Skip to main content

Home/ Sensorica Knowledge/ Group items tagged communities

Rss Feed Group items tagged

Francois Bergeron

MES - McGill Entrepreneurs' Society - 0 views

  •  
    Promote entrepreneurship among students and members of the Montreal Community Support students with their entrepreneurial ventures by means of advising, funds, bank account, networking opportunities and much more Network with local business organizations and make their resources available to club members Give anyone with a project in mind the opportunity to form their team, take a leadership position, and bring their idea to an end
Francois Bergeron

Science Exchange Jobs - AngelList - 1 views

  •  
    "Science Exchange is a community marketplace for scientists to list, discover, access and pay for scientific services from institutions around the world. Our mission is to improve the efficiency of scientific research by making it easy for researchers to access the global network of scientific resources and expertise. We do this by connecting researchers looking to get experiments conducted with scientific service providers who have the capacity to conduct those experiments."
Steve Bosserman

Scale of Social Structures - Tibi's Philosophy - 3 views

  •  
    "In April 2015 I was asked by Christine Koehler to write an article on value. She contacted me because she come across my work on open value networks, about a new organizational model that may be well-adapted to support large scale peer production of material goods. I accepted the challenge as an exercise to formalize the tacit knowledge that I have accumulated since 2008, when I became interested in the relation between the new digital technology and the shift of power structures in our modern society. I advise the reader not to consider this paper as a theoretical essay. This is only my effort to bring to my own consciousness the tacit knowledge that I am using in my efforts to help the development of the open value network model, and of the SENSORICA.co network/community, which is an instantiation of this model. As I get better at surfacing and formalizing these ideas, I also invite the reader to understand the heuristics behind my work. I let the reader place a judgment on the success of my work, which will make these heuristics and models that I am trying to expose here more or less interesting. Start with Scale of social structures and follow the links. "
faly77

From Platforms to Neighbourhoods - 0 views

  •  
    One of the biggest problems we see facing communities who want to use digital tools to coordinate is that platforms are the unit of social organization online. The logic of platforms enforces top-down cultural homogeneity on all groups who must submit to this culture in exchange for access to basic tools for coordination.
Tiberius Brastaviceanu

Inventables - 2 views

  •  
    Tibi sent them an email to see if they are interested in partnering with us to move some of our products. They are working with other OSHW communities.
Tiberius Brastaviceanu

SensorWiki.org - 0 views

  •  
    Add info on this wiki and contact the community
Tiberius Brastaviceanu

Access control - Wikipedia, the free encyclopedia - 0 views

  • The act of accessing may mean consuming, entering, or using.
  • Permission to access a resource is called authorization.
  • Locks and login credentials are two analogous mechanisms of access control.
  • ...26 more annotations...
  • Geographical access control may be enforced by personnel (e.g., border guard, bouncer, ticket checker)
  • n alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country
  • access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons
  • can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap.
  • Physical access control is a matter of who, where, and when
  • Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.[citation needed] Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked
  • Credential
  • Access control system operation
  • The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input
  • There are three types (factors) of authenticating information:[2] something the user knows, e.g. a password, pass-phrase or PIN something the user has, such as smart card or a key fob something the user is, such as fingerprint, verified by biometric measurement
  • Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios
  • When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked.
  • A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a biometric feature) or some combination of these items. This is known as multi-factor authentication. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.
  • An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list
  • monitor the door position
  • Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the doo
  • Access control topology
  • Access control decisions are made by comparing the credential to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the look-up out from a central host to the edge of the system, or the reader. The predominant topology circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks
  • Access control readers may be classified by the functions they are able to perform
  • and forward it to a control panel.
  • Basic (non-intelligent) readers: simply read
  • Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus.
  • Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers.
  • Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host
  • a built in webservice to make it user friendly
  • Some readers may have additional features such as an LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support
Tiberius Brastaviceanu

