Skip to main content

Home/ Sensorica Knowledge/ Group items tagged access

Rss Feed Group items tagged

Tiberius Brastaviceanu

Access control - Wikipedia, the free encyclopedia - 0 views

  • The act of accessing may mean consuming, entering, or using.
  • Permission to access a resource is called authorization.
  • Locks and login credentials are two analogous mechanisms of access control.
  • ...26 more annotations...
  • Geographical access control may be enforced by personnel (e.g., border guard, bouncer, ticket checker)
  • n alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country
  • access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons
  • can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap.
  • Physical access control is a matter of who, where, and when
  • Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.[citation needed] Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked
  • Credential
  • Access control system operation
  • The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input
  • There are three types (factors) of authenticating information:[2] something the user knows, e.g. a password, pass-phrase or PIN something the user has, such as smart card or a key fob something the user is, such as fingerprint, verified by biometric measurement
  • Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios
  • When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked.
  • A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a biometric feature) or some combination of these items. This is known as multi-factor authentication. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.
  • An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list
  • monitor the door position
  • Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the doo
  • Access control topology
  • Access control decisions are made by comparing the credential to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the look-up out from a central host to the edge of the system, or the reader. The predominant topology circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks
  • Access control readers may be classified by the functions they are able to perform
  • and forward it to a control panel.
  • Basic (non-intelligent) readers: simply read
  • Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus.
  • Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers.
  • Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host
  • a built in webservice to make it user friendly
  • Some readers may have additional features such as an LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support
Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • script that you want to run every day at a specific time
  • script that should run after a user submits a data-collection form.
  • Google Apps Script provides simple event handlers and installable event handlers, which are easy ways for you to specify functions to run at a particular time or in response to an event.
  • ...39 more annotations...
  • let's consider the terminology we use for events
  • event triggers
  • triggers
  • in response
  • event handler
  • event
  • onInstall function
  • onOpen function.
  • onEdit function
  • the simple event handlers are restricted in what they are permitted to do:
  • The spreadsheet containing the script must be opened for editing
  • cannot determine the current user
  • cannot access any services that require authentication as that user
  • Calendar, Mail and Site are not anonymous and the simple event handlers cannot access those services.
  • can only modify the current spreadsheet. Access to other spreadsheets is forbidden.
  • see Understanding Permissions and Script Execution.
  • The onOpen function runs automatically when a user opens a spreadsheet.
  • add custom menu items to the spreadsheet's menu bar.
  • onEdit function runs automatically when any cell of the spreadsheet is edited.
  • record the last modified time in a comment on the cell that was edited.
  • The onInstall function is called when a script is installed from the Script Gallery.
  • setting up custom menus for the user.
  • the script can call onOpen from onInstall.
  • Installable event handlers are set on the Triggers menu within the Script Editor, and they're called triggers in this document.
  • When a specific time is reached
  • When a form is submitted
  • When a Spreadsheet is edited
  • When a Spreadsheet is opened.
  • They can potentially access all services available to the user who installed the handler.
  • are fully-capable scripts with none of the access limitations of simple event handlers
  • may not be able to determine which user triggered the event being handled
  • The spreadsheet containing the script does not have to be open for the event to be triggered and the script to run.
  • You can connect triggers to one or more functions in a script. Any function can have multiple triggers attached. In addition, you can add trigger attributes to a function to further refine how the trigger behaves.
  • When a script runs because of a trigger, the script runs using the identity of the person who installed the trigger, not the identity of the user whose action triggered the event. This is for security reasons.
  • Installing an event handler may prompt for authorization to access
  • An event is passed to every event handler as the argument (e). You can add attributes to the (e) argument that further define how the trigger works or that capture information about how the script was triggered.
  • an example of a function that sends email to a designated individual containing information captured by a Spreadsheet when a form is submitted.
  • With Google Apps, forms have the option to automatically record the submitter's username, and this is available to the script as e.namedValues["Username"]. Note: e.namedValues are only available for Google Apps domains and not for consumer Google accounts.
  • The available attributes for triggers are described in the following tables.
  •  
    script that you want to run every day at a specific time
Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • Google Apps Script provides you with the ability to build a user interface for displaying or capturing information.
  • Viewing the Available User Interface Elements
  • Your scripts can display the user interface in two ways:
  • ...48 more annotations...
  • from a Spreadsheet
  • from a Site
  • As a stand-alone servlet
  • Deciding Whether to Run a Script from a Spreadsheet or as a Service
