Skip to main content

Home/ Sensorica Knowledge/ Group items tagged description

Rss Feed Group items tagged

Tiberius Brastaviceanu

Description of the Piezo Driver Circuit HV Power Supply - Google Drive - 0 views

  •  
    description of the piezo positioner driver circuit
Kurt Laitner

Nondominium | common-source economics & open capital - 0 views

  •  
    Simple description of Nondominium, first paragraph.
Francois Bergeron

Pronto Prototypage rapide- Opaque urethane parts - 0 views

  • Production in small quantities
  •  
    rapid prototyping and molding AND Production in small quantities Quebec city we met Alain Gauthier at ATX Montreal 
Kurt Laitner

Guidelines on Measuring Subjective Well-being.pdf - 0 views

  • such as interest,engagement and meaning,
  • subjective well-being is taken to be:2Good mental states, including all of the various evaluations, positive and negative, that peoplemake of their lives, and the affective reactions of people to their experiences
  • “subjective well-being is an umbrella term for the different valuationspeople make regarding their lives, the events happening to them, their bodies and minds,and the circumstances in which they live”.
  • ...16 more annotations...
  • In measuring overall human well-being then, subjective well-being should be placedalongside measures of non-subjective outcomes, such as income, health, knowledge andskills, safety, environmental quality and social connections
  • Inparticular, a distinction is commonly made between life evaluations, which involve acognitive evaluation of the respondent’s life as a whole (or aspects of it), and measures ofaffect, which capture the feelings experienced by the respondent at a particular point in time(Diener, 1984; Kahneman et al., 1999
  • eudaimonic aspect ofsubjective well-being, reflecting people’s sense of purpose and engagement
  • The framework used here covers all three concepts of well-being:●Life evaluation.●Affect.●Eudaimonia (psychological “flourishing”)
  • the result of a judgement by the individual rather than thedescription of an emotional state.
  • Elements of subjective well-beingLife evaluation
  • making an evaluation of this sort as involving the individual constructing a “standard” thatthey perceive as appropriate for themselves, and then comparing the circumstances oftheir life to that standard
  • Life evaluations are based on how people remember their experiences (Kahneman et al.,1999) and can differ significantly from how they actually experienced things at the time
  • It is for this reason that life evaluations are sometimes characterised as measures of“decision utility” in contrast to “experienced utility”
  • One of the mostwell documented measures of life evaluation – thePersonal Wellbeing Index– consists of eightquestions, covering satisfactions with eight different aspects of life, which are summedusing equal weights to calculate an overall index (International Wellbeing Group, 2006)
  • (job satisfaction, financial satisfaction, house satisfaction, healthsatisfaction, leisure satisfaction and environmental satisfaction),
  • AffectAffect is the term psychologists use to describe a person’s feelings. Measures of affectcan be thought of as measures of particular feelings or emotional states, and they aretypically measured with reference to a particular point in time.
  • Such measures capturehow people experience life rather than how they remember it (Kahneman and Krueger,2006
  • While an overall evaluation of life can be captured in a single measure, affect has atleast two distinct hedonic dimensions: positive affect and negative affect (Kahneman et al.,1999; Diener et al., 1999
  • positive affect is thought to be largely uni-dimensional
  • negative affect may be more multi-dimensional.
Tiberius Brastaviceanu

