This is known as multi-factor authentication. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.
  • An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list
  • monitor the door position
  • Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the doo
  • Access control topology
  • Access control decisions are made by comparing the credential to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the look-up out from a central host to the edge of the system, or the reader. The predominant topology circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks
  • Access control readers may be classified by the functions they are able to perform
  • and forward it to a control panel.
  • Basic (non-intelligent) readers: simply read
  • Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus.
  • Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers.
  • Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host
  • a built in webservice to make it user friendly
  • Some readers may have additional features such as an LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support
Tiberius Brastaviceanu

iPPO Q101 - 0 views

  •  
    Quad Core RK3188 2GB RAM+32GB/16GB Android 4.2.2 Bluetooth 10.1 inch Retina IPS capacitive Tablet PC usb 3g from Reliable cube u30gt2 suppliers on KingDragon Top Supplier
Tiberius Brastaviceanu

Original Huawei MediaPad 10 - 0 views

  •  
    Link 3G/WCDMA GPS Quad core K3V2 16GB/8GB+2GB/1GB RAM DDR3 10.1 inch IPS Tablet PC Android 4.0
Tiberius Brastaviceanu

Team - Palmira Granados - The Innovation Partnership - 0 views

  •  
    Palmira Granados
Tiberius Brastaviceanu

ICT-37-2014 - 0 views

  • provide support to a large set of early stage high risk innovative SMEs in the ICT sector
  • Focus will be on SME proposing innovative ICT concept, product and service applying new sets of rules, values and models which ultimately disrupt existing markets.
  • disruptive ideas
  • ...27 more annotations...
  • prototyping
  • validation and demonstration
  • deployment
  • Proposed projects should have a potential for disruptive innovation and fast market up-take in ICT.
  • interesting for entrepreneurs and young innovative companies
  • bearing a strong EU dimension.
  • Participants can apply to Phase 1 with a view to applying to Phase 2 at a later date, or directly to Phase 2.
  • In phase 1, a feasibility study
  • services and technologies or new market applications of existing technologies
  • Intellectual Property (IP) management
  • increase profitability
  • The proposal should contain an initial business plan based on the proposed idea/concept.
  • EUR 50.000. Projects should last around 6 months
    • Tiberius Brastaviceanu
       
      I don't understand why they call it Open (ODI) when they also talk about Intellectual Property. 
  • company competitiveness
  • prototyping
  • demonstration
  • readiness and maturity for market introduction
  • may also include some research
  • For technological innovation a Technology Readiness Levels of 6 or above
  • Proposals shall be based on an elaborated business plan
  • Proposals shall contain a specification for the outcome of the project, including a first commercialisation plan, and criteria for success.
    • Tiberius Brastaviceanu
       
      We are not a SME and have no classical commercialization plan. We can form an Exchange Firm for example, and offer services for OVNi for example, helping local food networks, providing them infrastructure. But in that case, the business plan for the Exchange Firm should contain a revenue model. Who is going to pay for the deployment of the OVNi in order to make the Exchange Firm commercially viable in the eyes of the Commission?  
  • coaching and mentoring support during phase 1 and phase 2
  • growth plan and maximising it through internationalisation
  • Enhancing profitability and growth performance of SMEs by combining and transferring new and existing knowledge into innovative, disruptive and competitive solutions
  • Open Disruptive Innovation Scheme
  •  
    "Specific Challenge: The challenge is to provide support to a large set of early stage high risk innovative SMEs in the ICT sector. Focus will be on SME proposing innovative ICT concept, product and service applying new sets of rules, values and models which ultimately disrupt existing markets."
Tiberius Brastaviceanu

The New Normal in Funding University Science | Issues in Science and Technology - 1 views

