Skip to main content

Home/ Sensorica Knowledge/ Group items tagged Mai

Rss Feed Group items tagged

Tiberius Brastaviceanu

James Grier Miller, Living Systems (1978) - 0 views

  • reality as an integrated hierarchy of organizations of matter and energy
  • General living systems theory is concerned with a special subset of all systems, the living ones
  • a space is a set of elements which conform to certain postulate
  • ...266 more annotations...
  • s. Euclidean space
  • metric space
  • topological space
  • Physical space is the extension surrounding a point
  • My presentation of a general theory of living systems will employ two sorts of spaces in which they may exist, physical or geographical space and conceptual or abstracted spaces
  • Physical or geographical space
  • Euclidean space
  • distance
  • moving
  • maximum speed
  • objects moving in such space cannot pass through one another
  • friction
  • The characteristics and constraints of physical space affect the action of all concrete systems, living and nonliving.
  • information can flow worldwide almost instantly
  • Physical space is a common space
  • Most people learn that physical space exists, which is not true of many spaces
  • They can give the location of objects in it
  • Conceptual or abstracted spaces
  • Peck order
  • Social class space
  • Social distance
  • Political distance
  • life space
  • semantic space
  • Sociometric space
  • A space of time costs of various modes of transportation
  • space of frequency of trade relations among nations.
  • A space of frequency of intermarriage among ethnic groups.
  • These conceptual and abstracted spaces do not have the same characteristics and are not subject to the same constraints as physical space
  • Social and some biological scientists find conceptual or abstracted spaces useful because they recognize that physical space is not a major determinant of certain processes in the living systems they study
  • interpersonal relations
  • one cannot measure comparable processes at different levels of systems, to confirm or disconfirm cross-level hypotheses, unless one can measure different levels of systems or dimensions in the same spaces or in different spaces with known transformations among them
  • It must be possible, moreover, to make such measurements precisely enough to demonstrate whether or not there is a formal identity across levels
  • fundamental "fourth dimension" of the physical space-time continuum
  • is the particular instant at which a structure exists or a process occurs
  • or the measured or measurable period over which a structure endures or a process continues.
  • durations
  • speeds
  • rates
  • accelerations
  • irreversible unidirectionality of time
  • thermodynamics
  • negentropy
  • "time's arrow."
  • Matter and energy
  • Matter is anything which has mass (m) and occupies physical space.
  • Energy (E) is defined in physics as the ability to do work.
  • kinetic energy
  • potential energy
  • rest mass energy
  • Mass and energy are equivalent
  • Living systems need specific types of matter-energy in adequate amounts
  • Energy for the processes of living systems is derived from the breakdown of molecules
  • Any change of state of matter-energy or its movement over space, from one point to another, I shall call action.
  • It is one form of process.
  • information (H)
  • Transmission of Information
  • Meaning is the significance of information to a system which processes it: it constitutes a change in that system's processes elicited by the information, often resulting from associations made to it on previous experience with it
  • Information is a simpler concept: the degrees of freedom that exist in a given situation to choose among signals, symbols, messages, or patterns to be transmitted.
  • The set of all these possible categories (the alphabet) is called the ensemble or repertoire
  • .) The unit is the binary digit, or bit of information
  • . The amount of information is measured as the logarithm to the base 2 of the number of alternate patterns
  • Signals convey information to the receiving system only if they do not duplicate information already in the receiver. As Gabor says:
  • [The information of a message can] be defined as the 'minimum number of binary decisions which enable the receiver to construct the message, on the basis of the data already available to him.'
  • meaning cannot be precisely measured
  • Information is the negative of uncertainty.
  • information is the amount of formal patterning or complexity in any system.
  • The term marker was used by von Neumann to refer to those observable bundles, units, or changes of matter-energy whose patterning bears or conveys the informational symbols from the ensemble or repertoire.
  • If a marker can assume n different states of which only one is present at any given time, it can represent at most log2n bits of information. The marker may be static, as in a book or in a computer's memory
  • Communication of almost every sort requires that the marker move in space, from the transmitting system to the receiving system, and this movement follows the same physical laws as the movement of any other sort of matter-energy. The advance of communication technology over the years has been in the direction of decreasing the matter-energy costs of storing and transmitting the markers which bear information.
  • There are, therefore, important practical matter-energy constraints upon the information processing of all living systems exerted by the nature of the matter-energy which composes their markers.
  • organization is based upon the interrelations among parts.
  • If two parts are interrelated either quantitatively or qualitatively, knowledge of the state of one must yield some information about the state of the other. Information measures can demonstrate when such relationships exist
  • The disorder, disorganization, lack of patterning, or randomness of organization of a system is known as its entropy (S)
  • the statistical measure for the negative of entropy is the same as that for information
  • entropy becomes a measure of the probability
  • Increase of entropy was thus interpreted as the passage of a system from less probable to more probable states.
  • according to the second law, a system tends to increase in entropy over time, it must tend to decrease in negentropy or information.
  • therefore no principle of the conservation of information
  • The total information can be decreased in any system without increasing it elsewhere
  • but it cannot be increased without decreasing it elsewhere
  • . Making one or more copies of a given informational pattern does not increase information overall, though it may increase the information in the system which receives the copied information.
  • transforms information into negative entropy
  • smallest possible amount of energy used in observing one bit of information
  • calculations of the amount of information accumulated by living systems throughout growth.
  • the concept of Prigogine that in an open system (that is one in which both matter and energy can be exchanged with the environment) the rate of entropy production within the system, which is always positive, is minimized when the system is in a steady state.
  • in systems with internal feedbacks, internal entropy production is not always minimized when the system is in a stationary state. In other words, feedback couplings between the system parameters may cause marked changes in the rate of development of entropy. Thus it may be concluded that the "information flow" which is essential for this feedback markedly alters energy utilization and the rate of development of entropy, at least in some such special cases which involve feedback control. While the explanation of this is not clear, it suggests an important relationship between information and entropy
  • amount of energy actually required to transmit the information in the channel is a minute part of the total energy in the system, the "housekeeping energy" being by far the largest part of it
  • In recent years systems theorists have been fascinated by the new ways to study and measure information flows, but matter-energy flows are equally important. Systems theory is more than information theory, since it must also deal with energetics - such matters as
  • the flow of raw materials through societies
  • Only a minute fraction of the energy used by most living systems is employed for information processing
  • I have noted above that the movement of matter-energy over space, action, is one form of process. Another form of process is information processing or communication, which is the change of information from one state to another or its movement from one point to another over space
  • Communications, while being processed, are often shifted from one matter-energy state to another, from one sort of marker to another
  • transformations go on in living systems
  • One basic reason why communication is of fundamental importance is that informational patterns can be processed over space and the local matter-energy at the receiving point can be organized to conform to, or comply with, this information
  • the delivery of "flowers by telegraph."
  • Matter-energy and information always flow together
  • Information is always borne on a marker
  • . Conversely there is no regular movement in a system unless there is a difference in potential between two points, which is negative entropy or information
  • If the receiver responds primarily to the material or energic aspect, I shall call it, for brevity, a matter-energy transmission; if the response is primarily to the information, I shall call it an information transmission
  • Moreover, just as living systems must have specific forms of matter-energy, so they must have specific patterns of information
  • example
  • example
  • develop normally
  • have appropriate information inputs in infancy
  • pairs of antonyms
  • one member of which is associated with the concept of information (H)
  • the other member of which is associated with its negative, entropy (S)
  • System
  • A system is a set of interacting units with relationships among them
  • .The word "set" implies that the units have some common properties. These common properties are essential if the units are to interact or have relationships. The state of each unit is constrained by, conditioned by, or dependent on the state of other units. The units are coupled. Moreover, there is at least one measure of the sum of its units which is larger than the sum of that measure of its units.
  • Conceptual system
  • Units
  • terms
  • Relationships
  • a set of pairs of units, each pair being ordered in a similar way
  • expressed by words
  • or by logical or mathematical symbols
  • operations
  • The conceptual systems of science
  • observer
  • selects
  • particular sets to study
  • Variable
  • Each member of such a set becomes a variable of the observer's conceptual system
  • conceptual system may be loose or precise, simple or elaborate
  • Indicator
  • an instrument or technique used to measure fluctuations of variables in concrete systems
  • Function
  • a correspondence between two variables, x and y, such that for each value of x there is a definite value of y, and no two y's have the same x, and this correspondence is: determined by some rule
  • Any function is a simple conceptual system
  • Parameter
  • An independent variable through functions of which other functions may be expressed
  • The state of a conceptual system
  • the set of values on some scale, numerical or otherwise, which its variables have at a given instant
  • Formal identity
  • variables
  • varies comparably to a variable in another system
  • If these comparable variations are so similar that they can be expressed by the same function, a formal identity exists between the two systems
  • Relationships between conceptual and other sorts of systems
  • Science advances as the formal identity or isomorphism increases between a theoretical conceptual system and objective findings about concrete or abstracted systems
  • A conceptual system may be purely logical or mathematical, or its terms and relationships may be intended to have some sort of formal identity or isomorphism with units and relationships empirically determinable by some operation carried out by an observer
  • Concrete system
  • a nonrandom accumulation of matter-energy, in a region in physical space-time, which is organized into interacting interrelated subsystems or components.
  • Units
  • are also concrete systems
  • Relationships
  • spatial
  • temporal
  • spatiotemporal
  • causal
  • Both units and relationships in concrete systems are empirically determinable by some operation carried out by an observer
  • patterns of relationships or processes
  • The observer of a concrete system
  • distinguishes a concrete system from unorganized entities in its environment by the following criteria
  • physical proximity of its units
  • similarity of its units
  • common fate of its units
  • distinct or recognizable patterning of its units.
  • Their boundaries are discovered by empirical operations available to the general scientific community rather than set conceptually by a single observer
  • Variable of a concrete system
  • Any property of a unit or relationship within a system which can be recognized by an observer
  • which can potentially change over time, and whose change can potentially be measured by specific operations, is a variable of a concrete system
  • Examples
  • number of its subsystems or components, its size, its rate of movement in space, its rate of growth, the number of bits of information it can process per second, or the intensity of a sound to which it responds
  • A variable is intrasystemic
  • not to be confused with intersystemic variations which may be observed among individual systems, types, or levels.
  • The state of a concrete system
  • its structure
  • represented by the set of values on some scale which its variables have at that instant
  • Open system
  • Most concrete systems have boundaries which are at least partially permeable, permitting sizable magnitudes of at least certain sorts of matter-energy or information transmissions to pass them. Such a system is an open system. In open systems entropy may increase, remain in steady state, or decrease.
  • Closed system
  • impermeable boundaries through which no matter-energy or information transmissions of any sort can occur is a closed system
  • special case
  • No actual concrete system is completely closed
  • In closed systems, entropy generally increases, exceptions being when certain reversible processes are carried on which do not increase it. It can never decrease.
  • Nonliving system
  • the general case of concrete systems, of which living systems are a very special case. Nonliving systems need not have the same critical subsystems as living systems, though they often have some of them
  • Living system
  • a special subset of the set of all possible concrete systems
  • They all have the following characteristics:
  • open systems
  • inputs
  • throughputs
  • outputs
  • of various sorts of matter-energy and information.
  • maintain a steady state of negentropy even though entropic changes occur in them as they do everywhere else
  • by taking in inputs
  • higher in complexity or organization or negentropy
  • than their outputs
  • The difference permits them to restore their own energy and repair breakdowns in their own organized structure.
  • In living systems many substances are produced as well as broken down
  • To do this such systems must be open and have continual inputs of matter-energy and information
  • entropy will always increase in walled-off living systems
  • They have more than a certain minimum degree of complexity
  • They either contain genetic material composed of deoxyribonucleic acid (DNA)
  • or have a charter
  • blueprint
  • program
  • of their structure and process from the moment of their origin
  • may also include nonliving components.
  • They have a decider, the essential critical sub-system which controls the entire system, causing its subsystems and components to interact. Without such interaction under decider control there is no system.
  • other specific critical sub-systems or they have symbiotic or parasitic relationships with other living or nonliving systems
  • Their subsystems are integrated together to form actively self-regulating, developing, unitary systems with purposes and goals
  • They can exist only in a certain environment
  • change in their environment
  • produces stresses
  • Totipotential system
  • capable of carrying out all critical subsystem processes necessary for life is totipotential
  • Partipotential system
  • does not itself carry out all critical subsystem processes is partipotential
  • A partipotential system must interact with other systems that can carry out the processes which it does not, or it will not survive
  • parasitic
  • symbiotic
    • Tiberius Brastaviceanu
       