What is an ontology and why we need it - 1 views

  • an ontology designer makes these decisions based on the structural properties of a class.
  • an ontology is a formal explicit description of concepts in a domain of discourse (classes (sometimes called concepts)), properties of each concept describing various features and attributes of the concept (slots (sometimes called roles or properties)), and restrictions on slots (facets (sometimes called role restrictions)). An ontology together with a set of individual instances of classes constitutes a knowledge base. In reality, there is a fine line where the ontology ends and the knowledge base begins.
  • Classes describe concepts in the domain
  • ...16 more annotations...
  • A class can have subclasses that represent concepts that are more specific than the superclass.
  • Here we discuss general issues to consider and offer one possible process for developing an ontology. We describe an iterative approach to ontology development: we start with a rough first pass at the ontology. We then revise and refine the evolving ontology and fill in the details. Along the way, we discuss the modeling decisions that a designer needs to make, as well as the pros, cons, and implications of different solutions.
  • In practical terms, developing an ontology includes: �         defining classes in the ontology, �         arranging the classes in a taxonomic (subclass–superclass) hierarchy, �         defining slots and describing allowed values for these slots, �         filling in the values for slots for instances.
  • We can then create a knowledge base by defining individual instances of these classes filling in specific slot value information and additional slot restrictions.
  • Slots describe properties of classes and instances:
  • There is no one correct way to model a domain— there are always viable alternatives. The best solution almost always depends on the application that you have in mind and the extensions that you anticipate. 2)      Ontology development is necessarily an iterative process. 3)      Concepts in the ontology should be close to objects (physical or logical) and relationships in your domain of interest. These are most likely to be nouns (objects) or verbs (relationships) in sentences that describe your domain.
  • some fundamental rules in ontology design
  • how detailed or general the ontology is going to be
  • what we are going to use the ontology for
  • concepts in the ontology must reflect this reality
  • We suggest starting the development of an ontology by defining its domain and scope. That is, answer several basic questions: �         What is the domain that the ontology will cover? �         For what  we are going to use the ontology? �         For what types of questions the information in the ontology should provide answers? �         Who will use and maintain the ontology?
  • plan to use
  • domain
  • If the people who will maintain the ontology describe the domain in a language that is different from the language of the ontology users, we may need to provide the mapping between the languages.
  • One of the ways to determine the scope of the ontology is to sketch a list of questions that a knowledge base based on the ontology should be able to answer, competency questions
  • These competency questions are just a sketch and do not need to be exhaustive.
Tiberius Brastaviceanu

Action (Stanford Encyclopedia of Philosophy) - 0 views

  • intentionally
  • questions about the nature, variety, and identity of action
  • Should we think of the consequences, conventional or causal, of physical behavior as constituents of an action distinct from but ‘generated by’ the movement? Or should we think that there is a single action describable in a host of ways?
  • ...22 more annotations...
  • Donald Davidson
  • an action
  • is something an agent does that was ‘intentional under some description,’
  • there have been many attempts to map the relations between intentions for the future, acting intentionally, and acting with a certain intention.
  • There has been a notable or notorious debate about whether the agent's reasons in acting are causes of the action
  • rendered the action intelligible in his eyes
  • things that merely happen
  • things they genuinely do
  • distinction between
  • the doings, are the acts or actions of the agent
  • what distinguishes an action from a mere happening or occurrence?
  • An agent performs activity that is directed at a goal
  • adopted on the basis of an overall practical assessment of his options and opportunities
  • awareness
  • that he is performing the activity
  • and that the activity is aimed by him at such-and-such a chosen end
  • It is frequently noted that the agent has some sort of immediate awareness of his physical activity and of the goals that the activity is aimed at realizing.
  • ‘knowledge without observation.’
  • It is also important to the concept of ‘goal directed action’ that agents normally implement a kind of direct control or guidance over their own behavior.
  • For many years, the most intensely debated topic in the philosophy of action concerned the explanation of intentional actions in terms of the agent's reasons for acting
  • Davidson and other action theorists defended the position that reason explanations are causal explanations
  • In the foregoing, reference has been made to explanations of actions in terms of reasons, but recent work on agency has questioned whether contemporary frameworks for the philosophy of action have really articulated the way in which an agent's desires and other pro-attitudes have the distinctive force of reasons in the setting of these ordinary explanations
Kurt Laitner

