Skip to main content

Home/ Sensorica Knowledge/ Group items tagged call

Rss Feed Group items tagged

Tiberius Brastaviceanu

James Grier Miller, Living Systems (1978) - 0 views

  • reality as an integrated hierarchy of organizations of matter and energy
  • General living systems theory is concerned with a special subset of all systems, the living ones
  • a space is a set of elements which conform to certain postulate
  • ...266 more annotations...
  • s. Euclidean space
  • metric space
  • topological space
  • Physical space is the extension surrounding a point
  • My presentation of a general theory of living systems will employ two sorts of spaces in which they may exist, physical or geographical space and conceptual or abstracted spaces
  • Physical or geographical space
  • Euclidean space
  • distance
  • moving
  • maximum speed
  • objects moving in such space cannot pass through one another
  • friction
  • The characteristics and constraints of physical space affect the action of all concrete systems, living and nonliving.
  • information can flow worldwide almost instantly
  • Physical space is a common space
  • Most people learn that physical space exists, which is not true of many spaces
  • They can give the location of objects in it
  • Conceptual or abstracted spaces
  • Peck order
  • Social class space
  • Social distance
  • Political distance
  • life space
  • semantic space
  • Sociometric space
  • A space of time costs of various modes of transportation
  • space of frequency of trade relations among nations.
  • A space of frequency of intermarriage among ethnic groups.
  • These conceptual and abstracted spaces do not have the same characteristics and are not subject to the same constraints as physical space
  • Social and some biological scientists find conceptual or abstracted spaces useful because they recognize that physical space is not a major determinant of certain processes in the living systems they study
  • interpersonal relations
  • one cannot measure comparable processes at different levels of systems, to confirm or disconfirm cross-level hypotheses, unless one can measure different levels of systems or dimensions in the same spaces or in different spaces with known transformations among them
  • It must be possible, moreover, to make such measurements precisely enough to demonstrate whether or not there is a formal identity across levels
  • fundamental "fourth dimension" of the physical space-time continuum
  • is the particular instant at which a structure exists or a process occurs
  • or the measured or measurable period over which a structure endures or a process continues.
  • durations
  • speeds
  • rates
  • accelerations
  • irreversible unidirectionality of time
  • thermodynamics
  • negentropy
  • "time's arrow."
  • Matter and energy
  • Matter is anything which has mass (m) and occupies physical space.
  • Energy (E) is defined in physics as the ability to do work.
  • kinetic energy
  • potential energy
  • rest mass energy
  • Mass and energy are equivalent
  • Living systems need specific types of matter-energy in adequate amounts
  • Energy for the processes of living systems is derived from the breakdown of molecules
  • Any change of state of matter-energy or its movement over space, from one point to another, I shall call action.
  • It is one form of process.
  • information (H)
  • Transmission of Information
  • Meaning is the significance of information to a system which processes it: it constitutes a change in that system's processes elicited by the information, often resulting from associations made to it on previous experience with it
  • Information is a simpler concept: the degrees of freedom that exist in a given situation to choose among signals, symbols, messages, or patterns to be transmitted.
  • The set of all these possible categories (the alphabet) is called the ensemble or repertoire
  • .) The unit is the binary digit, or bit of information
  • . The amount of information is measured as the logarithm to the base 2 of the number of alternate patterns
  • Signals convey information to the receiving system only if they do not duplicate information already in the receiver. As Gabor says:
  • [The information of a message can] be defined as the 'minimum number of binary decisions which enable the receiver to construct the message, on the basis of the data already available to him.'
  • meaning cannot be precisely measured
  • Information is the negative of uncertainty.
  • information is the amount of formal patterning or complexity in any system.
  • The term marker was used by von Neumann to refer to those observable bundles, units, or changes of matter-energy whose patterning bears or conveys the informational symbols from the ensemble or repertoire.
  • If a marker can assume n different states of which only one is present at any given time, it can represent at most log2n bits of information. The marker may be static, as in a book or in a computer's memory
  • Communication of almost every sort requires that the marker move in space, from the transmitting system to the receiving system, and this movement follows the same physical laws as the movement of any other sort of matter-energy. The advance of communication technology over the years has been in the direction of decreasing the matter-energy costs of storing and transmitting the markers which bear information.
  • There are, therefore, important practical matter-energy constraints upon the information processing of all living systems exerted by the nature of the matter-energy which composes their markers.
  • organization is based upon the interrelations among parts.
  • If two parts are interrelated either quantitatively or qualitatively, knowledge of the state of one must yield some information about the state of the other. Information measures can demonstrate when such relationships exist
  • The disorder, disorganization, lack of patterning, or randomness of organization of a system is known as its entropy (S)
  • the statistical measure for the negative of entropy is the same as that for information
  • entropy becomes a measure of the probability
  • Increase of entropy was thus interpreted as the passage of a system from less probable to more probable states.
  • according to the second law, a system tends to increase in entropy over time, it must tend to decrease in negentropy or information.
  • therefore no principle of the conservation of information
  • The total information can be decreased in any system without increasing it elsewhere
  • but it cannot be increased without decreasing it elsewhere
  • . Making one or more copies of a given informational pattern does not increase information overall, though it may increase the information in the system which receives the copied information.
  • transforms information into negative entropy
  • smallest possible amount of energy used in observing one bit of information
  • calculations of the amount of information accumulated by living systems throughout growth.
  • the concept of Prigogine that in an open system (that is one in which both matter and energy can be exchanged with the environment) the rate of entropy production within the system, which is always positive, is minimized when the system is in a steady state.
  • in systems with internal feedbacks, internal entropy production is not always minimized when the system is in a stationary state. In other words, feedback couplings between the system parameters may cause marked changes in the rate of development of entropy. Thus it may be concluded that the "information flow" which is essential for this feedback markedly alters energy utilization and the rate of development of entropy, at least in some such special cases which involve feedback control. While the explanation of this is not clear, it suggests an important relationship between information and entropy
  • amount of energy actually required to transmit the information in the channel is a minute part of the total energy in the system, the "housekeeping energy" being by far the largest part of it
  • In recent years systems theorists have been fascinated by the new ways to study and measure information flows, but matter-energy flows are equally important. Systems theory is more than information theory, since it must also deal with energetics - such matters as
  • the flow of raw materials through societies
  • Only a minute fraction of the energy used by most living systems is employed for information processing
  • I have noted above that the movement of matter-energy over space, action, is one form of process. Another form of process is information processing or communication, which is the change of information from one state to another or its movement from one point to another over space
  • Communications, while being processed, are often shifted from one matter-energy state to another, from one sort of marker to another
  • transformations go on in living systems
  • One basic reason why communication is of fundamental importance is that informational patterns can be processed over space and the local matter-energy at the receiving point can be organized to conform to, or comply with, this information
  • the delivery of "flowers by telegraph."
  • Matter-energy and information always flow together
  • Information is always borne on a marker
  • . Conversely there is no regular movement in a system unless there is a difference in potential between two points, which is negative entropy or information
  • If the receiver responds primarily to the material or energic aspect, I shall call it, for brevity, a matter-energy transmission; if the response is primarily to the information, I shall call it an information transmission
  • Moreover, just as living systems must have specific forms of matter-energy, so they must have specific patterns of information
  • example
  • example
  • develop normally
  • have appropriate information inputs in infancy
  • pairs of antonyms
  • one member of which is associated with the concept of information (H)
  • the other member of which is associated with its negative, entropy (S)
  • System
  • A system is a set of interacting units with relationships among them
  • .The word "set" implies that the units have some common properties. These common properties are essential if the units are to interact or have relationships. The state of each unit is constrained by, conditioned by, or dependent on the state of other units. The units are coupled. Moreover, there is at least one measure of the sum of its units which is larger than the sum of that measure of its units.
  • Conceptual system
  • Units
  • terms
  • Relationships
  • a set of pairs of units, each pair being ordered in a similar way
  • expressed by words
  • or by logical or mathematical symbols
  • operations
  • The conceptual systems of science
  • observer
  • selects
  • particular sets to study
  • Variable
  • Each member of such a set becomes a variable of the observer's conceptual system
  • conceptual system may be loose or precise, simple or elaborate
  • Indicator
  • an instrument or technique used to measure fluctuations of variables in concrete systems
  • Function
  • a correspondence between two variables, x and y, such that for each value of x there is a definite value of y, and no two y's have the same x, and this correspondence is: determined by some rule
  • Any function is a simple conceptual system
  • Parameter
  • An independent variable through functions of which other functions may be expressed
  • The state of a conceptual system
  • the set of values on some scale, numerical or otherwise, which its variables have at a given instant
  • Formal identity
  • variables
  • varies comparably to a variable in another system
  • If these comparable variations are so similar that they can be expressed by the same function, a formal identity exists between the two systems
  • Relationships between conceptual and other sorts of systems
  • Science advances as the formal identity or isomorphism increases between a theoretical conceptual system and objective findings about concrete or abstracted systems
  • A conceptual system may be purely logical or mathematical, or its terms and relationships may be intended to have some sort of formal identity or isomorphism with units and relationships empirically determinable by some operation carried out by an observer
  • Concrete system
  • a nonrandom accumulation of matter-energy, in a region in physical space-time, which is organized into interacting interrelated subsystems or components.
  • Units
  • are also concrete systems
  • Relationships
  • spatial
  • temporal
  • spatiotemporal
  • causal
  • Both units and relationships in concrete systems are empirically determinable by some operation carried out by an observer
  • patterns of relationships or processes
  • The observer of a concrete system
  • distinguishes a concrete system from unorganized entities in its environment by the following criteria
  • physical proximity of its units
  • similarity of its units
  • common fate of its units
  • distinct or recognizable patterning of its units.
  • Their boundaries are discovered by empirical operations available to the general scientific community rather than set conceptually by a single observer
  • Variable of a concrete system
  • Any property of a unit or relationship within a system which can be recognized by an observer
  • which can potentially change over time, and whose change can potentially be measured by specific operations, is a variable of a concrete system
  • Examples
  • number of its subsystems or components, its size, its rate of movement in space, its rate of growth, the number of bits of information it can process per second, or the intensity of a sound to which it responds
  • A variable is intrasystemic
  • not to be confused with intersystemic variations which may be observed among individual systems, types, or levels.
  • The state of a concrete system
  • its structure
  • represented by the set of values on some scale which its variables have at that instant
  • Open system
  • Most concrete systems have boundaries which are at least partially permeable, permitting sizable magnitudes of at least certain sorts of matter-energy or information transmissions to pass them. Such a system is an open system. In open systems entropy may increase, remain in steady state, or decrease.
  • Closed system
  • impermeable boundaries through which no matter-energy or information transmissions of any sort can occur is a closed system
  • special case
  • No actual concrete system is completely closed
  • In closed systems, entropy generally increases, exceptions being when certain reversible processes are carried on which do not increase it. It can never decrease.
  • Nonliving system
  • the general case of concrete systems, of which living systems are a very special case. Nonliving systems need not have the same critical subsystems as living systems, though they often have some of them
  • Living system
  • a special subset of the set of all possible concrete systems
  • They all have the following characteristics:
  • open systems
  • inputs
  • throughputs
  • outputs
  • of various sorts of matter-energy and information.
  • maintain a steady state of negentropy even though entropic changes occur in them as they do everywhere else
  • by taking in inputs
  • higher in complexity or organization or negentropy
  • than their outputs
  • The difference permits them to restore their own energy and repair breakdowns in their own organized structure.
  • In living systems many substances are produced as well as broken down
  • To do this such systems must be open and have continual inputs of matter-energy and information
  • entropy will always increase in walled-off living systems
  • They have more than a certain minimum degree of complexity
  • They either contain genetic material composed of deoxyribonucleic acid (DNA)
  • or have a charter
  • blueprint
  • program
  • of their structure and process from the moment of their origin
  • may also include nonliving components.
  • They have a decider, the essential critical sub-system which controls the entire system, causing its subsystems and components to interact. Without such interaction under decider control there is no system.
  • other specific critical sub-systems or they have symbiotic or parasitic relationships with other living or nonliving systems
  • Their subsystems are integrated together to form actively self-regulating, developing, unitary systems with purposes and goals
  • They can exist only in a certain environment
  • change in their environment
  • produces stresses
  • Totipotential system
  • capable of carrying out all critical subsystem processes necessary for life is totipotential
  • Partipotential system
  • does not itself carry out all critical subsystem processes is partipotential
  • A partipotential system must interact with other systems that can carry out the processes which it does not, or it will not survive
  • parasitic
  • symbiotic
    • Tiberius Brastaviceanu
       