      The Exchange fime is a symbiotic system to SENSORICA
  • Fully functioning system
  • when it
  • Partially functioning system
  • it must do its own deciding, or it is not a system
  • Abstracted system
  • Units
  • relationships abstracted or selected by an observer in the light of his interests, theoretical viewpoint, or philosophical bias.
  • Some relationships may be empirically determinable by some operation carried out by the observer, but others are not, being only his concepts
  • Relationships
  • The relationships mentioned above are observed to inhere and interact in concrete, usually living, systems
  • these concrete systems are the relationships of abstracted systems.
  • The verbal usages of theoretical statements concerning abstracted systems are often the reverse of those concerning concrete systems
  • An abstracted system differs from an abstraction, which is a concept
  • representing a class of phenomena all of which are considered to have some similar "class characteristic." The members of such a class are not thought to interact or be interrelated, as are the relationships in an abstracted system
  • Abstracted systems are much more common in social science theory than in natural science.
  • are oriented toward relationships rather than toward the concrete systems
  • spatial arrangements are not usually emphasized
  • their physical limits often do not coincide spatially with the boundaries of any concrete system, although they may.
  • important difference between the physical and biological hierarchies, on the one hand, and social hierarchies, on the other
  • Most physical and biological hierarchies are described in spatial terms
  • we propose to identify social hierarchies not by observing who lives close to whom but by observing who interacts with whom
  • intensity of interaction
  • in most biological and physical systems relatively intense interaction implies relative spatial propinquity
  • To the extent that interactions are channeled through specialized communications and transportation systems, spatial propinquity becomes less determinative of structure.
    • Tiberius Brastaviceanu
       
      This is the case of SENSORICA, built on web-based communication and coordination tools. 
  • PARSONS
  • the unit of a partial social system is a role and not the individual.
  • culture
  • cumulative body of knowledge of the past, contained in memories and assumptions of people who express this knowledge in definite ways
  • The social system is the actual habitual network of communication between people.
  • RUESCH
  • A social system is a behavioral system
  • It is an organized set of behaviors of persons interacting with each other: a pattern of roles.
  • The roles are the units of a social system
    • Tiberius Brastaviceanu
       
      That is why we need a role system in SENSORICA
  • On the other hand, the society is an aggregate of social subsystems, and as a limiting case it is that social system which comprises all the roles of all the individuals who participate.
  • What Ruesch calls the social system is something concrete in space-time, observable and presumably measurable by techniques like those of natural science
  • To Parsons the system is abstracted from this, being the set of relationships which are the form of organization. To him the important units are classes of input-output relationships of subsystems rather than the subsystems themselves
  • system is a system of relationship in action, it is neither a physical organism nor an object of physical perception
  • evolution
  • differentiation
  • growth
  • from earlier and simpler forms and functions
  • capacities for specializations and gradients
  • [action] is not concerned with the internal structure of processes of the organism, but is concerned with the organism as a unit in a set of relationships and the other terms of that relationship, which he calls situation
  • Abstracted versus concrete systems
  • One fundamental distinction between abstracted and concrete systems is that the boundaries of abstracted systems may at times be conceptually established at regions which cut through the units and relationships in the physical space occupied by concrete systems, but the boundaries of these latter systems are always set at regions which include within them all the units and internal relationships of each system
  • A science of abstracted systems certainly is possible and under some conditions may be useful.
  • If the diverse fields of science are to be unified, it would be helpful if all disciplines were oriented either to concrete or to abstracted systems.
  • It is of paramount importance for scientists to distinguish clearly between them
Tiberius Brastaviceanu

If not Global Captalism - then What? - 0 views

  • I posit an optimistic view of the potential for Society from the emergence of a new and “Open” form of Capitalism.
  • Open Capital
  • the concept of “Open” Capital is “so simple…. it repels the mind".
  • ...162 more annotations...
  • Open Capital is defined as “a proportional share in an enterprise for an indeterminate time”
  • ‘Enterprise’ is defined as ‘any entity within which two or more individuals create, accumulate or exchange Value”.
  • Value is to Economics as Energy and Matter are to Physics.
  • The Metaphysics Of Value
  • division between “subject” and “object”.
  • primary reality is “Quality”
  • formless and indefinable
  • not a “thing”
  • a non-intellectual awareness or “pre-intellectual reality”
  • but an event at which the subject becomes aware of the object and before he distinguishes it
  • Quality is the basis of both subject and object
  • distinguish between “Static” and “Dynamic” Quality
  • treating Value as a form of “Quality” as envisioned by Pirsig.
  • Riegel
  • defined “Value” as “ the Relativity of Desire” again implying indeterminacy.
  • Pirsig’s approach Capital may be viewed as “Static” Value and Money as “Dynamic” Value. “Transactions” are the “events” at which individuals (Subjects) interact with each other or with Capital (both as Objects) to create forms of Value and at which “Value judgments” are made based upon a “Value Unit”.
  • The result of these Value Events /Transactions is to create subject/object pairings in the form of data ie Who “owns” or has rights of use in What,
  • at what Price
  • accounting data
  • Neo-Classical” Economics confuses indeterminate Value with a market– determined Price –
  • Data may be static
  • This Data identifies the subject with objects such as tangible ‘Material Value’
  • Data may itself constitute ‘Intellectual Value’
  • It, too, may then be defined in a subject/object pairing through the concept of “intellectual property”.
  • Other forms of Value are however not definable by data:
  • “sentimental” Value
  • Emotional Value’
  • 'Spiritual Value’
  • We may therefore look at the “transaction” or “value event” in a new light.
  • The creation and circulation of Value essentially comprises the concept we know of as “Money”.
  • Money / Dynamic Value
  • “The purpose of money is to facilitate barter by splitting the transaction into two parts, the acceptor of money reserving the power to requisition value from any trader at any time
  • money
  • value unit dissociated from any object
  • monetary unit
  • the basis relative to which other values may be expressed
  • The monetary process is a dynamic one involving the creation and recording of obligations as between individuals and the later fulfilment of these obligations
  • The monetary “Value Event”/ Transaction involves the creation of “Credit”
  • obligation to provide something of equivalent Value at a future point in time.
  • These obligations may be recorded on transferable documents
  • database of “Credit”/obligations is not Money, but temporary “Capital”
  • “Working Capital”
  • Static Value – which only becomes “Money”/ Dynamic Value when exchanged in the transitory Monetary process.
  • what we think of as Money is in fact not tangible “cash” but rather
  • the flow of data between databases of obligations maintained by Credit Institutions
  • or dynamic
  • Banks literally “loan” Money into existence
  • In exchange for an obligation by an Individual to provide to the Bank something of Value
  • Bank’s obligation is merely to provide another obligation at some future time
  • These Bank-issued obligations are therefore
  • claim upon a claim upon Value
  • The true source of Credit is the Individual, not the intermediary Bank
  • this Money they create from nothing despite the fact that it is literally Value-less
  • Thus there is no true sharing of Risk and Reward involved in Lending
  • issue in relation to Credit/Debt and this relates to the nature of Lending itself.
  • the practice of Lending involves an incomplete exchange in terms of risk and reward: a Lender, as opposed to an Investor, has no interest in the outcome of the Loan, and requires the repayment of Principal no matter the ability of the Borrower to repay.
  • Ethical problem
    • Tiberius Brastaviceanu
       