Engaging For the Commons - Global Pull Platform - Helene Finidori - 0 views

  • "activating" human agency and political will and addressing the root causes for power unbalance and resistance to change is at the heart of tomorrow's paradigm shift.
  • action-oriented strategy and process methodology for generating engagement, accountability and outcomes in the political, economic, social and environmental spheres, which may contribute to enable this activation.
  • empowering individuals and communities, nurturing public wisdom
  • ...29 more annotations...
  • The platform is structured around commons, issues of social, environmental, economic nature,
  • treated as social objects: the nodes around which social networks are created, conversations and repeated interactions are initiated, new territories explored, meaning and intents shared, learning achieved.
  • ‘pinging of actors’ by ‘citizen-followers’ creates a pull dynamic
  • will yield conversations, knowledge flow, and feedback loops beneficial to learning, progress visualization, and evaluation
  • reate a context favorable to collaboration, exchange of ideas and know-how.
  • The process consists in letting people/organizations:
  • Select, follow,
  • Keep informed and track progress
  • Self assign actor role and communicate/report on self-activity and impact and status of issue.
  • Share
  • Find solutions and potential collaborators for action
  • Select or refer designated actors to acknowledge or request their engagement and action at various levels
  • participate in the conversation, report on activity and impact
  • evaluate and rate activity/impact of and trust toward actors' activity, impact and progress.
  • organize for collective action
  • garner follower participation
  • Initiate and participate in conversations, debates, deliberations
  • The ecosystem is composed of
  • Common’s spaces
  • Common’s graph
  • Progress & Impact or Situation Dashboard
  • The platform creates a context for the following
  • Curate the knowledge flow and increase learning
  • Connect and interrelate people, stakeholders, issues, and knowledge.
  • Help situate an issue
  • Define boundaries
  • Help situate self and others
  • Identify roles and interdependence between actors and issues.
  • Visualize the emergent bigger picture
Kurt Laitner

The Revolution at hand - Op-Ed - Domus - 0 views

  • Currently, our education prepares us to perform a job — at times any job — that pays us in terms of what we can possess and consume or, in other words, the goods that design and mass production consider to be to our satisfaction — at least partially.
  • We have produced artificial needs for years under this mantra
  • creating almost nonexistent necessities that are readily available and easy to narrate rather than investigating the problems and real needs of people and communities
  • ...13 more annotations...
  • the need for large-scale production is disappearing due to the crystalline democratization of the means of production
  • Mediocrity is obsolete
  • Money has become absurdly limited
  • unable to model the exchanges that serve to give way to a new mode of radically inclusive and more equitable cooperative production
  • design becomes a political tool
  • Innovation and meaning have been restricted, trapped and suffocated by mechanisms of protection, monopolies, patents and copyrights.
  • If you're lucky you will have patrons, not customers. Customers barely exist in the creative world now.
  • Production will occur only when there is a demand — and not a moment before
  • We need a new cultural infrastructure
  • A new distributed network of places of cultural and tangible production must be affirmed. The network will stem from fablabs, makerspaces and hackerspaces — the new factories — around the world, or from ambitious projects like the Italian Bottega 21: initiatives that unite the existing cultural heritage of places and traditions with currently available technologies
  • design itself must be independent from specific materials
  • We will teach students to investigate, discover and create work, products and services that the community needs, rather than merely follow any old curriculum while waiting for a "phantom" labour market to claim them
  • "The question we have to begin to ask ourselves is not 'how do we employ all the people who are rendered obsolete by technology', but 'how can we organize a society around something other than employment?'
Tiberius Brastaviceanu

The New Sacred « Dynamics of Myth - 0 views

  • The question then becomes about special content, and adoption of that content.
  • driving adoption of a mythology with values
  • We have to both overcome the hold of the old mythology and gain adoption of the new. What drives adoption of a meaningful cultural phenomenon?
  • ...11 more annotations...
  • the shared Christian story during the Renaissance
  • Church, artists, businesses and consumers all contributed to the great rebirth of culture
  • largely driven by the church and government institutions which we don’t necessarily want to recreate, right?
  • So how do we achieve the same effect?
  • The answer is sacred content.
  • I adopt what I believe in, and if the content is sacred, then it is beyond question.
  • An authority has determined these are sacred and therefore worthy
  • The Authority establishes a values framework, a ruling hierarchy directs and stewards the sacred content, and a host of intermediaries that carry it out to the faithful consumers.
  • We now have a strong distrust of authority, which has lost all legitimacy:
  • All around us there’s a collapse of the legitimacy of authorities, with much cynicism from the population. There’s never been a greater need for sacred content that can be trusted and deemed legitimate. How to achieve it without authorities? This is where we have to pivot our minds. We have to replace the dynamics of its creation within the authority with something else. This slide suggests an alternative:
  • We can create a values framework using collaborative culture techniques like community mythology projects. Out of these come sacred content that is legitimate because we created it according to shared values and a collective conscience. We have to put in place processes and rituals to establish, enshrine and communicate it.
sebastianklemm