  • The built-in code autocomplete functionality in the editor requires you to type the trailing period that follows app.
  • Plan the script. What tasks should the script accomplish?
  • Write down the specific information you want to display to or collect from your users.
  • Draw the user interface
  • Determine what the script and interface should do in response to any user input.
  • Determine the conditions for exiting the script.
  • you need a UiApp application object to contain the user interface elements. After you create the UiApp application object, you can add buttons, dialog boxes, panels, and other elements to the UiApp application object.
  • The general syntax for these operations is as follows:
  • To create a UiApp application object, use the syntax var your_application_object_name = UiApp.createApplication();
  • To create a user interface element and associate it with your UiApp application object, use the syntax var your_ui_element_name= your_application_object_name.createElement_Name();.
  • To add one user interface element to another
  • use the syntax your_ui_element_name1.add(your_ui_element_name2);
  • a button with the text Press Me on it:
  • creates a vertical panel.
  • other kinds of panels
  • pop-up panels, stack panels, focus panels, form panels, and so on.
  • code for displaying your button on the panel:
  • add the panel to the application:
  • nstruct Google Apps Script to display the interface elements:
  • You can create the user interface elements in any order.
  • the display order
  • Creating the elements and adding them to your application are separate steps requiring separate instructions.
  • a short script that does nothing but display a panel with a button on it.
  • You can chain together setter methods
  • sets its title
  • set the size of the object:
  • how to use Grid objects and the setWidget method to create a more complex layout and also how to create text boxes and label them.
  • To make a user interface useful, you need the ability to update a Spreadsheet with information a user enters from the interface.
  • a short script that responds to an action in the interface by updating the Spreadsheet.
  • looping structure in the script to keep the panel displayed and active
  • Server-side means that the actions are performed by a server
  • same script, with functions added that enable the form to be used multiple times before a user chooses to exit.
  • script collects some information from text fields on a panel and writes that information into the Spreadsheet.
  • You can make a script's user interface available to users from inside a Spreadsheet or Site or by running it separately as a service.
  • how to make the user interface as a service.
  • A script that provides a stand-alone user interface must invoke the doGet(e) function or the doPost(e) function for an HTML form submit.
  • A script that provides the user interface from the Spreadsheet invokes doc.show(app).
  • The doGet(e) function takes the argument e, passing in the arguments for the user interface, including the user name of the person invoking the script.
  • After you write the script, you publish it as a service. During the publishing process, you define who has access to the script.
  • In a Google Apps domain, you can publish the script so that only you have access or so that everyone in the domain has access.
  • In a Google consumer account, you can publish the script so that only you have access or so that everyone in the world has access.
  • Updating a Spreadsheet from the User Interface, the user interface is displayed from the Spreadsheet where the script is stored. The following code defines how the user interface is displayed:
  • Here's the skeleton code for displaying a user interface as a stand-alone service:
  • some aspects of the two ways to display a user interface.
Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • control over Google products
  • can access and control Google Spreadsheets and other products
  • scripts
  • ...44 more annotations...
  • run directly on Google servers in order to provide direct access to the products they control.
  • can also use Google Apps Script from Google Sites
  • Google Apps Script Template Gallery
  • Google Apps Script Blog
  • guide contains the information you need to use Google Apps Script, a server-side scripting language, based on JavaScript, that runs on Google's servers alongside Google Apps
  • enable varying degrees of interactivity among the applications
  • easy enough to use that you don't have to be a programmer to create scripts.
  • use it to automate complex tasks within Google Apps
  • You don't have to be a programmer to use Google Apps Script
  • A script is a series of instructions you write in a computer language to accomplish a particular task. You type in the instructions and save them as a script. The script runs only under circumstances you define.
  • The Google Apps Script API provides a set of objects. You can use these objects and their associates methods to access Google Docs and Spreadsheets, Gmail, Google Finance, and other Google applications.
  • To run a script, you must first add the script to a Google Spreadsheet or Google Site using the Script Editor.
  • You can retrieve information from a wide selection of Google Apps and Services and from external sources, including web pages and XML sources. You can use Google Apps Script to create email, spreadsheets, pages on Google Sites, and files in the Google Docs Document List.
  • The instructions in a script are grouped into functions.
  • objects
  • methods
  • for such tasks
  • Create pages on a Google Site
  • Customize a Spreadsheet
  • Send email based on information in a Spreadsheet
  • You can manipulate
  • numeric
  • financial
  • string
  • an XML document
  • controlling data in the following applications
  • Spreadsheets
  • Google Document List
  • Contacts
  • Calendar
  • Sites
  • Google Maps
  • create and display interactive user interface elements
  • interact with relational database management systems
  • create folders, subfolders, and files in the Google Docs document list
  • access to user, session, and browser information
  • access to web services
  • extract data from XML documents and then manipulate that data
  • obtain translations of text from one language to another
  • send email
  • UrlFetch services
  • encode and decode strings and format dates
  • store properties on a per-script and per-user basis
  • create, delete and update contact information for individuals and for groups in Google Contacts
Tiberius Brastaviceanu