      "The Lender has no interest in the outcome of the loan", i.e doesn't care what happens in the end. The Lender ins not interested in the economical outcome of the Lender-Loner relation. So in fact there is no real risk sharing. the only risk for the Lender is when the Loner doesn't pay back, which is not really a risk... In fact it is a risk for the small bank, who has to buy money from the central bank, but not for the central bank. 
  • Money is not
  • an “Object” circulating but rather a dynamic process of Value creation and exchange by reference to a “Value Unit”.
  • Capital/ Static Value
  • Capital represents the static accumulation of Value
  • Some forms of Capital are “productive”
  • An ethical question
  • in relation to Productive Capital relates to the extent of “property rights” which may be held over it thereby allowing individuals to assert “absolute” permanent and exclusive ownership - in particular in relation to Land
  • our current financial system is based not upon Value but rather a claim upon Value
  • Financial Capital consists of two types:
  • “Debt”
  • “Equity”
  • Interest
  • obligations of finite/temporary duration but with no participation in the assets or revenues
  • absolute and permanent ownership/participation (without obligation) in assets and revenues
  • discontinuity between Debt and Equity
  • at the heart of our current problems as a Society
  • The Enterprise
  • ‘Charitable’ Enterprise
  • ‘Social’ Enterprise
  • Value
  • exchanged in agreed proportions;
  • Value is exchanged for the Spiritual and Emotional Value
  • ‘Commercial’ Enterprise
  • ‘closed’
  • Value are exchanged between a limited number of individuals
  • Early enterprises were partnerships and unincorporated associations
  • need for institutions which outlived the lives of the Members led to the development of the Corporate body with a legal existence independent of its Members
  • The key development in the history of Capitalism was the creation of the ‘Joint Stock’ Corporate with liability limited by shares of a ‘Nominal’ or ‘Par’ value
  • over the next 150 years the Limited Liability Corporate evolved into the Public Limited Liability Corporate
  • Such “Closed” Shares of “fixed” value constitute an absolute and permanent claim over the assets and revenues of the Enterprise to the exclusion of all other “stakeholders” such as Suppliers, Customers, Staff, and Debt Financiers.
  • The latter are essentially ‘costs’ external to the
  • owners of the Enterprise
  • maximise ‘Shareholder Value’
  • There is a discontinuity/ fault-line within the ‘Closed’ Corporate
  • It has the characteristics of what biologists call a ‘semi-permeable membrane’ in the way that it allows Economic Value to be extracted from other stakeholders but not to pass the other way.
    • Tiberius Brastaviceanu
       
      It is a way to extract value from productive systems. It is a system of exploitation. 
  • Capital most certainly is and always has been - through the discontinuity (see diagram) between:‘Fixed’ Capital in the form of shares ie Equity; and ‘Working’ Capital in the form of debt finance, credit from suppliers, pre-payments by customers and obligations to staff and management.
  • irreconcilable conflict between Equity and Debt
  • xchange of Economic Value in a Closed Corporate is made difficult and true sharing of Risk and Reward is simply not possible
  • No Enterprise Model has been capable of resolving this dilemma. Until now.
  • Corporate Partnerships with unlimited liability
  • mandatory for partnerships with more than 20 partners to be incorporated
  • in the USA
  • it is the normal structure for professional partnerships
  • Limited Liability Partnerships
  • In the late 1990's
  • litigation
  • The UK LLP is supremely simple and remarkably flexible.
  • All that is needed is a simple ‘Member Agreement’ – a legal protocol which sets out the Aims, Objectives. Principles of Governance, Revenue Sharing, Dispute Resolution, Transparency and any other matters that Members agree should be included. Amazingly enough, this Agreement need not even be in writing, since in the absence of a written agreement Partnership Law is applied by way of default.
  • The ease of use and total flexibility enables the UK LLP to be utilised in a way never intended – as an ‘Open’ Corporate partnership.
  • ‘Open’ Corporate Partnership
  • concepts which characterise the ‘Open’ Corporate Partnership
  • it is now possible for any stakeholder to become a Member of a UK LLP simply through signing a suitably drafted Member Agreement
  • ‘Open’
  • supplier
  • employee
  • may instead become true Partners in the Enterprise with their interests aligned with other stakeholders.
    • Tiberius Brastaviceanu
       
      Can SENSORICA be a UK LLP?
  • no profit or loss in an Open Corporate Partnership, merely Value creation and exchange between members in conformance with the Member Agreement.
  • Proportional shares
  • in an Enterprise constitute an infinitely divisible, flexible and scaleable form of Capital capable of distributing or accumulating Value organically as the Enterprise itself grows in Value or chooses to distribute it.
  • Emergence of “Open” Capital
  • example of how ‘Temporary Equity’ may operate in practice
  • The Open Capital Partnership (“OCP”)
  • Within the OCP Capital and Revenue are continuous: to the extent that an Investee pays Rental in advance of the due date he becomes an Investor.
  • Open Capital – a new Asset Class
  • create a new asset class of proportional “shares”/partnership interests
  • in Capital holding OCP’s
  • Property Investment Partnerships (“PIP’s”)
  • Open Corporate Partnerships as a Co-operative Enterprise model
  • A Co-operative is not an enterprise structure: it is a set of Principles that may be applied to different types of enterprise structure.
  • Within a Partnership there is no “Profit” and no “Loss”.
  • Partnerships
  • mutual pursuit of the creation and exchange of Value
  • Partners do not compete with each othe
  • the crippling factors in practical terms have been, inter alia: the liability to which Member partners are exposed from the actions of their co-partners on their behalf; limited ability to raise capital.
  • they favour the interests of other stakeholders, are relatively restricted in accessing investment; are arguably deficient in incentivising innovation.
  • The ‘new’ LLP was expressly created to solve the former problem by limiting the liability of Member partners to those assets which they choose to place within its protective ‘semi-permeable membrane’
  • However, the ability to configure the LLP as an “Open” Corporate permits a new and superior form of Enterprise.
  • it is possible to re-organise any existing enterprise as either a partnership or as a partnership of partnerships.
  • the revenues
  • would be divided among Members in accordance with the LLP Agreement. This means that all Members share a common interest in collaborating/co-operating to maximise the Value generated by the LLP collectively as opposed to competing with other stakeholders to maximise their individual share at the other stakeholders’ expense.
  • facilitate the creation of LLP’s as “Co-operatives of Co-operatives”.
  • he ‘Commercial’ Enterprise LLP – where the object is for a closed group of individuals to maximise the value generated in their partnership. There are already over 7,000 of these.
    • Tiberius Brastaviceanu
       
      Can SENSORICA be one of these?
  • the Profit generated in a competitive economy based upon shareholder value and unsustainable growth results from a transfer of risks outwards, and the transfer of reward inwards, leading to a one way transfer of Economic Value.
  • This,
  • will very often impoverish one or more constituency of stakeholders
  • A partnership, however, involves an exchange of value through the sharing of risk and reward.
  • Whether its assets are protected within a corporate entity with limited liability or not, it will always operate co-operatively – for mutual profit.
  • Open Capital, Economics and Politics
  • continuity between Capital as Static Value and Money as Dynamic Value which has never before been possible due to the dichotomy between the absolute/infinite and the absolute/finite durations of the competing claims over assets – “Equity” and “Debt”
  • Open Capital Partnership gives rise to a new form of Financial Capital of indeterminate duration. It enables the Capitalisation of assets and the monetisation of revenue streams in an entirely new way.
  • It is possible to envisage a Society within which individuals are members of a portfolio of Enterprises constituted as partnerships, whether limited in liability or otherwise.
  • Some will be charitable
  • Others will be ‘social’
  • ‘Commercial’ enterprises of all kinds aimed at co-operatively working together to maximise value for the Members.
  • the process has already begun
  • Capitalism
  • superior
  • to all other models, such as Socialism.
  • It can only be replaced by another ‘emergent’ phenomenon, which is adopted ‘virally’ because any Enterprise which does not utilise it will be at a disadvantage to an Enterprise which does.
  • The ‘Open’ Corporate Partnership is: capable of linking any individuals anywhere in respect of collective ownership of assets anywhere; extremely cheap and simple to operate; and because one LLP may be a Member of another it is organically flexible and ‘scaleable’. The phenomenon of “Open Capital” – which is already visible in the form of significant commercial transactions - enables an extremely simple and continuous relationship between those who wish to participate indefinitely in an Enterprise and those who wish to participate for a defined period of time.
  • Moreover, the infinitely divisible proportionate “shares” which constitute ‘Open’ Capital allow stakeholder interests to grow flexibly and organically with the growth in Value of the Enterprise. In legal terms, the LLP agreement is essentially consensual and ‘pre-distributive’: it is demonstrably superior to prescriptive complex contractual relationships negotiated adversarially and subject to subsequent re-distributive legal action. Above all, the ‘Open’ Corporate Partnership is a Co-operative phenomenon which is capable, the author believes, of unleashing the “Co-operative Advantage” based upon the absence of a requirement to pay returns to “rentier” Capitalists.
Kurt Laitner