      The Exchange fime is a symbiotic system to SENSORICA
  • Fully functioning system
  • when it
  • Partially functioning system
  • it must do its own deciding, or it is not a system
  • Abstracted system
  • Units
  • relationships abstracted or selected by an observer in the light of his interests, theoretical viewpoint, or philosophical bias.
  • Some relationships may be empirically determinable by some operation carried out by the observer, but others are not, being only his concepts
  • Relationships
  • The relationships mentioned above are observed to inhere and interact in concrete, usually living, systems
  • these concrete systems are the relationships of abstracted systems.
  • The verbal usages of theoretical statements concerning abstracted systems are often the reverse of those concerning concrete systems
  • An abstracted system differs from an abstraction, which is a concept
  • representing a class of phenomena all of which are considered to have some similar "class characteristic." The members of such a class are not thought to interact or be interrelated, as are the relationships in an abstracted system
  • Abstracted systems are much more common in social science theory than in natural science.
  • are oriented toward relationships rather than toward the concrete systems
  • spatial arrangements are not usually emphasized
  • their physical limits often do not coincide spatially with the boundaries of any concrete system, although they may.
  • important difference between the physical and biological hierarchies, on the one hand, and social hierarchies, on the other
  • Most physical and biological hierarchies are described in spatial terms
  • we propose to identify social hierarchies not by observing who lives close to whom but by observing who interacts with whom
  • intensity of interaction
  • in most biological and physical systems relatively intense interaction implies relative spatial propinquity
  • To the extent that interactions are channeled through specialized communications and transportation systems, spatial propinquity becomes less determinative of structure.
    • Tiberius Brastaviceanu
       
      This is the case of SENSORICA, built on web-based communication and coordination tools.ย 
  • PARSONS
  • the unit of a partial social system is a role and not the individual.
  • culture
  • cumulative body of knowledge of the past, contained in memories and assumptions of people who express this knowledge in definite ways
  • The social system is the actual habitual network of communication between people.
  • RUESCH
  • A social system is a behavioral system
  • It is an organized set of behaviors of persons interacting with each other: a pattern of roles.
  • The roles are the units of a social system
    • Tiberius Brastaviceanu
       
      That is why we need a role system in SENSORICA
  • On the other hand, the society is an aggregate of social subsystems, and as a limiting case it is that social system which comprises all the roles of all the individuals who participate.
  • What Ruesch calls the social system is something concrete in space-time, observable and presumably measurable by techniques like those of natural science
  • To Parsons the system is abstracted from this, being the set of relationships which are the form of organization. To him the important units are classes of input-output relationships of subsystems rather than the subsystems themselves
  • system is a system of relationship in action, it is neither a physical organism nor an object of physical perception
  • evolution
  • differentiation
  • growth
  • from earlier and simpler forms and functions
  • capacities for specializations and gradients
  • [action] is not concerned with the internal structure of processes of the organism, but is concerned with the organism as a unit in a set of relationships and the other terms of that relationship, which he calls situation
  • Abstracted versus concrete systems
  • One fundamental distinction between abstracted and concrete systems is that the boundaries of abstracted systems may at times be conceptually established at regions which cut through the units and relationships in the physical space occupied by concrete systems, but the boundaries of these latter systems are always set at regions which include within them all the units and internal relationships of each system
  • A science of abstracted systems certainly is possible and under some conditions may be useful.
  • If the diverse fields of science are to be unified, it would be helpful if all disciplines were oriented either to concrete or to abstracted systems.
  • It is of paramount importance for scientists to distinguish clearly between them
Kurt Laitner

