Skip to main content

Home/ Sensorica Knowledge/ Group items tagged data

Rss Feed Group items tagged

Kurt Laitner

Guidelines on Measuring Subjective Well-being.pdf - 0 views

  • such as interest,engagement and meaning,
  • subjective well-being is taken to be:2Good mental states, including all of the various evaluations, positive and negative, that peoplemake of their lives, and the affective reactions of people to their experiences
  • “subjective well-being is an umbrella term for the different valuationspeople make regarding their lives, the events happening to them, their bodies and minds,and the circumstances in which they live”.
  • ...16 more annotations...
  • In measuring overall human well-being then, subjective well-being should be placedalongside measures of non-subjective outcomes, such as income, health, knowledge andskills, safety, environmental quality and social connections
  • Inparticular, a distinction is commonly made between life evaluations, which involve acognitive evaluation of the respondent’s life as a whole (or aspects of it), and measures ofaffect, which capture the feelings experienced by the respondent at a particular point in time(Diener, 1984; Kahneman et al., 1999
  • eudaimonic aspect ofsubjective well-being, reflecting people’s sense of purpose and engagement
  • The framework used here covers all three concepts of well-being:●Life evaluation.●Affect.●Eudaimonia (psychological “flourishing”)
  • the result of a judgement by the individual rather than thedescription of an emotional state.
  • Elements of subjective well-beingLife evaluation
  • making an evaluation of this sort as involving the individual constructing a “standard” thatthey perceive as appropriate for themselves, and then comparing the circumstances oftheir life to that standard
  • Life evaluations are based on how people remember their experiences (Kahneman et al.,1999) and can differ significantly from how they actually experienced things at the time
  • It is for this reason that life evaluations are sometimes characterised as measures of“decision utility” in contrast to “experienced utility”
  • One of the mostwell documented measures of life evaluation – thePersonal Wellbeing Index– consists of eightquestions, covering satisfactions with eight different aspects of life, which are summedusing equal weights to calculate an overall index (International Wellbeing Group, 2006)
  • (job satisfaction, financial satisfaction, house satisfaction, healthsatisfaction, leisure satisfaction and environmental satisfaction),
  • AffectAffect is the term psychologists use to describe a person’s feelings. Measures of affectcan be thought of as measures of particular feelings or emotional states, and they aretypically measured with reference to a particular point in time.
  • Such measures capturehow people experience life rather than how they remember it (Kahneman and Krueger,2006
  • While an overall evaluation of life can be captured in a single measure, affect has atleast two distinct hedonic dimensions: positive affect and negative affect (Kahneman et al.,1999; Diener et al., 1999
  • positive affect is thought to be largely uni-dimensional
  • negative affect may be more multi-dimensional.
Tiberius Brastaviceanu

Beyond Blockchain: Simple Scalable Cryptocurrencies - The World of Deep Wealth - Medium - 0 views

  • I clarify the core elements of cryptocurrency and outline a different approach to designing such currencies rooted in biomimicry
  • This post outlines a completely different strategy for implementing cryptocurrencies with completely distributed chains
  • Rather than trying to make one global, anonymous, digital cash
  • ...95 more annotations...
  • we are interested in the resilience that comes from building a rich ecosystem of interoperable currencies
  • What are the core elements of a modern cryptocurrency?
  • Digital
  • Holdings are electronic and only exist and operate by virtue of a community’s agreement about how to interpret digital bits according to rules about operation and accounting of the currency.
  • Trustless
  • don’t have to trust a 3rd party central authority
  • Decentralized
  • Specifically, access, issuance, transaction accounting, rules & policies, should be collectively visible, known, and held.
  • Cryptographic
  • This cryptographic structure is used to enable a variety of people to host the data without being able to alter it.
  • Identity
  • there must be a way to associate these bits with some kind of account, wallet, owner, or agent who can use them
  • Other things that many take for granted in blockchains may not be core but subject to decisions in design and implementation, so they can vary between implementations
  • It does not have to be stored in a synchronized global ledger
  • does not have to be money. It may be a reputation currency, or data used for identity, or naming, etc
  • Its units do not have to be cryptographic tokens or coins
  • It does not have to protect the anonymity of users, although it may
  • if you think currency is only money, and that money must be artificially scarce
  • Then you must tackle the problem of always tracking which coins exist, and which have been spent. That is one approach — the one blockchain takes.
  • You might optimize for anonymity if you think of cryptocurrency as a tool to escape governments, regulations, and taxes.
  • if you want to establish and manage membership in new kinds of commons, then identity and accountability for actions may turn out to be necessary ingredients instead of anonymity.
  • In the case of the MetaCurrency Project, we are trying to support many use cases by building tools to enable a rich ecosystem of communities and current-sees (many are non-monetary) to enhance collective intelligence at all scales.
  • Managing consensus about a shared reality is a central challenge at the heart of all distributed computing solutions.
  • If we want to democratize money by having cryptocurrencies become a significant and viable means of transacting on a daily basis, I believe we need fundamentally more scalable approaches that don’t require expensive, dedicated hardware just to participate.
  • We should not need system wide consensus for two people to do a transaction in a cryptocurrency
  • Blockchain is about managing a consensus about what was “said.” Ceptr is about distributing a consensus about how to “speak.”
  • how nature gets the job done in massively scalable systems which require coordination and consistency
  • Replicate the same processes across all nodes
  • Empower every node with full agency
  • Hold this transformed state locally and reliably
  • Establish protocols for interaction
  • Each speaker of a language carries the processes to understand sentences they hear, and generate sentences they need
  • we certainly don’t carry some kind of global ledger of everything that’s ever been said, or require consensus about what has been said
  • Language IS a communication protocol we learn by emulating the processes of usage.
  • Dictionaries try to catch up when the usage
  • there is certainly no global ledger with consensus about the state of trillions of cells. Yet, from a single zygote’s copy of DNA, our cells coordinate in a highly decentralized manner, on scales of trillions, and without the latency or bottlenecks of central control.
  • Imagine something along the lines of a Java Virtual Machine connected to a distributed version of Github
  • Every time this JVM runs a program it confirms the hash of the code it is about to execute with the hash signed into the code repository by its developers
  • This allows each node that intends to be honest to be sure that they’re running the same processes as everyone else. So when two parties want to do a transaction, and each can have confidence their own code, and the results that your code produces
  • Then you treat it as authoritative and commit it to your local cryptographically self-validating data store
  • Allowing each node to treat itself as a full authority to process transactions (or interactions via shared protocols) is exactly how you empower each node with full agency. Each node runs its copy of the signed program/processes on its own virtual machine, taking the transaction request combined with the transaction chains of the parties to the transaction. Each node can confirm their counterparty’s integrity by replaying their transactions to produce their current state, while confirming signatures and integrity of the chain
  • If both nodes are in an appropriate state which allows the current transaction, then they countersign the transaction and append to their respective chains. When you encounter a corrupted or dishonest node (as evidenced by a breach of integrity of their chain — passing through an invalid state, broken signatures, or broken links), your node can reject the transaction you were starting to process. Countersigning allows consensus at the appropriate scale of the decision (two people transacting in this case) to lock data into a tamper-proof state so it can be stored in as many parallel chains as you need.
  • When your node appends a mutually validated and signed transaction to its chain, it has updated its local state and is able to represent the integrity of its data locally. As long as each transaction (link in the chain) has valid linkages and countersignatures, we can know that it hasn’t been tampered with.
  • If you can reliably embody the state of the node in the node itself using Intrinsic Data Integrity, then all nodes can interact in parallel, independent of other interactions to maximize scalability and simultaneous processing. Either the node has the credits or it doesn’t. I don’t have to refer to a global ledger to find out, the state of the node is in the countersigned, tamper-proof chain.
  • Just like any meaningful communication, a protocol needs to be established to make sure that a transaction carries all the information needed for each node to run the processes and produce a new signed and chained state. This could be debits or credits to an account which modify the balance, or recoding courses and grades to a transcript which modify a Grade Point Average, or ratings and feedback contributing to a reputation score, and so on.
  • By distributing process at the foundation, and leveraging Intrinsic Data Integrity, our approach results in massive improvements in throughput (from parallel simultaneous independent processing), speed, latency, efficiency, and cost of hardware.
  • You also don’t need to incent people to hold their own record — they already want it.
  • Another noteworthy observation about humans, cells, and atoms, is that each has a general “container” that gets configured to a specific use.
  • Likewise, the Receptors we’ve built are a general purpose framework which can load code for different distributed applications. These Receptors are a lightweight processing container for the Ceptr Virtual Machine Host
  • Ceptr enables a developer to focus on the rules and transactions for their use case instead of building a whole framework for distributed applications.
  • how units in a currency are issued
  • Most people think that money is just money, but there are literally hundreds of decisions you can make in designing a currency to target particular needs, niches, communities or patterns of flow.
  • Blockchain cryptocurrencies are fiat currencies. They create tokens or coins from nothing
  • These coins are just “spoken into being”
  • the challenging task of
  • ensure there is no counterfeiting or double-spending
  • Blockchain cryptocurrencies are fiat currencies
  • These coins are just “spoken into being”
  • the challenging task of tracking all the coins that exist to ensure there is no counterfeiting or double-spending
  • You wouldn’t need to manage consensus about whether a cryptocoin is spent, if your system created accounts which have normal balances based on summing their transactions.
  • In a mutual credit system, units of currency are issued when a participant extends credit to another user in a standard spending transaction
  • Alice pays Bob 20 credits for a haircut. Alice’s account now has -20, and Bob’s has +20.
  • Alice spent credits she didn’t have! True
  • Managing the currency supply in a mutual credit system is about managing credit limits — how far people can spend into a negative balance
  • Notice the net number units in the system remains zero
  • One elegant approach to managing mutual credit limits is to set them based on actual demand.
  • concerns about manufacturing fake accounts to game credit limits (Sybil Attacks)
  • keep in mind there can be different classes of accounts. Easy to create, anonymous accounts may get NO credit limit
  • What if I alter my code to give myself an unlimited credit limit, then spend as much as I want? As soon as you pass the credit limit encoded in the shared agreements, the next person you transact with will discover you’re in an invalid state and refuse the transaction.
  • If two people collude to commit an illegal transaction by both hacking their code to allow a normally invalid state, the same still pattern still holds. The next person they try to transact with using untampered code will detect the problem and decline to transact.
  • Most modern community currency systems have been implemented as mutual credit,
  • Hawala is a network of merchants and businessmen, which has been operating since the middle ages, performing money transfers on an honor system and typically settling balances through merchandise instead of transferring money
  • Let’s look at building a minimum viable cryptocurrency with the hawala network as our use case
  • To minimize key management infrastructure, each hawaladar’s public key is their address or identity on the network. To join the network you get a copy of the software from another hawaladar, generate your public and private keys, and complete your personal profile (name, location, contact info, etc.). You call, fax, or email at least 10 hawaladars who know you, and give them your IP address and ask them to vouch for you.
  • Once 10 other hawaladars have vouched for you, you can start doing other transactions because the protocol encoded in every node will reject a transaction chain that doesn’t start with at least 10 vouches
  • seeding your information with those other peers so you can be found by the rest of the network.
  • As described in the Mutual Credit section, at the time of transaction each party audits the counterparty’s transaction chain.
  • Our hawala crypto-clearinghouse protocol has two categories of transactions: some used for accounting and others for routing. Accounting transactions change balances. Routing transactions maintain network integrity by recording information about hawaladar
  • Accounting Transactions create signed data that changes account balances and contains these fields:
  • The final hash of all of the above fields is used as a unique transaction ID and is what each of party signs with their private keys. Signing indicates a party has agreed to the terms of the transaction. Only transactions signed by both parties are considered valid. Nodes can verify signatures by confirming that decryption of the signature using the public key yields a result which matches the transaction ID.
  • Routing Transactions sign data that changes the peers list and contain these fields:
  • As with accounting transactions, the hash of the above fields is used as the transaction’s unique key and the basis for the cryptographic signature of both counterparties.
  • Remember, instead of making changes to account balances, routing transactions change a node’s local list of peers for finding each other and processing.
  • a distributed network of mutual trust
  • operates across national boundaries
  • everyone already keeps and trusts their own separate records
  • Hawaladars are not anonymous
  • “double-spending”
  • It would be possible for someone to hack the code on their node to “forget” their most recent transaction (drop the head of their chain), and go back to their previous version of the chain before that transaction. Then they could append a new transaction, drop it, and append again.
  • After both parties have signed the agreed upon transaction, each party submits the transaction to separate notaries. Notaries are a special class of participant who validate transactions (auditing each chain, ensuring nobody passes through an invalid state), and then they sign an outer envelope which includes the signatures of the two parties. Notaries agree to run high-availability servers which collectively manage a Distributed Hash Table (DHT) servicing requests for transaction information. As their incentive for providing this infrastructure, notaries get a small transaction fee.
  • This approach introduces a few more steps and delays to the transaction process, but because it operates on independent parallel chains, it is still orders of magnitude more efficient and decentralized than reaching consensus on entries in a global ledger
  • millions of simultaneous transactions could be getting processed by other parties and notaries with no bottlenecks.
  • There are other solutions to prevent nodes from dropping the head of their transaction chain, but the approach of having notaries serve out a DHT solves a number of common objections to completely distributed accounting. Having access to reliable lookups in a DHT provides a similar big picture view that you get from a global ledger. For example, you may want a way to look up transactions even when the parties to that transaction are offline, or to be able to see the net system balance at a particular moment in time, or identify patterns of activity in the larger system without having to collect data from everyone individually.
  • By leveraging Intrinsic Data Integrity to run numerous parallel tamper-proof chains you can enable nodes to do various P2P transactions which don’t actually require group consensus. Mutual credit is a great way to implement cryptocurrencies to run in this peered manner. Basic PKI with a DHT is enough additional infrastructure to address main vulnerabilities. You can optimize your solution architecture by reserving reserve consensus work for tasks which need to guarantee uniqueness or actually involve large scale agreement by humans or automated contracts.
  • It is not only possible, but far more scalable to build cryptocurrencies without a global ledger consensus approach or cryptographic tokens.
  •  
    Article written by Arthur Brook, founder of Metacurrency project and of Ceptr.
Tiberius Brastaviceanu