Digital Reality | Edge.org - 0 views

  • When you snap the bricks together, you don't need a ruler to play Lego; the geometry comes from the parts
  • first attribute is metrology that comes from the parts
  • digitizing composites into little linked loops of carbon fiber instead of making giant pieces
  • ...75 more annotations...
  • In a 3D printer today, what you can make is limited by the size of the machine. The geometry is external
  • is the Lego tower is more accurate than the child because the constraint of assembling the bricks lets you detect and correct errors
  • That's the exponential scaling for working reliably with unreliable parts
  • Because the parts have a discrete state, it means in joining them you can detect and correct errors
  • detect and correct state to correct errors to get an exponential reduction in error, which gives you an exponential increase in complexity
  • The next one is you can join Lego bricks made out of dissimilar materials.
  • The last one is when you're done with Lego you don't put it in the trash; you take it apart and reuse it because there's state in the materials. In a forest there's no trash; you die and your parts get disassembled and you're made into new stuff. When you make a 3D print or laser cut, when you're done there's recycling attempts but there's no real notion of reusing the parts
  • The metrology coming from the parts, detecting and correcting errors, joining dissimilar materials, disconnecting, reusing the components
  • On the very smallest scale, the most exciting work on digital fabrication is the creation of life from scratch. The cell does everything we're talking about. We've had a great collaboration with the Venter Institute on microfluidic machinery to load designer genomes into cells. One step up from that we're developing tabletop chip fab instead of a billion dollar fab, using discrete assembly of blocks of electronic materials to build things like integrated circuits in a tabletop process
  • a child can make a Lego structure bigger than themself
  • There's a series of books by David Gingery on how to make a machine shop starting with charcoal and iron ore.
  • There are twenty amino acids. With those twenty amino acids you make the motors in the molecular muscles in my arm, you make the light sensors in my eye, you make my neural synapses. The way that works is the twenty amino acids don't encode light sensors, or motors. They’re very basic properties like hydrophobic or hydrophilic. With those twenty properties you can make you. In the same sense, digitizing fabrication in the deep sense means that with about twenty building blocks—conducting, insulating, semiconducting, magnetic, dielectric—you can assemble them to create modern technology
  • By discretizing those three parts we can make all those 500,000 resistors, and with a few more parts everything else.
  • Now, there's a casual sense, which means a computer controls something to make something, and then there's the deep sense, which is coding the materials. Intellectually, that difference is everything but now I'm going to explain why it doesn't matter.
  • Then in turn, the next surprise was they weren't there for research, they weren't there for theses, they wanted to make stuff. I taught additive, subtractive, 2D, 3D, form, function, circuits, programming, all of these skills, not to do the research but just using the existing machines today
  • What they were answering was the killer app for digital fabrication is personal fabrication, meaning, not making what you can buy at Walmart, it’s making what you can't buy in Walmart, making things for a market of one person
  • The minicomputer industry completely misread PCs
  • the Altair was life changing for people like me. It was the first computer you could own as an individual. But it was almost useless
  • It was hard to use but it brought the cost from a million dollars to 100,000 and the size from a warehouse down to a room. What that meant is a workgroup could have one. When a workgroup can have one it meant Ken Thompson and Dennis Ritchie at Bell Labs could invent UNIX—which all modern operating systems descend from—because they didn't have to get permission from a whole corporation to do it
  • At the PC stage what happened is graphics, storage, processing, IO, all of the subsystems got put in a box
  • To line that up with fabrication, MIT's 1952 NC Mill is similar to the million-dollar machines in my lab today. These are the mainframes of fab. You need a big organization to have them. The fab labs I'll tell you about are exactly analogous to the cost and complexity of minicomputers. The machines that make machines I'll tell you about are exactly analogous to the cost and complexity of the hobbyist computers. The research we're doing, which is leading up to the Star Trek Replicator, is what leads to the personal fabricator, which is the integrated unit that makes everything
  • conducting, resistive, insulating.
  • The fab lab is 2 tons, a $100,000 investment. It fills a few thousand square feet, 3D scanning and printing, precision machining, you can make circuit boards, molding and casting tooling, computer controlled cutting with a knife, with a laser, large format machining, composite layup, surface mount rework, sensors, actuators, embedded programming— technology to make technology.
  • Ten years you can just plot this doubling. Today, you can send a design to a fab lab and you need ten different machines to turn the data into something. Twenty years from now, all of that will be in one machine that fits in your pocket.
  • We've been living with this notion that making stuff is an illiberal art for commercial gain and it's not part of the means of expression. But, in fact, today, 3D printing, micromachining, and microcontroller programming are as expressive as painting paintings or writing sonnets but they're not means of expression from the Renaissance. We can finally fix that boundary between art and artisans
  • You don't go to a fab lab to get access to the machine; you go to the fab lab to make the machine.
  • Over the next maybe five years we'll be transitioning from buying machines to using machines to make machines. Self-reproducing machines
  • But they still have consumables like the motors, and they still cut or squirt. Then the interesting transition comes when we go from cutting or printing to assembling and disassembling, to moving to discretely assembled materials
  • because if anybody can make anything anywhere, it challenges everything
    • Kurt Laitner
       