Towards a Material Commons | Guerrilla Translation! - 0 views

  • the modes of communication we use are very tightly coupled with the modes of production that finance them
  • Iโ€™m focused on the policy formation around this transition to a new, open knowledge and commons-based economy, and thatโ€™s the research work Iโ€™m doing here
  • The problem is I can only make a living by still working for capital.
  • ...88 more annotations...
  • We now have a technology which allows us to globally scale small group dynamics, and to create huge productive communities, self-organized around the collaborative production of knowledge, code, and design. But the key issue is that we are not able to live from that, right
  • A lot of co-ops have been neo-liberalizing, as it were, have become competitive enterprises competing against other companies but also against other co-ops, and they donโ€™t share their knowledge
  • We cannot create our own livelihood within that sphere
  • instead of having a totally open commons, which allows multinationals to use our commons and reinforce the system of capital, the idea is to keep the accumulation within the sphere of the commons.
  • The result would be a type of open cooperative-ism, a kind of synthesis or convergence between peer production and cooperative modes of production
  • then the material work, the work of working for clients and making a livelihood, would be done through co-ops
  • But it hasnโ€™t had much of a direct connection to this emerging commons movement, which shares so many of the values and  principles of the traditional cooperative movement.
  • Thereโ€™s also a lot of peer-to-peer work going on, but itโ€™s not very well versed around issues like cooperative organization, formal or legal forms of ownership, which are based on reciprocity and cooperation, and how to interpret the commons vision with a structure, an organizational structure and a legal structure that actually gives it economic power, market influence, and a means of connecting it to organizational forms that have durability over the long-term.
  • The young people, the developers in open source or free software, the people who are in co-working centers, hacker spaces, maker spaces. When they are thinking of making a living, they think startups
  • They have a kind of generic reaction, โ€œoh, letโ€™s do a startupโ€, and then they look for venture funds. But this is a very dangerous path to take
  • Typically, the venture capital will ask for a controlling stake, they have the right to close down your start up whenever they feel like it, when they feel that theyโ€™re not going to make enough money
  • Donโ€™t forget that with venture capital, only 1 out of 10 companies will actually make it, and they may be very rich, but itโ€™s a winner-take-all system
  • we donโ€™t have what Marx used to call social reproduction
  • I would like John to talk about the solidarity co-ops, and how that integrates the notion of the commons or the common good in the very structure of the co-op
  • They donโ€™t have a commons of design or code, they privatize and patent, just like private competitive enterprise, their knowledge
  • Cooperatives, which are basically a democratic and collective form of enterprise where members have control rights and democratically direct the operations of the co-op, have been the primary stakeholders in any given co-op โ€“ whether itโ€™s a consumer co-op, or a credit union, or a worker co-op.
  • Primarily, the co-op is in the service of its immediate members
  • What was really fascinating about the social co-ops was that, although they had members, their mission was not only to serve the members but also to provide service to the broader community
  • In the city of Bologna, for example, over 87% of the social services provided in that city are provided through contract with social co-ops
  • democratically run
  • much more participatory, and a much more engaged model
  • The difference, however, is that the structure of social co-ops is still very much around control rights, in other words, members have rights of control and decision-making within how that organization operates
  • And it is an incorporated legal structure that has formal recognition by the legislation of government of the state, and it has the power, through this incorporated power, to negotiate with and contract with government for the provision of these public services
  • In Quรฉbec theyโ€™re called Solidarity co-ops
  • So, the social economy, meaning organizations that have a mutual aim in their purpose, based on the principles of reciprocity, collective benefit, social benefit, is emerging as an important player for the design and delivery of public services
  • This, too, is in reaction to the failure of the public market for provision of services like affordable housing or health care or education services
  • This is a crisis in the role of the state as a provider of public services. So the question has emerged: what happens when the state fails to provide or fulfill its mandate as a provider or steward of public goods and services, and whatโ€™s the role of civil society and the social economy in response?
  • we have commonses of knowledge, code and design. Theyโ€™re more easily created, because as a knowledge worker, if you have access to the network and some means, however meager, of subsistence, through effort and connection you can actually create knowledge. However, this is not the case if you move to direct physical production, like the open hardware movement
  • I originally encountered Michel after seeing some talks by Benkler and Lessig at the Wizard of OS 4, in 2006, and I wrote an essay criticizing that from a materialist perspective, it was called โ€œThe creative anti-commons and the poverty of networksโ€, playing on the terms that both those people used.
  • In hardware, we donโ€™t see that, because you need to buy material, machines, plastic, metal.
  • Some people have called the open hardware community a โ€œcandyโ€ economy, because if youโ€™re not part of these open hardware startups, youโ€™re basically not getting anything for your efforts
  • democratic foundations like the Apache foundation
  • They conceive of peer production, especially Benkler, as being something inherently immaterial, a form of production that can only exist in the production of immaterial wealth
  • From my materialist point of view, thatโ€™s not a mode of production, because a mode of production must, in the first place, reproduce its productive inputs, its capital, its labor, and whatever natural wealth it consumes
  • From a materialist point of view, it becomes  obvious that the entire exchange value produced in these immaterial forms would be captured by the same old owners of materialist wealth
  • different definition of peer production
  • independent producers collectively sharing a commons of productive assets
  • I wanted to create something like a protocol for the formation and allocation of physical goods, the same way we have TCP/IP and so forth, as a way to allocate immaterial goods
  • share and distribute and collectively create immaterial wealth, and become independent producers based on this collective commons.
  • One was the Georgist idea of using rent, economic rent, as a fundamental mutualizing source of wealth
  • Mutualizing unearned income
  • So, the unearned income, the portion of income derived from ownership of productive assets is evenly distributed
  • This protocol would seek to normalize that, but in a way that doesnโ€™t require administration
  • typical statist communist reaction to the cooperative movement is saying that cooperatives can exclude and exploit one another
  • But then, as weโ€™ve seen in history, thereโ€™s something that develops called an administrative class,  which governs over the collective of cooperatives or the socialist state, and can become just as counterproductive and often exploitive as capitalist class
  • So, how do we create cooperation among cooperatives, and distribution of wealth among cooperatives, without creating this administrative class?
  • This is why I borrowed from the work of Henry George and Silvio Gesell in created this idea of rent sharing.
  • This is not done administratively, this is simply done as a protocol
  • The idea is that if a cooperative wants an asset, like, an example is if one of the communes would like to have a tractor, then essentially the central commune is like a bond market. They float a bond, they say I want a tractor, I am willing to pay $200 a month for this tractor in rent, and other members of the cooperative can say, hey, yeah, thatโ€™s a good idea,we think thatโ€™s a really good allocation of these productive assets, so we are going to buy these bonds. The bond sale clears, the person gets the tractor, the money from the rent of the tractor goes back to clear the bonds, and  after that, whatever further money is collected through the rent on this tractor โ€“ and I donโ€™t only mean tractors, same would be applied to buildings, to land, to any other productive assets โ€“ all this rent thatโ€™s collected is then distributed equally among all of the workers.
  • The idea is that people earn income not only by producing things, but by owning the means of production, owning productive assets, and our society is unequal because the distribution of productive assets is unequal
  • This means that if you use your exact per capita share of property, no more no less than what you pay in rent and what you received in social dividend, will be equal
  • But if youโ€™re not working at that time, because youโ€™re old, or otherwise unemployed, then obviously the the productive assets that you will be using will be much less than the mean and the median, so what youโ€™ll receive as dividend will be much more than what you pay in rent, essentially providing a basic income
  • venture communism doesnโ€™t seek to control the product of the cooperatives
  • It doesnโ€™t seek to limit, control, or even tell them how they should distribute it, or under what means; what they produce is entirely theirs, itโ€™s only the collective management of the commons of productive assets
  • On paper this would seem to work, but the problem is that this assumes that we have capital to allocate in this way, and that is not the case for most of the world workers
  • how do we get to that stage?
  • other two being counter politics and insurrectionary finance
  • do we express our activism through the state, or do we try to achieve our goals by creating the alternative society outside
  • pre-figurative politics, versus statist politics
  • My materialist background tells me that when you sell your labor on the market, you have nothing more than your subsistence costs at the end of it, so where is this wealth meant to come from
  • I believe that the only reason that we have any extra wealth beyond subsistence is because of organized social political struggle; because we have organized in labor movements, in the co-op movement, and in other social forms
  • To create the space for prefiguring presupposes engagement with the state, and struggle within parliaments, and struggle within the public social forum
  • Instead, we should think that no, we must engage in the state in order to protect our ability to have alternative societies
  • We can only get rid of the state in these areas once we have alternative, distributed, cooperative means to provide those same functions
  • We can only eliminate the state from these areas once they actually exist, which means we actually have to build them
  • What I mean by insurrectionary finance is that we have to acknowledge that itโ€™s not only forming capital and distributing capital, itโ€™s also important how intensively we use capital
  • Iโ€™m not proposing that the cooperative movement needs to engage in the kind of derivative speculative madness that led to the financial crisis, but at the same time we canโ€™tโ€ฆ it canโ€™t be earn a dollar, spend a dollar
  • We have to find ways to create liquidity
  • to deal with economic cycles
  • they did things the organized left hasnโ€™t been able to do, which is takeover industrial means of production
  • if they can take over these industrial facilities, just in order to shut them down and asset strip them, why canโ€™t we take them over and mutualize them?
  • more ironic once you understand that the source of investment that Milken and his colleagues were working with were largely workers pension funds
  • idea of venture communism
  • pooling, based on the capture of unearned income
  • in Quรฉbec, there is a particular form of co-op thatโ€™s been developed that allows small or medium producers to pool their capital to purchase machinery and to use it jointly
  • The other idea I liked was trying to minimize a management class
  • much more lean and accountable because they are accountable to boards of directors that represent the interests of the members
  • Iโ€™ve run into this repeatedly among social change activists who immediately recoil at the notion of thinking about markets and capital, as part of their change agenda
  • I had thought previously, like so many, that economics is basically a bought discipline, and that it serves the interests of existing elites. I really had a kind of reaction against that
  • complete rethinking of economics
  • recapture the initiative around vocabulary, and vision, with respect to economics
  • reimagining and reinterpreting, for a popular and common good, the notion of market and capital
  • advocating for a vision of social change that isnโ€™t just about politics, and isnโ€™t just about protest, it has to be around how do we reimagine and reclaim economics
  • markets actually belong to communities and people
  • capital wasnโ€™t just an accumulated wealth for the rich
  • I think what weโ€™re potentially  talking about here is to make the social economy hyper-productive, hyper-competitive, hyper-cooperative
  • The paradox is that capital already knows this. Capital is investing in these peer production projects
  • Part of the proposal of the FLOK society project in Ecuador will be to get that strategic reorganization to make the social economy strategic
  •  
    A lot of really interesting points of discussion in here.
Kurt Laitner

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • Use the Script Editor to write and run scripts, to set triggers, and to perform other actions such as sharing scripts.
  • start the Script Editor from a Google Site
  • declares a function called myFunction()
  • ...69 more annotations...
  • You can perform the following tasks from the Script Editor.
  • pening, deleting, renaming, and saving scripts
  • Cutting, copying, and pasting text
  • Find and replace
  • Setting a time zone
  • scripts with time-based triggers
  • Running functions
  • Viewing log messages
  • revision history
  • write pseudocode first
  • When you're planning a script
  • narrative version of what the script needs to do.
  • A particular script is associated with one and only one Google Spreadsheet.
  • If you make a copy of the Spreadsheet, the script is also copied.
  • A particular Spreadsheet can have multiple scripts associated with it.
  • use the onOpen event handler in more than one script associated with a particular Spreadsheet, all scripts begin to execute when you open the Spreadsheet and the order in which the scripts are executed is indeterminate.
  • event handler is a function executed when a particular event takes place.
  • see Running Scripts in Response to an Event.
  • A script cannot currently call or create another script and cannot call functions in another script.
  • If you want to store the results of a function, you must copy them into a spreadsheet cell.
  • You can trigger Apps Script events from links that are embedded in a Google Site. For information about how to do this, see Using Apps Scrip in Your Ssite.
  • You can insert a script into a Site as a gadget.
  • you must grant permission for the script to run as a service.
  • You also designate whether only you can invoke the service or whether all members of your domain can invoke the service.
  • you can assign functions within the script any arbitrary name.
  • The instructions in a function must be enclosed within curly braces.
  • event handler
  • when a spreadsheet is opened,
  • when a script is installed
  • when a spreadsheet is edited
  • at times you choose
  • menu item
  • Using a drawing or button embedded in a Spreadsheet
  • Using a custom function that is referenced as a Spreadsheet function
  • Clicking the Run button
  • object-oriented programming languages
  • Google Apps Script uses the JavaScript language.
  • Operations
  • are performed using the objects and methods described in the API documentation.
  • An API provides pre-packaged code for standard tasks you need to accomplish in scripts or programs.
  • API includes objects that you use to accomplish tasks such as sending email, creating calendar entries
  • A method describes the behavior of an object and is a function attached to an object.
  • MailApp
  • use to create and send email
  • To send email, you invoke the sendEmail method and provide values for the method arguments.
  • Google Apps Script can access or retrieve data in different formats in different ways.
  • A custom function
  • is called directly from a cell in a Spreadsheet using the syntax =myFunctionName()
  • they cannot set values outside the cells
  • have some restrictions not shared by other functions
  • cannot send email
  • cannot operate on a Google Site
  • cannot perform any operations that require user authorization
  • cannot perform any operations that require knowledge of who the user
  • onInstall function
  • onOpen function
  • Other functions run when you run them manually or when they are triggered by clicking
  • Custom functions and formulas in the spreadsheet execute any time the entire Spreadsheet is evaluated or when the data changes in the function or formula's cell.
  • share the Spreadsheet
  • publish the script to the Script Gallery
  • spreadsheet template
  • the color coding for that line will not be correct
  • A script with incorrect syntax or other errors does not run.
  • The Script Editor includes a debugger.
  • view the current state of variables and objects created by a script while that script runs.
  • step through the code line by line as it executes or set breakpoints
  • The debugger does not work with custom functions, onEdit functions, event triggers, or scripts running as a service.
  • use the debugger to find errors in scripts that are syntactically correct but still do not function correctly.
  • Functions ending in an underscore (_), for example, internalStuff_(), are treated differently from other functions. You do not see these function in the Run field in the Script Editor and they do not appear in the Script Manager in the Spreadsheet. You can use the underscore to indicate that users should not attempt to run the function and the function is available only to other functions.
Tiberius Brastaviceanu