Welcome to the new reputation economy (Wired UK) - 1 views

  • banks take into account your online reputation alongside traditional credit ratings to determine your loan
  • headhunters hire you based on the expertise you've demonstrated on online forums
  • reputation data becomes the window into how we behave, what motivates us, how our peers view us and ultimately whether we can or can't be trusted.
  • ...37 more annotations...
  • At the heart of Movenbank is a concept call CRED.
  • The difference today is our ability to capture data from across an array of digital services. With every trade we make, comment we leave, person we "friend", spammer we flag or badge we earn, we leave a trail of how well we can or can't be trusted.
  • An aggregated online reputation having a real-world value holds enormous potential
  • peer-to-peer marketplaces, where a high degree of trust is required between strangers; and where a traditional approach based on disjointed information sources is currently inefficient, such as recruiting.
  • opportunity to reinvent the way people found jobs through online reputation
  • "It's not about your credit, but your credibility," King says.
  • But this wealth of data raises an important question -- who owns our reputation? Shouldn't our hard-earned online status be portable? If you're a SuperHost on Airbnb, shouldn't you be able to use that reputation to, say, get a loan, or start selling on Etsy?
  • "People are currently underusing their networks and reputation," King says. "I want to help people to understand and build their influence and reputation, and think of it as capital they can put to good use."
  • Social scientists have long been trying to quantify the value of reputation.
  • Using functional magnetic resonance imaging, the researchers monitored brain activity
  • "The implication of our study is that different types of reward are coded by the same currency system." In other words, our brains neurologically compute personal reputation to be as valuable as money.
  • Personal reputation has been a means of making socioeconomic decisions for thousands of years. The difference today is that network technologies are digitally enabling the trust we used to experience face-to-face -- meaning that interactions and exchanges are taking place between total strangers.
  • Trust and reputation become acutely important in peer-to-peer marketplaces such as WhipCar and Airbnb, where members are taking a risk renting out their cars or their homes.
  • When you are trading peer-to-peer, you can't count on traditional credit scores. A different measurement is needed. Reputation fills this gap because it's the ultimate output of how much a community trusts you.
  • Welcome to the reputation economy, where your online history becomes more powerful than your credit history.
  • Presently, reputation data doesn't transfer between verticals.
  • A wave of startups, including Connect.Me, TrustCloud, TrustRank, Legit and WhyTrusted, are trying to solve this problem by designing systems that correlate reputation data. By building a system based on "reputation API" -- a combination of a user's activity, ratings and reviews across sites -- Legit is working to build a service that gives users a score from zero to 100. In trying to create a universal metric for a person's trustworthiness, they are trying to "become the credit system of the sharing economy", says Jeremy Barton, the 27-year-old San Francisco-based cofounder of Legit.
  • His company, and other reputation ventures, face some big challenges if they are to become, effectively, the PayPal of trust. The most obvious is coming up with algorithms that can't be easily gamed or polluted by trolls. And then there's the critical hurdle of convincing online marketplaces not just to open up their reputation vaults, but create a standardised format for how they frame and collect reputation data. "We think companies will share reputation data for the same reasons banks give credit data to credit bureaux," says Rob Boyle, Legit cofounder and CTO. "It is beneficial for one company to give up their slice of reputation data if in return they get access to the bigger picture: aggregated data from other companies."
  • PeerIndex, Kred and Klout,
  • are measuring social influence, not reputation. "Influence measures your ability to drag someone into action,"
  • "Reputation is an indicator of whether a person is good or bad and, ultimately, are they trustworthy?"
  • Early influence and reputation aggregators will undoubtedly learn by trial and error -- but they will also face the significant challenge of pioneering the use of reputation data in a responsible way. And there's a challenge beyond that: reputation is largely contextual, so it's tricky to transport it to other situations.
  • Many of the ventures starting to make strides in the reputation economy are measuring different dimensions of reputation.
  • reputation is a measure of knowledge
  • a measure of trust
  • a measure of propensity to pay
  • measure of influence
  • Reputation capital is not about combining a selection of different measures into a single number -- people are too nuanced and complex to be distilled into single digits or binary ratings.
  • It's the culmination of many layers of reputation you build in different places that genuinely reflect who you are as a person and figuring out exactly how that carries value in a variety of contexts.
  • The most basic level is verification of your true identity
  • reliability and helpfulness
  • do what we say we are going to do
  • respect another person's property
  • trusted to pay on time
  • we will be able to perform a Google- or Facebook-like search and see a picture of a person's behaviour in many different contexts, over a length of time. Slivers of data that have until now lived in secluded isolation online will be available in one place. Answers on Quora, reviews on TripAdvisor, comments on Amazon, feedback on Airbnb, videos posted on YouTube, social groups joined, or presentations on SlideShare; as well as a history and real-time stream of who has trusted you, when, where and why. The whole package will come together in your personal reputation dashboard, painting a comprehensive, definitive picture of your intentions, capabilities and values.
  • idea of global reputation
  • By the end of the decade, a good online reputation could be the most valuable currency in your possession.
Steve Bosserman