Crypto4Good - 2 views

  •  
    Crypto4Good is a French NGO organizing charity events supported by the French-speaking crypto community. Best Practice: During a 24 hours live event by Crypto4Good + Binance Charity on 19 June 2021, two professional trading teams - Kryll.io & Diabolo.io - leveraged an experimental fund that was collected throughout the French crypto community in the weeks before the event. The two trading teams competed to make the most out of this fund within 24 hours of trading. Finally, both the money fundraised as well as the money sucessfully traded by Kryll.io & Diabolo.io will be given to NGOs in France. In the next weeks the event teams will travel to 5 cities in France: Lille, Paris, Lyon, Nantes, Toulouse, and use all of the donations collected and the money traded to buy as much food and basic necessities as possible. All these products will be donated to social services: https://www.binance.charity/fight-hunger-worldwide
Tiberius Brastaviceanu

PublicLabs - 0 views

  •  
    "Pursuing environmental justice through community science and open technology"
Tiberius Brastaviceanu

Co-Creating as Disruption to the Dominant Cultural Framework » Wirearchy - 0 views

  • more open people processes
  • Participative processes like Open Space, World Cafes, Unconferences, Peer Circles
  • Barcamps, Wordcamps, Govcamps, Foo Camps, Unconferences, high-end celebrity-and-marketing-and venture-capital ‘experience’ markets, new cultural and artistic festivals with technology-and-culture-making themes
  • ...45 more annotations...
  • maker faires
  • community-and-consensus building, organizing for activism and fundraising
  • The impetus behind this explosion is both technological and sociological
  • Technological
  • information technology and the creation and evolution of the Internet and the Web
  • appearance, development and evolution of social tools, web services, massive storage, and the ongoing development of computer-and-smart-devices development
  • Sociological
  • People are searching for ways to find others with similar interests and motivations so that they can engage in activities that help them learn, find work, grow capabilities and skills, and tackle vexing social and economic problems
  • get informed and take action
  • Developing familiarity and practice with open and collaborative processes
  • play and work together
  • rules about self-management, operate democratically, and produce results grounded in ownership and the responsibilities that have been agreed upon by the ‘community’
  • The relationships and flows of information can be transferred to online spaces and often benefit from wider connectivity.
  • Today, our culture-making activities are well engaged in the early stages of cultural mutation
  • What’s coming along next ?  “Smart” devices and Internet everywhere in our lives ?  Deep(er) changes to the way things are conceived, carried out, managed and used ?  New mental models ?  Or, will we discover real societal limits to what can be done given the current framework of laws, institutions and established practices with which people are familiar and comfortable ?
  • Shorter cycle-based development and release
  • Agile development
  • It is clear evidence that the developmental and learning dynamics generated by continuous or regular feedback loops are becoming the norm in areas of activity in which change and short cycles of product development are constants.
  • The Internet of Things (IoT)
  • clothes, homes, cars, buildings, roads, and a wide range of other objects that have a place in peoples’ daily life activities
  • experiencing major growth, equally in terms of hardware, software and with respect to the way the capabilities are configured and used
  • The IoT concept is being combined with the new-ish concepts of Open Data and Big Data
  • ethical, political and social impact policy decisions
  • that key opportunities associated with widespread uptake of the IoT are derived from the impact upon peoples’ activities and lives
  • ‘we’ are on our way towards more integrated eco-systems of issues, people and technologies
  • participation and inclusion enabled by interconnectedness are quickly becoming the ‘new rules’
  • What the Future May Hold
  • the ‘scenario planning’ approach
  • world’s politics, economics, anthropology, technology, psychology, sociology and philosophy
  • A scenario planning exercise carried out by the Rockefeller Foundation
  • Clearly these early (and now not-so-weak) signals and patterns tell us that the core assumptions and principles that have underpinned organized human activities for most of the past century
  • are being changed by the combinations and permutations of new, powerful, inexpensive and widely accessible information-processing technologies
  • The short description of each scenario reinforces the perception that we are both individually and collectively in transition from a linear, specialized, efficiency-driven paradigm towards a paradigm based on continuous feedback loops and principles of participation, both large and small in scope.
  • cultural ‘mutation’
  • Wirearchy
  • a dynamic two-way flow of power and authority based on knowledge, trust, credibility and a focus on results, enabled by interconnected people and technology.
  • the role of social media and smart mobile devices in the uprisings in Egypt, Libya and elsewhere in the Middle East
  • The roots of organizational development (OD) are in humanistic psychology and sociology action and ethnographic and cybernetic/ socio-technical systems theory.  It’s a domain that emerged essentially as a counter-balance to the mechanistic and machine-metaphor-based core assumptions about the organized activities in our society.
  • Organizational development principles are built upon some basic assumptions about human motivations, engagement and activities.
  • Participative Work Design – The Six Criteria
  • in recent years created models that help clarify how to evaluate and respond to the continuous turbulence and ambiguity generated by participating in interconnected flows of information.
  • contexts characterized by either Simple, Complicated or Chaotic dynamics (from complexity theory fundamentals). Increasingly, Complexity is emerging as a key definer of the issues, problems and opportunities faced by our societies.
  • peer-to-peer movement(s) unfolding around the world
  • Co-creating in a wide range of forms, processes and purpose may become an effective and important antidote to the spreading enclosure of human creative activity.
  • But .. the dominant models of governance, commercial ownership and the use and re-use of that which is co-created by people are going to have to undergo much more deep change in order to disrupt the existing paradigm of proprietary commercial creation and the model of socio-economic power that this paradigm enables and carries today.
Kurt Laitner