      great quote (replace challenges with changes for effect)
  • Now, the biggest surprise for me in this is I thought the research was hard. It's leading to how to make the Star Trek Replicator. The insight now is that's an exercise in embodied computation—computation in materials, programming their construction. Lots of work to come, but we know what to do
  • And that's when you do tabletop chip fab or make airplanes. That's when technical trash goes away because you can disassemble. 
  • irritated by the maker movement for the failure in mentoring
  • At something like a Maker Faire, there's hall after hall of repeated reinventions of bad 3D printers and there isn't an easy process to take people from easy to hard
  • We started a project out of desperation because we kept failing to succeed in working with existing schools, called the Fab Academy. Now, to understand how that works, MIT is based on scarcity. You assume books are scarce, so you have to go there for the library; you assume tools are scarce, so you have to go there for the machines; you assume people are scarce, so you have to go there to see them; and geography is scarce. It adds up to we can fit a few thousand people at a time. For those few thousand people it works really well. But the planet is a few billion people. We're off by six orders of magnitude. 
  • Next year we're starting a new class with George Church that we've called "How to Grow Almost Anything", which is using fab labs to make bio labs and then teach biotech in it. What we're doing is we're making a new global kind of university
  • Amusingly, I went to my friends at Educause about accrediting the Fab Academy and they said, "We love it. Where are you located?" And I said, "Yes" and they said, "No." Meaning, "We're all over the earth." And they said, "We have no mechanism. We're not allowed to do that. There's no notion of global accreditation."
  • Then they said something really helpful: "Pretend."
  • Once you have a basic set of tools, you can make all the rest of the tools
  • The way the Fab Academy works, in computing terms, it's like the Internet. Students have peers in workgroups, with mentors, surrounded by machines in labs locally. Then we connect them globally by video and content sharing and all of that. It's an educational network. There are these critical masses of groups locally and then we connect them globally
  • You still have Microsoft or IBM now but, with all respect to colleagues there, arguably that's the least interesting part of software
  • To understand the economic and social implications, look at software and look at music to understand what's happening now for fabrication
  • There's a core set of skills a place like MIT can do but it alone doesn't scale to a billion people. This is taking the social engineering—the character of MIT—but now doing it on this global scale.
  • Mainframes didn't go away but what opened up is all these tiers of software development that weren't economically viable
  • If you look at music development, the most interesting stuff in music isn't the big labels, it's all the tiers of music that weren't viable before
  • You can make music for yourself, for one, ten, 100, 1,000, a million. If you look at the tracks on your device, music is now in tiers that weren't economically viable before. In that example it's a string of data and it becomes a sound. Now in digital fab, it's a string of data and it becomes a thing.
  • What is work? For the average person—not the people who write for Edge, but just an average person working—you leave home to go to a place you'd rather not be, doing a repetitive operation you'd rather not do, making something designed by somebody you don't know for somebody you'll never see, to get money to then go home and buy something. But what if you could skip that and just make the thing?
    • Kurt Laitner
       
      !!!
  • It took about ten years for the dot com industry to realize pretty much across the board you don't directly sell the thing. You sell the benefits of the thing
  • 2016 it's in Shenzhen because they're pivoting from mass manufacturing to enabling personal fabrication. We've set Shenzhen as the goal in 2016 for Fab Lab 2.0, which is fab labs making fab labs
  • To rewind now, you can send something to Shenzhen and mass manufacture it. There's a more interesting thing you can do, which is you go to market by shipping data and you produce it on demand locally, and so you produce it all around the world.
  • But their point was a lot of printers producing beautiful pages slowly scales if all the pages are different
  • In the same sense it scales to fabricate globally by doing it locally, not by shipping the products but shipping the data.
  • It doesn't replace mass manufacturing but mass manufacturing becomes the least interesting stuff where everybody needs the same thing. Instead, what you open up is all these tiers that weren't viable before
  • There, they consider IKEA the enemy because IKEA defines your taste. Far away they make furniture and flat pack it and send it to a big box store. Great design sense in Barcelona, but 50 percent youth unemployment. A whole generation can't work. Limited jobs. But ships come in from the harbor, you buy stuff in a big box store. And then after a while, trucks go off to a trash dump. They describe it as products in, trash out. Ships come in with products, trash goes out
    • Kurt Laitner
       
      worse actually.. the trash stays
  • The bits come and go, globally connected for knowledge, but the atoms stay in the city.
  • instead of working to get money to buy products made somewhere else, you can make them locally
    • Kurt Laitner
       