Evolving Towards a Partner State in an Ethical Economy - 0 views

  • In the  emerging institutional model of peer production
  • we can distinguish an interplay between three partners
  • a community of contributors that create a commons of knowledge, software or design;
  • ...46 more annotations...
  • There is a clear institutional division of labour between these three players
  • a set of "for-benefit institutions' which manage the 'infrastructure of cooperation'
  • an enterpreneurial coalition that creates market value on top of that commons;
  • Can we also learn something about the politics of this new mode of value creation
  • Is there perhaps a new model of power and democracy co-evolving out of these new social practices, that may be an answer to the contemporary crisis of democracy
  • we are witnessing a new model for the state. A 'P2P' state, if you will.
  • The post-democratic logic of community
  • these communities are not democracies
  • because democracy, and the market, and hierarchy, are modes of allocation of scarce resources
  • Such communities are truly poly-archies and the type of power that is held in them is meritocratic, distributed, and ad hoc.
  • Everyone can contribute without permission, but such a priori permissionlessness is  matched with mechanisms for 'a posteriori'  communal validation, where those with recognized expertise and that are accepted by the community, the so-called 'maintainers' and the 'editors',  decide
  • These decisions require expertise, not communal consensus
  • tension between inclusiveness of participation and selection for excellence
  • allowing for maximum human freedom compatible with the object of cooperation. Indeed, peer production is always a 'object-oriented' cooperation, and it is the particular object that will drive the particular form chosen for its 'peer governance' mechanisms
  • The main allocation mechanism in such project, which replaces the market, the hierarchy and democracy,  is a 'distribution of tasks'
  • no longer a division of labor between 'jobs', and the mutual coordination works through what scientist call 'stigmergic signalling'
  • work environment is designed to be totally open and transparent
  • every participating individual can see what is needed, or not and decide accordingly whether to undertake his/her particular contribution
  • this new model
  • has achieved capacities both for global coordination, and for the small group dynamics that are characteristic of human tribal forms and that it does this without 'command and control'! In fact, we can say that peer production has enabled the global scaling of small-group dynamics.
  • And they have to be, because an undemocratic institution would also discourage contributions by the community of participants.
    • Kurt Laitner
       
      disagree, there are many ways to ethically distribute governance, not just democracy
  • Hence, an increased exodus of productive  capacities, in the form of direct use value production, outside the existing system of monetization, which only operates at its margins.
  • Where there is no tension between supply and demand, their can be no market, and no capital accumulation
  • Facebook and Google users create commercial value for their platforms, but only very indirectly and they are not at all rewarded for their own value creation.
  • Since what they are creating is not what is commodified on the market for scarce goods, there is no return of income for these value creators
  • This means that social media platforms are exposing an important fault line in our system
  • If you did not contribute, you had no say, so engagement was and is necessary.
    • Kurt Laitner
       
      key divergence from birth/process citizenship driven democracy
  • โƒ   At the core of value creation are various commons, where the innovations are deposited for all humanity to share and to build on โƒ   These commons are enabled and protected through nonprofit civic associations, with as national equivalent the Partner State, which empowers and enables that social production โƒ   Around the commons emerges a vibrant commons-oriented economy undertaken by different kinds of ethical companies, whose legal structures ties them to the values and goals of the commons communities, and not absentee and private shareholders intent of maximising profit at any cost
  • the citizens deciding on the optimal shape of their provisioning systems.
    • Kurt Laitner
       
      ie value equations..?
  • Today, it is proto-mode of production which is entirely inter-dependent with the system of capital
  • Is there any possibility to create a really autonmous model of peer production, that could create its own cycle of reproduction?
  • contribute
    • Kurt Laitner
       
      defined as?
    • Tiberius Brastaviceanu
       
      "ad hoc": perhaps based on context, needs and everyone's understanding of the situation
  • and whose mission is the support of the commons and its contributors
  • In this way, the social reproduction of commoners would no longer depend on the accumulation cycle of capital, but on its own cycle of value creation and realization
  • Phyles are mission-oriented, purpose-driven, community-supportive entities that operate in the market, on a global scale, but work for the commons.
  • peer production license, which has been proposed by Dmytri Kleiner.
  • Thijs Markus writes  so eloquently about Nike in the Rick Falkvinge blog, if you want to sell $5 shoes for $150 in the West, you better have one heck of a repressive IP regime in place.
  • Hence the need for SOPA/PIPA , ACTA'S and other attempts to criminalize the right to share.
  • An economy of scope exists between the production of two goods when two goods which share a CommonCost are produced together such that the CommonCost is reduced.
  • shared infrastructure costs
  • 2) The current system beliefs that innovations should be privatized and only available by permission or for a hefty price (the IP regime), making sharing of knowledge and culture a crime; let's call this feature, enforced 'artificial scarcity'.
  • 1) Our current system is based on the belief of infinite growth and the endless availability of resources, despite the fact that we live on a finite planet; let's call this feature, runaway 'pseudo-abundance'.
  • So what are the economies of scope of the new p2p age? They come in two flavours: 1) the mutualizing of knowledge and immaterial resources 2) the mutualizing of material productive resources
  • how does global governance look like in P2P civilization?
  • conflicts between contributors
  • are not decided by authoritarian fiat, but by 'negotiated coordination'.
Tiberius Brastaviceanu

Promoting and Assessing Value Creation in Networks - P2P Foundation - 1 views

  • Promoting and Assessing Value Creation in Networks: A conceptual framework
  • there are three pieces of a CoP
  • the evaluation framework is able to assess the value of each piece
  • ...7 more annotations...
  • The framework itself has five levels
  • The first levelโ€”related to the satisfaction levelโ€”is called "immediate value" and it assesses what just happened, for example, in a webinar
  • The second level is called "potential value," and I like to think of this as the new knowledge or understanding that is lying latent but ready to be put to use in the future
  • This level looks at change
  • The third level does this, and it is called "applied value" and this is where the model starts to become interesting to CEOs and others
  • hard metrics like reduced development time, improved efficiencies, or financial returns. The fourth level in the framework provides this, and the level is called "realized value."
  • he fifth level is where the community changes as a result of the activity occurring in the first four levels. At this highest level, the framework examines changes in the communityโ€”norms, standards, practices, and thought leadershipโ€”that has occurred as a result of activity within the community
Tiberius Brastaviceanu