Forget the Foundations - In These Times - 0 views

  • Their “actions” didn’t involve writing grant proposals, discussing their concerns with a board of directors or contacting state agencies. They tested water samples themselves, and, in 1979, produced a study revealing high levels of radioactive contamination, a high percentage of pregnancies complicated by excessive bleeding or terminated in abortion and large numbers of children born with birth defects. Despite their work, the Centers for Disease Control and Indian Health Services discredited the study, and WARN wasn’t vindicated until the South Dakota School of Mines substantiated their claims that same year.
  • But unlike Erin Brockovich, this tale of local activists fighting against faceless institutions doesn’t have a happy ending: The Nuclear Regulatory Commission simply raised the level of “acceptable contamination,” and Indian Health Services started providing bottled water in one area. Congress authorized a new water pipeline to the reservation in 2002–only to have the funding diverted by the financial demands of the wars in Iraq and Afghanistan.
  • who defer responsibility onto do-nothing organizations, only later to complain about their lack of agency
  • ...12 more annotations...
  • that foundations perpetuate First World interests and free-market capitalism, thus preserving many of the problems radical activists wish to eradicate, such as the unregulated concentration of wealth.
  • Foundations were created in the early 20th century by multimillionaire robber barons, such as John D. Rockefeller and Andrew Carnegie, to evade corporate and estate taxes.
  • foundations divert money away from the collective tax base
  • who are more interested in supporting milquetoast reformers than social-justice organizations
  • federal and state funding for education and healthcare has shrunk
  • This is a culture of noblesse oblige, Ahn writes, where the “privileged are obliged to help those less fortunate, without examining how that wealth was created or the dangerous implications of conceding such power to the wealthy.”
  • is the power those with money wield over community leaders.
  • consequently realigning their interests (i.e., maintaining their jobs) with maintaining the system
  • This allegiance keeps community leaders from challenging the root causes of social inequities–the social-change work–at the same time that they pedal to keep up by providing for the needs of individuals devastated by institutional exploitation.
  • Kivel concedes this is valuable work, but points out the inherent injustice of this paradigm: “When temporary shelter becomes a substitute for permanent housing, emergency food a substitute for a decent job … we have shifted our attention from the redistribution of wealth to the temporary provision of social services to keep people alive.”
  • University of Southern California Professor Ruth Wilson Gilmore urges contemporary grassroots activists to stop seeking a “pure way of doing things.” “Many are looking for an organizational structure and a resource capability that will somehow be impervious to co-optation,”
  • transitioning from foundation support to a volunteer collective reliant solely on grassroots dollars
Tiberius Brastaviceanu

