Skip to main content

Home/ Sensorica Knowledge/ Group items tagged car

Rss Feed Group items tagged

Kurt Laitner

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
Francois Bergeron

Stroke your car seat to pump up the volume - tech - 09 January 2012 - New Scientist - 0 views

  • In essence we are trying to reproduce the smartphone experience in textile form," says researcher Maksim Skorobogatiy of the Polytechnic School in Montreal, Canada. "We are looking for applications where we can weave in sleek, non-invasive control, avoiding blocks of push buttons."
Tiberius Brastaviceanu

Welcome to the new reputation economy (Wired UK) - 1 views

  • banks take into account your online reputation alongside traditional credit ratings to determine your loan
  • headhunters hire you based on the expertise you've demonstrated on online forums
  • reputation data becomes the window into how we behave, what motivates us, how our peers view us and ultimately whether we can or can't be trusted.
  • ...37 more annotations...
  • At the heart of Movenbank is a concept call CRED.
  • The difference today is our ability to capture data from across an array of digital services. With every trade we make, comment we leave, person we "friend", spammer we flag or badge we earn, we leave a trail of how well we can or can't be trusted.
  • An aggregated online reputation having a real-world value holds enormous potential
  • peer-to-peer marketplaces, where a high degree of trust is required between strangers; and where a traditional approach based on disjointed information sources is currently inefficient, such as recruiting.
  • opportunity to reinvent the way people found jobs through online reputation
  • "It's not about your credit, but your credibility," King says.
  • But this wealth of data raises an important question -- who owns our reputation? Shouldn't our hard-earned online status be portable? If you're a SuperHost on Airbnb, shouldn't you be able to use that reputation to, say, get a loan, or start selling on Etsy?
  • "People are currently underusing their networks and reputation," King says. "I want to help people to understand and build their influence and reputation, and think of it as capital they can put to good use."
  • Social scientists have long been trying to quantify the value of reputation.
  • Using functional magnetic resonance imaging, the researchers monitored brain activity
  • "The implication of our study is that different types of reward are coded by the same currency system." In other words, our brains neurologically compute personal reputation to be as valuable as money.
  • Personal reputation has been a means of making socioeconomic decisions for thousands of years. The difference today is that network technologies are digitally enabling the trust we used to experience face-to-face -- meaning that interactions and exchanges are taking place between total strangers.
  • Trust and reputation become acutely important in peer-to-peer marketplaces such as WhipCar and Airbnb, where members are taking a risk renting out their cars or their homes.
  • When you are trading peer-to-peer, you can't count on traditional credit scores. A different measurement is needed. Reputation fills this gap because it's the ultimate output of how much a community trusts you.
  • Welcome to the reputation economy, where your online history becomes more powerful than your credit history.
  • Presently, reputation data doesn't transfer between verticals.
  • A wave of startups, including Connect.Me, TrustCloud, TrustRank, Legit and WhyTrusted, are trying to solve this problem by designing systems that correlate reputation data. By building a system based on "reputation API" -- a combination of a user's activity, ratings and reviews across sites -- Legit is working to build a service that gives users a score from zero to 100. In trying to create a universal metric for a person's trustworthiness, they are trying to "become the credit system of the sharing economy", says Jeremy Barton, the 27-year-old San Francisco-based cofounder of Legit.
  • His company, and other reputation ventures, face some big challenges if they are to become, effectively, the PayPal of trust. The most obvious is coming up with algorithms that can't be easily gamed or polluted by trolls. And then there's the critical hurdle of convincing online marketplaces not just to open up their reputation vaults, but create a standardised format for how they frame and collect reputation data. "We think companies will share reputation data for the same reasons banks give credit data to credit bureaux," says Rob Boyle, Legit cofounder and CTO. "It is beneficial for one company to give up their slice of reputation data if in return they get access to the bigger picture: aggregated data from other companies."
  • PeerIndex, Kred and Klout,
  • are measuring social influence, not reputation. "Influence measures your ability to drag someone into action,"
  • "Reputation is an indicator of whether a person is good or bad and, ultimately, are they trustworthy?"
  • Early influence and reputation aggregators will undoubtedly learn by trial and error -- but they will also face the significant challenge of pioneering the use of reputation data in a responsible way. And there's a challenge beyond that: reputation is largely contextual, so it's tricky to transport it to other situations.
  • Many of the ventures starting to make strides in the reputation economy are measuring different dimensions of reputation.
  • reputation is a measure of knowledge
  • a measure of trust
  • a measure of propensity to pay
  • measure of influence
  • Reputation capital is not about combining a selection of different measures into a single number -- people are too nuanced and complex to be distilled into single digits or binary ratings.
  • It's the culmination of many layers of reputation you build in different places that genuinely reflect who you are as a person and figuring out exactly how that carries value in a variety of contexts.
  • The most basic level is verification of your true identity
  • reliability and helpfulness
  • do what we say we are going to do
  • respect another person's property
  • trusted to pay on time
  • we will be able to perform a Google- or Facebook-like search and see a picture of a person's behaviour in many different contexts, over a length of time. Slivers of data that have until now lived in secluded isolation online will be available in one place. Answers on Quora, reviews on TripAdvisor, comments on Amazon, feedback on Airbnb, videos posted on YouTube, social groups joined, or presentations on SlideShare; as well as a history and real-time stream of who has trusted you, when, where and why. The whole package will come together in your personal reputation dashboard, painting a comprehensive, definitive picture of your intentions, capabilities and values.
  • idea of global reputation
  • By the end of the decade, a good online reputation could be the most valuable currency in your possession.
Francois Bergeron