The Link Economy and Creditright - Geeks Bearing Gifts - Medium - 3 views

  • Online, content with no links has no value because it has no audience
  • News Commons used Repost as the basis of a content- and audience-sharing network among dozens of sites big and small in the state’s new ecosystem
  • Huffington Post and Twitter can get thousands of writers — including me — to make content for free because it brings us audience and attention.
  • ...25 more annotations...
  • Consider an alternative to syndication. I’ll call it reverse syndication. Instead of selling my content to you, what say I give it to you for free? Better yet, I pay you to publish it on your site. The condition: I get to put my ad on the content. I will pay you a share of what I earn from that ad based on how much audience you bring me.
  • That model values the creation of the audience
  • If content could travel with its business model attached, we could set it free to travel across the web, gathering recommendations and audience and value as it goes
  • She searched Google for “embeddable article” and up came Repost.us, already created by entrepreneur and technologist John Pettitt. Repost very cleverly allowed embeddable articles to travel with the creator’s own brand, advertising, analytics, and links.
  • First, he found that the overlap in audience between a creator’s and an embedder’s sites generally ran between 2 and 5 percent. That is to say, the embedders brought a mostly new audience to the creator’s content.
  • Instead, Pettitt found that click-through ran amazingly high: 5 to 7 percent — and these were highly qualified clicks of people who knew what they were going to get on the other side of a link
  • I call this creditright. We need a means to attach credit to content for those who contribute value to it so that each constituent has the opportunity to negotiate and extract value along the chain, so that each can gain permission to take part in the chain, and so that behaviors that benefit others in the chain can be rewarded and encouraged
    • Kurt Laitner
       
      so *net basically, or OVN contributory value accounting
  • Each creator’s ads traveled with its content — though that wasn’t necessarily optimal, because an ad for a North Jersey hairdresser wouldn’t perform terribly well with South Jersey readers brought in through embedding.
  • key factor in its failure: Repost could find many sites willing and eager to make their content embeddable. It didn’t find enough sites to embed the content.
  • But the embedders got nothing aside from the free use of content — content that was just a link away anyway
  • Our ultimate problem in media is that we do not have sufficient technical and legal frameworks for alternate business models.
  • That formula was the key insight behind Google: that links to content are a signal of its value; thus, the more links to a page from sites that themselves have more links, the more useful, relevant, or valuable that content is likely to be
  • Silicon Valley’s: Those people are your fans who are bringing value to you by sending you audiences and by contributing their creativity, and you’d be wise to build your businesses around making it easier, not harder, for them to get and share your content when and how they want it.
  • And so, we came to agree that we need new technological and legal frameworks flexible enough to enable multiple models to support creativity.
  • Hollywood’s side: People who download our content without buying it or who remix it without our permission — and the platforms that facilitate these behaviors — are stealing from us and must be stopped and punished.
  • Imagine you are a songwriter. You hear a street poet and her words inspire you to write a song about her, quoting her in the piece. You go to a crowdfunding platform — Kickstarter, Indiegogo, or Patreon — to raise money for you to go into the studio and perform and distribute your song. Another songwriter comes along and remixes it, making a new version and also sampling from others’ songs. Both end up on YouTube and Soundcloud, on iTunes and Google Play. Audience members discover and share the songs. A particularly popular artist shares the remixed version on Twitter and Facebook and it explodes. A label has one of its stars record it. The star appears on TV performing it. A movie studio includes that song in a soundtrack. There are many constituents in that process: the subject, the songwriter, the patrons, the fans, the remixer, the distributor, the label, the star, the show, the studio, and the platforms. Each contributed value.
  • Each may want to recognize value — but not all will want cash. There are other currencies in play: The poet may want credit and fame; the songwriter may want to sell concert tickets; the patrons may want social capital for discovering and supporting a new artist; the remixer may want permission to remix; the platforms may want a cut of sales or of subscription revenue; the show may want audience and advertising; the studio will want a return on its investment and risk.
  • I’ve suggested they would be wiser to seek another currency from Google: data about the users, helping build better services for readers and advertisers and thus better businesses
  • We will need a way to attach metadata to content, recording and revealing its source and the contributions of others in the chain of continuing creation and distribution.
  • We need a marketplace to measure and value their contributions and a means to negotiate rewards and permissions
  • We need payment structures to handle multiple currencies: data as well as money
  • And we need a legal framework to allow the flexible exploration of new models, some of which we cannot yet imagine.
  • It took many more years for society to develop principles of free speech to balance the economic and political interests of those who would attempt to control a new tool of speech.
  • We must reimagine the business of media and news from the first penny, asking where value is created, who contributes to it, where it resides, and how to extract it
  • Thus, we need new measures of value
Tiberius Brastaviceanu

Beyond Blockchain: Simple Scalable Cryptocurrencies - The World of Deep Wealth - Medium - 0 views