Designing great data products - O'Reilly Radar - 1 views

  •  
    Note from Bill Fulkerson: The Drivetrain Approach: A four-step process for building data products. We are entering the era of data as drivetrain, where we use data not just to generate more data (in the form of predictions), but use data to produce actionable outcomes. That is the goal of the Drivetrain Approach.
Tiberius Brastaviceanu

PeerPoint « Poor Richard's Almanack 2010 - 1 views

  • Each PeerPoint is an autonomous node on a p2p network with no centralized corporate  infrastructure.
  • The PeerPoint will be connected between the user’s pc, home network, or mobile device and the ISP connection.
  • The PeerPoint is designed to Occupy the Internet.
  • ...7 more annotations...
  • provide greater user value
  • For numerous reasons the services provided by the commercial companies do not adequately meet the creative, social, political, and financial needs of the 99%
  • allows self-selected individuals to coalesce into powerful workgroups, forums, and movements.
  • With the PeerPoint approach, each user will own her own inexpensive internet appliance and all the data and content she creates
  • If a FreedomBox were used as a starting platform, the PeerPoint application package would be added on top of the FreedomBox security stack.
  • The common requirements for each PeerPoint app are: world class, best-of-breed open source p2p architecture consistent, granular, user-customizable security management and identity protection integrated with other apps in the suite via a common distributed database and/or “data bus” architecture. consistent, user-customizable large, medium, and small-screen (mobile device) user interfaces ability to interface with its corresponding major-market-share service (Facebook, Twitter, etc.) GPS enabled
  • First tier applications: distributed database social networking  (comparison of distributed social network applications) trust/reputation metrics crowdsourcing: content collaboration & management  (wiki, Google Docs, or better) project management/workflow data visualization (data sets, projects, networks, etc.) user-customizable complementary currency and barter exchange (Community Forge or better) crowd funding (http://www.quora.com/Is-there-an-open-source-crowdfunding-platform) voting (LiquidFeedback or better) universal search across all PeerPoint data/content and world wide web content
Tiberius Brastaviceanu

Citizen Weather Observer Program - 0 views

  •  
    "The Citizen Weather Observer Program (CWOP) is a public-private partnership with three goals: 1) to collect weather data contributed by citizens; 2) to make these data available for weather services and homeland security; and 3) to provide feedback to the data contributors so they have the tools to check and improve their data quality. In fact, the web address, wxqa.com, stands for weather quality assurance. "
Tiberius Brastaviceanu

If not Global Captalism - then What? - 0 views

  • I posit an optimistic view of the potential for Society from the emergence of a new and “Open” form of Capitalism.
  • Open Capital
  • the concept of “Open” Capital is “so simple…. it repels the mind".
  • ...162 more annotations...
  • Open Capital is defined as “a proportional share in an enterprise for an indeterminate time”
  • ‘Enterprise’ is defined as ‘any entity within which two or more individuals create, accumulate or exchange Value”.
  • Value is to Economics as Energy and Matter are to Physics.
  • The Metaphysics Of Value
  • division between “subject” and “object”.
  • primary reality is “Quality”
  • formless and indefinable
  • not a “thing”
  • a non-intellectual awareness or “pre-intellectual reality”
  • but an event at which the subject becomes aware of the object and before he distinguishes it
  • Quality is the basis of both subject and object
  • distinguish between “Static” and “Dynamic” Quality
  • treating Value as a form of “Quality” as envisioned by Pirsig.
  • Riegel
  • defined “Value” as “ the Relativity of Desire” again implying indeterminacy.
  • Pirsig’s approach Capital may be viewed as “Static” Value and Money as “Dynamic” Value. “Transactions” are the “events” at which individuals (Subjects) interact with each other or with Capital (both as Objects) to create forms of Value and at which “Value judgments” are made based upon a “Value Unit”.
  • The result of these Value Events /Transactions is to create subject/object pairings in the form of data ie Who “owns” or has rights of use in What,
  • at what Price
  • accounting data
  • Neo-Classical” Economics confuses indeterminate Value with a market– determined Price –
  • Data may be static
  • This Data identifies the subject with objects such as tangible ‘Material Value’
  • Data may itself constitute ‘Intellectual Value’
  • It, too, may then be defined in a subject/object pairing through the concept of “intellectual property”.
  • Other forms of Value are however not definable by data:
  • “sentimental” Value
  • Emotional Value’
  • 'Spiritual Value’
  • We may therefore look at the “transaction” or “value event” in a new light.
  • The creation and circulation of Value essentially comprises the concept we know of as “Money”.
  • Money / Dynamic Value
  • “The purpose of money is to facilitate barter by splitting the transaction into two parts, the acceptor of money reserving the power to requisition value from any trader at any time
  • money
  • value unit dissociated from any object
  • monetary unit
  • the basis relative to which other values may be expressed
  • The monetary process is a dynamic one involving the creation and recording of obligations as between individuals and the later fulfilment of these obligations
  • The monetary “Value Event”/ Transaction involves the creation of “Credit”
  • obligation to provide something of equivalent Value at a future point in time.
  • These obligations may be recorded on transferable documents
  • database of “Credit”/obligations is not Money, but temporary “Capital”
  • “Working Capital”
  • Static Value – which only becomes “Money”/ Dynamic Value when exchanged in the transitory Monetary process.
  • what we think of as Money is in fact not tangible “cash” but rather
  • the flow of data between databases of obligations maintained by Credit Institutions
  • or dynamic
  • Banks literally “loan” Money into existence
  • In exchange for an obligation by an Individual to provide to the Bank something of Value
  • Bank’s obligation is merely to provide another obligation at some future time
  • These Bank-issued obligations are therefore
  • claim upon a claim upon Value
  • The true source of Credit is the Individual, not the intermediary Bank
  • this Money they create from nothing despite the fact that it is literally Value-less
  • Thus there is no true sharing of Risk and Reward involved in Lending
  • issue in relation to Credit/Debt and this relates to the nature of Lending itself.
  • the practice of Lending involves an incomplete exchange in terms of risk and reward: a Lender, as opposed to an Investor, has no interest in the outcome of the Loan, and requires the repayment of Principal no matter the ability of the Borrower to repay.
  • Ethical problem
    • Tiberius Brastaviceanu
       