The Baffler - 0 views

  • This tendency to view questions of freedom primarily through the lens of economic competition, to focus on the producer and the entrepreneur at the expense of everyone else, shaped Oโ€™Reillyโ€™s thinking about technology.
  • the Oโ€™Reilly brand essence is ultimately a story about the hacker as hero, the kid who is playing with technology because he loves it, but one day falls into a situation where he or she is called on to go forth and change the world,
  • His true hero is the hacker-cum-entrepreneur, someone who overcomes the insurmountable obstacles erected by giant corporations and lazy bureaucrats in order to fulfill the American Dream 2.0: start a company, disrupt an industry, coin a buzzword.
  • ...139 more annotations...
  • gospel of individualism, small government, and market fundamentalism
  • innovation is the new selfishness
  • mastery of public relations
  • making it seem as if the language of economics was, in fact, the only reasonable way to talk about the subject
  • memes are for losers; the real money is in epistemes.
  • โ€œOpen source softwareโ€ was also the first major rebranding exercise overseen by Team Oโ€™Reill
  • Itโ€™s easy to forget this today, but there was no such idea as open source software before 1998; the conceptโ€™s seeming contemporary coherence is the result of clever manipulation and marketing.
  • ideological cleavage between two groups
  • Richard Stallman
  • Free Software Foundation, preoccupied with ensuring that users had rights with respect to their computer programs. Those rights werenโ€™t manyโ€”users should be able to run the program for any purpose, to study how it works, to redistribute copies of it, and to release their improved version (if there was one) to the public
  • โ€œfree software.โ€
  • association with โ€œfreedomโ€ rather than โ€œfree beerโ€
  • copyleft
  • profound critique of the role that patent law had come to play in stifling innovation and creativity.
  • Plenty of developers contributed to โ€œfree softwareโ€ projects for reasons that had nothing to do with politics. Some, like Linus Torvalds, the Finnish creator of the much-celebrated Linux operating system, did so for fun; some because they wanted to build more convenient software; some because they wanted to learn new and much-demanded skills.
  • Stallmanโ€™s rights-talk, however, risked alienating the corporate types
  • he was trying to launch a radical social movement, not a complacent business association
  • By early 1998 several business-minded members of the free software community were ready to split from Stallman, so they masterminded a coup, formed their own advocacy outletโ€”the Open Source Initiativeโ€”and brought in Oโ€™Reilly to help them rebrand.
  • โ€œopen sourceโ€
  • The label โ€œopen sourceโ€ may have been new, but the ideas behind it had been in the air for some time.
  • In those early days, the messaging around open source occasionally bordered on propaganda
  • This budding movement prided itself on not wanting to talk about the ends it was pursuing; except for improving efficiency and decreasing costs, those were left very much undefined.
  • extremely decentralized manner, using Internet platforms, with little central coordination.
  • In contrast to free software, then, open source had no obvious moral component.
  • โ€œopen source is not particularly a moral or a legal issue. Itโ€™s an engineering issue. I advocate open source, because . . . it leads to better engineering results and better economic results
  • While free software was meant to force developers to lose sleep over ethical dilemmas, open source software was meant to end their insomnia.
  • Stallman the social reformer could wait for decades until his ethical argument for free software prevailed in the public debate
  • Oโ€™Reilly the savvy businessman had a much shorter timeline: a quick embrace of open source software by the business community guaranteed steady demand for Oโ€™Reilly books and events
  • The coup succeeded. Stallmanโ€™s project was marginalized. But Oโ€™Reilly and his acolytes didnโ€™t win with better arguments; they won with better PR.
  • A decade after producing a singular vision of the Internet to justify his ideas about the supremacy of the open source paradigm, Oโ€™Reilly is close to pulling a similar trick on how we talk about government reform.
  • much of Stallmanโ€™s efforts centered on software licenses
  • Oโ€™Reillyโ€™s bet wa
  • the โ€œcloudโ€
  • licenses would cease to matter
  • Since no code changed hands
  • So what did matter about open source? Not โ€œfreedomโ€
  • Oโ€™Reilly cared for only one type of freedom: the freedom of developers to distribute software on whatever terms they fancied.
  • the freedom of the producer
  • who must be left to innovate, undisturbed by laws and ethics.
  • The most important freedom,
  • is that which protects โ€œmy choice as a creator to give, or not to give, the fruits of my work to you, as a โ€˜userโ€™ of that work, and for you, as a user, to accept or reject the terms I place on that gift.โ€
  • Oโ€™Reilly opposed this agenda: โ€œI completely support the right of Richard [Stallman] or any individual author to make his or her work available under the terms of the GPL; I balk when they say that others who do not do so are doing something wrong.โ€
  • The right thing to do, according to Oโ€™Reilly, was to leave developers alone.
  • According to this Randian interpretation of open source, the goal of regulation and public advocacy should be to ensure that absolutely nothingโ€”no laws or petty moral considerationsโ€”stood in the way of the open source revolution
  • Any move to subject the fruits of developersโ€™ labor to public regulation
  • must be opposed, since it would taint the reputation of open source as technologically and economically superior to proprietary software
  • the advent of the Internet made Stallmanโ€™s obsession with licenses obsolete
  • Many developers did stop thinking about licenses, and, having stopped thinking about licenses, they also stopped thinking about broader moral issues that would have remained central to the debates had โ€œopen sourceโ€ not displaced โ€œfree softwareโ€ as the paradigm du jour.
  • Profiting from the termโ€™s ambiguity, Oโ€™Reilly and his collaborators likened the โ€œopennessโ€ of open source software to the โ€œopennessโ€ of the academic enterprise, markets, and free speech.
  • โ€œopen to intellectual exchangeโ€
  • โ€œopen to competitionโ€
  • โ€œFor me, โ€˜open sourceโ€™ in the broader sense means any system in which open access to code lowers the barriers to entry into the marketโ€).
  • โ€œOpenโ€ allowed Oโ€™Reilly to build the largest possible tent for the movement.
  • The language of economics was less alienating than Stallmanโ€™s language of ethics; โ€œopennessโ€ was the kind of multipurpose term that allowed one to look political while advancing an agenda that had very little to do with politics
  • highlight the competitive advantages of openness.
  • the availability of source code for universal examination soon became the one and only benchmark of openness
  • What the code did was of little importanceโ€”the market knows best!โ€”as long as anyone could check it for bugs.
  • The new paradigm was presented as something that went beyond ideology and could attract corporate executives without losing its appeal to the hacker crowd.
  • What Raymond and Oโ€™Reilly failed to grasp, or decided to overlook, is that their effort to present open source as non-ideological was underpinned by a powerful ideology of its ownโ€”an ideology that worshiped innovation and efficiency at the expense of everything else.
  • What they had in common was disdain for Stallmanโ€™s moralizingโ€”barely enough to justify their revolutionary agenda, especially among the hacker crowds who were traditionally suspicious of anyone eager to suck up to the big corporations that aspired to dominate the open source scene.
  • linking this new movement to both the history of the Internet and its future
  • As long as everyone believed that โ€œopen sourceโ€ implied โ€œthe Internetโ€ and that โ€œthe Internetโ€ implied โ€œopen source,โ€ it would be very hard to resist the new paradigm
  • Telling a coherent story about open source required finding some inner logic to the history of the Internet
  • โ€œIf you believe me that open source is about Internet-enabled collaboration, rather than just about a particular style of software license,โ€
  • everything on the Internet was connected to everything elseโ€”via open source.
  • The way Oโ€™Reilly saw it, many of the key developments of Internet culture were already driven by what he called โ€œopen source behavior,โ€ even if such behavior was not codified in licenses.
  • No moralizing (let alone legislation) was needed; the Internet already lived and breathed open source
  • apps might be displacing the browser
  • the openness once taken for granted is no more
  • Openness as a happenstance of market conditions is a very different beast from openness as a guaranteed product of laws.
  • One of the key consequences of linking the Internet to the world of open source was to establish the primacy of the Internet as the new, reinvented desktop
  • This is where the now-forgotten language of โ€œfreedomโ€ made a comeback, since it was important to ensure that Oโ€™Reillyโ€™s heroic Randian hacker-entrepreneurs were allowed to roam freely.
  • Soon this โ€œfreedom to innovateโ€ morphed into โ€œInternet freedom,โ€ so that what we are trying to preserve is the innovative potential of the platform, regardless of the effects on individual users.
  • Lumping everything under the label of โ€œInternet freedomโ€ did have some advantages for those genuinely interested in promoting rights such as freedom of expression
  • Forced to choose between preserving the freedom of the Internet or that of its users, we were supposed to choose the formerโ€”because โ€œthe Internetโ€ stood for progress and enlightenment.
  • infoware
  • Yahoo
  • their value proposition lay in the information they delivered, not in the software function they executed.
  • The โ€œinfowareโ€ buzzword didnโ€™t catch on, so Oโ€™Reilly turned to the work of Douglas Engelbart
  • to argue that the Internet could help humanity augment its โ€œcollective intelligenceโ€ and that, once again, open source software was crucial to this endeavor.
  • Now it was all about Amazon learning from its customers and Google learning from the sites in its index.
  • The idea of the Internet as both a repository and incubator of โ€œcollective intelligenceโ€
  • in 2004, Oโ€™Reilly and his business partner Dale Dougherty hit on the idea of โ€œWeb 2.0.โ€ What did โ€œ2.0โ€ mean, exactly?
  • he primary goal was to show that the 2001 market crash did not mean the end of the web and that it was time to put the crash behind us and start learning from those who survived.
  • Tactically, โ€œWeb 2.0โ€ could also be much bigger than โ€œopen sourceโ€; it was the kind of sexy umbrella term that could allow Oโ€™Reilly to branch out from boring and highly technical subjects to pulse-quickening futurology
  • Oโ€™Reilly couldnโ€™t improve on a concept as sexy as โ€œcollective intelligence,โ€ so he kept it as the defining feature of this new phenomenon.
  • What set Web 2.0 apart from Web 1.0, Oโ€™Reilly claimed, was the simple fact that those firms that didnโ€™t embrace it went bust
  • find a way to harness collective intelligence and make it part of their business model.
  • By 2007, Oโ€™Reilly readily admitted that โ€œWeb 2.0 was a pretty crappy name for whatโ€™s happening.โ€
  • Oโ€™Reilly eventually stuck a 2.0 label on anything that suited his business plan, running events with titles like โ€œGov 2.0โ€ and โ€œWhere 2.0.โ€ Today, as everyone buys into the 2.0 paradigm, Oโ€™Reilly is quietly dropping it
  • assumption that, thanks to the coming of Web 2.0, we are living through unique historical circumstances
  • Take Oโ€™Reillyโ€™s musings on โ€œEnterprise 2.0.โ€ What is it, exactly? Well, itโ€™s the same old enterpriseโ€”for all we know, it might be making widgetsโ€”but now it has learned something from Google and Amazon and found a way to harness โ€œcollective intelligence.โ€
  • tendency to redescribe reality in terms of Internet culture, regardless of how spurious and tenuous the connection might be, is a fine example of what I call โ€œInternet-centrism.โ€
  • โ€œOpen sourceโ€ gave us the โ€œthe Internet,โ€ โ€œthe Internetโ€ gave us โ€œWeb 2.0,โ€ โ€œWeb 2.0โ€ gave us โ€œEnterprise 2.0โ€: in this version of history, Tim Oโ€™Reilly is more important than the European Union
  • For Postman, each human activityโ€”religion, law, marriage, commerceโ€”represents a distinct โ€œsemantic environmentโ€ with its own tone, purpose, and structure. Stupid talk is relatively harmless; it presents no threat to its semantic environment and doesnโ€™t cross into other ones.
  • Since it mostly consists of falsehoods and opinions
  • it can be easily corrected with facts
  • to say that Tehran is the capital of Iraq is stupid talk
  • Crazy talk, in contrast, challenges a semantic environment, as it โ€œestablishes different purposes and assumptions from those we normally accept.โ€ To argue, as some Nazis did, that the German soldiers ended up far more traumatized than their victims is crazy talk.
  • For Postman, one of the main tasks of language is to codify and preserve distinctions among different semantic environments.
  • As he put it, โ€œWhen language becomes undifferentiated, human situations disintegrate: Science becomes indistinguishable from religion, which becomes indistinguishable from commerce, which becomes indistinguishable from law, and so on.
  • pollution
  • Some wordsโ€”like โ€œlawโ€โ€”are particularly susceptible to crazy talk, as they mean so many different things: from scientific โ€œlawsโ€ to moral โ€œlawsโ€ to โ€œlawsโ€ of the market to administrative โ€œlaws,โ€ the same word captures many different social relations. โ€œOpen,โ€ โ€œnetworks,โ€ and โ€œinformationโ€ function much like โ€œlawโ€ in our own Internet discourse today.
  • For Korzybski, the world has a relational structure that is always in flux; like Heraclitus, who argued that everything flows, Korzybski believed that an object A at time x1 is not the same object as object A at time x2
  • Our language could never properly account for the highly fluid and relational structure of our realityโ€”or as he put it in his most famous aphorism, โ€œthe map is not the territory.โ€
  • Korzybski argued that we relate to our environments through the process of โ€œabstracting,โ€ whereby our neurological limitations always produce an incomplete and very selective summary of the world around us.
  • nothing harmful in this per seโ€”Korzybski simply wanted to make people aware of the highly selective nature of abstracting and give us the tools to detect it in our everyday conversations.
  • Korzybski developed a number of mental tools meant to reveal all the abstracting around us
  • He also encouraged his followers to start using โ€œetc.โ€ at the end of their statements as a way of making them aware of their inherent inability to say everything about a given subject and to promote what he called the โ€œconsciousness of abstraction.โ€
  • There was way too much craziness and bad science in Korzybskiโ€™s theories
  • but his basic question
  • โ€œWhat are the characteristics of language which lead people into making false evaluations of the world around them?โ€
  • Tim Oโ€™Reilly is, perhaps, the most high-profile follower of Korzybskiโ€™s theories today.
  • Oโ€™Reilly openly acknowledges his debt to Korzybski, listing Science and Sanity among his favorite books
  • It would be a mistake to think that Oโ€™Reillyโ€™s linguistic interventionsโ€”from โ€œopen sourceโ€ to โ€œWeb 2.0โ€โ€”are random or spontaneous.
  • There is a philosophy to them: a philosophy of knowledge and language inspired by Korzybski. However, Oโ€™Reilly deploys Korzybski in much the same way that the advertising industry deploys the latest findings in neuroscience: the goal is not to increase awareness, but to manipulate.
  • Oโ€™Reilly, of course, sees his role differently, claiming that all he wants is to make us aware of what earlier commentators may have overlooked. โ€œA metaphor is just that: a way of framing the issues such that people can see something they might otherwise miss,
  • But Korzybskiโ€™s point, if fully absorbed, is that a metaphor is primarily a way of framing issues such that we donโ€™t see something we might otherwise see.
  • In public, Oโ€™Reilly modestly presents himself as someone who just happens to excel at detecting the โ€œfaint signalsโ€ of emerging trends. He does so by monitoring a group of รผberinnovators that he dubs the โ€œalpha geeks.โ€ โ€œThe โ€˜alpha geeksโ€™ show us where technology wants to go. Smart companies follow and support their ingenuity rather than trying to suppress it,
  • His own function is that of an intermediaryโ€”someone who ensures that the alpha geeks are heard by the right executives: โ€œThe alpha geeks are often a few years ahead of their time. . . . What we do at Oโ€™Reilly is watch these folks, learn from them, and try to spread the word by writing down (
  • The name of his companyโ€™s blogโ€”Oโ€™Reilly Radarโ€”is meant to position him as an independent intellectual who is simply ahead of his peers in grasping the obvious.
  • โ€œthe skill of writing is to create a context in which other people can thinkโ€
  • As Web 2.0 becomes central to everything, Oโ€™Reillyโ€”the worldโ€™s biggest exporter of crazy talkโ€”is on a mission to provide the appropriate โ€œcontextโ€ to every field.
  • In a fascinating essay published in 2000, Oโ€™Reilly sheds some light on his modus operandi.
  • The thinker who emerges there is very much at odds with the spirit of objectivity that Oโ€™Reilly seeks to cultivate in public
  • meme-engineering lets us organize and shape ideas so that they can be transmitted more effectively, and have the desired effect once they are transmitted
  • Oโ€™Reilly meme-engineers a nice euphemismโ€”โ€œmeme-engineeringโ€โ€”to describe what has previously been known as โ€œpropaganda.โ€
  • how one can meme-engineer a new meaning for โ€œpeer-to-peerโ€ technologiesโ€”traditionally associated with piracyโ€”and make them appear friendly and not at all threatening to the entertainment industry.
  • Oโ€™Reilly and his acolytes โ€œchanged the canonical list of projects that we wanted to hold up as exemplars of the movement,โ€ while also articulating what broader goals the projects on the new list served. He then proceeds to rehash the already familiar narrative: Oโ€™Reilly put the Internet at the center of everything, linking some โ€œfree softwareโ€ projects like Apache or Perl to successful Internet start-ups and services. As a result, the movementโ€™s goal was no longer to produce a completely free, independent, and fully functional operating system but to worship at the altar of the Internet gods.
  • Could it be that Oโ€™Reilly is right in claiming that โ€œopen sourceโ€ has a history that predates 1998?
  • Seen through the prism of meme-engineering, Oโ€™Reillyโ€™s activities look far more sinister.
  • His โ€œcorrespondentsโ€ at Oโ€™Reilly Radar donโ€™t work beats; they work memes and epistemes, constantly reframing important public issues in accordance with the templates prophesied by Oโ€™Reilly.
  • Or take Oโ€™Reillyโ€™s meme-engineering efforts around cyberwarfare.
  • Now, who stands to benefit from โ€œcyberwarfareโ€ being defined more broadly? Could it be those who, like Oโ€™Reilly, canโ€™t currently grab a share of the giant pie that is cybersecurity funding?
  • Frank Luntz lists ten rules of effective communication: simplicity, brevity, credibility, consistency, novelty, sound, aspiration, visualization, questioning, and context.
  • Thus, Oโ€™Reillyโ€™s meme-engineering efforts usually result in โ€œmeme maps,โ€ where the meme to be definedโ€”whether itโ€™s โ€œopen sourceโ€ or โ€œWeb 2.0โ€โ€”is put at the center, while other blob-like terms are drawn as connected to it.
  • The exact nature of these connections is rarely explained in full, but this is all for the better, as the reader might eventually interpret connections with their own agendas in mind. This is why the name of the meme must be as inclusive as possible: you never know who your eventual allies might be. โ€œA big part of meme engineering is giving a name that creates a big tent that a lot of people want to be under, a train that takes a lot of people where they want to go,โ€
  • News April 4 mail date March 29, 2013 Baffler party March 6, 2013 ลฝiลพek on seduction February 13, 2013 More Recent Press Iโ€™ve Seen the Worst Memes of My Generation Destroyed by Madness io9, April 02, 2013 The Bafflerโ€™s New Colors Imprint, March 21, 2013
  • There is considerable continuity across Oโ€™Reillyโ€™s memesโ€”over time, they tend to morph into one another.
Kurt Laitner