  • I clarify the core elements of cryptocurrency and outline a different approach to designing such currencies rooted in biomimicry
  • This post outlines a completely different strategy for implementing cryptocurrencies with completely distributed chains
  • Rather than trying to make one global, anonymous, digital cash
  • ...95 more annotations...
  • we are interested in the resilience that comes from building a rich ecosystem of interoperable currencies
  • What are the core elements of a modern cryptocurrency?
  • Digital
  • Holdings are electronic and only exist and operate by virtue of a community’s agreement about how to interpret digital bits according to rules about operation and accounting of the currency.
  • Trustless
  • don’t have to trust a 3rd party central authority
  • Decentralized
  • Specifically, access, issuance, transaction accounting, rules & policies, should be collectively visible, known, and held.
  • Cryptographic
  • This cryptographic structure is used to enable a variety of people to host the data without being able to alter it.
  • Identity
  • there must be a way to associate these bits with some kind of account, wallet, owner, or agent who can use them
  • Other things that many take for granted in blockchains may not be core but subject to decisions in design and implementation, so they can vary between implementations
  • It does not have to be stored in a synchronized global ledger
  • does not have to be money. It may be a reputation currency, or data used for identity, or naming, etc
  • Its units do not have to be cryptographic tokens or coins
  • It does not have to protect the anonymity of users, although it may
  • if you think currency is only money, and that money must be artificially scarce
  • Then you must tackle the problem of always tracking which coins exist, and which have been spent. That is one approach — the one blockchain takes.
  • You might optimize for anonymity if you think of cryptocurrency as a tool to escape governments, regulations, and taxes.
  • if you want to establish and manage membership in new kinds of commons, then identity and accountability for actions may turn out to be necessary ingredients instead of anonymity.
  • In the case of the MetaCurrency Project, we are trying to support many use cases by building tools to enable a rich ecosystem of communities and current-sees (many are non-monetary) to enhance collective intelligence at all scales.
  • Managing consensus about a shared reality is a central challenge at the heart of all distributed computing solutions.
  • If we want to democratize money by having cryptocurrencies become a significant and viable means of transacting on a daily basis, I believe we need fundamentally more scalable approaches that don’t require expensive, dedicated hardware just to participate.
  • We should not need system wide consensus for two people to do a transaction in a cryptocurrency
  • Blockchain is about managing a consensus about what was “said.” Ceptr is about distributing a consensus about how to “speak.”
  • how nature gets the job done in massively scalable systems which require coordination and consistency
  • Replicate the same processes across all nodes
  • Empower every node with full agency
  • Hold this transformed state locally and reliably
  • Establish protocols for interaction
  • Each speaker of a language carries the processes to understand sentences they hear, and generate sentences they need
  • we certainly don’t carry some kind of global ledger of everything that’s ever been said, or require consensus about what has been said
  • Language IS a communication protocol we learn by emulating the processes of usage.
  • Dictionaries try to catch up when the usage
  • there is certainly no global ledger with consensus about the state of trillions of cells. Yet, from a single zygote’s copy of DNA, our cells coordinate in a highly decentralized manner, on scales of trillions, and without the latency or bottlenecks of central control.
  • Imagine something along the lines of a Java Virtual Machine connected to a distributed version of Github
  • Every time this JVM runs a program it confirms the hash of the code it is about to execute with the hash signed into the code repository by its developers
  • This allows each node that intends to be honest to be sure that they’re running the same processes as everyone else. So when two parties want to do a transaction, and each can have confidence their own code, and the results that your code produces
  • Then you treat it as authoritative and commit it to your local cryptographically self-validating data store
  • Allowing each node to treat itself as a full authority to process transactions (or interactions via shared protocols) is exactly how you empower each node with full agency. Each node runs its copy of the signed program/processes on its own virtual machine, taking the transaction request combined with the transaction chains of the parties to the transaction. Each node can confirm their counterparty’s integrity by replaying their transactions to produce their current state, while confirming signatures and integrity of the chain
  • If both nodes are in an appropriate state which allows the current transaction, then they countersign the transaction and append to their respective chains. When you encounter a corrupted or dishonest node (as evidenced by a breach of integrity of their chain — passing through an invalid state, broken signatures, or broken links), your node can reject the transaction you were starting to process. Countersigning allows consensus at the appropriate scale of the decision (two people transacting in this case) to lock data into a tamper-proof state so it can be stored in as many parallel chains as you need.
  • When your node appends a mutually validated and signed transaction to its chain, it has updated its local state and is able to represent the integrity of its data locally. As long as each transaction (link in the chain) has valid linkages and countersignatures, we can know that it hasn’t been tampered with.
  • If you can reliably embody the state of the node in the node itself using Intrinsic Data Integrity, then all nodes can interact in parallel, independent of other interactions to maximize scalability and simultaneous processing. Either the node has the credits or it doesn’t. I don’t have to refer to a global ledger to find out, the state of the node is in the countersigned, tamper-proof chain.
  • Just like any meaningful communication, a protocol needs to be established to make sure that a transaction carries all the information needed for each node to run the processes and produce a new signed and chained state. This could be debits or credits to an account which modify the balance, or recoding courses and grades to a transcript which modify a Grade Point Average, or ratings and feedback contributing to a reputation score, and so on.
  • By distributing process at the foundation, and leveraging Intrinsic Data Integrity, our approach results in massive improvements in throughput (from parallel simultaneous independent processing), speed, latency, efficiency, and cost of hardware.
  • You also don’t need to incent people to hold their own record — they already want it.
  • Another noteworthy observation about humans, cells, and atoms, is that each has a general “container” that gets configured to a specific use.
  • Likewise, the Receptors we’ve built are a general purpose framework which can load code for different distributed applications. These Receptors are a lightweight processing container for the Ceptr Virtual Machine Host
  • Ceptr enables a developer to focus on the rules and transactions for their use case instead of building a whole framework for distributed applications.
  • how units in a currency are issued
  • Most people think that money is just money, but there are literally hundreds of decisions you can make in designing a currency to target particular needs, niches, communities or patterns of flow.
  • Blockchain cryptocurrencies are fiat currencies. They create tokens or coins from nothing
  • These coins are just “spoken into being”
  • the challenging task of
  • ensure there is no counterfeiting or double-spending
  • Blockchain cryptocurrencies are fiat currencies
  • These coins are just “spoken into being”
  • the challenging task of tracking all the coins that exist to ensure there is no counterfeiting or double-spending
  • You wouldn’t need to manage consensus about whether a cryptocoin is spent, if your system created accounts which have normal balances based on summing their transactions.
  • In a mutual credit system, units of currency are issued when a participant extends credit to another user in a standard spending transaction
  • Alice pays Bob 20 credits for a haircut. Alice’s account now has -20, and Bob’s has +20.
  • Alice spent credits she didn’t have! True
  • Managing the currency supply in a mutual credit system is about managing credit limits — how far people can spend into a negative balance
  • Notice the net number units in the system remains zero
  • One elegant approach to managing mutual credit limits is to set them based on actual demand.
  • concerns about manufacturing fake accounts to game credit limits (Sybil Attacks)
  • keep in mind there can be different classes of accounts. Easy to create, anonymous accounts may get NO credit limit
  • What if I alter my code to give myself an unlimited credit limit, then spend as much as I want? As soon as you pass the credit limit encoded in the shared agreements, the next person you transact with will discover you’re in an invalid state and refuse the transaction.
  • If two people collude to commit an illegal transaction by both hacking their code to allow a normally invalid state, the same still pattern still holds. The next person they try to transact with using untampered code will detect the problem and decline to transact.
  • Most modern community currency systems have been implemented as mutual credit,
  • Hawala is a network of merchants and businessmen, which has been operating since the middle ages, performing money transfers on an honor system and typically settling balances through merchandise instead of transferring money
  • Let’s look at building a minimum viable cryptocurrency with the hawala network as our use case
  • To minimize key management infrastructure, each hawaladar’s public key is their address or identity on the network. To join the network you get a copy of the software from another hawaladar, generate your public and private keys, and complete your personal profile (name, location, contact info, etc.). You call, fax, or email at least 10 hawaladars who know you, and give them your IP address and ask them to vouch for you.
  • Once 10 other hawaladars have vouched for you, you can start doing other transactions because the protocol encoded in every node will reject a transaction chain that doesn’t start with at least 10 vouches
  • seeding your information with those other peers so you can be found by the rest of the network.
  • As described in the Mutual Credit section, at the time of transaction each party audits the counterparty’s transaction chain.
  • Our hawala crypto-clearinghouse protocol has two categories of transactions: some used for accounting and others for routing. Accounting transactions change balances. Routing transactions maintain network integrity by recording information about hawaladar
  • Accounting Transactions create signed data that changes account balances and contains these fields:
  • The final hash of all of the above fields is used as a unique transaction ID and is what each of party signs with their private keys. Signing indicates a party has agreed to the terms of the transaction. Only transactions signed by both parties are considered valid. Nodes can verify signatures by confirming that decryption of the signature using the public key yields a result which matches the transaction ID.
  • Routing Transactions sign data that changes the peers list and contain these fields:
  • As with accounting transactions, the hash of the above fields is used as the transaction’s unique key and the basis for the cryptographic signature of both counterparties.
  • Remember, instead of making changes to account balances, routing transactions change a node’s local list of peers for finding each other and processing.
  • a distributed network of mutual trust
  • operates across national boundaries
  • everyone already keeps and trusts their own separate records
  • Hawaladars are not anonymous
  • “double-spending”
  • It would be possible for someone to hack the code on their node to “forget” their most recent transaction (drop the head of their chain), and go back to their previous version of the chain before that transaction. Then they could append a new transaction, drop it, and append again.
  • After both parties have signed the agreed upon transaction, each party submits the transaction to separate notaries. Notaries are a special class of participant who validate transactions (auditing each chain, ensuring nobody passes through an invalid state), and then they sign an outer envelope which includes the signatures of the two parties. Notaries agree to run high-availability servers which collectively manage a Distributed Hash Table (DHT) servicing requests for transaction information. As their incentive for providing this infrastructure, notaries get a small transaction fee.
  • This approach introduces a few more steps and delays to the transaction process, but because it operates on independent parallel chains, it is still orders of magnitude more efficient and decentralized than reaching consensus on entries in a global ledger
  • millions of simultaneous transactions could be getting processed by other parties and notaries with no bottlenecks.
  • There are other solutions to prevent nodes from dropping the head of their transaction chain, but the approach of having notaries serve out a DHT solves a number of common objections to completely distributed accounting. Having access to reliable lookups in a DHT provides a similar big picture view that you get from a global ledger. For example, you may want a way to look up transactions even when the parties to that transaction are offline, or to be able to see the net system balance at a particular moment in time, or identify patterns of activity in the larger system without having to collect data from everyone individually.
  • By leveraging Intrinsic Data Integrity to run numerous parallel tamper-proof chains you can enable nodes to do various P2P transactions which don’t actually require group consensus. Mutual credit is a great way to implement cryptocurrencies to run in this peered manner. Basic PKI with a DHT is enough additional infrastructure to address main vulnerabilities. You can optimize your solution architecture by reserving reserve consensus work for tasks which need to guarantee uniqueness or actually involve large scale agreement by humans or automated contracts.
  • It is not only possible, but far more scalable to build cryptocurrencies without a global ledger consensus approach or cryptographic tokens.
  •  
    Article written by Arthur Brook, founder of Metacurrency project and of Ceptr.
Kurt Laitner

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
Kurt Laitner

UK Indymedia - WOS4: The Creative Anti-Commons and the Poverty of Networks - 0 views

  • Something with no reproduction costs can have no exchange-value in a context of free exchange.
  • Further, unless it can be converted into exchange-value, how can the peer producers be able to acquire the material needs for their own subsistence?
  • For Social Production to have any effect on general material wealth it has to operate within the context of a total system of goods and services, where the physical means of production and the virtual means of production are both available in the commons for peer production.
  • ...26 more annotations...
  • "All texts published in Situationist International may be freely reproduced, translated and edited, even without crediting the original source."
  • The website of the creative commons makes the following statement about it's purpose: "Creative Commons defines the spectrum of possibilities between full copyright -- all rights reserved -- and the public domain -- no rights reserved. Our licenses help you keep your copyright while inviting certain uses of your work -- a 'some rights reserved' copyright."
  • The website of the creative commons makes the following statement about it's purpose: "Creative Commons defines the spectrum of possibilities between full copyright -- all rights reserved -- and the public domain -- no rights reserved. Our licenses help you keep your copyright while inviting certain uses of your work -- a 'some rights reserved' copyright."
  • Or more specifically, who is a position to convert the use-value available in the "commons" into the exchange-value needed to acquire essential subsistence or accumulate wealth?
  • All texts published in Situationist International may be freely reproduced, translated and edited, even without crediting the original source
  • The point of the above is clear, the Creative Commons, is to help "you" (the "Producer") to keep control of "your" work. The right of the "consumer" is not mentioned, neither is the division of "producer" and "consumer" disputed.
  • Creative "Commons" is thus really an Anti-Commons, serving to legitimise, rather than deny, Producer-control and serving to enforce, rather than do away with, the distinction between producer and consumer
  • specifically providing a framework then, for "producers" to deny "consumers" the right to either create use-value or material exchange-value of the "common" stock of value in the Creative "Commons" in their own cultural production
  • Thus, the very problem presented by Lawrence Lessig, the problem of Producer-control, is not in anyway solved by the presented solution, the Creative Commons, so long as the producer has the exclusive right to chose the level of freedom to grant the consumer, a right which Lessig has always maintained support for
  • The Free Software foundation, publishers of the GPL, take a very different approach in their definition of "free," insisting on the "four freedoms:" The Freedom to use, the freedom to study, the freedom to share, and the freedom to modify.
  • The website of the creative commons makes the following statement about it's purpose: "Creative Commons defines the spectrum of possibilities between full copyright -- all rights reserved -- and the public domain -- no rights reserved. Our licenses help you keep your copyright while inviting certain uses of your work -- a 'some rights reserved' copyright
  • In all these cases what is evident is that the freedom being insisted upon is the freedom of the consumer to use and produce, not the "freedom" of the producer to control.
  • Moreover, proponents of free cultural must be firm in denying the right of Producer-control and denying the enforcement of distinction between producer and consumer
  • where a class-less community of workers ("peers") produce collaboratively within a property-less ("commons-based") society
  • Clearly, even Marx would agree that the ideal of Communism was commons-based peer production
  • the property in the commons is entirely non-rivalrous property
  • The use-value of this information commons is fantastic
  • However, if commons-based peer-production is limited exclusively to a commons made of digital property with virtual no reproduction costs then how can the use-value produced be translated into exchange-value?
  • Further, unless it can be converted into exchange-value, how can the peer producers be able to acquire the material needs for their own subsistence
  • The root of the problem of poverty does not lay in a lack of culture or information
  • but of direct exploitation of the producing class by the property owning classes
  • The source of poverty is not reproduction costs, but rather extracted economic rents, forcing the producers to accept less than the full product of their labour as their wage by denying them independent access to the means of production
  • So long as commons-based peer-production is applied narrowly to only an information commons, while the capitalist mode of production still dominates the production of material wealth, owners of material property, namely land and capital, will continue to capture the marginal wealth created as a result of the productivity of the information commons.
  • Whatever exchange value is derived from the information commons will always be captured by owners of real property, which lays outside the commons.
  • For Social Production to have any effect on general material wealth it has to operate within the context of a total system of goods and services, where the physical means of production and the virtual means of production are both available in the commons for peer production
  • For free cultural to create a valuable common stock it must destroy the privilege of the producer to control the common stock, and for this common stock to increase the real material wealth of peer producers, the commons must include real property, not just information
  •  
    Strong grasp of the issues, not entirely in agreement on the thesis that the solution is the removal of producer control as this does not support the initiation of an economy, only its ongoing function once established, and the economy is continuously intiating itself, so it is not a one time problem. I do support the notion that producers are in fact none other than consumers of prior art but also that effort is required to remix as much as the magical creation out of nothing. In order to incent this behavior then (or even merely to allow it) the basic scarce needs of the individual must be taken care of. This may be done by ensuring beneficial ownership, but even that suffers from the initiation problem, which the requires us to have a pool of wealth to kickstart the thing by supporting every last person on earth with a basic income - that wealth is in fact available...
Tiberius Brastaviceanu

