Skip to main content

Home/ Sensorica Knowledge/ Group items tagged assessments

Rss Feed Group items tagged

Tiberius Brastaviceanu

Promoting and Assessing Value Creation in Networks - P2P Foundation - 1 views

  • Promoting and Assessing Value Creation in Networks: A conceptual framework
  • there are three pieces of a CoP
  • the evaluation framework is able to assess the value of each piece
  • ...7 more annotations...
  • The framework itself has five levels
  • The first level—related to the satisfaction level—is called "immediate value" and it assesses what just happened, for example, in a webinar
  • The second level is called "potential value," and I like to think of this as the new knowledge or understanding that is lying latent but ready to be put to use in the future
  • This level looks at change
  • The third level does this, and it is called "applied value" and this is where the model starts to become interesting to CEOs and others
  • hard metrics like reduced development time, improved efficiencies, or financial returns. The fourth level in the framework provides this, and the level is called "realized value."
  • he fifth level is where the community changes as a result of the activity occurring in the first four levels. At this highest level, the framework examines changes in the community—norms, standards, practices, and thought leadership—that has occurred as a result of activity within the community
Kurt Laitner

Assessments - 0 views

  •  
    May be insightful
Kurt Laitner

A StumbleUpon for Design Geeks | Co.Exist: World changing ideas and innovation - 0 views

  • While there’s no "like" button to declare your affection for certain content, the app monitors how much time you spend with an article, whether you scroll all the way down, and whether or not you share it via social media, and makes assessments based on those data points.
  •  
    "While there's no "like" button to declare your affection for certain content, the app monitors how much time you spend with an article, whether you scroll all the way down, and whether or not you share it via social media, and makes assessments based on those data points." An example from a colleague of an application that uses ambient metrics to determine what you like without you needing to explicitly rank it - much more effective and efficient than explicit ranking, they could add _who_ you share it with to further qualify (shared widely, narrowly, to respected peers, social peers, or senior peers, all of which are also ambiently determined, possibly in combination with some user provided metadata through other processes)
Francois Bergeron

Conference Detail for Industrial and Commercial Applications of Smart Structures Techno... - 0 views

  •  
    "Three-axis distributed fiber optic strain measurement in 3D woven composite structures   Paper 8690-6 Time: 1:50 PM - 2:10 PM Author(s): Matt Castellucci, Evan M. Lally, Sandra Klute, Luna Innovations Inc. (United States); David Lowry, NASA Johnson Space Ctr. (United States) Hide Abstract Add to My Schedule  Recent advancements in composite materials technologies have broken further from traditional designs and require advanced instrumentation and analysis capabilities. Success or failure is highly dependent on design analysis and manufacturing processes. By monitoring smart structures throughout manufacturing and service life, residual and operational stresses can be assessed and structural damage identified. Composite smart structures can be manufactured by integrating fiber optic sensors into existing composite materials processes such as layup, filament winding and three-dimensional weaving. In this work optical fiber was integrated into 3D woven composite parts at a commercial woven products manufacturing facility. The fiber was then used to monitor the structures during a VARTM manufacturing process, and subsequent static and dynamic testing. Low cost telecommunications-grade optical fiber acts as the sensor using a high resolution commercial Optical Frequency Domain Reflectometer (OFDR) system providing distributed strain measurement at spatial resolutions as low as 2mm. Strain measurements using the optical fiber sensors are correlated to resistive strain gauge measurements during static structural loading."
Kurt Laitner

The Energy Efficiency of Trust & Vulnerability: A Conversation | Switch and Shift - 0 views

  • trusting people because of who they are personally vs. who they are professionally
  • also need to trust systems
  • our ability to understand the context we are in
  • ...34 more annotations...
  • How much we need to trust others depends on the context,
  • how much we trust ourselves,
  • our own resources
  • When we trust, we re-allocate that energy and time to getting things done and making an impact
  • If the alternative is worse, we might opt for no trust
  • Trust is a tool to assess and manage (reduce and/or increase) risk, depending on the situation.
  • Trusting someone implies making oneself more vulnerable
  • When we don’t trust, we exert a lot of energy to keep up our guard, to continually assess and verify.  This uses a lot of energy and time.
  • the more information and/or experience we have, the better we can decide whether or not to trust
  • As we let ourselves be vulnerable, we also leave ourselves more open to new ideas, new ways of thinking which leads to empathy and innovation.
  • Being vulnerable is a way to preserve energy
  • trusting is efficient….and effective
  • the more we can focus on the scope and achievement of our goals
  • It lets us reallocate our resources to what matters and utilize our skills and those around us to increase effectiveness…impact.
  • If we are working together, we need to agree on the meaning of ‘done’.  When are we done, what does that look like?
  • make sure we hear and see the same thing (reduce buffers around our response)
  • Strategic sloppiness is a way to preserve energy
  • Build on the same shared mental models
  • use the same language
  • As the ability to replicate something has become more of a commodity, we are increasingly seeing that complex interactions are the way to create ‘value from difference’ (as opposed to ‘value from sameness’).
  • allow for larger margins of error in our response and our acceptance of others
  • higher perfection slows down the tempo
  • We can’t minimize the need to be effective.
  • Efficient systems are great at dealing with complicated things – things that have many parts and sequences, but they fall flat dealing with complex systems, which is most of world today.
  • “Control is for Beginners”
  • timing
  • intuition
  • judgment
  • experience
  • ability to look at things from many different perspective
  • to discover, uncover, understand and empathize is critical
  • focus on meaning and purpose for work (outcomes) instead of just money and profit (outputs)
  • When we have a common goal of WHY we want to do something, we are better able to trust
  • When we never do the same thing or have the same conversation twice, it becomes much more important to figure out why and what we do than how we do it (process, which is a given)
  •  
    spot on conversation on *trust, I see creating a trustful environment quickly among strangers as a key capability of an OVN, we need to quickly get past the need to protect and verify and move on to making purpose and goals happen
Kurt Laitner