AUTOMOTIVE FIBER: Plastic optical fiber builds on MOST success - Laser Focus World - 0 views

  • Bending the fiber in one direction leads to a better transmission whereas bending in the other direction leads to a lower transmission, compared to the straight position.
  • Plastic optical fiber can also be used for seat-occupancy recognition
  • One approach for seat-occupancy recognition is the Kinotex cavity sensor from Canpolar East (St. John’s, NF, Canada).
  • ...1 more annotation...
  • Many consumers are probably aware of the use of tactile sensors that can stop a car window if an object is in the way. While many of these sensors are nonoptical, the evanescent field of an optical fiber can also be exploited in this application.
Kurt Laitner

On the Phenomenon of Bullshit Jobs - STRIKE! - 1 views

  • financial services or telemarketing, or the unprecedented expansion of sectors like corporate law, academic and health administration, human resources, and public relations
  • provide administrative, technical, or security support for these industries, or for that matter the whole host of ancillary industries (dog-washers, all-night pizza deliverymen) that only exist because everyone else is spending so much of their time working in all the other ones
  • It’s as if someone were out there making up pointless jobs just for the sake of keeping us all working. And here, precisely, lies the mystery. In capitalism, this is exactly what is not supposed to happen
  • ...23 more annotations...
  • Sure, in the old inefficient socialist states like the Soviet Union, where employment was considered both a right and a sacred duty, the system made up as many jobs as they had to (this is why in Soviet department stores it took three clerks to sell a piece of meat)
  • working 40 or even 50 hour weeks on paper, but effectively working 15 hours just as Keynes predicted, since the rest of their time is spent organising or attending motivational seminars
  • The ruling class has figured out that a happy and productive population with free time on their hands is a mortal danger
  • The answer clearly isn’t economic: it’s moral and political
  • And, on the other hand, the feeling that work is a moral value in itself, and that anyone not willing to submit themselves to some kind of intense work discipline for most of their waking hours deserves nothing, is extraordinarily convenient for them
  • Hell is a collection of individuals who are spending the bulk of their time working on a task they don’t like and are not especially good at
  • they all become so obsessed with resentment at the thought that some of their co-workers might be spending more time making cabinets
  • It’s not entirely clear how humanity would suffer were all private equity CEOs, lobbyists, PR researchers, actuaries, telemarketers, bailiffs or legal consultants to similarly vanish. (Many suspect it might markedly improve.)
  • plagued with debts and a newborn daughter, ended up, as he put it, “taking the default choice of so many directionless folk: law school
  • Now he’s a corporate lawyer working in a prominent New York firm. He was the first to admit that his job was utterly meaningless, contributed nothing to the world, and, in his own estimation, should not really exist
  • I would not presume to tell someone who is convinced they are making a meaningful contribution to the world that, really, they are not. But what about those people who are themselves convinced their jobs are meaningless?
  • (Answer: if 1% of the population controls most of the disposable wealth, what we call “the market” reflects what they think is useful or important, not anybody else.)
  • should you meet them at parties and admit that you do something that might be considered interesting (an anthropologist, for example), will want to avoid even discussing their line of work entirely
  • This is a profound psychological violence here. How can one even begin to speak of dignity in labour when one secretly feels one’s job should not exist?
  • Yet it is the peculiar genius of our society that its rulers have figured out a way, as in the case of the fish-fryers, to ensure that rage is directed precisely against those who actually do get to do meaningful work
  • in our society, there seems a general rule that, the more obviously one’s work benefits other people, the less one is likely to be paid for it
  • There’s a lot of questions one could ask here, starting with, what does it say about our society that it seems to generate an extremely limited demand for talented poet-musicians, but an apparently infinite demand for specialists in corporate law?
  • Even more perverse, there seems to be a broad sense that this is the way things should b
  • You can see it when tabloids whip up resentment against tube workers for paralysing London during contract disputes: the very fact that tube workers can paralyse London shows that their work is actually necessary, but this seems to be precisely what annoys people
  • It’s even clearer in the US, where Republicans have had remarkable success mobilizing resentment against school teachers, or auto workers (and not, significantly, against the school administrators or auto industry managers who actually cause the problems)
  • It’s as if they are being told “but you get to teach children! Or make cars! You get to have real jobs! And on top of that you have the nerve to also expect middle-class pensions and health care?”
  • If someone had designed a work regime perfectly suited to maintaining the power of finance capital, it’s hard to see how they could have done a better job
  • The remainder are divided between a terrorised stratum of the – universally reviled – unemployed and a larger stratum who are basically paid to do nothing, in positions designed to make them identify with the perspectives and sensibilities of the ruling class (managers, administrators, etc) – and particularly its financial avatars – but, at the same time, foster a simmering resentment against anyone whose work has clear and undeniable social value
Tiberius Brastaviceanu