  • Government funding for academic research will remain limited, and competition for grants will remain high. Broad adjustments will be needed
  • he sequester simply makes acute a chronic condition that has been getting worse for years.
  • the federal budget sequester
  • ...72 more annotations...
  • systemic problems that arise from the R&D funding system and incentive structure that the federal government put in place after World War II
  • Researchers across the country encounter increasingly fierce competition for money.
  • unding rates in many National Institutes of Health (NIH) and National Science Foundation (NSF) programs are now at historical lows, declining from more than 30% before 2001 to 20% or even less in 2011
  • even the most prominent scientists will find it difficult to maintain funding for their laboratories, and young scientists seeking their first grant may become so overwhelmed that individuals of great promise will be driven from the field
  • anxiety and frustration
  • The growth of the scientific enterprise on university campuses during the past 60 years is not sustainable and has now reached a tipping point at which old models no longer work
  • Origins of the crisis
  • ederal funding agencies must work with universities to ensure that new models of funding do not stymie the progress of science in the United States
  • The demand for research money greatly exceeds the supply
  • the demand for research funding has gone up
  • The deeper sources of the problem lie in the incentive structure of the modern research university, the aspirations of scientists trained by those universities, and the aspirations of less research-intensive universities and colleges across the nation
  • competitive grants system
  • if a university wants to attract a significant amount of sponsored research money, it needs doctoral programs in the relevant fields and faculty members who are dedicated to both winning grants and training students
  • The production of science and engineering doctorates has grown apace
  • Even though not all doctorate recipients become university faculty, the size of the science and engineering faculty at U.S. universities has grown substantially
  • proposal pressure goes up
  • These strategies make sense for any individual university, but will fail collectively unless federal funding for R&D grows robustly enough to keep up with demand.
  • At the very time that universities were enjoying rapidly growing budgets, and creating modes of operation that assumed such largess was the new normal, Price warned that it would all soon come to a halt
  • the human and financial resources invested in science had been increasing much faster than the populations and economies of those regions
  • growth in the scientific enterprise would have to slow down at some point, growing no more than the population or the economy.
  • Dead-end solutions
  • studies sounded an alarm about the potential decline in U.S. global leadership in science and technology and the grave implications of that decline for economic growth and national security
  • Although we are not opposed to increasing federal funding for research, we are not optimistic that it will happen at anywhere near the rate the Academies seek, nor do we think it will have a large impact on funding rates
  • universities should not expect any radical increases in domestic R&D budgets, and most likely not in defense R&D budgets either, unless the discretionary budgets themselves grow rapidly. Those budgets are under pressure from political groups that want to shrink government spending and from the growth of spending in mandatory programs
  • The basic point is that the growth of the economy will drive increases in federal R&D spending, and any attempt to provide rapid or sustained increases beyond that growth will require taking money from other programs.
  • The demand for research money cannot grow faster than the economy forever and the growth curve for research money flattened out long ago.
  • Path out of crisis
  • The goal cannot be to convince the government to invest a higher proportion of its discretionary spending in research
  • Getting more is not in the cards, and some observers think the scientific community will be lucky to keep what it has
  • The potential to take advantage of the infrastructure and talent on university campuses may be a win-win situation for businesses and institutions of higher education.
  • Why should universities and colleges continue to support scientific research, knowing that the financial benefits are diminishing?
  • esearch culture
  • attract good students and faculty as well as raise their prestige
  • mission to expand the boundaries of human knowledge
  • faculty members are committed to their scholarship and will press on with their research programs even when external dollars are scarce
  • training
  • take place in
  • research laboratories
  • it is critical to have active research laboratories, not only in elite public and private research institutions, but in non-flagship public universities, a diverse set of private universities, and four-year colleges
  • How then do increasingly beleaguered institutions of higher education support the research efforts of the faculty, given the reality that federal grants are going to be few and far between for the majority of faculty members? What are the practical steps institutions can take?
  • change the current model of providing large startup packages when a faculty member is hired and then leaving it up to the faculty member to obtain funding for the remainder of his or her career
  • universities invest less in new faculty members and spread their internal research dollars across faculty members at all stages of their careers, from early to late.
    • Tiberius Brastaviceanu
       