Access control - Wikipedia, the free encyclopedia - 0 views

  • The act of accessing may mean consuming, entering, or using.
  • Permission to access a resource is called authorization.
  • Locks and login credentials are two analogous mechanisms of access control.
  • ...26 more annotations...
  • Geographical access control may be enforced by personnel (e.g., border guard, bouncer, ticket checker)
  • n alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country
  • access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons
  • can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap.
  • Physical access control is a matter of who, where, and when
  • Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.[citation needed] Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked
  • Credential
  • Access control system operation
  • The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input
  • There are three types (factors) of authenticating information:[2] something the user knows, e.g. a password, pass-phrase or PIN something the user has, such as smart card or a key fob something the user is, such as fingerprint, verified by biometric measurement
  • Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios
  • When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked.
  • A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a biometric feature) or some combination of these items. This is known as multi-factor authentication. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.
  • An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list
  • monitor the door position
  • Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the doo
  • Access control topology
  • Access control decisions are made by comparing the credential to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the look-up out from a central host to the edge of the system, or the reader. The predominant topology circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks
  • Access control readers may be classified by the functions they are able to perform
  • and forward it to a control panel.
  • Basic (non-intelligent) readers: simply read
  • Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus.
  • Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers.
  • Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host
  • a built in webservice to make it user friendly
  • Some readers may have additional features such as an LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support
Kurt Laitner

Club of Amsterdam blog: The impact of culture on education - 0 views

  • For example in some countries the objective of education is: to develop a critical mind, which in other cultures is viewed as absurd. In these countries students are supposed to try to learn as much as possible from the older generation and only when you are fully initiated you may communicate to have ideas of yourself.
  • For example in some countries the objective of education is: to develop a critical mind, which in other cultures is viewed as absurd. In these countries students are supposed to try to learn as much as possible from the older generation and only when you are fully initiated you may communicate to have ideas of yourself.
  • The combined scores for each country explain variations in behavior of people and organizations. The scores indicate the relative differences between cultures.
  • ...13 more annotations...
  • n masculine cultures like USA, UK, Germany, Japan and Italy the dominant values are achievement and success. The dominant values in feminine cultures are consensus seeking, caring for others and quality of life. Sympathy is for the underdog. People try to avoid situations distinguishing clear winners and losers.  In masculine cultures performance and achievement are important. The sympathy is for the winners. Status is important to show success. Feminine cultures like the Scandinavian countries and the Netherlands have a people orientation. Small is beautiful and status is not so important.
  • In masculine cultures like USA, UK, Germany, Japan and Italy the dominant values are achievement and success. The dominant values in feminine cultures are consensus seeking, caring for others and quality of life. Sympathy is for the underdog. People try to avoid situations distinguishing clear winners and losers.  In masculine cultures performance and achievement are important. The sympathy is for the winners. Status is important to show success. Feminine cultures like the Scandinavian countries and the Netherlands have a people orientation. Small is beautiful and status is not so important.
  • In masculine cultures like USA, UK, Germany, Japan and Italy the dominant values are achievement and success. The dominant values in feminine cultures are consensus seeking, caring for others and quality of life. Sympathy is for the underdog. People try to avoid situations distinguishing clear winners and losers.  In masculine cultures performance and achievement are important. The sympathy is for the winners. Status is important to show success. Feminine cultures like the Scandinavian countries and the Netherlands have a people orientation. Small is beautiful and status is not so important.
  • For example in some countries the objective of education is: to develop a critical mind, which in other cultures is viewed as absurd. In these countries students are supposed to try to learn as much as possible from the older generation and only when you are fully initiated you may communicate to have ideas of yourself.
  • c. Masculinity vs. Femininity (MAS) In masculine cultures like USA, UK, Germany, Japan and Italy the dominant values are achievement and success. The dominant values in feminine cultures are consensus seeking, caring for others and quality of life. Sympathy is for the underdog. People try to avoid situations distinguishing clear winners and losers.  In masculine cultures performance and achievement are important. The sympathy is for the winners. Status is important to show success. Feminine cultures like the Scandinavian countries and the Netherlands have a people orientation. Small is beautiful and status is not so important.
  • He defines culture as “the collective programming of the mind that distinguishes the members of one group or category of people from others”.
  • Analyzing his data, Hofstede found five value clusters (or “dimensions”) being the most fundamental in understanding and explaining the differences in answers to the single questions in his questionnaires
  • The five dimensions of national culture identified by Hofstede are:  Power Distance Index (PDI)  Individualism vs. collectivism (IDV)  Masculinity vs. femininity (MAS)  Uncertainty Avoidance Index (UAI)  Long Term Orientation (LTO)
  • Power distance is the extent to which less powerful members of a society accept that power is distributed unequally. In high power-distance cultures everybody has his/her rightful place in society. Old age is respected, and status is important. In low power-distance cultures people try to look younger and powerful people try to look less powerful
  • In individualistic cultures, like almost all the rich Western countries, people look after themselves and their immediate family only; in collectivist cultures like Asia and Africa people belong to "in-groups" who look after them in exchange for loyalty
  • In masculine cultures like USA, UK, Germany, Japan and Italy the dominant values are achievement and success. The dominant values in feminine cultures are consensus seeking, caring for others and quality of life. Sympathy is for the underdog. People try to avoid situations distinguishing clear winners and losers.  In masculine cultures performance and achievement are important. The sympathy is for the winners. Status is important to show success. Feminine cultures like the Scandinavian countries and the Netherlands have a people orientation. Small is beautiful and status is not so important
  • Uncertainty avoidance (or uncertainty control) stands for the extent to which people feel threatened by uncertainty and ambiguity. In cultures with strong uncertainty avoidance, people have a strong emotional need for rules and formality to structure life
  • The last element of culture is the Long Term Orientation which is the extent to which a society exhibits a future-orientated perspective rather than a near term point of view.  Low scoring countries like the USA and West European countries are usually those under the influence of monotheistic religious systems, such as the Christian, Islamic or Jewish systems. People in these countries believe there is an absolute and indivisible truth. In high scoring countries such as Hong Kong, Taiwan, China, for example those practicing Buddhism, Shintoism or Hinduism,  people believe truth depends on time, context and situation
  •  
    has explanatory power over many of the fundamental disagreements I have seen play out in sensorica discussions - may be worthwhile to understand constituents based on this model
Tiberius Brastaviceanu

INFRASUPP-1-2014 - 0 views

  • Topic: Innovation support measures
  • Research infrastructures
  • have an innovation potential that has not always been sufficiently exploited in the past
  • ...9 more annotations...
  • enterprises (including SMEs) may not realise that they have the opportunity to benefit
  • due to a lack of awareness
  • industry may find entry barriers to this sector
  • There is therefore a need to stimulate innovation both from within the research infrastructures themselves and in their supplier industry
  • Development of a portal of calls, tenders and future needs and technology transfer opportunities in research infrastructures of pan European interest;
  • Networking of procurement professionals to encourage exchange of good practices across research infrastructure sectors;
  •   Awareness campaign towards industry (including SMEs) on the potential of research infrastructures for their activities in selected R&D areas;
  • As a first step a repository
  • The Commission expects to fund a single proposal under this heading.
  •  
    "Topic: Innovation support measures"
Tiberius Brastaviceanu

The New Normal in Funding University Science | Issues in Science and Technology - 1 views