      "The Lender has no interest in the outcome of the loan", i.e doesn't care what happens in the end. The Lender ins not interested in the economical outcome of the Lender-Loner relation. So in fact there is no real risk sharing. the only risk for the Lender is when the Loner doesn't pay back, which is not really a risk... In fact it is a risk for the small bank, who has to buy money from the central bank, but not for the central bank. 
  • Money is not
  • an “Object” circulating but rather a dynamic process of Value creation and exchange by reference to a “Value Unit”.
  • Capital/ Static Value
  • Capital represents the static accumulation of Value
  • Some forms of Capital are “productive”
  • An ethical question
  • in relation to Productive Capital relates to the extent of “property rights” which may be held over it thereby allowing individuals to assert “absolute” permanent and exclusive ownership - in particular in relation to Land
  • our current financial system is based not upon Value but rather a claim upon Value
  • Financial Capital consists of two types:
  • “Debt”
  • “Equity”
  • Interest
  • obligations of finite/temporary duration but with no participation in the assets or revenues
  • absolute and permanent ownership/participation (without obligation) in assets and revenues
  • discontinuity between Debt and Equity
  • at the heart of our current problems as a Society
  • The Enterprise
  • ‘Charitable’ Enterprise
  • ‘Social’ Enterprise
  • Value
  • exchanged in agreed proportions;
  • Value is exchanged for the Spiritual and Emotional Value
  • ‘Commercial’ Enterprise
  • ‘closed’
  • Value are exchanged between a limited number of individuals
  • Early enterprises were partnerships and unincorporated associations
  • need for institutions which outlived the lives of the Members led to the development of the Corporate body with a legal existence independent of its Members
  • The key development in the history of Capitalism was the creation of the ‘Joint Stock’ Corporate with liability limited by shares of a ‘Nominal’ or ‘Par’ value
  • over the next 150 years the Limited Liability Corporate evolved into the Public Limited Liability Corporate
  • Such “Closed” Shares of “fixed” value constitute an absolute and permanent claim over the assets and revenues of the Enterprise to the exclusion of all other “stakeholders” such as Suppliers, Customers, Staff, and Debt Financiers.
  • The latter are essentially ‘costs’ external to the
  • owners of the Enterprise
  • maximise ‘Shareholder Value’
  • There is a discontinuity/ fault-line within the ‘Closed’ Corporate
  • It has the characteristics of what biologists call a ‘semi-permeable membrane’ in the way that it allows Economic Value to be extracted from other stakeholders but not to pass the other way.
    • Tiberius Brastaviceanu
       
      It is a way to extract value from productive systems. It is a system of exploitation. 
  • Capital most certainly is and always has been - through the discontinuity (see diagram) between:‘Fixed’ Capital in the form of shares ie Equity; and ‘Working’ Capital in the form of debt finance, credit from suppliers, pre-payments by customers and obligations to staff and management.
  • irreconcilable conflict between Equity and Debt
  • xchange of Economic Value in a Closed Corporate is made difficult and true sharing of Risk and Reward is simply not possible
  • No Enterprise Model has been capable of resolving this dilemma. Until now.
  • Corporate Partnerships with unlimited liability
  • mandatory for partnerships with more than 20 partners to be incorporated
  • in the USA
  • it is the normal structure for professional partnerships
  • Limited Liability Partnerships
  • In the late 1990's
  • litigation
  • The UK LLP is supremely simple and remarkably flexible.
  • All that is needed is a simple ‘Member Agreement’ – a legal protocol which sets out the Aims, Objectives. Principles of Governance, Revenue Sharing, Dispute Resolution, Transparency and any other matters that Members agree should be included. Amazingly enough, this Agreement need not even be in writing, since in the absence of a written agreement Partnership Law is applied by way of default.
  • The ease of use and total flexibility enables the UK LLP to be utilised in a way never intended – as an ‘Open’ Corporate partnership.
  • ‘Open’ Corporate Partnership
  • concepts which characterise the ‘Open’ Corporate Partnership
  • it is now possible for any stakeholder to become a Member of a UK LLP simply through signing a suitably drafted Member Agreement
  • ‘Open’
  • supplier
  • employee
  • may instead become true Partners in the Enterprise with their interests aligned with other stakeholders.
    • Tiberius Brastaviceanu
       
      Can SENSORICA be a UK LLP?
  • no profit or loss in an Open Corporate Partnership, merely Value creation and exchange between members in conformance with the Member Agreement.
  • Proportional shares
  • in an Enterprise constitute an infinitely divisible, flexible and scaleable form of Capital capable of distributing or accumulating Value organically as the Enterprise itself grows in Value or chooses to distribute it.
  • Emergence of “Open” Capital
  • example of how ‘Temporary Equity’ may operate in practice
  • The Open Capital Partnership (“OCP”)
  • Within the OCP Capital and Revenue are continuous: to the extent that an Investee pays Rental in advance of the due date he becomes an Investor.
  • Open Capital – a new Asset Class
  • create a new asset class of proportional “shares”/partnership interests
  • in Capital holding OCP’s
  • Property Investment Partnerships (“PIP’s”)
  • Open Corporate Partnerships as a Co-operative Enterprise model
  • A Co-operative is not an enterprise structure: it is a set of Principles that may be applied to different types of enterprise structure.
  • Within a Partnership there is no “Profit” and no “Loss”.
  • Partnerships
  • mutual pursuit of the creation and exchange of Value
  • Partners do not compete with each othe
  • the crippling factors in practical terms have been, inter alia: the liability to which Member partners are exposed from the actions of their co-partners on their behalf; limited ability to raise capital.
  • they favour the interests of other stakeholders, are relatively restricted in accessing investment; are arguably deficient in incentivising innovation.
  • The ‘new’ LLP was expressly created to solve the former problem by limiting the liability of Member partners to those assets which they choose to place within its protective ‘semi-permeable membrane’
  • However, the ability to configure the LLP as an “Open” Corporate permits a new and superior form of Enterprise.
  • it is possible to re-organise any existing enterprise as either a partnership or as a partnership of partnerships.
  • the revenues
  • would be divided among Members in accordance with the LLP Agreement. This means that all Members share a common interest in collaborating/co-operating to maximise the Value generated by the LLP collectively as opposed to competing with other stakeholders to maximise their individual share at the other stakeholders’ expense.
  • facilitate the creation of LLP’s as “Co-operatives of Co-operatives”.
  • he ‘Commercial’ Enterprise LLP – where the object is for a closed group of individuals to maximise the value generated in their partnership. There are already over 7,000 of these.
    • Tiberius Brastaviceanu
       
      Can SENSORICA be one of these?
  • the Profit generated in a competitive economy based upon shareholder value and unsustainable growth results from a transfer of risks outwards, and the transfer of reward inwards, leading to a one way transfer of Economic Value.
  • This,
  • will very often impoverish one or more constituency of stakeholders
  • A partnership, however, involves an exchange of value through the sharing of risk and reward.
  • Whether its assets are protected within a corporate entity with limited liability or not, it will always operate co-operatively – for mutual profit.
  • Open Capital, Economics and Politics
  • continuity between Capital as Static Value and Money as Dynamic Value which has never before been possible due to the dichotomy between the absolute/infinite and the absolute/finite durations of the competing claims over assets – “Equity” and “Debt”
  • Open Capital Partnership gives rise to a new form of Financial Capital of indeterminate duration. It enables the Capitalisation of assets and the monetisation of revenue streams in an entirely new way.
  • It is possible to envisage a Society within which individuals are members of a portfolio of Enterprises constituted as partnerships, whether limited in liability or otherwise.
  • Some will be charitable
  • Others will be ‘social’
  • ‘Commercial’ enterprises of all kinds aimed at co-operatively working together to maximise value for the Members.
  • the process has already begun
  • Capitalism
  • superior
  • to all other models, such as Socialism.
  • It can only be replaced by another ‘emergent’ phenomenon, which is adopted ‘virally’ because any Enterprise which does not utilise it will be at a disadvantage to an Enterprise which does.
  • The ‘Open’ Corporate Partnership is: capable of linking any individuals anywhere in respect of collective ownership of assets anywhere; extremely cheap and simple to operate; and because one LLP may be a Member of another it is organically flexible and ‘scaleable’. The phenomenon of “Open Capital” – which is already visible in the form of significant commercial transactions - enables an extremely simple and continuous relationship between those who wish to participate indefinitely in an Enterprise and those who wish to participate for a defined period of time.
  • Moreover, the infinitely divisible proportionate “shares” which constitute ‘Open’ Capital allow stakeholder interests to grow flexibly and organically with the growth in Value of the Enterprise. In legal terms, the LLP agreement is essentially consensual and ‘pre-distributive’: it is demonstrably superior to prescriptive complex contractual relationships negotiated adversarially and subject to subsequent re-distributive legal action. Above all, the ‘Open’ Corporate Partnership is a Co-operative phenomenon which is capable, the author believes, of unleashing the “Co-operative Advantage” based upon the absence of a requirement to pay returns to “rentier” Capitalists.
Tiberius Brastaviceanu