      Sharing of resources, see SENSORICA's NRP
  • national conversation about changes in startup packages and by careful consultations with prospective faculty hires about long-term support of their research efforts
  • Many prospective hires may find smaller startup packages palatable, if they can be convinced that the smaller packages are coupled with an institutional commitment to ongoing research support and more reasonable expectations about winning grants.
  • Smaller startup packages mean that in many situations, new faculty members will not be able to establish a functioning stand-alone laboratory. Thus, space and equipment will need to be shared to a greater extent than has been true in the past.
  • construction of open laboratory spaces and the strategic development of well-equipped research centers capable of efficiently servicing the needs of an array of researchers
  • phaseout of the individual laboratory
  • enhanced opportunities for communication and networking among faculty members and their students
  • Collaborative proposals and the assembly of research teams that focus on more complex problems can arise relatively naturally as interactions among researchers are facilitated by proximity and the absence of walls between laboratories.
  • An increased emphasis on team research
  • investments in the research enterprise
  • can be directed at projects that have good buy-in from the faculty
  • learn how to work both as part of a team and independently
  • Involvement in multiple projects should be encouraged
  • The more likely trajectory of a junior faculty member will evolve from contributing team member to increasing leadership responsibilities to team leader
  • nternal evaluations of contributions and potential will become more important in tenure and promotion decisions.
    • Tiberius Brastaviceanu
       
      Need value accounting system
  • relationships with foundations, donors, state agencies, and private business will become increasingly important in the funding game
  • The opportunities to form partnerships with business are especially intriguing
    • Tiberius Brastaviceanu
       
      The problem is to change the model and go open source, because IP stifles other processes that might benefit Universities!!!
  • Further complicating university collaborations with business is that past examples of such partnerships have not always been easy or free of controversy.
  • some faculty members worried about firms dictating the research priorities of the university, pulling graduate students into proprietary research (which could limit what they could publish), and generally tugging the relevant faculty in multiple directions.
  • developed rules and guidelines to control them
  • University faculty and businesspeople often do not understand each other’s cultures, needs, and constraints, and such gaps can lead to more mundane problems in university/industry relations, not least of which are organizational demands and institutional cultures
    • Tiberius Brastaviceanu
       
      Needs for mechanisms to govern, coordinate, structure an ecosystem -See SENSORICA's Open Alliance model
  • n addition to funding for research, universities can receive indirect benefits from such relationships. High-profile partnerships with businesses will underline the important role that universities can play in the economic development of a region.
  • Universities have to see firms as more than just deep pockets, and firms need to see universities as more than sources of cheap skilled labor.
  • foundations or other philanthropy
  • We do not believe that research proposed and supervised by individual principal investigators will disappear anytime soon. It is a research model that has proven to be remarkably successful and enduring
  • However, we believe that the most vibrant scientific communities on university and college campuses, and the ones most likely to thrive in the new reality of funding for the sciences, will be those that encourage the formation of research teams and are nimble with regard to funding sources, even as they leave room for traditional avenues of funding and research.
Tiberius Brastaviceanu

'Anti-Troll' Marblar Unites NASA Patents, Samsung to Crowdsource New Products - 1 views

  • can be found in NASA technology, and the new crowdsourcing website Marblar is taking advantage of that to find the next big thing.
  • The site Wednesday announced that several hundred patents from NASA and other organizations would be available for its users to play with.
  • many companies' research and development departments spend millions of dollars on such patents, more than 95 percent of them sit unused.
  • ...19 more annotations...
  • what if people saw the patents
  • aying dormant
  • new ways that we can incorporate these patents into new products?"
  • Marblar also obtained access to many patents from the University of Pennsylvania and from ETRI,
  • The site also partnered with Samsung,
  • or its potential to bring the patents of Marblar users to life.
  • Any idea that Samsung likes could find its way into Samsung technology, with 10 percent of the royalties going to the Marblar users who brought it to life
    • Tiberius Brastaviceanu
       