Mantrap (access control) - Wikipedia, the free encyclopedia - 0 views

  • A mantrap, air lock, sally port or access control vestibule is a physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens.
Francois Bergeron

Science Exchange Jobs - AngelList - 1 views

  •  
    "Science Exchange is a community marketplace for scientists to list, discover, access and pay for scientific services from institutions around the world. Our mission is to improve the efficiency of scientific research by making it easy for researchers to access the global network of scientific resources and expertise. We do this by connecting researchers looking to get experiments conducted with scientific service providers who have the capacity to conduct those experiments."
Kurt Laitner

How Many Kinds of Property are There? - 0 views

  • Whenever a group of people depend on a resource that everybody uses but nobody owns, and where one person’s use effects another person’s ability to use the resource, either the population fails to provide the resource, overconsumes and/or fails to replenish it, or they construct an institution for undertaking and managing collective action.
  • Common-pool resources may be owned by national, regional, or local [1]governments; by [2] communal groups; by [3] private individuals or corporations; or used as open access resources by whomever can gain access
  • Based on her survey, Ostrom distilled this list of common design principles from the experience of successful governance institutions: Clearly defined boundaries. Individuals or households who have rights to withdraw resource units from the CPR must be clearly defined, as must the boundaries of the CPR itself. Congruence between appropriation and provision rules and local conditions. Appropriation rules restricting time, place, technology, and/or quantity of resource units are related to local conditions and to provision rules requiring labour, material, and/or money. Collective-choice arrangements. Most individuals affected by the operational rules can participate in modifying the operational rules [how refreshing. Standing!]. Monitoring. Monitors, who actively audit CPR conditions and appropriator behavior, are accountable to the appropriators or are the appropriators. Graduated sanctions. Appropriators who violate operational rules are likely to be assessed graduated sanctions (depending on the seriousness and context of the offence) by other appropriators, by officials accountable to these appropriators, or by both. Conflict-resolution mechanisms. Appropriators and their officials have rapid access to low-cost local arenas to resolve conflicts among appropriators or between appropriators and officials. Minimal recognition of rights to organize. The rights of appropriators to devise their own institutions are not challenged by external governmental authorities. For CPRs that are parts of larger systems: Nested enterprises. Appropriation, provision, monitoring, enforcement, conflict resolution, and governance activities are organized in multiple layers of nested enterprises.
  •  
    Good review of Ostrom and Bollier's definitions of commons and governance approaches to this property class
  •  
    This paper is mostly about commons... the title is misleading.
Tiberius Brastaviceanu

Private 'Distributed Ledgers' Miss the Point of a Blockchain | Bank Think - 0 views

  • a new buzzword making waves throughout the financial industry: “distributed ledger.”
  • Some say it's a tool to enable transparency by ensuring that all members of a group receive cryptographically secured messages about participants’ activities
  • Some are even bold enough to predict that distributed ledgers will end the madness of managing multiple database and reconciliation structures.
  • ...13 more annotations...
  • Distributed ledgers have primarily claimed to supplant the need for Bitcoin's mining process by introducing trust requirements among participants. These ledgers also promise users the immutability of Bitcoin without the need for expensive mining operations.
  • the technology powering distributed ledgers predates blockchains by well over 20 years.
  • Proponents of distributed ledgers argue that they can displace centralized providers such as SWIFT,
  • by moving money faster
  • There’s no doubt that blockchain technology will facilitate disruptive innovations in finance
  • But a world of private ledgers sounds eerily similar to a range of “private Internets.”
  • Blockchain technology is useful not because it offers efficiency in a world of message-passing but because it uses a complex process to settle value between untrusted parties.
  • But distributed ledgers do not offer users the ability to easily convert their tokens and messages into fungible units of value. Nor do distributed ledgers escrow value between parties that don't trust each other.
  • If a ledger is not a public resource, it will have the pressures incumbent to existing settlement systems plus the overhead of maintaining a shared database among competitors. What efficiency will remain thereafter remains dubious.
  • Permissioned Blockchains
  • their institutional users will probably find it expedient to hash their private-chain transactions and use those hashes to create bitcoin addresses and then send tiny fractions of a bitcoin to them to register their data at a location that cannot be hacked or changed.
    • Tiberius Brastaviceanu
       