Dark Intellectual Property. Why We Need a Kickstarter for Patents - 0 views

  • “dark IP,” the intellectual property (IP) that remains on the shelf: undiscovered, unexplored, untapped
  • our ability to catch so much in the net by dragging the surface (to use Mike Bergman’s analogy) actually still misses the invisible wealth of what lies beneath.
  • But dark IP is different than the other hidden-depths knowledge since it’s also unfair. Because taxpayers paid for much of the research — whether basic understanding with long-term benefits or more applied research with shorter-term benefits — that now lies collecting dust on university shelves.
  • ...31 more annotations...
  • the people of the United States spent an average of nearly $40 billion every year supporting institutional research
  • 65 percent of invention disclosure bundles remain, on average, unlicensed and unused … each year.
  • ”…the street finds its own uses for things.”
  • most of the IP (much of which we paid for) isn’t actually on the street, where entrepreneurial folks can do something with it.
  • the overworked and understaffed tech transfer offices
  • their models
  • There’s not necessarily room for exploration and discovery
  • byzantine bureaucracy of large organizations
  • But let’s face it, there’s also the hoarding and the overprotecting
  • So much IP is generated that it’s far too much for any one entity to ever make sense of
  • very few people are aware of — let alone able to access — an invention outside the social circle of its inventors, the scientific community involved, or even the “crowd” that’s sometimes harnessed in open innovation
  • we need new ways of democratizing it
  • Not democratizing the IP itself — institutions should still own and generate profits from the intellectual property they’ve created — but democratizing the ways in which we allow this IP to be discovered and licensed.
  • idea contests
  • marketplaces
  • competitions to find uses for on-the-shelf IP
  • missing out on the transformative potential of what technology can do here
  • promoting new ways of interacting around intellectual property
  • Marblar, where I’m an advisor
    • Tiberius Brastaviceanu
       
      The guy is not entirely for open innovation but proposes an intermediary model to democratize the use of IP
  • This turns off the average entrepreneur, who doesn’t have the patience and bandwidth to engage in all the unnecessary overhead of searching, browsing, and licensing IP.
  • Many small startups don’t even bother with IP
  • Another missing piece is ways of allowing the crowd to interact with each other and decide which technologies should be licensed
  • bidding wars
    • Tiberius Brastaviceanu
       
      competitive dynamic for acquiring IP and using it effectively. This doesn't solve the problem, because some companies will still buy it for defensive purposes or block others from using it, unlike with truly open innovation. 
  • Most of the examples I listed above haven’t changed much over the past decade or broken into the mainstream.
  • why not a Kickstarter for IP?
  • Such a website would bring together not just funds and transactions, but communities — with their attendant feedback mechanisms — that are interested in creating something novel around unused patents.
  • such a model would help get the ideas of a few into the minds of many.
  • open up the currently closed shelf to virtual browsing
  • inventions are not only ‘filed’ or ‘granted’ but ‘browsed’ or ‘licensed’.
Tiberius Brastaviceanu

opscientia/desci - 0 views

  •  
    "We are actively building the software stack for empowering citizen science communities."
Francois Bergeron

Acfas - 0 views

  •  
    "L'Association francophone pour le savoir-Acfas est un organisme à but non lucratif contribuant à l'avancement des sciences au Québec et dans la Francophonie canadienne. " Selected by YAsir
« First ‹ Previous 41 - 60 of 259 Next › Last »
Showing 20 items per page