Blood pressure (BP) measurements with fiber optic pressure sensor. Systolic blood press... - 3 views

  •  
    Another pressure sensor similar to the one FISO sells. Uses a membrane to sent the light back. 
  •  
    this swedish company started to manufacture engine compression control sensors for Volvo cars...
Kurt Laitner

Owning Together Is the New Sharing by Nathan Schneider - YES! Magazine - 0 views

  • VC-backed sharing economy companies like Airbnb and Uber have caused trouble for legacy industries, but gone is the illusion that they are doing it with actual sharing
  • Their main contribution to society has been facilitating new kinds of transactions
  • The notion that sharing would do away with the need for owning has been one of the mantras of sharing economy promoters. We could share cars, houses, and labor, trusting in the platforms to provide. But it’s becoming clear that ownership matters as much as ever.
  • ...30 more annotations...
  • Whoever owns the platforms that help us share decides who accumulates wealth from them, and how
  • Léonard and his collaborators are part of a widespread effort to make new kinds of ownership the new norm. There are cooperatives, networks of freelancers, cryptocurrencies, and countless hacks in between. Plans are being made for a driver-owned Lyft, a cooperative version of eBay, and Amazon Mechanical Turk workers are scheming to build a crowdsourcing platform they can run themselves. Each idea has its prospects and shortcomings, but together they aspire toward an economy, and an Internet, that is more fully ours.
  • Jeremy Rifkin, a futurist to CEOs and governments, contends that the Internet-of-things and 3-D printers are ushering in a “ zero marginal cost society“ in which the “collaborative commons” will be more competitive than extractive corporations
  • once the VC-backed sharing companies clear away regulatory hurdles, local co-ops will be poised to swoop in and spread the wealth
  • People are recognizing that doing business differently will require changing who gets to own what.
  • “We’re moving into a new economic age,” says Marjorie Kelly, who spent two decades at the helm of Business Ethics magazine and now advises social entrepreneurs. “It needs to be sustainable. It needs to be inclusive. And the foundation of what defines an economic age is its form of ownership.”
  • It’s a worker-owned cooperative that produces open-source software to help people practice consensus—though they prefer the term “collaboration”—about decisions that affect their lives.
  • From the start Loomio was part of Enspiral, an “open value network“ of freelancers and social enterprises devoted to mutual support and the common good.
  • a companion tool, CoBudget, to help them allocate resources together
  • The team members recently had to come to terms with the fact that, for the time being, only some of them could be paid for full-time work They called the process “participatory downsizing.”
  • And they can take many forms. Loomio and other tech companies, for instance, are aspiring toward the model of a multi-stakeholder cooperative—one in which not just workers or consumers are voting members, but several such groups at once.
  • Loconomics is a San Francisco-based startup designed, like TaskRabbit, to manage short-term freelance jobs
  • “People who have been without for a long time,” she says, “often operate with a mindset that they can’t share what they have, because they don’t know when that resource will come along again.”
  • As Loconomics prepares to begin operations this winter, it’s running out of the pocket of the founder, Josh Danielson
  • The ambition of a cooperative Facebook or Uber—competitive, widespread, and owned by its community—still seems out of reach for enterprises not willing to sell large parts of themselves to investors. Organizations like 
  • His fellow OuiShare founder Benjamin Tincq is concerned that too much fixation on a particular model will make it hard for well-meaning ventures to be successful. “I like the idea that we don’t need to have a specific legal status,” he says. “It’s more about hacking an existing legal status and making these hacks work.”
  • Fenton’s new undertaking, Sovolve, proposes to “create innovative solutions to accelerate social change,” much as CouchSurfing did, but it’s doing the innovating cautiously. All work is done by worker-owners located around the world. Sovolve uses an internal platform—soon to become a product in its own right—through which contributors decide how much they want to be paid in cash and how much in equity. They can see how much others are earning. Their virtual workplace is gamified, with everyone working to nudge their first product, WonderApp, into virality
  • Loomio’s members use a similar system, which they call Loomio Points. But Sovolve is no cooperative; contributors are not in charge.
  • Open-source software and share-alike licenses have revived the ancient idea of the commons for an Internet age. But the “ commons-based peer production“ that Sensorica seeks to practice doesn’t arise overnight. Just as today’s business culture rests on generations of accumulated law, habit, and training, learning to manage a commons successfully takes time
  • It makes possible decentralized autonomous organizations, or DAOs, which exist entirely on a shared network
  • The most ambitious successor to Bitcoin, Ethereum, has raised more than $15 million in crowdfunding on the promise of creating such a network.
  • all with technology that makes collective ownership a lot easier than a conventional legal structure
  • A project called Eris is developing a collective decision-making tool designed to govern DAOs on Ethereum, though the platform may still be months from release.
  • For now, the burden of reinventing every wheel at once makes it hard for companies like Sensorica and Loomio to compete
  • For instance, Cutting Edge Capital specializes in helping companies raise money through a long-standing mechanism called the direct public investment, or DPO, which allows for small, non-accredited investors.
  • Venture funding may be in competition with Dietz’s cryptoequity vision, but it provides a fearsome head start
  • Co-ops help ensure that the people who contribute to and depend on an enterprise keep control and keep profits, so they’re a possible remedy for worsening economic inequality
  • Sooner or later, transforming a system of gross inequality and concentrated wealth will require more than isolated experiments at the fringes—it will require capturing that wealth and redirecting its flows
  • A less consensual strategy was employed to fund the Catalan Integral Cooperative in Spain; over the course of a few years, one activist borrowed around $600,000 from Spanish banks without paying any of it back.
  • In Jackson, Mississippi, Chokwe Lumumba was elected mayor in 2013 on a platform of fostering worker-owned cooperatives, although much of the momentum was lost when Lumumba died just a few months later.
Tiberius Brastaviceanu