      This is also a problem with access, if an access event needs to be recorded in a way that cannot be altered, in a data location that cannot be altered, it will need to be stored on a block chain. 
  • In other words, all private ledger/blockchains will lead to Bitcoin's Rome, driven there by its low cost and high public accountability.
  •  
    the case against private chains.
Tiberius Brastaviceanu

From #blockchain to #BadgeChain - Introduction | Learning Futures - 0 views

  •  
    Badges, also about trusted access.
Tiberius Brastaviceanu

Card reader - Wikipedia, the free encyclopedia - 0 views

  • Smart card
  • There are two types of smart cards: contact and contactless. Both have an embedded microprocessor and memory. The smart card differs from the proximity card in that the microchip in the proximity card has only one function: to provide the reader with the card's identification number. The processor on the smart card has an embedded operating system and can handle multiple applications such as a cash card, a pre-paid membership card, or an access control card.
  • A contactless card does not have to touch the reader or even be taken out of a wallet or purse. Most access control systems only read serial numbers of contactless smart cards and do not utilize the available memory. Card memory may be used for storing biometric data (i.e. fingerprint template) of a user. In such case a biometric reader first reads the template on the card and then compares it to the finger (hand, eye, etc.) presented by the user. In this way biometric data of users does not have to be distributed and stored in the memory of controllers or readers, which simplifies the system and reduces memory requirements.
Steve Bosserman

When Cities Run Themselves | WOUB - 0 views

  •  
    Machines talking to machines No doubt that the Olympics will have a profound effect in shaping London's future. By the time the Games begin, for instance, it will have Europe's largest free WiFi zone, with the city's iconic red phone booths converted, fittingly, into hotspots. But another opportunity London landed earlier this month could have just as much impact, perhaps more. A company called Living PlanIt announced that it will begin testing its "Urban Operating System" in the Greenwich section of the city. What does that mean? Put simply, London would have its own operating system, much as your PC runs on Windows or your Mac runs on Apple's IOS. This ties into the latest hot buzz phrase, "the internet of things," which describes a world where machines talk to other machines. No human interaction required. So, for a city, this means sensors in buildings would connect to sensors in water treatment plants which would connect to sensors in stoplights. It would be one gigantic, computerized urban nervous system, which a lot of experts think is the only way cities can survive a future when they'll contain more than two out of every three people on Earth. Based on what sensors reveal about the location and movement of humans in a section of a city, for instance, buildings will automatically adjust their temperatures, streetlights will dim or brighten, water flow will increase or slow. Or, in the event of a disaster, emergency services would have real-time access to traffic data, trauma unit availability, building blueprints. And soon enough, our smart phones will be able to tap in to the Urban OS. So will our household appliances. This is not some 21st century analogue of the personal jet pack. The Urban OS is the driving force behind a smart city being built from the ground up in northern Portugal. Construction is scheduled to be completed in three years; eventually it will have about 150,000 residents. It will also have more than 100 million sen
Francois Bergeron

Death of evidence : Nature : Nature Publishing Group - 1 views

  • Of paramount concern for basic scientists is the elimination of the Can$25-million (US$24.6-million) RTI, administered by the Natural Sciences and Engineering Research Council of Canada (NSERC), which funds equipment purchases of Can$7,000–150,000.
  •  
    canadian researcher may not have access anymore to 7000$ -150k$ scientific equipment grants
Tiberius Brastaviceanu