POWER-CURVE SOCIETY: The Future of Innovation, Opportunity and Social Equity in the Eme... - 1 views

  • how technological innovation is restructuring productivity and the social and economic impact resulting from these changes
  • concern about the technological displacement of jobs, stagnant middle class income, and wealth disparities in an emerging "winner-take-all" economy
  • personal data ecosystems that could potentially unlock a revolutionary wave of individual economic empowerment
  • ...70 more annotations...
  • the bell curve described the wealth and income distribution of American society
  • As the technology boom of the 1990s increased productivity, many assumed that the rising water level of the economy was raising all those middle class boats. But a different phenomenon has also occurred. The wealthy have gained substantially over the past two decades while the middle class has remained stagnant in real income, and the poor are simply poorer.
  • America is turning into a power-curve society: one where there are a relative few at the top and a gradually declining curve with a long tail of relatively poorer people.
  • For the first time since the end of World War II, the middle class is apparently doing worse, not better, than previous generations.
  • an alarming trend
  • What is the role of technology in these developments?
  • a sweeping look at the relationship between innovation and productivity
  • New Economy of Personal Information
  • Power-Curve Society
  • the future of jobs
  • the report covers the social, policy and leadership implications of the “Power-Curve Society,”
  • World Wide Web
  • as businesses struggle to come to terms with this revolution, a new set of structural innovations is washing over businesses, organizations and government, forcing near-constant adaptation and change. It is no exaggeration to say that the explosion of innovative technologies and their dense interconnections is inventing a new kind of economy.
  • the new technologies are clearly driving economic growth and higher productivity, the distribution of these benefits is skewed in worrisome ways.
  • the networked economy seems to be producing a “power-curve” distribution, sometimes known as a “winner-take-all” economy
  • Economic and social insecurity is widespread.
  • major component of this new economy, Big Data, and the coming personal data revolution fomenting beneath it that seeks to put individuals, and not companies or governments, at the forefront. Companies in the power-curve economy rely heavily on big databases of personal information to improve their marketing, product design, and corporate strategies. The unanswered question is whether the multiplying reservoirs of personal data will be used to benefit individuals as consumers and citizens, or whether large Internet companies will control and monetize Big Data for their private gain.
  • Why are winner-take-all dynamics so powerful?
  • appear to be eroding the economic security of the middle class
  • A special concern is whether information and communications technologies are actually eliminating more jobs than they are creating—and in what countries and occupations.
  • How is the power-curve economy opening up opportunities or shutting them down?
  • Is it polarizing income and wealth distributions? How is it changing the nature of work and traditional organizations and altering family and personal life?
  • many observers fear a wave of social and political disruption if a society’s basic commitments to fairness, individual opportunity and democratic values cannot be honored
  • what role government should play in balancing these sometimes-conflicting priorities. How might educational policies, research and development, and immigration policies need to be altered?
  • The Innovation Economy
  • Conventional economics says that progress comes from new infusions of capital, whether financial, physical or human. But those are not necessarily the things that drive innovation
  • What drives innovation are new tools and then the use of those new tools in new ways.”
  • at least 50 percent of the acceleration of productivity over these years has been due to ICT
  • economists have developed a number of proxy metrics for innovation, such as research and development expenditures.
  • Atkinson believes that economists both underestimate and overestimate the scale and scope of innovation.
  • Calculating the magnitude of innovation is also difficult because many innovations now require less capital than they did previously.
  • Others scholars
  • see innovation as going in cycles, not steady trajectories.
  • A conventional approach is to see innovation as a linear, exponential phenomenon
  • leads to gross errors
  • Atkinson
  • believes that technological innovation follows the path of an “S-curve,” with a gradual increase accelerating to a rapid, steep increase, before it levels out at a higher level. One implication of this pattern, he said, is that “you maximize the ability to improve technology as it becomes more diffused.” This helps explain why it can take several decades to unlock the full productive potential of an innovation.
  • innovation keeps getting harder. It was pretty easy to invent stuff in your garage back in 1895. But the technical and scientific challenges today are huge.”
  • costs of innovation have plummeted, making it far easier and cheaper for more people to launch their own startup businesses and pursue their unconventional ideas
  • innovation costs are plummeting
  • Atkinson conceded such cost-efficiencies, but wonders if “the real question is that problems are getting more complicated more quickly than the solutions that might enable them.
  • we may need to parse the different stages of innovation: “The cost of innovation generally hasn’t dropped,” he argued. “What has become less expensive is the replication and diffusion of innovation.”
  • what is meant by “innovation,”
  • “invention plus implementation.”
  • A lot of barriers to innovation can be found in the lack of financing, organizational support systems, regulation and public policies.
  • 90 percent of innovation costs involve organizational capital,”
  • there is a serious mismatch between the pace of innovation unleashed by Moore’s Law and our institutional and social capacity to adapt.
  • This raises the question of whether old institutions can adapt—or whether innovation will therefore arise through other channels entirely. “Existing institutions are often run by followers of conventional wisdom,”
  • The best way to identify new sources of innovation, as Arizona State University President Michael Crow has advised, is to “go to the edge and ignore the center.”
  • Paradoxically, one of the most potent barriers to innovation is the accelerating pace of innovation itself.
  • Institutions and social practice cannot keep up with the constant waves of new technologies
  • “We are moving into an era of constant instability,”
  • “and the half-life of a skill today is about five years.”
  • Part of the problem, he continued, is that our economy is based on “push-based models” in which we try to build systems for scalable efficiencies, which in turn demands predictability.
  • The real challenge is how to achieve radical institutional innovations that prepare us to live in periods of constant two- or three-year cycles of change. We have to be able to pick up new ideas all the time.”
  • pace of innovation is a major story in our economy today.
  • The App Economy consists of a core company that creates and maintains a platform (such as Blackberry, Facebook or the iPhone), which in turn spawns an ecosystem of big and small companies that produce apps and/or mobile devices for that platform
  • tied this success back to the open, innovative infrastructure and competition in the U.S. for mobile devices
  • standard
  • The App Economy illustrates the rapid, fluid speed of innovation in a networked environment
  • crowdsourcing model
  • winning submissions are
  • globally distributed in an absolute sense
  • problem-solving is a global, Long Tail phenomenon
  • As a technical matter, then, many of the legacy barriers to innovation are falling.
  • small businesses are becoming more comfortable using such systems to improve their marketing and lower their costs; and, vast new pools of personal data are becoming extremely useful in sharpening business strategies and marketing.
  • Another great boost to innovation in some business sectors is the ability to forge ahead without advance permission or regulation,
  • “In bio-fabs, for example, it’s not the cost of innovation that is high, it’s the cost of regulation,”
  • This notion of “permissionless innovation” is crucial,
  • “In Europe and China, the law holds that unless something is explicitly permitted, it is prohibited. But in the U.S., where common law rather than Continental law prevails, it’s the opposite
Tiberius Brastaviceanu

'Anti-Troll' Marblar Unites NASA Patents, Samsung to Crowdsource New Products - 1 views

  • can be found in NASA technology, and the new crowdsourcing website Marblar is taking advantage of that to find the next big thing.
  • The site Wednesday announced that several hundred patents from NASA and other organizations would be available for its users to play with.
  • many companies' research and development departments spend millions of dollars on such patents, more than 95 percent of them sit unused.
  • ...19 more annotations...
  • what if people saw the patents
  • aying dormant
  • new ways that we can incorporate these patents into new products?"
  • Marblar also obtained access to many patents from the University of Pennsylvania and from ETRI,
  • The site also partnered with Samsung,
  • or its potential to bring the patents of Marblar users to life.
  • Any idea that Samsung likes could find its way into Samsung technology, with 10 percent of the royalties going to the Marblar users who brought it to life
    • Tiberius Brastaviceanu
       
      Samsong decides what to develop or not... this is still top down, when it comes to choosing the technology to be developed. But at least the list of ideas has been curated and refined.
    • Tiberius Brastaviceanu
       
      Using the crowd to curate and refine ideas/inventions
  • The contributors to a Marblar project might be helping an inventor out of the goodness of their heart, but they also stand to gain if a particular product gets the green light. Marblar rewards users who provide useful data or information by giving them "marbles," the websites namesake currency.
    • Tiberius Brastaviceanu
       