Owning Together Is the New Sharing by Nathan Schneider - YES! Magazine - 0 views

  • VC-backed sharing economy companies like Airbnb and Uber have caused trouble for legacy industries, but gone is the illusion that they are doing it with actual sharing
  • Their main contribution to society has been facilitating new kinds of transactions
  • The notion that sharing would do away with the need for owning has been one of the mantras of sharing economy promoters. We could share cars, houses, and labor, trusting in the platforms to provide. But itโ€™s becoming clear that ownership matters as much as ever.
  • ...30 more annotations...
  • Whoever owns the platforms that help us share decides who accumulates wealth from them, and how
  • Lรฉonard and his collaborators are part of a widespread effort to make new kinds of ownership the new norm. There are cooperatives, networks of freelancers, cryptocurrencies, and countless hacks in between. Plans are being made for a driver-owned Lyft, a cooperative version of eBay, and Amazon Mechanical Turk workers are scheming to build a crowdsourcing platform they can run themselves. Each idea has its prospects and shortcomings, but together they aspire toward an economy, and an Internet, that is more fully ours.
  • Jeremy Rifkin, a futurist to CEOs and governments, contends that the Internet-of-things and 3-D printers are ushering in a โ€œ zero marginal cost societyโ€œ in which the โ€œcollaborative commonsโ€ will be more competitive than extractive corporations
  • once the VC-backed sharing companies clear away regulatory hurdles, local co-ops will be poised to swoop in and spread the wealth
  • People are recognizing that doing business differently will require changing who gets to own what.
  • โ€œWeโ€™re moving into a new economic age,โ€ says Marjorie Kelly, who spent two decades at the helm of Business Ethics magazine and now advises social entrepreneurs. โ€œIt needs to be sustainable. It needs to be inclusive. And the foundation of what defines an economic age is its form of ownership.โ€
  • Itโ€™s a worker-owned cooperative that produces open-source software to help people practice consensusโ€”though they prefer the term โ€œcollaborationโ€โ€”about decisions that affect their lives.
  • From the start Loomio was part of Enspiral, an โ€œopen value networkโ€œ of freelancers and social enterprises devoted to mutual support and the common good.
  • a companion tool, CoBudget, to help them allocate resources together
  • The team members recently had to come to terms with the fact that, for the time being, only some of them could be paid for full-time work They called the process โ€œparticipatory downsizing.โ€
  • And they can take many forms. Loomio and other tech companies, for instance, are aspiring toward the model of a multi-stakeholder cooperativeโ€”one in which not just workers or consumers are voting members, but several such groups at once.
  • Loconomics is a San Francisco-based startup designed, like TaskRabbit, to manage short-term freelance jobs
  • โ€œPeople who have been without for a long time,โ€ she says, โ€œoften operate with a mindset that they canโ€™t share what they have, because they donโ€™t know when that resource will come along again.โ€
  • As Loconomics prepares to begin operations this winter, itโ€™s running out of the pocket of the founder, Josh Danielson
  • The ambition of a cooperative Facebook or Uberโ€”competitive, widespread, and owned by its communityโ€”still seems out of reach for enterprises not willing to sell large parts of themselves to investors. Organizations like 
  • His fellow OuiShare founder Benjamin Tincq is concerned that too much fixation on a particular model will make it hard for well-meaning ventures to be successful. โ€œI like the idea that we donโ€™t need to have a specific legal status,โ€ he says. โ€œItโ€™s more about hacking an existing legal status and making these hacks work.โ€
  • Fentonโ€™s new undertaking, Sovolve, proposes to โ€œcreate innovative solutions to accelerate social change,โ€ much as CouchSurfing did, but itโ€™s doing the innovating cautiously. All work is done by worker-owners located around the world. Sovolve uses an internal platformโ€”soon to become a product in its own rightโ€”through which contributors decide how much they want to be paid in cash and how much in equity. They can see how much others are earning. Their virtual workplace is gamified, with everyone working to nudge their first product, WonderApp, into virality
  • Loomioโ€™s members use a similar system, which they call Loomio Points. But Sovolve is no cooperative; contributors are not in charge.
  • Open-source software and share-alike licenses have revived the ancient idea of the commons for an Internet age. But the โ€œ commons-based peer productionโ€œ that Sensorica seeks to practice doesnโ€™t arise overnight. Just as todayโ€™s business culture rests on generations of accumulated law, habit, and training, learning to manage a commons successfully takes time
  • It makes possible decentralized autonomous organizations, or DAOs, which exist entirely on a shared network
  • The most ambitious successor to Bitcoin, Ethereum, has raised more than $15 million in crowdfunding on the promise of creating such a network.
  • all with technology that makes collective ownership a lot easier than a conventional legal structure
  • A project called Eris is developing a collective decision-making tool designed to govern DAOs on Ethereum, though the platform may still be months from release.
  • For now, the burden of reinventing every wheel at once makes it hard for companies like Sensorica and Loomio to compete
  • For instance, Cutting Edge Capital specializes in helping companies raise money through a long-standing mechanism called the direct public investment, or DPO, which allows for small, non-accredited investors.
  • Venture funding may be in competition with Dietzโ€™s cryptoequity vision, but it provides a fearsome head start
  • Co-ops help ensure that the people who contribute to and depend on an enterprise keep control and keep profits, so theyโ€™re a possible remedy for worsening economic inequality
  • Sooner or later, transforming a system of gross inequality and concentrated wealth will require more than isolated experiments at the fringesโ€”it will require capturing that wealth and redirecting its flows
  • A less consensual strategy was employed to fund the Catalan Integral Cooperative in Spain; over the course of a few years, one activist borrowed around $600,000 from Spanish banks without paying any of it back.
  • In Jackson, Mississippi, Chokwe Lumumba was elected mayor in 2013 on a platform of fostering worker-owned cooperatives, although much of the momentum was lost when Lumumba died just a few months later.
Tiberius Brastaviceanu