      Samsong decides what to develop or not... this is still top down, when it comes to choosing the technology to be developed. But at least the list of ideas has been curated and refined.
    • Tiberius Brastaviceanu
       
      Using the crowd to curate and refine ideas/inventions
  • The contributors to a Marblar project might be helping an inventor out of the goodness of their heart, but they also stand to gain if a particular product gets the green light. Marblar rewards users who provide useful data or information by giving them "marbles," the websites namesake currency.
    • Tiberius Brastaviceanu
       
      They do have some sort of value accounting system in place. See the open value network model http://valuenetwork.referata.com/wiki/Value_accounting_system 
  • In the spirit of crowdsourcing, other Marblar users can help out a particular inventor whose idea they want to see come to life.
  • "As you submit product ideas and contribute market data or technical data, you get more marbles," Perez said.
    • Tiberius Brastaviceanu
       
      Quirky developed prototyping, manufacturing and distribution capabilities
  • The more marbles a person earns, the bigger the cut he or she gets in the royalty check if the product makes it to market.
  • Another website, Quirky
  • have a store dedicated to selling its users products
  • patents have become more associated with litigation than productivity.
  • "Patent trolls buy up patents to extract money, with no intention of actually creating a product," he said. "Marblar is like the anti-troll. We're looking for new ways to commercialize."
Tiberius Brastaviceanu