Science and Technology Consultation - Industry Canada - 0 views

  • Under this strategy
    • Yasir Siddiqui
       
      Testing
    • Yasir Siddiqui
       
      testing
  • Genome Canada, the Canadian Institute for Advanced Research and the Canada Foundation for Innovation.
  • Still, Canadian businesses continue to underperform when it comes to innovation—a primary driver of productivity growth—when compared to other competing nations. The performance of business R&D is one oft-cited measure used to gauge the level of innovative activity in a country's business sector.
  • ...38 more annotations...
  • Canadians have reached top tier global performance in reading, mathematics, problem solving and science, and Canada has rising numbers of graduates with doctoral degrees in science and engineering.
  • This valuable resource of highly qualified and skilled individuals needs to be better leveraged.
  • The ease and ability of the academic community to collaborate, including through research networks, is also well-recognized.
  • to develop technologies, products and services that add value and create high-paying jobs.
  • Canada has an impressive record when it comes to research and the quality of its knowledge base.
  • Still, the innovative performance of Canada's firms and the productivity growth continue to lag behind competing nations.
  • The government is also committed to moving forward with a new approach to promoting business innovation—one that emphasizes active business-led initiatives and focuses resources on better fostering the growth of innovative firms.
  • Achieving this requires the concerted effort of all players in the innovation system—to ensure each does what one does best and to leverage one another's strengths.
  • the government has invested more to support science, technology and innovative companies than ever before
  • Canada must become more innovative
    • Kurt Laitner
       
      problem statement
  • providing a new framework to guide federal ST&I investments and priorities. That is why the Government of Canada stated its intention to release an updated ST&I Strategy in the October 2013 Speech from the Throne.
    • Kurt Laitner
       
      exercise
  • seeking the views of stakeholders from all sectors of the ST&I system—including universities, colleges and polytechnics, the business community, and Canadians
  • written submissions from all Canadians on the policy issues and questions presented in this paper.
  • The government remains focused on creating jobs, growth and long-term prosperity for Canadians
  • encouraging partnerships with industry, attracting highly skilled researchers, continuing investments in discovery-driven research, strengthening Canada's knowledge base, supporting research infrastructure and providing incentives to private sector innovation.
  • has transformed the National Research Council, doubled its investment
  • supported research collaborations through the federal granting councils
  • created the new Venture Capital Action Plan
  • helping to promote greater commercialization of research and development
  • Our country continues to lead the G7 in spending on R&D
  • Canada has a world-class post-secondary education system that embraces and successfully leverages collaboration with the private sector, particularly through research networks
  • destination for some of the world's brightest minds
  • global race
  • businesses that embrace innovation-based strategies
  • post-secondary and research institutions that attract and nurture highly qualified and skilled talent
  • researchers who push the frontiers of knowledge
  • governments that provide the support
    • Tiberius Brastaviceanu
       
      Why a race? We need to change the way we see this!!! We need to open up. See the European Commission Horizon 2020 program  http://ec.europa.eu/programmes/horizon2020/en/ They are acknowledging that Europe cannot do it alone, and are spending money on International collaboration. 
    • Tiberius Brastaviceanu
       
      There is nothing about non-institutionalized innovation, i.e. open source! There is nothing about the public in this equation like the Europeans do in the Digital Era for Europe program  https://ec.europa.eu/digital-agenda/node/66731 
  • low taxes, strong support for new businesses, a soundly regulated banking system, and ready availability of financial services
  • reducing red tape
  • expanding training partnerships and improving access to venture capital.
  • Collaboration is key to mobilizing innovation
  • invest in partnerships between businesses and colleges and universities
    • Tiberius Brastaviceanu
    • Tiberius Brastaviceanu
       
      But the public and in people is still not in sight of the fed gov. 
  • Economic Action Plans (EAP) 2012 and 2013
  • provide incentive for innovative activity in firms, improved access to venture capital, augmented and more coordinated direct support to firms, and deeper partnerships and connections between the public and private sectors.
Francois Bergeron

Join Now | ImagineNations Network - 1 views

  • Find People or Groups with Similar Interests Connect with people or groups in your area or other countries to share ideas, learn and support each other. Find Mentors to Help You Grow Your Business When faced with the many challenges of starting and growing a small business, a business mentor can offer experience and expertise to help you achieve your business goals. Get Answers and Resources Get answers to your business questions and access helpful articles and tools to help launch or expand your business.
  • Find People or Groups with Similar Interests Connect with people or groups in your area or other countries to share ideas, learn and support each other.
  • Find Mentors to Help You Grow Your Business When faced with the many challenges of starting and growing a small business, a business mentor can offer experience and expertise to help you achieve your business goals. Get Answers and Resources Get answers to your business questions and access helpful articles and tools to help launch or expand your business.
  •  
    "Ready to take your business to the next level?"
Tiberius Brastaviceanu