What is an ontology and why we need it - 1 views

  • an ontology designer makes these decisions based on the structural properties of a class.
  • an ontology is a formal explicit description of concepts in a domain of discourse (classes (sometimes called concepts)), properties of each concept describing various features and attributes of the concept (slots (sometimes called roles or properties)), and restrictions on slots (facets (sometimes called role restrictions)). An ontology together with a set of individual instances of classes constitutes a knowledge base. In reality, there is a fine line where the ontology ends and the knowledge base begins.
  • Classes describe concepts in the domain
  • ...16 more annotations...
  • A class can have subclasses that represent concepts that are more specific than the superclass.
  • Here we discuss general issues to consider and offer one possible process for developing an ontology. We describe an iterative approach to ontology development: we start with a rough first pass at the ontology. We then revise and refine the evolving ontology and fill in the details. Along the way, we discuss the modeling decisions that a designer needs to make, as well as the pros, cons, and implications of different solutions.
  • In practical terms, developing an ontology includes: ๏ฟฝ         defining classes in the ontology, ๏ฟฝ         arranging the classes in a taxonomic (subclassโ€“superclass) hierarchy, ๏ฟฝ         defining slots and describing allowed values for these slots, ๏ฟฝ         filling in the values for slots for instances.
  • We can then create a knowledge base by defining individual instances of these classes filling in specific slot value information and additional slot restrictions.
  • Slots describe properties of classes and instances:
  • some fundamental rules in ontology design
  • There is no one correct way to model a domainโ€” there are always viable alternatives. The best solution almost always depends on the application that you have in mind and the extensions that you anticipate. 2)      Ontology development is necessarily an iterative process. 3)      Concepts in the ontology should be close to objects (physical or logical) and relationships in your domain of interest. These are most likely to be nouns (objects) or verbs (relationships) in sentences that describe your domain.
  • how detailed or general the ontology is going to be
  • what we are going to use the ontology for
  • concepts in the ontology must reflect this reality
  • We suggest starting the development of an ontology by defining its domain and scope. That is, answer several basic questions: ๏ฟฝ         What is the domain that the ontology will cover? ๏ฟฝ         For what  we are going to use the ontology? ๏ฟฝ         For what types of questions the information in the ontology should provide answers? ๏ฟฝ         Who will use and maintain the ontology?
  • plan to use
  • domain
  • If the people who will maintain the ontology describe the domain in a language that is different from the language of the ontology users, we may need to provide the mapping between the languages.
  • One of the ways to determine the scope of the ontology is to sketch a list of questions that a knowledge base based on the ontology should be able to answer, competency questions
  • These competency questions are just a sketch and do not need to be exhaustive.
Kurt Laitner

Goodbye, Dilbert: 'The Rise of the Naked Economy' ยป Knowledge@Wharton - 2 views

  • โ€œteamingโ€: bringing together a team of professionals for a specific task
  • The old cubicle-based, static company is increasingly being replaced by a more fluid and mobile model: โ€œthe constant assembly, disassembly, and reassembly of people, talent, and ideas around a range of challenges and opportunities.โ€
  • Therefore, the new economy and its โ€œseminomadic workforceโ€ will require โ€œnew places to gather, work, live, and interact.โ€
  • ...17 more annotations...
  • The consumer electronics company Plantronics, for example, knowing that on any given day 40% of its workforce will be working elsewhere, designed its corporate campus to only 60% capacity
  • Their joint enterprise, NextSpace, became their first venture into what they call โ€œcoworking,โ€ or the creation of โ€œshared collaborative workspaces.โ€
  • also nurtures what the authors call โ€œmanaged serendipityโ€ โ€” ad hoc collaboration between people with diverging but complementary skills
  • the number of coworking spaces worldwide has shot up from 30 in 2006 to 1,130 in 2011
  • someone needs to keep an eye on the big picture, to โ€œconnect the dots.โ€
  • workspaces are designed on a flexible, on-demand and as-needed basis
  • Coonerty and Neuner found that the most productive collaborations tended to pair highly specialized experts with big-picture thinkers
  • they were struck by the number of entrepreneurs and freelancers working at coffee shops in the area
  • Business Talent Group
  • Clients get the specialized help they need at a cost below that of a full-time employee or traditional consulting firm, and specialists are well compensated and rewarded with flexible schedules and a greater degree of choice about which projects to take.
  • This has produced a new market dynamic in which the headhunter of yesteryear has been replaced by โ€œtalent brokersโ€ who connect highly specialized talent with companies on a project-by-project basis
  • Matthew Mullenweg, doesnโ€™t have much faith in traditional office buildings or corporate campuses: โ€œI would argue that most offices are full of people not working.โ€
  • On the other hand, Mullenweg is a big believer in face-to-face collaboration and brainstorming, and flies his teams all over the globe to do so.
  • He also set up an informal workspace in San Francisco called the Lounge
  • Additionally, a 2010 Kauffman-Rand study worried that employer-based health insurance, by discouraging risk-taking, will be an ongoing drag on entrepreneurship
  • the problem of payroll taxes for freelancers
  • up to 44% of independent workers encounter difficulty getting paid fully for their work
Kurt Laitner

Call for Papers: Defining the Spatiality of Co-Creation, Collaboration and Peer Product... - 0 views

  •  
    Another way to reuse work on the industry canada paper this one due Feb 10 in abstract, not sure of the process from there
Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • script that you want to run every day at a specific time
  • script that should run after a user submits a data-collection form.
  • Google Apps Script provides simple event handlers and installable event handlers, which are easy ways for you to specify functions to run at a particular time or in response to an event.
  • ...39 more annotations...
  • let's consider the terminology we use for events
  • event triggers
  • triggers
  • in response
  • event handler
  • event
  • onInstall function
  • onOpen function.
  • onEdit function
  • the simple event handlers are restricted in what they are permitted to do:
  • The spreadsheet containing the script must be opened for editing
  • cannot determine the current user
  • cannot access any services that require authentication as that user
  • Calendar, Mail and Site are not anonymous and the simple event handlers cannot access those services.
  • can only modify the current spreadsheet. Access to other spreadsheets is forbidden.
  • see Understanding Permissions and Script Execution.
  • The onOpen function runs automatically when a user opens a spreadsheet.
  • add custom menu items to the spreadsheet's menu bar.
  • onEdit function runs automatically when any cell of the spreadsheet is edited.
  • record the last modified time in a comment on the cell that was edited.
  • The onInstall function is called when a script is installed from the Script Gallery.
  • setting up custom menus for the user.
  • the script can call onOpen from onInstall.
  • Installable event handlers are set on the Triggers menu within the Script Editor, and they're called triggers in this document.
  • When a specific time is reached
  • When a form is submitted
  • When a Spreadsheet is edited
  • When a Spreadsheet is opened.
  • They can potentially access all services available to the user who installed the handler.
  • are fully-capable scripts with none of the access limitations of simple event handlers
  • may not be able to determine which user triggered the event being handled
  • The spreadsheet containing the script does not have to be open for the event to be triggered and the script to run.
  • You can connect triggers to one or more functions in a script. Any function can have multiple triggers attached. In addition, you can add trigger attributes to a function to further refine how the trigger behaves.
  • When a script runs because of a trigger, the script runs using the identity of the person who installed the trigger, not the identity of the user whose action triggered the event. This is for security reasons.
  • Installing an event handler may prompt for authorization to access
  • An event is passed to every event handler as the argument (e). You can add attributes to the (e) argument that further define how the trigger works or that capture information about how the script was triggered.
  • an example of a function that sends email to a designated individual containing information captured by a Spreadsheet when a form is submitted.
  • With Google Apps, forms have the option to automatically record the submitter's username, and this is available to the script as e.namedValues["Username"]. Note: e.namedValues are only available for Google Apps domains and not for consumer Google accounts.
  • The available attributes for triggers are described in the following tables.
  •  
    script that you want to run every day at a specific time
faly77

[ Fondation Louis Bonduelle - Call for participatory research on plant-based food | Res... - 0 views