  • Government funding for academic research will remain limited, and competition for grants will remain high. Broad adjustments will be needed
  • he sequester simply makes acute a chronic condition that has been getting worse for years.
  • the federal budget sequester
  • ...72 more annotations...
  • systemic problems that arise from the R&D funding system and incentive structure that the federal government put in place after World War II
  • Researchers across the country encounter increasingly fierce competition for money.
  • unding rates in many National Institutes of Health (NIH) and National Science Foundation (NSF) programs are now at historical lows, declining from more than 30% before 2001 to 20% or even less in 2011
  • even the most prominent scientists will find it difficult to maintain funding for their laboratories, and young scientists seeking their first grant may become so overwhelmed that individuals of great promise will be driven from the field
  • anxiety and frustration
  • The growth of the scientific enterprise on university campuses during the past 60 years is not sustainable and has now reached a tipping point at which old models no longer work
  • Origins of the crisis
  • ederal funding agencies must work with universities to ensure that new models of funding do not stymie the progress of science in the United States
  • The demand for research money greatly exceeds the supply
  • the demand for research funding has gone up
  • The deeper sources of the problem lie in the incentive structure of the modern research university, the aspirations of scientists trained by those universities, and the aspirations of less research-intensive universities and colleges across the nation
  • competitive grants system
  • if a university wants to attract a significant amount of sponsored research money, it needs doctoral programs in the relevant fields and faculty members who are dedicated to both winning grants and training students
  • The production of science and engineering doctorates has grown apace
  • Even though not all doctorate recipients become university faculty, the size of the science and engineering faculty at U.S. universities has grown substantially
  • proposal pressure goes up
  • These strategies make sense for any individual university, but will fail collectively unless federal funding for R&D grows robustly enough to keep up with demand.
  • At the very time that universities were enjoying rapidly growing budgets, and creating modes of operation that assumed such largess was the new normal, Price warned that it would all soon come to a halt
  • the human and financial resources invested in science had been increasing much faster than the populations and economies of those regions
  • growth in the scientific enterprise would have to slow down at some point, growing no more than the population or the economy.
  • Dead-end solutions
  • studies sounded an alarm about the potential decline in U.S. global leadership in science and technology and the grave implications of that decline for economic growth and national security
  • Although we are not opposed to increasing federal funding for research, we are not optimistic that it will happen at anywhere near the rate the Academies seek, nor do we think it will have a large impact on funding rates
  • universities should not expect any radical increases in domestic R&D budgets, and most likely not in defense R&D budgets either, unless the discretionary budgets themselves grow rapidly. Those budgets are under pressure from political groups that want to shrink government spending and from the growth of spending in mandatory programs
  • The basic point is that the growth of the economy will drive increases in federal R&D spending, and any attempt to provide rapid or sustained increases beyond that growth will require taking money from other programs.
  • The demand for research money cannot grow faster than the economy forever and the growth curve for research money flattened out long ago.
  • Path out of crisis
  • The goal cannot be to convince the government to invest a higher proportion of its discretionary spending in research
  • Getting more is not in the cards, and some observers think the scientific community will be lucky to keep what it has
  • The potential to take advantage of the infrastructure and talent on university campuses may be a win-win situation for businesses and institutions of higher education.
  • Why should universities and colleges continue to support scientific research, knowing that the financial benefits are diminishing?
  • esearch culture
  • attract good students and faculty as well as raise their prestige
  • mission to expand the boundaries of human knowledge
  • faculty members are committed to their scholarship and will press on with their research programs even when external dollars are scarce
  • training
  • take place in
  • research laboratories
  • it is critical to have active research laboratories, not only in elite public and private research institutions, but in non-flagship public universities, a diverse set of private universities, and four-year colleges
  • How then do increasingly beleaguered institutions of higher education support the research efforts of the faculty, given the reality that federal grants are going to be few and far between for the majority of faculty members? What are the practical steps institutions can take?
  • change the current model of providing large startup packages when a faculty member is hired and then leaving it up to the faculty member to obtain funding for the remainder of his or her career
  • universities invest less in new faculty members and spread their internal research dollars across faculty members at all stages of their careers, from early to late.
    • Tiberius Brastaviceanu
       
      Sharing of resources, see SENSORICA's NRP
  • national conversation about changes in startup packages and by careful consultations with prospective faculty hires about long-term support of their research efforts
  • Many prospective hires may find smaller startup packages palatable, if they can be convinced that the smaller packages are coupled with an institutional commitment to ongoing research support and more reasonable expectations about winning grants.
  • Smaller startup packages mean that in many situations, new faculty members will not be able to establish a functioning stand-alone laboratory. Thus, space and equipment will need to be shared to a greater extent than has been true in the past.
  • construction of open laboratory spaces and the strategic development of well-equipped research centers capable of efficiently servicing the needs of an array of researchers
  • phaseout of the individual laboratory
  • enhanced opportunities for communication and networking among faculty members and their students
  • Collaborative proposals and the assembly of research teams that focus on more complex problems can arise relatively naturally as interactions among researchers are facilitated by proximity and the absence of walls between laboratories.
  • An increased emphasis on team research
  • investments in the research enterprise
  • can be directed at projects that have good buy-in from the faculty
  • learn how to work both as part of a team and independently
  • Involvement in multiple projects should be encouraged
  • The more likely trajectory of a junior faculty member will evolve from contributing team member to increasing leadership responsibilities to team leader
  • nternal evaluations of contributions and potential will become more important in tenure and promotion decisions.
    • Tiberius Brastaviceanu
       
      Need value accounting system
  • relationships with foundations, donors, state agencies, and private business will become increasingly important in the funding game
  • The opportunities to form partnerships with business are especially intriguing
    • Tiberius Brastaviceanu
       
      The problem is to change the model and go open source, because IP stifles other processes that might benefit Universities!!!
  • Further complicating university collaborations with business is that past examples of such partnerships have not always been easy or free of controversy.
  • some faculty members worried about firms dictating the research priorities of the university, pulling graduate students into proprietary research (which could limit what they could publish), and generally tugging the relevant faculty in multiple directions.
  • developed rules and guidelines to control them
  • University faculty and businesspeople often do not understand each other’s cultures, needs, and constraints, and such gaps can lead to more mundane problems in university/industry relations, not least of which are organizational demands and institutional cultures
    • Tiberius Brastaviceanu
       
      Needs for mechanisms to govern, coordinate, structure an ecosystem -See SENSORICA's Open Alliance model
  • n addition to funding for research, universities can receive indirect benefits from such relationships. High-profile partnerships with businesses will underline the important role that universities can play in the economic development of a region.
  • Universities have to see firms as more than just deep pockets, and firms need to see universities as more than sources of cheap skilled labor.
  • foundations or other philanthropy
  • We do not believe that research proposed and supervised by individual principal investigators will disappear anytime soon. It is a research model that has proven to be remarkably successful and enduring
  • However, we believe that the most vibrant scientific communities on university and college campuses, and the ones most likely to thrive in the new reality of funding for the sciences, will be those that encourage the formation of research teams and are nimble with regard to funding sources, even as they leave room for traditional avenues of funding and research.
Tiberius Brastaviceanu

Partner State - P2P Foundation - 0 views

    • Tiberius Brastaviceanu
       
      we call this a custodian
    • Tiberius Brastaviceanu
       
      we call this a custodian
  • So here we have it, the new triarchy: - The state, with its public property and representative mechanisms of governance (in the best scenario) - The private sector, with the corporation and private property - The commons, with the Trust (or the for-benefit association), and which is the ‘property’ of all its members (not the right word in the context of the commons, since it has a different philosophy of ownership)
    • Tiberius Brastaviceanu
       