Accessibility platform - SENSORICA - 0 views

  •  
    "Portable_Ascending_Device"
Tiberius Brastaviceanu

Why Great Innovations Fail: It's All in the Ecosystem - 0 views

  • “It is no longer enough to manage your innovation. Now you must manage your innovation ecosystem,”
  • example
  • Michelin developed a revolutionary new kind of tire with sensors and an internal hard wheel that could run almost perfectly for 125 miles after a puncture.
  • ...13 more annotations...
  • Yet by 2007 the product was such a failure that Michelin had to abandon it.
  • The company hadn’t confronted the entire ecosystem the tire would rely on
  • conversion costs
  • expensive new equipment
  • legal challenges
  • Mastery of the ecosystem is the great strength that made Apple the supreme success story of our time,
  • The iPod
  • a beginning ecosystem that Jobs enlarged by introducing the iTunes Music Store.
  • the ecosystem further by opening up the Mac-only device to PC users.
  • In a world where mobile phone makers sold their devices to operators to sell to consumers, Jobs had such a powerful ecosystem that he could get operators to compete to partner with him: “And here was Apple, offering not just exclusive access to the most talked-about phone in history, but also exclusive access to Apple consumers—the most desirable customer segment imaginable
  • How do you take the measure of the ecosystem that your innovation will need to be part of and rely on? How do you not miss the blind spots that can lurk almost anywhere?
  • three main steps to take.
  • There are terrible pitfalls in the usual progression from prototype to pilot to rollout. It relies perilously on getting everything right from the very start. Often a far wiser and safer approach can be what Adner calls a “minimum viable footprint (MVF) rollout followed by a staged expansion.” In other words, start with a complete ecosystem, but a limited one.
Tiberius Brastaviceanu

Beyond Blockchain: Simple Scalable Cryptocurrencies - The World of Deep Wealth - Medium - 0 views