Impact of Social Sciences - The right tool for the job: Five collaborative writing tool... - 2 views

  •  
    may be helpful for assessing potential tools
Kurt Laitner

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
Tiberius Brastaviceanu

Action (Stanford Encyclopedia of Philosophy) - 0 views

  • intentionally
  • questions about the nature, variety, and identity of action
  • Should we think of the consequences, conventional or causal, of physical behavior as constituents of an action distinct from but ‘generated by’ the movement? Or should we think that there is a single action describable in a host of ways?
  • ...22 more annotations...
  • Donald Davidson
  • an action
  • is something an agent does that was ‘intentional under some description,’
  • there have been many attempts to map the relations between intentions for the future, acting intentionally, and acting with a certain intention.
  • There has been a notable or notorious debate about whether the agent's reasons in acting are causes of the action
  • rendered the action intelligible in his eyes
  • things that merely happen
  • things they genuinely do
  • distinction between
  • the doings, are the acts or actions of the agent
  • what distinguishes an action from a mere happening or occurrence?
  • An agent performs activity that is directed at a goal
  • adopted on the basis of an overall practical assessment of his options and opportunities
  • awareness
  • that he is performing the activity
  • and that the activity is aimed by him at such-and-such a chosen end
  • It is frequently noted that the agent has some sort of immediate awareness of his physical activity and of the goals that the activity is aimed at realizing.
  • ‘knowledge without observation.’
  • It is also important to the concept of ‘goal directed action’ that agents normally implement a kind of direct control or guidance over their own behavior.
  • For many years, the most intensely debated topic in the philosophy of action concerned the explanation of intentional actions in terms of the agent's reasons for acting
  • Davidson and other action theorists defended the position that reason explanations are causal explanations
  • In the foregoing, reference has been made to explanations of actions in terms of reasons, but recent work on agency has questioned whether contemporary frameworks for the philosophy of action have really articulated the way in which an agent's desires and other pro-attitudes have the distinctive force of reasons in the setting of these ordinary explanations
Kurt Laitner

How Many Kinds of Property are There? - 0 views

  • Whenever a group of people depend on a resource that everybody uses but nobody owns, and where one person’s use effects another person’s ability to use the resource, either the population fails to provide the resource, overconsumes and/or fails to replenish it, or they construct an institution for undertaking and managing collective action.
  • Common-pool resources may be owned by national, regional, or local [1]governments; by [2] communal groups; by [3] private individuals or corporations; or used as open access resources by whomever can gain access
  • Based on her survey, Ostrom distilled this list of common design principles from the experience of successful governance institutions: Clearly defined boundaries. Individuals or households who have rights to withdraw resource units from the CPR must be clearly defined, as must the boundaries of the CPR itself. Congruence between appropriation and provision rules and local conditions. Appropriation rules restricting time, place, technology, and/or quantity of resource units are related to local conditions and to provision rules requiring labour, material, and/or money. Collective-choice arrangements. Most individuals affected by the operational rules can participate in modifying the operational rules [how refreshing. Standing!]. Monitoring. Monitors, who actively audit CPR conditions and appropriator behavior, are accountable to the appropriators or are the appropriators. Graduated sanctions. Appropriators who violate operational rules are likely to be assessed graduated sanctions (depending on the seriousness and context of the offence) by other appropriators, by officials accountable to these appropriators, or by both. Conflict-resolution mechanisms. Appropriators and their officials have rapid access to low-cost local arenas to resolve conflicts among appropriators or between appropriators and officials. Minimal recognition of rights to organize. The rights of appropriators to devise their own institutions are not challenged by external governmental authorities. For CPRs that are parts of larger systems: Nested enterprises. Appropriation, provision, monitoring, enforcement, conflict resolution, and governance activities are organized in multiple layers of nested enterprises.
  •  
    Good review of Ostrom and Bollier's definitions of commons and governance approaches to this property class
  •  
    This paper is mostly about commons... the title is misleading.
1 - 10 of 10
Showing 20 items per page