How Peer to Peer Communities will change the World - 0 views

  • role of p2p movement
  • historical role
  • horizontalisation of human relationships
  • ...55 more annotations...
  • allowing the free aggregation of individuals around shared values or common value creation
  • a huge sociological shift
  • new life forms, social practices and human institutions
  • emergent communities of practice are developing new social practices that are informed by the p2p paradigm
  • ethical revolution
  • openness
  • participation
  • inclusivity
  • cooperation
  • commons
  • the open content industry in the U.S. to reach one sixth of GDP.
  • political expressions
  • the movement has two wings
  • constructive
  • building new tools and practices
  • resistance to neoliberalism
  • we are at a stage of emergence
  • difficulty of implementing full p2p solutions in the current dominant system
  • At this stage, there is a co-dependency between peer producers creating value, and for-profit firms ‘capturing that value’, but they both need each other.
  • Peer producers need a business ecology to insure the social reproduction of their system and financial sustainability of its participants, and capital needs the positive externalities of social cooperation which flow from p2p collaboration.
  • peer producing communities should create their own ‘mission-oriented’ social businesses, so that the surplus value remains with the value creators, i.e. the commoners themselves, but this is hardly happening now.
  • Instead what we see is a mutual accomodation between netarchical capital on one side, and peer production communities on the other.
  • the horizontal meets the vertical
  • mostly hybrid ‘diagonal’ adaptations
  • For peer producers the question becomes, if we cannot create our own fully autonomous institutions, how can we adapt while maintaining maximum autonomy and sustainability as a commons and as a community.
  • Why p2p have failed to create successful alternatives in some areas?
  • In commons-oriented peer production, where people aggegrate around a common object which requires deep cooperation, they usually have their own infrastructures of cooperation and a ecology combining community, a for-benefit association managing the infrastructure, and for-profit companies operating on the market place; in the sharing economy, where individuals merely share their own expressions, third party platforms are the norm. It is clear that for-profit companies have different priorities, and want to enclose value so that it can be sold on the marketplace. This in fact the class struggle of the p2p era, the struggle between communities and corporations around various issues because of partly differential interests.
  • Even commercially controlled platforms are being used for a massive horizontalisation and self-aggregation of human relationships, and communities, including political and radical groups are effectively using them to mobilize. What’s important is not just to focus on the limitations and intentions of the platform owners, but to use whatever we can to strengthen the autonomy of peer communities.
  • requires a clever adaptation
  • use for our own benefit
  • The fact today is that capital is still capable of marshaling vast financial and material resources, so that it can create,
  • platforms that can easily and quickly offer services, creating network effects
  • without network effects, there is no ‘there’ there, just an empty potential platform.
  • p2p activists should work on both fronts
  • using mainstream platforms for spreading their ideas and culture and reach greater numbers of people, while also developing their own autonomous media ecologies, that can operate independently, and the latter is an engagement for the ‘long haul’, i.e. the slow construction of an alternative lifeworld.
  • The commons and p2p are really just different aspects of the same phenomena; the commons is the object that p2p dynamics are building; and p2p takes place wherever there are commons.
  • So both p2p and the commons, as they create abundant (digital) or sufficient (material) value for the commoners, at the same time create opportunities to create added value for the marketplace. There is no domain that is excluded from p2p, no field that can say, “we wouldn’t be stronger by opening up to participation and community dynamics”. And there is no p2p community that can say, we are in the long term fully sustainable within the present system, without extra resources coming from the market sector.
  • One trend is the distribution of current infrastructures and practices, i.e. introducing crowdsourcing, crowdfunding, social lending, digital currencies, in order to achieve wider participation in current practices. That is a good thing, but not sufficient. All the things that I mention above, move to a distributed infrastructure, but do not change the fundamental logic of what they are doing.
  • we are talking about the distribution of capitalism, not about a deeper change in the logic of our economy.
  • No matter how good you are, no matter how much capital you have to hire the best people, you cannot compete with the innovative potential of open global communities.
  • the p2p dynamics
  • the new networked culture
  • the opposite is also happening, as we outlined above, more and more commons-oriented value communities are creating their own entrepreneurial coalitions. Of course, some type of companies, because of their monopoly positions and legacy systems, may have a very difficult time undergoing that adaptation, in which case new players will appear that can do it more effectively.
  • the corporate form is unable to deal with ecological and sustainability issues, because its very DNA, the legal obligation to enrich the shareholders, makes its strive to lower input costs,  and ignore externalities.
  • we need new corporate structures, a new type of market entity, for which profit is a means, but not an end, dedicated to a ‘benefit‘, a ‘mission’, or the sustenance of a particular community and/or commons.
  • abundance destroys scarcity and therefore markets
  • open design community
  • will inherently design for sustainability
  • for inclusion
  • conceive more distributed forms of manufacturing
  • entrepreneurs attaching themselves to open design projects start working from an entirely different space, even if they still use the classic corporate form. Prevent the sharing of sustainability designs through IP monopolies is also in my view unethical and allowing such patents should be a minimalist option, not a maximalist one.
  • The high road scenario proposes an enlightened government that ‘enables and empowers’ social production and value creation and allows a much smoother transition to p2p models; the low road scenario is one in which no structural reforms take place, the global situation descends into various forms of chaos, and p2p becomes a survival and resilience tactic in extremely difficult social, political and economic circumstances.
  • accelerated end of capitalism
  • Making sure that we get a better alternative is actually the historical task of the p2p movement. In other words, it depends on us!
  • I don’t really think in terms of technological breakthroughs, because the essential one, globally networked collective intelligence enabled by the internetworks, is already behind us; that is the major change, all other technological breakthroughs will be informed by this new social reality of the horizontalisation of our civilisation. The important thing now is to defend and extend our communication and organisation rights, against a concerted attempt to turn back the clock. While the latter is really an impossibility, this does not mean that the attempts by governments and large corporations cannot create great harm and difficulties. We need p2p technology to enable the global solution finding and implementation of the systemic crises we are facing.
Tiberius Brastaviceanu

Beyond Blockchain: Simple Scalable Cryptocurrencies - The World of Deep Wealth - Medium - 0 views