  • I clarify the core elements of cryptocurrency and outline a different approach to designing such currencies rooted in biomimicry
  • This post outlines a completely different strategy for implementing cryptocurrencies with completely distributed chains
  • Rather than trying to make one global, anonymous, digital cash
  • ...95 more annotations...
  • we are interested in the resilience that comes from building a rich ecosystem of interoperable currencies
  • What are the core elements of a modern cryptocurrency?
  • Digital
  • Holdings are electronic and only exist and operate by virtue of a community’s agreement about how to interpret digital bits according to rules about operation and accounting of the currency.
  • Trustless
  • don’t have to trust a 3rd party central authority
  • Decentralized
  • Specifically, access, issuance, transaction accounting, rules & policies, should be collectively visible, known, and held.
  • Cryptographic
  • This cryptographic structure is used to enable a variety of people to host the data without being able to alter it.
  • Identity
  • there must be a way to associate these bits with some kind of account, wallet, owner, or agent who can use them
  • Other things that many take for granted in blockchains may not be core but subject to decisions in design and implementation, so they can vary between implementations
  • It does not have to be stored in a synchronized global ledger
  • does not have to be money. It may be a reputation currency, or data used for identity, or naming, etc
  • Its units do not have to be cryptographic tokens or coins
  • It does not have to protect the anonymity of users, although it may
  • if you think currency is only money, and that money must be artificially scarce
  • Then you must tackle the problem of always tracking which coins exist, and which have been spent. That is one approach — the one blockchain takes.
  • You might optimize for anonymity if you think of cryptocurrency as a tool to escape governments, regulations, and taxes.
  • if you want to establish and manage membership in new kinds of commons, then identity and accountability for actions may turn out to be necessary ingredients instead of anonymity.
  • In the case of the MetaCurrency Project, we are trying to support many use cases by building tools to enable a rich ecosystem of communities and current-sees (many are non-monetary) to enhance collective intelligence at all scales.
  • Managing consensus about a shared reality is a central challenge at the heart of all distributed computing solutions.
  • If we want to democratize money by having cryptocurrencies become a significant and viable means of transacting on a daily basis, I believe we need fundamentally more scalable approaches that don’t require expensive, dedicated hardware just to participate.
  • We should not need system wide consensus for two people to do a transaction in a cryptocurrency
  • Blockchain is about managing a consensus about what was “said.” Ceptr is about distributing a consensus about how to “speak.”
  • how nature gets the job done in massively scalable systems which require coordination and consistency
  • Replicate the same processes across all nodes
  • Empower every node with full agency
  • Hold this transformed state locally and reliably
  • Establish protocols for interaction
  • Each speaker of a language carries the processes to understand sentences they hear, and generate sentences they need
  • we certainly don’t carry some kind of global ledger of everything that’s ever been said, or require consensus about what has been said
  • Language IS a communication protocol we learn by emulating the processes of usage.
  • Dictionaries try to catch up when the usage
  • there is certainly no global ledger with consensus about the state of trillions of cells. Yet, from a single zygote’s copy of DNA, our cells coordinate in a highly decentralized manner, on scales of trillions, and without the latency or bottlenecks of central control.
  • Imagine something along the lines of a Java Virtual Machine connected to a distributed version of Github
  • Every time this JVM runs a program it confirms the hash of the code it is about to execute with the hash signed into the code repository by its developers
  • This allows each node that intends to be honest to be sure that they’re running the same processes as everyone else. So when two parties want to do a transaction, and each can have confidence their own code, and the results that your code produces
  • Then you treat it as authoritative and commit it to your local cryptographically self-validating data store
  • Allowing each node to treat itself as a full authority to process transactions (or interactions via shared protocols) is exactly how you empower each node with full agency. Each node runs its copy of the signed program/processes on its own virtual machine, taking the transaction request combined with the transaction chains of the parties to the transaction. Each node can confirm their counterparty’s integrity by replaying their transactions to produce their current state, while confirming signatures and integrity of the chain
  • If both nodes are in an appropriate state which allows the current transaction, then they countersign the transaction and append to their respective chains. When you encounter a corrupted or dishonest node (as evidenced by a breach of integrity of their chain — passing through an invalid state, broken signatures, or broken links), your node can reject the transaction you were starting to process. Countersigning allows consensus at the appropriate scale of the decision (two people transacting in this case) to lock data into a tamper-proof state so it can be stored in as many parallel chains as you need.
  • When your node appends a mutually validated and signed transaction to its chain, it has updated its local state and is able to represent the integrity of its data locally. As long as each transaction (link in the chain) has valid linkages and countersignatures, we can know that it hasn’t been tampered with.
  • If you can reliably embody the state of the node in the node itself using Intrinsic Data Integrity, then all nodes can interact in parallel, independent of other interactions to maximize scalability and simultaneous processing. Either the node has the credits or it doesn’t. I don’t have to refer to a global ledger to find out, the state of the node is in the countersigned, tamper-proof chain.
  • Just like any meaningful communication, a protocol needs to be established to make sure that a transaction carries all the information needed for each node to run the processes and produce a new signed and chained state. This could be debits or credits to an account which modify the balance, or recoding courses and grades to a transcript which modify a Grade Point Average, or ratings and feedback contributing to a reputation score, and so on.
  • By distributing process at the foundation, and leveraging Intrinsic Data Integrity, our approach results in massive improvements in throughput (from parallel simultaneous independent processing), speed, latency, efficiency, and cost of hardware.
  • You also don’t need to incent people to hold their own record — they already want it.
  • Another noteworthy observation about humans, cells, and atoms, is that each has a general “container” that gets configured to a specific use.
  • Likewise, the Receptors we’ve built are a general purpose framework which can load code for different distributed applications. These Receptors are a lightweight processing container for the Ceptr Virtual Machine Host