      so where is direct democracy in all this?
  • ...39 more annotations...
  • In a first phase, the commons simply emerges as an added alternative.
  • becoming a subsector of society, and starts influencing the whole
  • phase transition and transformation will need to occur.
  • how a commons-dominated, i.e. after the phase transition, society would look like.
  • At its core would be a collection of commons, represented by trusts and for-benefit associations, which protect their common assets for the benefit of present and future generations
  • The commons ‘rents out’ the use of its resources to entrepreneurs. In other words, business still exists, though infinite growth-based capitalism does not.
  • More likely is that the corporate forms will be influenced by the commons and that profit will be subsumed to other goals, that are congruent with the maintenance of the commons.
  • The state will still exist, but will have a radically different nature
  • Much of its functions will have been taken over by commons institutions, but since these institutions care primarily about their commons, and not the general common good, we will still need public authorities that are the guarantor of the system as a whole, and can regulate the various commons, and protect the commoners against possible abuses. So in our scenario, the state does not disappear, but is transformed, though it may greatly diminish in scope, and with its remaining functions thoroughly democratized and based on citizen participation.
  • In our vision, it is civil-society based peer production, through the Commons, which is the guarantor of value creation by the private sector, and the role of the state, as Partner State, is to enable and empower the creation of common value. The new peer to peer state then, though some may see that as a contradictio in terminis, is a state which is subsumed under the Commons, just as it is now under the private sector. Such a peer to peer state, if we are correct, will have a much more modest role than the state under a classic state society, with many of its functions taken over by civil society associations, interlinked in processes of global governance. The above then, this triarchy, is the institutional core which replaces the dual private-public binary system that is characteristic of the capitalist system that is presently the dominant format.
  • fundamental mission is to empower direct social-value creation, and to focus on the protection of the Commons sphere as well as on the promotion of sustainable models of entrepreneurship and participatory politics
  • the state becomes a 'partner state' and enables autonomous social production.
  • the state does exist, and I believe that we can’t just imagine that we live in a future state-less society
  • retreating from the binary state/privatization dilemma to the triarchical choice of an optimal mix amongst government regulation, private-market freedom and autonomous civil-society projects
  • the role of the state
  • “the peer production of common value requires civic wealth and strong civic institutions.
  • trigger the production/construction of new commons by - (co-) management of complexe resource systems which are not limited to local boundaries or specific communities (as manager and partner) - survey of rules (chartas) to care for the commons (mediator or judge) - kicking of or providing incentives for commoners governing their commons - here the point is to design intelligent rules which automatically protect the commons, like the GPL does (facilitator)"
  • the emergence of the digital commons. It is the experience of creating knowledge, culture, software and design commons, by a combination of voluntary contributions, entrepreneurial coalitions and infrastructure-protecting for-benefit associations, that has most tangibly re-introduced the idea of commons, for all to use without discrimination, and where all can contribute. It has drastically reduced the production, distribution, transaction and coordination costs for the immaterial value that is at the core also of all what we produce physically, since that needs to be made, needs to be designed. It has re-introduced communing as a mainstream experience for at least one billion internet users, and has come with proven benefits and robustness that has outcompeted and outcooperated its private rivals. It also of course offers new ways to re-imagine, create and protect physical commons.
  • stop enclosures
  • peer to peer, i.e. the ability to freely associate with others around the creation of common value
  • communal shareholding, i.e. the non-reciprocal exchange of an individual with a totality. It is totality that we call the commons.
  • It is customary to divide society into three sectors, and what we want to show is how the new peer to peer dynamic unleashed by networked infrastructures, changes the inter-relationship between these three sectors.
  • In the current ‘cognitive capitalist’ system, it is the private sector consisting of enterprises and businesses which is the primary factor, and it is engaged in competitive capital accumulation. The state is entrusted with the protection of this process. Though civil society, through the citizen, is in theory ‘sovereign’, and chooses the state; in practice, both civil society and the state are under the domination of the private sector.
  • it fulfills three contradictory functions
  • Of course, this is not to say that the state is a mere tool of private business.
  • protect the whole system, under the domination of private business
  • protector of civil society, depending on the balance of power and achievements of social movements
  • protector of its own independent interests
  • Under fascism, the state achieves great independence from the private sector , which may become subservient to the state. Under the welfare state, the state becomes a protector of the social balance of power and manages the achievements of the social movement; and finally, under the neoliberal corporate welfare state, or ‘market state’, it serves most directly the interests of the financial sector.
  • key institutions and forms of property.
  • The state managed a public sector, under its own property.
  • The private sector , under a regime of private ownership, is geared to profit, discounts social and natural externalities, both positive and negative, and uses its dominance in society to use and dominate the state.
  • civil society has a relative power as well, through its capability of creating social movements and associations
  • Capitalism has historically been a pendulum between the private and the public sector
  • However, this configuration is changing,
  • the endangerment of the biosphere through the workings of ‘selfish’ market players; the second is the role of the new digital commons.
  • participatory politics
  • Peer production gives us an advance picture of how a commons-oriented society would look like. At its core is a commons and a community contributing to it, either voluntarily, or as paid entrepreneurial employees. It does this through collaborative platforms using open standards. Around the commons emerges enterprises that create added value to operate on the marketplace, but also help the maintenance and the expansion of the commons they rely on. A third partner are the for-benefit associations that maintain the infrastructure of cooperation. Public authorities could play a role if they wanted to support existing commons or the creation of new commons, for the value they bring to society.
  • if a commons is not created as in the case of the digital commons, it is something that is inherited from nature or former generations, given in trust and usufruct, so that it can be transmitted to our descendents. The proper institution for such commons is therefore the trust, which is a corporate form that cannot touch its principal capital, but has to maintain it.
Kurt Laitner

Prototyping and infrastructuring in design for social innovation | prototyping alternat... - 0 views

  •  
    May have some relevance, did not read past abstract
Tiberius Brastaviceanu

GitHub Has Big Dreams for Open-Source Software, and More - NYTimes.com - 0 views

  • GitHub has no managers among its 140 employees, for example. “Everyone has management interests,” he said. “People can work on things that are interesting to them. Companies should exist to optimize happiness, not money. Profits follow.” He does, however, retain his own title and decides things like salaries.
  • Another member of GitHub has posted a talk that stresses how companies flourish when people want to work on certain things, not because they are told to.
  • Asana bases work on a series of to-do lists that people assign one another. Inside Asana there are no formal titles, though like GitHub there are bosses at the top who make final decisions.
  • ...8 more annotations...
  • For all the happiness and sharing, real money is involved here. In July GitHub received $100 million from the venture capital firm Andreessen Horowitz. This early in most software companies’ lives, $20 million would be a fortune.
  • GitHub’s popularity has also made it an important way for companies to recruit engineers, because some of the best people in the business are showing their work or dissecting the work of others inside some of the public pull requests.
  • Mr. Preston-Werner thinks the way open source requires a high degree of trust and collaboration among relative equals (plus a few high-level managers who define the scope of a job and make final decisions) can be extended more broadly, even into government.
  • “For now this is about code, but we can make the burden of decision-making into an opportunity,” he said. “It would be useful if you could capture the process of decision-making, and see who suggested the decisions that created a law or a bill.”
  • Can this really be extended across a large, complex organization, however?
  • As complex as an open-source project may be, it is also based on a single, well-defined outcome, and an engineering task that is generally free of concepts like fairness and justice, about which people can debate endlessly.
  • Google once prided itself on few managers and fast action, but has found that getting big can also involve lots more meetings.
  • Still, these fast-rising successes may be on to something more than simply universalizing the means of their own good fortune. An early guru of the Information Age, Peter Drucker, wrote often in the latter part of his career of the need for managers to define tasks, and for workers to seek fulfillment before profits.
Steve Bosserman

Scientist beams up a real Star Trek tricorder | Reuters - 1 views

  •  
    While it may sound like the stuff of science fiction, Jansen isn't the only one to take notice of just how useful a real functioning tricorder would be - especially as a medical tool. Telecommunications giant Qualcomm Inc this year launched the "Tricorder X-Prize Contest" with the slogan "Healthcare in the palm of your hand." Qualcomm hopes to motivate developers with a $10 million prize to make medical tricorders a reality. Wanda Moebus of the Advanced Medical Technology Association, who is not affiliated with Jansen or Qualcomm, told Reuters the X-Prize "is really cool," but cautioned that making a real medical tricorder device "would have to be measured on its safety and effect, like all other medical technologies." Jansen said he has been approached by "a couple of teams" about the X Prize, but added that his prototypes are more for science research than medical tools. Besides, he said he already is on to his next frontier, making a sort of "replicator," another "Star Trek" device that will create 3D objects and foods that are dimensional copies of real items. Jansen's "replicator" is a 3D printer, which in itself is not really new, but the scientist thinks about it in terms reminiscent of "Star Trek's" famous prologue. It's "like nothing we've ever seen before," Jansen said.
Francois Bergeron

Death of evidence : Nature : Nature Publishing Group - 1 views

  • Of paramount concern for basic scientists is the elimination of the Can$25-million (US$24.6-million) RTI, administered by the Natural Sciences and Engineering Research Council of Canada (NSERC), which funds equipment purchases of Can$7,000–150,000.
  •  
    canadian researcher may not have access anymore to 7000$ -150k$ scientific equipment grants
Tiberius Brastaviceanu

David Lametti | Faculty of Law - McGill University - 1 views

  •  
    See tibi's email, also included in the conversation were Ishan, Kurt, Yasir, Francois, Mai, Soumaya and Genevieve.
Kurt Laitner

Impact of Social Sciences - The right tool for the job: Five collaborative writing tool... - 2 views

  •  
    may be helpful for assessing potential tools
Kurt Laitner

Did the Other Shoe Just Drop? Big Banks Hit with Monster $250 Billion Lawsuit in Housin... - 0 views

  • The reason for this is that credit is merely one way by which a society manages the distribution of goods and services. . . . A credit collapse . . . doesn’t make the energy, raw materials, and labor vanish into some fiscal equivalent of a black hole; they’re all still there, in whatever quantities they were before the credit collapse, and all that’s needed is some new way to allocate them to the production of goods and services.
  • Better would be to have an alternative system in place and ready to implement before the boom drops.
  • On a national level, when the Wall Street credit system fails, the government can turn to the innovative model devised by our colonial forebears and start issuing its own currency and credit—a power now usurped by private banks but written into the US Constitution as belonging to Congress
  • ...5 more annotations...
  • The chief problem with the paper scrip of the colonial governments was the tendency to print and spend too much.
  • he Pennsylvania colonists corrected that systemic flaw by establishing a publicly-owned bank, which lent money to farmers and tradespeople at interest
  • To get the funds into circulation to cover the interest, some extra scrip was printed and spent on government services.
  • The interest returned to public coffers, to be spent on the common weal.
  • The result was a system of money and credit that was sustainable without taxes, price inflation or government debt
  •  
    "The reason for this is that credit is merely one way by which a society manages the distribution of goods and services. . . . A credit collapse . . . doesn't make the energy, raw materials, and labor vanish into some fiscal equivalent of a black hole; they're all still there, in whatever quantities they were before the credit collapse, and all that's needed is some new way to allocate them to the production of goods and services." and  "Better would be to have an alternative system in place and ready to implement before the boom drops." taken together may imply something other than the article's proposed solution of  "On a national level, when the Wall Street credit system fails, the government can turn to the innovative model devised by our colonial forebears and start issuing its own currency and credit-a power now usurped by private banks but written into the US Constitution as belonging to Congress"
1 - 20 of 70 Next › Last »
Showing 20 items per page