Co-Creating as Disruption to the Dominant Cultural Framework » Wirearchy - 0 views

  • more open people processes
  • Participative processes like Open Space, World Cafes, Unconferences, Peer Circles
  • Barcamps, Wordcamps, Govcamps, Foo Camps, Unconferences, high-end celebrity-and-marketing-and venture-capital ‘experience’ markets, new cultural and artistic festivals with technology-and-culture-making themes
  • ...45 more annotations...
  • maker faires
  • community-and-consensus building, organizing for activism and fundraising
  • The impetus behind this explosion is both technological and sociological
  • Technological
  • information technology and the creation and evolution of the Internet and the Web
  • appearance, development and evolution of social tools, web services, massive storage, and the ongoing development of computer-and-smart-devices development
  • Sociological
  • People are searching for ways to find others with similar interests and motivations so that they can engage in activities that help them learn, find work, grow capabilities and skills, and tackle vexing social and economic problems
  • get informed and take action
  • Developing familiarity and practice with open and collaborative processes
  • play and work together
  • rules about self-management, operate democratically, and produce results grounded in ownership and the responsibilities that have been agreed upon by the ‘community’
  • The relationships and flows of information can be transferred to online spaces and often benefit from wider connectivity.
  • Today, our culture-making activities are well engaged in the early stages of cultural mutation
  • What’s coming along next ?  “Smart” devices and Internet everywhere in our lives ?  Deep(er) changes to the way things are conceived, carried out, managed and used ?  New mental models ?  Or, will we discover real societal limits to what can be done given the current framework of laws, institutions and established practices with which people are familiar and comfortable ?
  • Shorter cycle-based development and release
  • Agile development
  • It is clear evidence that the developmental and learning dynamics generated by continuous or regular feedback loops are becoming the norm in areas of activity in which change and short cycles of product development are constants.
  • The Internet of Things (IoT)
  • clothes, homes, cars, buildings, roads, and a wide range of other objects that have a place in peoples’ daily life activities
  • experiencing major growth, equally in terms of hardware, software and with respect to the way the capabilities are configured and used
  • The IoT concept is being combined with the new-ish concepts of Open Data and Big Data
  • ethical, political and social impact policy decisions
  • that key opportunities associated with widespread uptake of the IoT are derived from the impact upon peoples’ activities and lives
  • ‘we’ are on our way towards more integrated eco-systems of issues, people and technologies
  • participation and inclusion enabled by interconnectedness are quickly becoming the ‘new rules’
  • What the Future May Hold
  • the ‘scenario planning’ approach
  • world’s politics, economics, anthropology, technology, psychology, sociology and philosophy
  • A scenario planning exercise carried out by the Rockefeller Foundation
  • Clearly these early (and now not-so-weak) signals and patterns tell us that the core assumptions and principles that have underpinned organized human activities for most of the past century
  • are being changed by the combinations and permutations of new, powerful, inexpensive and widely accessible information-processing technologies
  • The short description of each scenario reinforces the perception that we are both individually and collectively in transition from a linear, specialized, efficiency-driven paradigm towards a paradigm based on continuous feedback loops and principles of participation, both large and small in scope.
  • cultural ‘mutation’
  • Wirearchy
  • a dynamic two-way flow of power and authority based on knowledge, trust, credibility and a focus on results, enabled by interconnected people and technology.