      They do have some sort of value accounting system in place. See the open value network model http://valuenetwork.referata.com/wiki/Value_accounting_system 
  • In the spirit of crowdsourcing, other Marblar users can help out a particular inventor whose idea they want to see come to life.
  • "As you submit product ideas and contribute market data or technical data, you get more marbles," Perez said.
    • Tiberius Brastaviceanu
       
      Quirky developed prototyping, manufacturing and distribution capabilities
  • The more marbles a person earns, the bigger the cut he or she gets in the royalty check if the product makes it to market.
  • Another website, Quirky
  • have a store dedicated to selling its users products
  • patents have become more associated with litigation than productivity.
  • "Patent trolls buy up patents to extract money, with no intention of actually creating a product," he said. "Marblar is like the anti-troll. We're looking for new ways to commercialize."
Kurt Laitner

Digital Reality | Edge.org - 0 views

  • When you snap the bricks together, you don't need a ruler to play Lego; the geometry comes from the parts
  • first attribute is metrology that comes from the parts
  • digitizing composites into little linked loops of carbon fiber instead of making giant pieces
  • ...75 more annotations...
  • In a 3D printer today, what you can make is limited by the size of the machine. The geometry is external
  • is the Lego tower is more accurate than the child because the constraint of assembling the bricks lets you detect and correct errors
  • That's the exponential scaling for working reliably with unreliable parts
  • Because the parts have a discrete state, it means in joining them you can detect and correct errors
  • detect and correct state to correct errors to get an exponential reduction in error, which gives you an exponential increase in complexity
  • The next one is you can join Lego bricks made out of dissimilar materials.
  • The last one is when you're done with Lego you don't put it in the trash; you take it apart and reuse it because there's state in the materials. In a forest there's no trash; you die and your parts get disassembled and you're made into new stuff. When you make a 3D print or laser cut, when you're done there's recycling attempts but there's no real notion of reusing the parts
  • The metrology coming from the parts, detecting and correcting errors, joining dissimilar materials, disconnecting, reusing the components
  • On the very smallest scale, the most exciting work on digital fabrication is the creation of life from scratch. The cell does everything we're talking about. We've had a great collaboration with the Venter Institute on microfluidic machinery to load designer genomes into cells. One step up from that we're developing tabletop chip fab instead of a billion dollar fab, using discrete assembly of blocks of electronic materials to build things like integrated circuits in a tabletop process
  • a child can make a Lego structure bigger than themself
  • There's a series of books by David Gingery on how to make a machine shop starting with charcoal and iron ore.
  • There are twenty amino acids. With those twenty amino acids you make the motors in the molecular muscles in my arm, you make the light sensors in my eye, you make my neural synapses. The way that works is the twenty amino acids don't encode light sensors, or motors. They’re very basic properties like hydrophobic or hydrophilic. With those twenty properties you can make you. In the same sense, digitizing fabrication in the deep sense means that with about twenty building blocks—conducting, insulating, semiconducting, magnetic, dielectric—you can assemble them to create modern technology
  • By discretizing those three parts we can make all those 500,000 resistors, and with a few more parts everything else.
  • Now, there's a casual sense, which means a computer controls something to make something, and then there's the deep sense, which is coding the materials. Intellectually, that difference is everything but now I'm going to explain why it doesn't matter.
  • Then in turn, the next surprise was they weren't there for research, they weren't there for theses, they wanted to make stuff. I taught additive, subtractive, 2D, 3D, form, function, circuits, programming, all of these skills, not to do the research but just using the existing machines today
  • What they were answering was the killer app for digital fabrication is personal fabrication, meaning, not making what you can buy at Walmart, it’s making what you can't buy in Walmart, making things for a market of one person
  • The minicomputer industry completely misread PCs
  • the Altair was life changing for people like me. It was the first computer you could own as an individual. But it was almost useless
  • It was hard to use but it brought the cost from a million dollars to 100,000 and the size from a warehouse down to a room. What that meant is a workgroup could have one. When a workgroup can have one it meant Ken Thompson and Dennis Ritchie at Bell Labs could invent UNIX—which all modern operating systems descend from—because they didn't have to get permission from a whole corporation to do it
  • At the PC stage what happened is graphics, storage, processing, IO, all of the subsystems got put in a box
  • To line that up with fabrication, MIT's 1952 NC Mill is similar to the million-dollar machines in my lab today. These are the mainframes of fab. You need a big organization to have them. The fab labs I'll tell you about are exactly analogous to the cost and complexity of minicomputers. The machines that make machines I'll tell you about are exactly analogous to the cost and complexity of the hobbyist computers. The research we're doing, which is leading up to the Star Trek Replicator, is what leads to the personal fabricator, which is the integrated unit that makes everything
  • conducting, resistive, insulating.
  • The fab lab is 2 tons, a $100,000 investment. It fills a few thousand square feet, 3D scanning and printing, precision machining, you can make circuit boards, molding and casting tooling, computer controlled cutting with a knife, with a laser, large format machining, composite layup, surface mount rework, sensors, actuators, embedded programming— technology to make technology.
  • Ten years you can just plot this doubling. Today, you can send a design to a fab lab and you need ten different machines to turn the data into something. Twenty years from now, all of that will be in one machine that fits in your pocket.
  • We've been living with this notion that making stuff is an illiberal art for commercial gain and it's not part of the means of expression. But, in fact, today, 3D printing, micromachining, and microcontroller programming are as expressive as painting paintings or writing sonnets but they're not means of expression from the Renaissance. We can finally fix that boundary between art and artisans
  • You don't go to a fab lab to get access to the machine; you go to the fab lab to make the machine.
  • Over the next maybe five years we'll be transitioning from buying machines to using machines to make machines. Self-reproducing machines
  • But they still have consumables like the motors, and they still cut or squirt. Then the interesting transition comes when we go from cutting or printing to assembling and disassembling, to moving to discretely assembled materials
  • because if anybody can make anything anywhere, it challenges everything
    • Kurt Laitner
       
      great quote (replace challenges with changes for effect)
  • Now, the biggest surprise for me in this is I thought the research was hard. It's leading to how to make the Star Trek Replicator. The insight now is that's an exercise in embodied computation—computation in materials, programming their construction. Lots of work to come, but we know what to do
  • And that's when you do tabletop chip fab or make airplanes. That's when technical trash goes away because you can disassemble. 
  • irritated by the maker movement for the failure in mentoring
  • At something like a Maker Faire, there's hall after hall of repeated reinventions of bad 3D printers and there isn't an easy process to take people from easy to hard
  • We started a project out of desperation because we kept failing to succeed in working with existing schools, called the Fab Academy. Now, to understand how that works, MIT is based on scarcity. You assume books are scarce, so you have to go there for the library; you assume tools are scarce, so you have to go there for the machines; you assume people are scarce, so you have to go there to see them; and geography is scarce. It adds up to we can fit a few thousand people at a time. For those few thousand people it works really well. But the planet is a few billion people. We're off by six orders of magnitude. 
  • Next year we're starting a new class with George Church that we've called "How to Grow Almost Anything", which is using fab labs to make bio labs and then teach biotech in it. What we're doing is we're making a new global kind of university
  • Amusingly, I went to my friends at Educause about accrediting the Fab Academy and they said, "We love it. Where are you located?" And I said, "Yes" and they said, "No." Meaning, "We're all over the earth." And they said, "We have no mechanism. We're not allowed to do that. There's no notion of global accreditation."
  • Then they said something really helpful: "Pretend."
  • Once you have a basic set of tools, you can make all the rest of the tools
  • The way the Fab Academy works, in computing terms, it's like the Internet. Students have peers in workgroups, with mentors, surrounded by machines in labs locally. Then we connect them globally by video and content sharing and all of that. It's an educational network. There are these critical masses of groups locally and then we connect them globally
  • You still have Microsoft or IBM now but, with all respect to colleagues there, arguably that's the least interesting part of software
  • To understand the economic and social implications, look at software and look at music to understand what's happening now for fabrication
  • There's a core set of skills a place like MIT can do but it alone doesn't scale to a billion people. This is taking the social engineering—the character of MIT—but now doing it on this global scale.
  • Mainframes didn't go away but what opened up is all these tiers of software development that weren't economically viable
  • If you look at music development, the most interesting stuff in music isn't the big labels, it's all the tiers of music that weren't viable before
  • You can make music for yourself, for one, ten, 100, 1,000, a million. If you look at the tracks on your device, music is now in tiers that weren't economically viable before. In that example it's a string of data and it becomes a sound. Now in digital fab, it's a string of data and it becomes a thing.
  • What is work? For the average person—not the people who write for Edge, but just an average person working—you leave home to go to a place you'd rather not be, doing a repetitive operation you'd rather not do, making something designed by somebody you don't know for somebody you'll never see, to get money to then go home and buy something. But what if you could skip that and just make the thing?
    • Kurt Laitner
       