  • I clarify the core elements of cryptocurrency and outline a different approach to designing such currencies rooted in biomimicry
  • This post outlines a completely different strategy for implementing cryptocurrencies with completely distributed chains
  • Rather than trying to make one global, anonymous, digital cash
  • ...95 more annotations...
  • we are interested in the resilience that comes from building a rich ecosystem of interoperable currencies
  • What are the core elements of a modern cryptocurrency?
  • Digital
  • Holdings are electronic and only exist and operate by virtue of a community’s agreement about how to interpret digital bits according to rules about operation and accounting of the currency.
  • Trustless
  • don’t have to trust a 3rd party central authority
  • Decentralized
  • Specifically, access, issuance, transaction accounting, rules & policies, should be collectively visible, known, and held.
  • Cryptographic
  • This cryptographic structure is used to enable a variety of people to host the data without being able to alter it.
  • Identity
  • there must be a way to associate these bits with some kind of account, wallet, owner, or agent who can use them
  • Other things that many take for granted in blockchains may not be core but subject to decisions in design and implementation, so they can vary between implementations
  • It does not have to be stored in a synchronized global ledger
  • does not have to be money. It may be a reputation currency, or data used for identity, or naming, etc
  • Its units do not have to be cryptographic tokens or coins
  • It does not have to protect the anonymity of users, although it may
  • if you think currency is only money, and that money must be artificially scarce
  • Then you must tackle the problem of always tracking which coins exist, and which have been spent. That is one approach — the one blockchain takes.
  • You might optimize for anonymity if you think of cryptocurrency as a tool to escape governments, regulations, and taxes.
  • if you want to establish and manage membership in new kinds of commons, then identity and accountability for actions may turn out to be necessary ingredients instead of anonymity.
  • In the case of the MetaCurrency Project, we are trying to support many use cases by building tools to enable a rich ecosystem of communities and current-sees (many are non-monetary) to enhance collective intelligence at all scales.
  • Managing consensus about a shared reality is a central challenge at the heart of all distributed computing solutions.
  • If we want to democratize money by having cryptocurrencies become a significant and viable means of transacting on a daily basis, I believe we need fundamentally more scalable approaches that don’t require expensive, dedicated hardware just to participate.
  • We should not need system wide consensus for two people to do a transaction in a cryptocurrency
  • Blockchain is about managing a consensus about what was “said.” Ceptr is about distributing a consensus about how to “speak.”
  • how nature gets the job done in massively scalable systems which require coordination and consistency
  • Replicate the same processes across all nodes
  • Empower every node with full agency
  • Hold this transformed state locally and reliably
  • Establish protocols for interaction
  • Each speaker of a language carries the processes to understand sentences they hear, and generate sentences they need
  • we certainly don’t carry some kind of global ledger of everything that’s ever been said, or require consensus about what has been said
  • Language IS a communication protocol we learn by emulating the processes of usage.
  • Dictionaries try to catch up when the usage
  • there is certainly no global ledger with consensus about the state of trillions of cells. Yet, from a single zygote’s copy of DNA, our cells coordinate in a highly decentralized manner, on scales of trillions, and without the latency or bottlenecks of central control.
  • Imagine something along the lines of a Java Virtual Machine connected to a distributed version of Github
  • Every time this JVM runs a program it confirms the hash of the code it is about to execute with the hash signed into the code repository by its developers
  • This allows each node that intends to be honest to be sure that they’re running the same processes as everyone else. So when two parties want to do a transaction, and each can have confidence their own code, and the results that your code produces
  • Then you treat it as authoritative and commit it to your local cryptographically self-validating data store
  • Allowing each node to treat itself as a full authority to process transactions (or interactions via shared protocols) is exactly how you empower each node with full agency. Each node runs its copy of the signed program/processes on its own virtual machine, taking the transaction request combined with the transaction chains of the parties to the transaction. Each node can confirm their counterparty’s integrity by replaying their transactions to produce their current state, while confirming signatures and integrity of the chain