  •  
    Passed. Keep an eye on 2022 call for proposal.
Tiberius Brastaviceanu

Partner State - P2P Foundation - 0 views

    • Tiberius Brastaviceanu
       
      we call this a custodian
    • Tiberius Brastaviceanu
       
      we call this a custodian
  • So here we have it, the new triarchy: - The state, with its public property and representative mechanisms of governance (in the best scenario) - The private sector, with the corporation and private property - The commons, with the Trust (or the for-benefit association), and which is the โ€˜propertyโ€™ of all its members (not the right word in the context of the commons, since it has a different philosophy of ownership)
    • Tiberius Brastaviceanu
       
      so where is direct democracy in all this?
  • ...39 more annotations...
  • In a first phase, the commons simply emerges as an added alternative.
  • becoming a subsector of society, and starts influencing the whole
  • phase transition and transformation will need to occur.
  • how a commons-dominated, i.e. after the phase transition, society would look like.
  • At its core would be a collection of commons, represented by trusts and for-benefit associations, which protect their common assets for the benefit of present and future generations
  • The commons โ€˜rents outโ€™ the use of its resources to entrepreneurs. In other words, business still exists, though infinite growth-based capitalism does not.
  • More likely is that the corporate forms will be influenced by the commons and that profit will be subsumed to other goals, that are congruent with the maintenance of the commons.
  • The state will still exist, but will have a radically different nature
  • Much of its functions will have been taken over by commons institutions, but since these institutions care primarily about their commons, and not the general common good, we will still need public authorities that are the guarantor of the system as a whole, and can regulate the various commons, and protect the commoners against possible abuses. So in our scenario, the state does not disappear, but is transformed, though it may greatly diminish in scope, and with its remaining functions thoroughly democratized and based on citizen participation.
  • In our vision, it is civil-society based peer production, through the Commons, which is the guarantor of value creation by the private sector, and the role of the state, as Partner State, is to enable and empower the creation of common value. The new peer to peer state then, though some may see that as a contradictio in terminis, is a state which is subsumed under the Commons, just as it is now under the private sector. Such a peer to peer state, if we are correct, will have a much more modest role than the state under a classic state society, with many of its functions taken over by civil society associations, interlinked in processes of global governance. The above then, this triarchy, is the institutional core which replaces the dual private-public binary system that is characteristic of the capitalist system that is presently the dominant format.
  • fundamental mission is to empower direct social-value creation, and to focus on the protection of the Commons sphere as well as on the promotion of sustainable models of entrepreneurship and participatory politics
  • the state becomes a 'partner state' and enables autonomous social production.
  • the state does exist, and I believe that we canโ€™t just imagine that we live in a future state-less society
  • retreating from the binary state/privatization dilemma to the triarchical choice of an optimal mix amongst government regulation, private-market freedom and autonomous civil-society projects
  • the role of the state
  • โ€œthe peer production of common value requires civic wealth and strong civic institutions.
  • trigger the production/construction of new commons by - (co-) management of complexe resource systems which are not limited to local boundaries or specific communities (as manager and partner) - survey of rules (chartas) to care for the commons (mediator or judge) - kicking of or providing incentives for commoners governing their commons - here the point is to design intelligent rules which automatically protect the commons, like the GPL does (facilitator)"
  • the emergence of the digital commons. It is the experience of creating knowledge, culture, software and design commons, by a combination of voluntary contributions, entrepreneurial coalitions and infrastructure-protecting for-benefit associations, that has most tangibly re-introduced the idea of commons, for all to use without discrimination, and where all can contribute. It has drastically reduced the production, distribution, transaction and coordination costs for the immaterial value that is at the core also of all what we produce physically, since that needs to be made, needs to be designed. It has re-introduced communing as a mainstream experience for at least one billion internet users, and has come with proven benefits and robustness that has outcompeted and outcooperated its private rivals. It also of course offers new ways to re-imagine, create and protect physical commons.
  • stop enclosures
  • peer to peer, i.e. the ability to freely associate with others around the creation of common value
  • communal shareholding, i.e. the non-reciprocal exchange of an individual with a totality. It is totality that we call the commons.
  • It is customary to divide society into three sectors, and what we want to show is how the new peer to peer dynamic unleashed by networked infrastructures, changes the inter-relationship between these three sectors.
  • In the current โ€˜cognitive capitalistโ€™ system, it is the private sector consisting of enterprises and businesses which is the primary factor, and it is engaged in competitive capital accumulation. The state is entrusted with the protection of this process. Though civil society, through the citizen, is in theory โ€˜sovereignโ€™, and chooses the state; in practice, both civil society and the state are under the domination of the private sector.
  • it fulfills three contradictory functions
  • Of course, this is not to say that the state is a mere tool of private business.
  • protect the whole system, under the domination of private business
  • protector of civil society, depending on the balance of power and achievements of social movements
  • protector of its own independent interests
  • Under fascism, the state achieves great independence from the private sector , which may become subservient to the state. Under the welfare state, the state becomes a protector of the social balance of power and manages the achievements of the social movement; and finally, under the neoliberal corporate welfare state, or โ€˜market stateโ€™, it serves most directly the interests of the financial sector.
  • key institutions and forms of property.
  • The state managed a public sector, under its own property.
  • The private sector , under a regime of private ownership, is geared to profit, discounts social and natural externalities, both positive and negative, and uses its dominance in society to use and dominate the state.
  • civil society has a relative power as well, through its capability of creating social movements and associations
  • Capitalism has historically been a pendulum between the private and the public sector
  • However, this configuration is changing,
  • the endangerment of the biosphere through the workings of โ€˜selfishโ€™ market players; the second is the role of the new digital commons.
  • participatory politics
  • Peer production gives us an advance picture of how a commons-oriented society would look like. At its core is a commons and a community contributing to it, either voluntarily, or as paid entrepreneurial employees. It does this through collaborative platforms using open standards. Around the commons emerges enterprises that create added value to operate on the marketplace, but also help the maintenance and the expansion of the commons they rely on. A third partner are the for-benefit associations that maintain the infrastructure of cooperation. Public authorities could play a role if they wanted to support existing commons or the creation of new commons, for the value they bring to society.
  • if a commons is not created as in the case of the digital commons, it is something that is inherited from nature or former generations, given in trust and usufruct, so that it can be transmitted to our descendents. The proper institution for such commons is therefore the trust, which is a corporate form that cannot touch its principal capital, but has to maintain it.
Tiberius Brastaviceanu

Access control - Wikipedia, the free encyclopedia - 0 views

  • The act of accessing may mean consuming, entering, or using.
  • Permission to access a resource is called authorization.
  • Locks and login credentials are two analogous mechanisms of access control.
  • ...26 more annotations...
  • Geographical access control may be enforced by personnel (e.g., border guard, bouncer, ticket checker)
  • n alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country
  • access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons
  • can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap.
  • Physical access control is a matter of who, where, and when
  • Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.[citation needed] Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked
  • Credential
  • Access control system operation
  • The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input
  • There are three types (factors) of authenticating information:[2] something the user knows, e.g. a password, pass-phrase or PIN something the user has, such as smart card or a key fob something the user is, such as fingerprint, verified by biometric measurement
  • Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios
  • When a credential is presented to a reader, the reader sends the credentialโ€™s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked.
  • A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a biometric feature) or some combination of these items. This is known as multi-factor authentication. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.
  • An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list
  • monitor the door position
  • Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the doo
  • Access control topology
  • Access control decisions are made by comparing the credential to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the look-up out from a central host to the edge of the system, or the reader. The predominant topology circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks
  • Access control readers may be classified by the functions they are able to perform
  • and forward it to a control panel.
  • Basic (non-intelligent) readers: simply read
  • Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus.
  • Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers.
  • Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host
  • a built in webservice to make it user friendly
  • Some readers may have additional features such as an LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support
Steve Bosserman

When Cities Run Themselves | WOUB - 0 views

  •  
    Machines talking to machines No doubt that the Olympics will have a profound effect in shaping London's future. By the time the Games begin, for instance, it will have Europe's largest free WiFi zone, with the city's iconic red phone booths converted, fittingly, into hotspots. But another opportunity London landed earlier this month could have just as much impact, perhaps more. A company called Living PlanIt announced that it will begin testing its "Urban Operating System" in the Greenwich section of the city. What does that mean? Put simply, London would have its own operating system, much as your PC runs on Windows or your Mac runs on Apple's IOS. This ties into the latest hot buzz phrase, "the internet of things," which describes a world where machines talk to other machines. No human interaction required. So, for a city, this means sensors in buildings would connect to sensors in water treatment plants which would connect to sensors in stoplights. It would be one gigantic, computerized urban nervous system, which a lot of experts think is the only way cities can survive a future when they'll contain more than two out of every three people on Earth. Based on what sensors reveal about the location and movement of humans in a section of a city, for instance, buildings will automatically adjust their temperatures, streetlights will dim or brighten, water flow will increase or slow. Or, in the event of a disaster, emergency services would have real-time access to traffic data, trauma unit availability, building blueprints. And soon enough, our smart phones will be able to tap in to the Urban OS. So will our household appliances. This is not some 21st century analogue of the personal jet pack. The Urban OS is the driving force behind a smart city being built from the ground up in northern Portugal. Construction is scheduled to be completed in three years; eventually it will have about 150,000 residents. It will also have more than 100 million sen
Tiberius Brastaviceanu

Tibi's CASZH T10 quad core MTK6589 GPS 3G WCDMA/2G GSM SIM Card Slot Phone call Androi... - 0 views

  •  
    This is the one that I ordered, waiting to receive it to provide feedback. quad core MTK6589 GPS 3G WCDMA/2G GSM SIM Card Slot Phone call Android 4.2 IPS 10.1 inch Capacitive Tablet PC-in Tablet PROBLEMS I had some problems with the power jack, it breaks very easily. I repaired it myself. After, the screen started to have problems, insensitive stripes. After, I dropped the tablet and it chipped the screen a bit and the screen became totally unresponsive. POSITIVE POINTS light weight, works well, battery/autonomy OK NEGATIVE COMMENTS No flash for pictures/videos No magnetic compass, no orientation sensors, but it has an accelerometer.
Francois Bergeron

Poly(methyl methacrylate) - Wikipedia, the free encyclopedia - 0 views

  • Names PMMA has been sold under a variety of brand names and generic names. It is often generically called acrylic glass,[6] although it is chemically unrelated to glass. It is sometimes called simply acrylic, although acrylic can also refer to other polymers or copolymers containing polyacrylonitrile. Other notable trade names include: Plexiglas
  • Acrylic paint essentially consists of PMMA suspended in water; however since PMMA is hydrophobic, a substance with both hydrophobic and hydrophilic groups needs to be added to facilitate the suspension.
  • Plastic optical fiber used for short distance communication is made from PMMA, and perfluorinated PMMA, clad with fluorinated PMMA, in situations where its flexibility and cheaper installation costs outweigh its poor heat tolerance and higher attenuation over glass fiber.
1 - 20 of 51 Next › Last »
Showing 20 items per page