      !!!
  • It took about ten years for the dot com industry to realize pretty much across the board you don't directly sell the thing. You sell the benefits of the thing
  • 2016 it's in Shenzhen because they're pivoting from mass manufacturing to enabling personal fabrication. We've set Shenzhen as the goal in 2016 for Fab Lab 2.0, which is fab labs making fab labs
  • To rewind now, you can send something to Shenzhen and mass manufacture it. There's a more interesting thing you can do, which is you go to market by shipping data and you produce it on demand locally, and so you produce it all around the world.
  • But their point was a lot of printers producing beautiful pages slowly scales if all the pages are different
  • In the same sense it scales to fabricate globally by doing it locally, not by shipping the products but shipping the data.
  • It doesn't replace mass manufacturing but mass manufacturing becomes the least interesting stuff where everybody needs the same thing. Instead, what you open up is all these tiers that weren't viable before
  • There, they consider IKEA the enemy because IKEA defines your taste. Far away they make furniture and flat pack it and send it to a big box store. Great design sense in Barcelona, but 50 percent youth unemployment. A whole generation can't work. Limited jobs. But ships come in from the harbor, you buy stuff in a big box store. And then after a while, trucks go off to a trash dump. They describe it as products in, trash out. Ships come in with products, trash goes out
    • Kurt Laitner
       
      worse actually.. the trash stays
  • The bits come and go, globally connected for knowledge, but the atoms stay in the city.
  • instead of working to get money to buy products made somewhere else, you can make them locally
    • Kurt Laitner
       
      this may solve greece's problem, walk away from debt, you can't buy other people's (country's) stuff anymore, so make it all yourself
  • The biggest tool is a ShotBot 4'x8'x1' NC mill, and you can make beautiful furniture with it. That's what furniture shops use
  • Anything IKEA makes you can make in a fab lab
  • it means you can make many of the things you consume directly rather than this very odd remote economic loop
  • the most interesting part of the DIY phone projects is if you're making a do-it-yourself phone, you can also start to make the things that the phones talk to. You can start to build your own telco providers where the users provide the network rather than spending lots of money on AT&T or whoever
  • Traditional manufacturing is exactly replaying the script of the computer companies saying, "That's a toy," and it's shining a light to say this creates entirely new economic activity. The new jobs don't come back to the old factories. The ability to make stuff on demand is creating entirely new jobs
  • To keep playing that forward, when I was in Barcelona for the meeting of all these labs hosted by the city architect and the city, the mayor, Xavier Trias, pushed a button that started a forty-year countdown to self-sufficiency. Not protectionism
  • I need high-torque efficient motors with integrated lead screws at low cost, custom-produced on demand. All sorts of the building blocks that let us do what I'm doing currently rest on a global supply chain including China's manufacturing agility
  • The short-term answer is you can't get rid of them because we need them in the supply chain. But the long-term answer is Shenzhen sees the future isn't mass producing for everybody. That's a transitional stage to producing locally
  • My description of MIT's core competence is it's a safe place for strange people
  • The real thing ultimately that's driving the fab labs ... the vacuum we filled is a technical one. The means to make stuff. Nobody was providing that. But in turn, the spaces become magnets. Everybody talks about innovation or knowledge economy, but then most things that label that strangle it. The labs become vehicles for bright inventive people who don't fit locally. You can think about the culture of MIT but on this global scale
  • My allegiance isn't to any one border, it's to the brainpower of the planet and this is building the infrastructure to scale to that brainpower
  • If you zoom from transistors to microcode to object code to a program, they don't look like each other. But if we take this room and go from city, state, country, it's hierarchical but you preserve geometry
  • Computation violates geometry unlike most anything else we do
  • The reason that's so important for the digital fabrication piece is once we build molecular assemblers to build arbitrary systems, you don't want to then paste a few lines of code in it. You need to overlay computation with geometry. It's leading to this complete do-over of computer science
  • If you take digital fab, plus the real sense of Internet of Things—not the garbled sense—plus the real future of computing aligning hardware and software, it all adds up to this ability to program reality
  • I run a giant video infrastructure and I have collaborators all over the world that I see more than many of my colleagues at MIT because we're all too busy on campus. The next Silicon Valley is a network, it's not a place. Invention happens in these networks.
  • When Edwin Land was kicked out of Polaroid, he made the Rowland Institute, which was making an ideal research institute with the best facilities and the best people and they could do whatever they want. But almost nothing came from it because there was no turnover of the gene pool, there was no evolutionary pressure.  
  • the wrong way to do research, which is to believe there's a privileged set of people that know more than anybody else and to create a barrier that inhibits communication from the inside to the outside
  • you need evolutionary pressure, you need traffic, you need to be forced to deal with people you don't think you need to encounter, and you need to recognize that to be disruptive it helps to know what people know
  • For me the hardest thing isn't the research. That's humming along nicely. It's that we're finding we have to build a completely new kind of social order and that social entrepreneurship—figuring out how you live, learn, work, play—is hard and there's a very small set of people who can do that kind of organizational creation.
    • Kurt Laitner
       
      our challenge in the OVN space
  •  
    what is heavy is local, what is light is global, and increasingly manufacturing is being recreated along this principle
Kurt Laitner

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
Tiberius Brastaviceanu

P2P Foundation » Blog Archive » Ethical Marketing in Age of Horizontal Social... - 0 views

  • the development of marketing is sensible to its environment and is hence already self-limiting itself according to the previously mentioned legal and social framework
  • neuromarketing
  • explore new inner dynamics of marketing, new directions in the field of possibilities offered by the current organology and its articulations between techniques and social organization in order to influence and shape marketing as an associative force – in opposition to its current dissociative force – in the larger psychic, social and technic organology
  • ...70 more annotations...
  • find new ways of efficiency
  • arbitration between efficiency and care
  • a global thinking of the problem
  • Fighting the attention and desire resource shortage: stoping to use advertisement?
  • The question is rather here to think the moderation of the psychopower
  • empower transindividuation, i.e. to make sure that an economic activity creates more possibilities of individuation than it tend to destroy by attempting to capture attention and canalize motivation in a funnel. Empower transindividuation would imply to empowering actors of their own lifestyle, winning back the savoir-vivre prescribing production
  • Should marketing stop using psychopower?
  • marketing ethics guidelines
  • transactions are more likely to be morally defensible if both parties enter it freely and fully informed
  • the goal of marketing should be to increase the likelihood and frequency of free and informed transactions in the marketplace
  • putting freedom as a criteria of morality
  • the industrial use of pycho- and neuropower tend to fall under the category of barriers to freedom
  • neurotechniques – to capture the attention
  • psychotechniques – to attempt to create motivation
  • Most people think commercials are a small price to pay for these benefits
  • advertising
  • denying the schemes of addiction and the fact that we are becoming through the objects of attentions
  • right to avoid attention capture by advertising
  • progress made in cognitive sciences proving that
  • reward system being abnormally stimulated
  • Advertisements exploit
  • vulnerability and reinforce their overconsumption behaviors
  • “if food advertising on TV were banned, significant reductions in the prevalence of childhood obesity are possible.” (Veerman et al. 2009)
  • What is at stake falls to be much more complex than the sole Freedom of Speech invoked for the advertiser
  • liberty of non-reception
  • would mean to guaranty every citizen the right to choose where and when he wants to access the advertising information
  • Change in the industrial and commercial paradigm
  • Economy of contribution and peer production
  • An economy of contribution means that users of a service are contributing to the production of these services.
  • example
  • is open-source software that are contributively build by potentially hundreds of developers organized in communities
  • minimize the gap between the producer and consumer
  • blur the frontier between professionals and amateurs
  • The Copernican revolution of the Vendor Relationship Management paradigm
  • change in the commercial paradigm, described as an Intention Economy i.e. the opposite of the Attention Economy
  • consumers are charged to express and discuss their intention
  • with businesses rather than the usual paradigm in which businesses where fighting for a piece of canalized motivation
  • Implementing such a system would nevertheless imply that marketing departments dispose of a system in which they could value their supplies and where they could be easily found by customers. Doc Searls promotes his answer to this issue: the Vendor Relationship Management system.
  • the belief that free customers are more valuable than captive ones — to themselves, to vendors, and to the larger economy.
  • To be free
  • 1. Customers must enter relationships with vendors as independent actors.
  • 2. Customers must be the points of integration for their own data.
  • 3. Customers must have control of data they generate and gather. This means they must be able to share data selectively and voluntarily.
  • 4. Customers must be able to assert their own terms of engagement.
  • 5. Customers must be free to express their demands and intentions outside of any one company’s control.
  • This is a profoundly game-changing approach
  • big data that is the rush for consumers’ information potentially leading to the same dead-end of attention destruction and affective saturation than the former offline paradigm
  • VRM system working as a marketplace
  • the goal of marketing should be to increase the likelihood and frequency of free and informed transactions in the marketplace
  • less imperfect and less biased information in a cultural context overvaluing transparency, and a bigger atomicity due to the hereafter introduced trend for re-localized peer production.
  • 3.2.2.3 VRM and externalization of the socialization process
  • Promoting the end of advertisement
  • means to find a new way to make the information circulate, what was the primary goal of advertisement
  • Until there is no alternative to massive advertisement campaign for the information circulation, it is indeed hard to ask entrepreneurs and managers to get rid of those successors of propaganda: such a transition process necessarily imply adaptation costs from the producer and the consumer side, and possible competitive disadvantage against competitors still maximizing profit through advertisement means
  • But the internet transformation of the general organology offers new way to think information circuits and potentially constitute an opportunity to externalize the socialization process of products that is to empower citizen-consumers organized in communities
  • Empowering groups of citizen doesn’t annihilate the risks of mis-use or counterproductive interest-taker behaviors but a well-designed system of trust between peers could minimize this risk by creating a dependency to what social capital other peers give you, as it is happening in the sharing economy: the credibility of a contributive peer would be guaranteed through what the P2P Foundation calls Feedback systems and peer-police
  • a strong structuration of products characteristics, allowing customers to personalize their choices according to their desire and constraints: such a “VRM+” system
  • Marketing would then be the art of being as high as possible in this ranking, as it is happening in SEO for search engines, but in this context of criteria explosion, marketing would then be the disciple of listening to customers’ wishes and aspiration needing an attention, in order to kick in the production or to adapt the following series.
  • 3.2.2.4 Toward a possible equi-power
  • Such a system would tremendously re-configure the balance of power and tend toward a form of equi-power i.e. a social organization in which abuses of a “big” would be the potential object of a ranking sanction by the peers
  • self-regulative function
  • a form of economic Darwinism would let to conscious organization the right to curve their path toward a durable configuration in accordance with the social ecosystem.
  • the idea of equi-power is a form of homogenization of the social matter, in which the distortions in the balance of power would be compensated by the gathering of small forces sharing a common interest
  • Such a sanction systems, if successfully implemented, would make value-destructing businesses progressively decline and hopefully bankrupt,
  • long-term valuable strategic choice
  • long term satisfyingly high ranking
  • It would be utopic to think that the “being cool” marketing
  • would disappear, but marketers would have to make those two objectives compose together.
  • This social capital contagion is nevertheless a tool that would need to be controlled in its form of violence by extensive testings and iterations with forms of protections for the smallest peers, that is to say to keep this form of social violence to institutionalized, classic forms of businesses, clearly beyond the line of what should be acceptable in the global village.
  • the goal is here to create an artificial form of majority that is a self-censuring responsible behavior of corporations
Tiberius Brastaviceanu