  • If both nodes are in an appropriate state which allows the current transaction, then they countersign the transaction and append to their respective chains. When you encounter a corrupted or dishonest node (as evidenced by a breach of integrity of their chain — passing through an invalid state, broken signatures, or broken links), your node can reject the transaction you were starting to process. Countersigning allows consensus at the appropriate scale of the decision (two people transacting in this case) to lock data into a tamper-proof state so it can be stored in as many parallel chains as you need.
  • When your node appends a mutually validated and signed transaction to its chain, it has updated its local state and is able to represent the integrity of its data locally. As long as each transaction (link in the chain) has valid linkages and countersignatures, we can know that it hasn’t been tampered with.
  • If you can reliably embody the state of the node in the node itself using Intrinsic Data Integrity, then all nodes can interact in parallel, independent of other interactions to maximize scalability and simultaneous processing. Either the node has the credits or it doesn’t. I don’t have to refer to a global ledger to find out, the state of the node is in the countersigned, tamper-proof chain.
  • Just like any meaningful communication, a protocol needs to be established to make sure that a transaction carries all the information needed for each node to run the processes and produce a new signed and chained state. This could be debits or credits to an account which modify the balance, or recoding courses and grades to a transcript which modify a Grade Point Average, or ratings and feedback contributing to a reputation score, and so on.
  • By distributing process at the foundation, and leveraging Intrinsic Data Integrity, our approach results in massive improvements in throughput (from parallel simultaneous independent processing), speed, latency, efficiency, and cost of hardware.
  • You also don’t need to incent people to hold their own record — they already want it.
  • Another noteworthy observation about humans, cells, and atoms, is that each has a general “container” that gets configured to a specific use.
  • Likewise, the Receptors we’ve built are a general purpose framework which can load code for different distributed applications. These Receptors are a lightweight processing container for the Ceptr Virtual Machine Host
  • Ceptr enables a developer to focus on the rules and transactions for their use case instead of building a whole framework for distributed applications.
  • how units in a currency are issued
  • Most people think that money is just money, but there are literally hundreds of decisions you can make in designing a currency to target particular needs, niches, communities or patterns of flow.
  • Blockchain cryptocurrencies are fiat currencies. They create tokens or coins from nothing
  • These coins are just “spoken into being”
  • the challenging task of
  • ensure there is no counterfeiting or double-spending
  • Blockchain cryptocurrencies are fiat currencies
  • These coins are just “spoken into being”
  • the challenging task of tracking all the coins that exist to ensure there is no counterfeiting or double-spending
  • You wouldn’t need to manage consensus about whether a cryptocoin is spent, if your system created accounts which have normal balances based on summing their transactions.
  • In a mutual credit system, units of currency are issued when a participant extends credit to another user in a standard spending transaction
  • Alice pays Bob 20 credits for a haircut. Alice’s account now has -20, and Bob’s has +20.
  • Alice spent credits she didn’t have! True
  • Managing the currency supply in a mutual credit system is about managing credit limits — how far people can spend into a negative balance
  • Notice the net number units in the system remains zero
  • One elegant approach to managing mutual credit limits is to set them based on actual demand.
  • concerns about manufacturing fake accounts to game credit limits (Sybil Attacks)
  • keep in mind there can be different classes of accounts. Easy to create, anonymous accounts may get NO credit limit
  • What if I alter my code to give myself an unlimited credit limit, then spend as much as I want? As soon as you pass the credit limit encoded in the shared agreements, the next person you transact with will discover you’re in an invalid state and refuse the transaction.
  • If two people collude to commit an illegal transaction by both hacking their code to allow a normally invalid state, the same still pattern still holds. The next person they try to transact with using untampered code will detect the problem and decline to transact.
  • Most modern community currency systems have been implemented as mutual credit,
  • Hawala is a network of merchants and businessmen, which has been operating since the middle ages, performing money transfers on an honor system and typically settling balances through merchandise instead of transferring money