  • Ceptr enables a developer to focus on the rules and transactions for their use case instead of building a whole framework for distributed applications.
  • how units in a currency are issued
  • Most people think that money is just money, but there are literally hundreds of decisions you can make in designing a currency to target particular needs, niches, communities or patterns of flow.
  • Blockchain cryptocurrencies are fiat currencies. They create tokens or coins from nothing
  • These coins are just “spoken into being”
  • the challenging task of
  • ensure there is no counterfeiting or double-spending
  • Blockchain cryptocurrencies are fiat currencies
  • These coins are just “spoken into being”
  • the challenging task of tracking all the coins that exist to ensure there is no counterfeiting or double-spending
  • You wouldn’t need to manage consensus about whether a cryptocoin is spent, if your system created accounts which have normal balances based on summing their transactions.
  • In a mutual credit system, units of currency are issued when a participant extends credit to another user in a standard spending transaction
  • Alice pays Bob 20 credits for a haircut. Alice’s account now has -20, and Bob’s has +20.
  • Alice spent credits she didn’t have! True
  • Managing the currency supply in a mutual credit system is about managing credit limits — how far people can spend into a negative balance
  • Notice the net number units in the system remains zero
  • One elegant approach to managing mutual credit limits is to set them based on actual demand.
  • concerns about manufacturing fake accounts to game credit limits (Sybil Attacks)
  • keep in mind there can be different classes of accounts. Easy to create, anonymous accounts may get NO credit limit
  • What if I alter my code to give myself an unlimited credit limit, then spend as much as I want? As soon as you pass the credit limit encoded in the shared agreements, the next person you transact with will discover you’re in an invalid state and refuse the transaction.
  • If two people collude to commit an illegal transaction by both hacking their code to allow a normally invalid state, the same still pattern still holds. The next person they try to transact with using untampered code will detect the problem and decline to transact.
  • Most modern community currency systems have been implemented as mutual credit,
  • Hawala is a network of merchants and businessmen, which has been operating since the middle ages, performing money transfers on an honor system and typically settling balances through merchandise instead of transferring money
  • Let’s look at building a minimum viable cryptocurrency with the hawala network as our use case
  • To minimize key management infrastructure, each hawaladar’s public key is their address or identity on the network. To join the network you get a copy of the software from another hawaladar, generate your public and private keys, and complete your personal profile (name, location, contact info, etc.). You call, fax, or email at least 10 hawaladars who know you, and give them your IP address and ask them to vouch for you.
  • Once 10 other hawaladars have vouched for you, you can start doing other transactions because the protocol encoded in every node will reject a transaction chain that doesn’t start with at least 10 vouches
  • seeding your information with those other peers so you can be found by the rest of the network.
  • As described in the Mutual Credit section, at the time of transaction each party audits the counterparty’s transaction chain.
  • Our hawala crypto-clearinghouse protocol has two categories of transactions: some used for accounting and others for routing. Accounting transactions change balances. Routing transactions maintain network integrity by recording information about hawaladar
  • Accounting Transactions create signed data that changes account balances and contains these fields:
  • The final hash of all of the above fields is used as a unique transaction ID and is what each of party signs with their private keys. Signing indicates a party has agreed to the terms of the transaction. Only transactions signed by both parties are considered valid. Nodes can verify signatures by confirming that decryption of the signature using the public key yields a result which matches the transaction ID.
  • Routing Transactions sign data that changes the peers list and contain these fields:
  • As with accounting transactions, the hash of the above fields is used as the transaction’s unique key and the basis for the cryptographic signature of both counterparties.
  • Remember, instead of making changes to account balances, routing transactions change a node’s local list of peers for finding each other and processing.
  • a distributed network of mutual trust
  • operates across national boundaries
  • everyone already keeps and trusts their own separate records
  • Hawaladars are not anonymous
  • “double-spending”
  • It would be possible for someone to hack the code on their node to “forget” their most recent transaction (drop the head of their chain), and go back to their previous version of the chain before that transaction. Then they could append a new transaction, drop it, and append again.
  • After both parties have signed the agreed upon transaction, each party submits the transaction to separate notaries. Notaries are a special class of participant who validate transactions (auditing each chain, ensuring nobody passes through an invalid state), and then they sign an outer envelope which includes the signatures of the two parties. Notaries agree to run high-availability servers which collectively manage a Distributed Hash Table (DHT) servicing requests for transaction information. As their incentive for providing this infrastructure, notaries get a small transaction fee.
  • This approach introduces a few more steps and delays to the transaction process, but because it operates on independent parallel chains, it is still orders of magnitude more efficient and decentralized than reaching consensus on entries in a global ledger
  • millions of simultaneous transactions could be getting processed by other parties and notaries with no bottlenecks.
  • There are other solutions to prevent nodes from dropping the head of their transaction chain, but the approach of having notaries serve out a DHT solves a number of common objections to completely distributed accounting. Having access to reliable lookups in a DHT provides a similar big picture view that you get from a global ledger. For example, you may want a way to look up transactions even when the parties to that transaction are offline, or to be able to see the net system balance at a particular moment in time, or identify patterns of activity in the larger system without having to collect data from everyone individually.
  • By leveraging Intrinsic Data Integrity to run numerous parallel tamper-proof chains you can enable nodes to do various P2P transactions which don’t actually require group consensus. Mutual credit is a great way to implement cryptocurrencies to run in this peered manner. Basic PKI with a DHT is enough additional infrastructure to address main vulnerabilities. You can optimize your solution architecture by reserving reserve consensus work for tasks which need to guarantee uniqueness or actually involve large scale agreement by humans or automated contracts.
  • It is not only possible, but far more scalable to build cryptocurrencies without a global ledger consensus approach or cryptographic tokens.
  •  
    Article written by Arthur Brook, founder of Metacurrency project and of Ceptr.
1 - 20 of 71 Next › Last »
Showing 20 items per page