Citclops project overview - Citclops - 0 views

  •  
    "The Citclops project aims to develop systems to retrieve and use data on seawater colour, transparency and fluorescence, using low-cost sensors combined with people acting as data carriers, contextual information (e.g. georeferencing) and a community-based Internet platform, taking into account existing experiences (e.g. Secchi Dip-In, Coastwatch Europe and Oil Reporter)."
Tiberius Brastaviceanu

About - Safecast - 0 views

  •  
    "create useful, accessible, and granular environmental data. All Safecast data is published, free of charge, into the public domain under a CC0 designation"
Tiberius Brastaviceanu

How The Blockchain Will Transform Everything From Banking To Government To Our Identities - 1 views

  • The first generation of the Internet was a great tool for communicating, collaborating and connecting online, but it was not ideal for business. When you send and share information on the Internet, you’re not sending an original but a copy. That’s good for information — it means people have a printing press for information and that information becomes democratized — but if you want to send an asset, it’s a problem. If I send you $100 online, you need to be sure you have it and I don’t, and that I can’t spend the same $100 somewhere else. As a result, we need intermediaries to perform critical roles — to establish identity between two parties in a transaction, and to do all the settlement transaction logic, which includes record-keeping.
  • With blockchain, for the first time, we have a new digital medium for value where anyone can access anything of value — stocks, bonds, money, digital property, titles, deeds — and even things like identity and votes can be moved, stored and managed securely and privately. Trust is not established though a third party but with clever code and mass consensus using a network. That’s got huge implications for intermediaries and businesses and society at large
  • And also with government, as a central repository of information an entity that delivers services.
  • ...35 more annotations...
  • There’s an opportunity to disrupt how those organizations work. Intermediaries, though they do a good job, have a few problems — they’re centralized, which makes them vulnerable to attack or failure
  • They tax the system
  • They capture data
  • They exclude billions of people from the global economy
  • internet of value
  • With blockchain, we can go from redistributing wealth to distributing value and opportunity value fairly a priori, from cradle to grave.
  • creating a true sharing economy by replacing service aggregators like Uber with distributed applications on the blockchain
  • unleashing a new age of entrepreneurship
  • build accountable governments through transparency, smart contracts and revitalized models of democracy.
  • The virtual you is owned by large intermediaries
  • This virtual you knows more about you than you do sometimes
  • So there’s a strange phenomenon from the first generation of the Internet where the most important asset class that’s been created is data —and we don’t control it or own it.
  • individuals taking back their identity through your own personal avatar
  • The financial services industry
  • antiquated
  • a complicated machine that does a simple thing
  • settlement
  • an opportunity to profoundly change the nature of the entire industry. The Starbucks transaction should be instant.
  • At the heart of it, the financial services industry moves value.
  • so this is both an existential threat to the financial services industry and an historic opportunity.
  • Banks trade on trust
  • Within the decade, every single financial asset, which is really just a contract
  • will all move to a blockchain-based format
  • In the accounting world, a lot of firms rely on costly audits to drive their profits
  • With blockchain, you could have a third entry time-stamped in a distributed ledger that could be acceptable to any relevant stakeholders from regulators to shareholders, giving you a perfect record of the truth and thus the financial health of an organization.
  • Nobel-winning economist Ronald Coase argued that firms exist because transaction costs in an open market are greater than the cost of doing things inside the boundaries of the corporation.
  • four costs — of search, coordination, contracting and establishing trust
  • Blockchains will profoundly affect all of these.
  • you can now synthesize trust on an open platform and people who’ve never met can trust each other to do certain things. So this results in a whole number of new business models
  • It turns out the Internet of Everything needs a Ledger of Everything, because a lightbulb buying power from your neighbor’s solar panel definitely won’t use banks or the Visa network
  • Right now, governments take tax revenue from corporations, individuals, licenses and so on. All of that can change. We can first of all have transparency in a radical sense because sunlight is the best disinfectant. Secondly, we can open up governments in a different sense of sharing data.
  • governments can enable self-organization to occur in society where companies, civil society organizations, NGOs, academics, foundations, and government agencies and individual citizens ought to use this data to self-organize and create what we used to call services or forms of public value. The third one has to do with the relationship between citizens and their governments.
  • There are more opportunities to create government by the people for the people
  • Electronic voting won’t be delivered by traditional server technology because it won’t be trusted by citizens
Kurt Laitner

GAME GOLF - change the golf experience forever, for everyone | Indiegogo - 1 views

  •  
    Very clever use of sensors in golf application, aggregating data in several different dimensions
Francois Bergeron

Data-Oriented Contract.pdf - 1 views

  •  
    (submited by Bob) Computable Contracts This Article explains how and why firms are representing certain contractual obligations as computer data. terms. This Article explains how parties can effectively "translate" certain contractual criteria into a comparable set of computer-processable rules. This can have the effect of significantly reducing transaction costs associated with contract monitoring and compliance as compared to the traditional written-language contracting paradigm.
Yasir Siddiqui

Klick's Intranet System - Genome - Wins SuperNova Award | Klick Health - 1 views

  • Genome harnesses the data-driven and social technology used in online experiences like Facebook, Twitter, Amazon, eBay and Match.com and applies them to how you work
    • Yasir Siddiqui
       
      Relevant to Tactus
  •  
    Genome harnesses the data-driven and social technology used in online experiences like Facebook, Twitter, Amazon, eBay and Match.com and applies them to how you work
Yasir Siddiqui

Distributed Platform, MaidSafe - 0 views

  •  
    "MaidSafe will do for data what Bitcoin does for trade"
1 - 20 of 80 Next › Last »
Showing 20 items per page