  • Let’s look at building a minimum viable cryptocurrency with the hawala network as our use case
  • To minimize key management infrastructure, each hawaladar’s public key is their address or identity on the network. To join the network you get a copy of the software from another hawaladar, generate your public and private keys, and complete your personal profile (name, location, contact info, etc.). You call, fax, or email at least 10 hawaladars who know you, and give them your IP address and ask them to vouch for you.
  • Once 10 other hawaladars have vouched for you, you can start doing other transactions because the protocol encoded in every node will reject a transaction chain that doesn’t start with at least 10 vouches
  • seeding your information with those other peers so you can be found by the rest of the network.
  • As described in the Mutual Credit section, at the time of transaction each party audits the counterparty’s transaction chain.
  • Our hawala crypto-clearinghouse protocol has two categories of transactions: some used for accounting and others for routing. Accounting transactions change balances. Routing transactions maintain network integrity by recording information about hawaladar
  • Accounting Transactions create signed data that changes account balances and contains these fields:
  • The final hash of all of the above fields is used as a unique transaction ID and is what each of party signs with their private keys. Signing indicates a party has agreed to the terms of the transaction. Only transactions signed by both parties are considered valid. Nodes can verify signatures by confirming that decryption of the signature using the public key yields a result which matches the transaction ID.
  • Routing Transactions sign data that changes the peers list and contain these fields:
  • As with accounting transactions, the hash of the above fields is used as the transaction’s unique key and the basis for the cryptographic signature of both counterparties.
  • Remember, instead of making changes to account balances, routing transactions change a node’s local list of peers for finding each other and processing.
  • a distributed network of mutual trust
  • operates across national boundaries
  • everyone already keeps and trusts their own separate records
  • Hawaladars are not anonymous
  • “double-spending”
  • It would be possible for someone to hack the code on their node to “forget” their most recent transaction (drop the head of their chain), and go back to their previous version of the chain before that transaction. Then they could append a new transaction, drop it, and append again.
  • After both parties have signed the agreed upon transaction, each party submits the transaction to separate notaries. Notaries are a special class of participant who validate transactions (auditing each chain, ensuring nobody passes through an invalid state), and then they sign an outer envelope which includes the signatures of the two parties. Notaries agree to run high-availability servers which collectively manage a Distributed Hash Table (DHT) servicing requests for transaction information. As their incentive for providing this infrastructure, notaries get a small transaction fee.
  • This approach introduces a few more steps and delays to the transaction process, but because it operates on independent parallel chains, it is still orders of magnitude more efficient and decentralized than reaching consensus on entries in a global ledger
  • millions of simultaneous transactions could be getting processed by other parties and notaries with no bottlenecks.
  • There are other solutions to prevent nodes from dropping the head of their transaction chain, but the approach of having notaries serve out a DHT solves a number of common objections to completely distributed accounting. Having access to reliable lookups in a DHT provides a similar big picture view that you get from a global ledger. For example, you may want a way to look up transactions even when the parties to that transaction are offline, or to be able to see the net system balance at a particular moment in time, or identify patterns of activity in the larger system without having to collect data from everyone individually.
  • By leveraging Intrinsic Data Integrity to run numerous parallel tamper-proof chains you can enable nodes to do various P2P transactions which don’t actually require group consensus. Mutual credit is a great way to implement cryptocurrencies to run in this peered manner. Basic PKI with a DHT is enough additional infrastructure to address main vulnerabilities. You can optimize your solution architecture by reserving reserve consensus work for tasks which need to guarantee uniqueness or actually involve large scale agreement by humans or automated contracts.
  • It is not only possible, but far more scalable to build cryptocurrencies without a global ledger consensus approach or cryptographic tokens.
  •  
    Article written by Arthur Brook, founder of Metacurrency project and of Ceptr.
1 - 20 of 21 Next ›
Showing 20 items per page