  • the role of social media and smart mobile devices in the uprisings in Egypt, Libya and elsewhere in the Middle East
  • The roots of organizational development (OD) are in humanistic psychology and sociology action and ethnographic and cybernetic/ socio-technical systems theory.  It’s a domain that emerged essentially as a counter-balance to the mechanistic and machine-metaphor-based core assumptions about the organized activities in our society.
  • Organizational development principles are built upon some basic assumptions about human motivations, engagement and activities.
  • Participative Work Design – The Six Criteria
  • in recent years created models that help clarify how to evaluate and respond to the continuous turbulence and ambiguity generated by participating in interconnected flows of information.
  • contexts characterized by either Simple, Complicated or Chaotic dynamics (from complexity theory fundamentals). Increasingly, Complexity is emerging as a key definer of the issues, problems and opportunities faced by our societies.
  • peer-to-peer movement(s) unfolding around the world
  • Co-creating in a wide range of forms, processes and purpose may become an effective and important antidote to the spreading enclosure of human creative activity.
  • But .. the dominant models of governance, commercial ownership and the use and re-use of that which is co-created by people are going to have to undergo much more deep change in order to disrupt the existing paradigm of proprietary commercial creation and the model of socio-economic power that this paradigm enables and carries today.
Tiberius Brastaviceanu

Value network - Wikipedia - 0 views

  • a business analysis perspective
  • describes
  • resources within and between businesses
  • ...38 more annotations...
  • nodes in a value network represent people
  • nodes are connected by interactions that represent tangible and intangible deliverables
  • Value networks exhibit interdependence
  • Companies have both internal and external value networks.[1]
  • customers or recipients, intermediaries, stakeholders, complementary, open innovation networks and suppliers
  • key activities
  • processes and relationships that cut across internal boundaries
  • Value is created through exchange and the relationships between roles
  • F&S's value networks consists of these components
  • customers
  • Some service the customers all use, and enables interaction between the customers
  • service
  • contracts that enables access to the service
  • the network formed by phone users
  • example
  • example
  • car insurance company
  • how a company understands itself
  • value creation process
  • value creating system
  • all stakeholders co-produce value
  • systematic social innovation
  • strategy as
  • the Value Network to emerge as a mental model
  • Verna Allee defines value networks [5] as any web of relationships that generates both tangible and intangible value through complex dynamic exchanges between two or more individuals, groups or organizations. Any organization or group of organizations engaged in both tangible and intangible exchanges can be viewed as a value network, whether private industry, government or public sector.
  • Allee developed Value network analysis, a whole systems mapping and analysis approach to understanding tangible and intangible value creation among participants in an enterprise system
  • participants, transactions and tangible and intangible deliverables that together form a value network.
  • knowledge
  • benefits
  • favors
  • know-how
  • policy
  • planning
  • process
  • biological organisms, including humans, function in a self-organizing mode internally and externally
  • no central “boss” to control this dynamic activity
  • The purpose of value networks is to create the most benefit for the people involved in the network (5)
    • Tiberius Brastaviceanu
       
      Verna starts with relationships. I think this is wrong. Perceived value and how to get  to it determines the type of relationships we forge with other people with whom we robe shoulders.  
1 - 10 of 10
Showing 20 items per page