      this may solve greece's problem, walk away from debt, you can't buy other people's (country's) stuff anymore, so make it all yourself
  • The biggest tool is a ShotBot 4'x8'x1' NC mill, and you can make beautiful furniture with it. That's what furniture shops use
  • Anything IKEA makes you can make in a fab lab
  • it means you can make many of the things you consume directly rather than this very odd remote economic loop
  • the most interesting part of the DIY phone projects is if you're making a do-it-yourself phone, you can also start to make the things that the phones talk to. You can start to build your own telco providers where the users provide the network rather than spending lots of money on AT&T or whoever
  • Traditional manufacturing is exactly replaying the script of the computer companies saying, "That's a toy," and it's shining a light to say this creates entirely new economic activity. The new jobs don't come back to the old factories. The ability to make stuff on demand is creating entirely new jobs
  • To keep playing that forward, when I was in Barcelona for the meeting of all these labs hosted by the city architect and the city, the mayor, Xavier Trias, pushed a button that started a forty-year countdown to self-sufficiency. Not protectionism
  • I need high-torque efficient motors with integrated lead screws at low cost, custom-produced on demand. All sorts of the building blocks that let us do what I'm doing currently rest on a global supply chain including China's manufacturing agility
  • The short-term answer is you can't get rid of them because we need them in the supply chain. But the long-term answer is Shenzhen sees the future isn't mass producing for everybody. That's a transitional stage to producing locally
  • My description of MIT's core competence is it's a safe place for strange people
  • The real thing ultimately that's driving the fab labs ... the vacuum we filled is a technical one. The means to make stuff. Nobody was providing that. But in turn, the spaces become magnets. Everybody talks about innovation or knowledge economy, but then most things that label that strangle it. The labs become vehicles for bright inventive people who don't fit locally. You can think about the culture of MIT but on this global scale
  • My allegiance isn't to any one border, it's to the brainpower of the planet and this is building the infrastructure to scale to that brainpower
  • If you zoom from transistors to microcode to object code to a program, they don't look like each other. But if we take this room and go from city, state, country, it's hierarchical but you preserve geometry
  • Computation violates geometry unlike most anything else we do
  • The reason that's so important for the digital fabrication piece is once we build molecular assemblers to build arbitrary systems, you don't want to then paste a few lines of code in it. You need to overlay computation with geometry. It's leading to this complete do-over of computer science
  • If you take digital fab, plus the real sense of Internet of Things—not the garbled sense—plus the real future of computing aligning hardware and software, it all adds up to this ability to program reality
  • I run a giant video infrastructure and I have collaborators all over the world that I see more than many of my colleagues at MIT because we're all too busy on campus. The next Silicon Valley is a network, it's not a place. Invention happens in these networks.
  • When Edwin Land was kicked out of Polaroid, he made the Rowland Institute, which was making an ideal research institute with the best facilities and the best people and they could do whatever they want. But almost nothing came from it because there was no turnover of the gene pool, there was no evolutionary pressure.  
  • the wrong way to do research, which is to believe there's a privileged set of people that know more than anybody else and to create a barrier that inhibits communication from the inside to the outside
  • you need evolutionary pressure, you need traffic, you need to be forced to deal with people you don't think you need to encounter, and you need to recognize that to be disruptive it helps to know what people know
  • For me the hardest thing isn't the research. That's humming along nicely. It's that we're finding we have to build a completely new kind of social order and that social entrepreneurship—figuring out how you live, learn, work, play—is hard and there's a very small set of people who can do that kind of organizational creation.
    • Kurt Laitner
       
      our challenge in the OVN space
  •  
    what is heavy is local, what is light is global, and increasingly manufacturing is being recreated along this principle
Tiberius Brastaviceanu

Access control - Wikipedia, the free encyclopedia - 0 views

  • The act of accessing may mean consuming, entering, or using.
  • Permission to access a resource is called authorization.
  • Locks and login credentials are two analogous mechanisms of access control.
  • ...26 more annotations...
  • Geographical access control may be enforced by personnel (e.g., border guard, bouncer, ticket checker)
  • n alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country
  • access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons
  • can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap.
  • Physical access control is a matter of who, where, and when
  • Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.[citation needed] Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked
  • Credential
  • Access control system operation
  • The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input
  • There are three types (factors) of authenticating information:[2] something the user knows, e.g. a password, pass-phrase or PIN something the user has, such as smart card or a key fob something the user is, such as fingerprint, verified by biometric measurement
  • Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios
  • When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked.
  • A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a biometric feature) or some combination of these items. This is known as multi-factor authentication. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.
  • An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list
  • monitor the door position
  • Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the doo
  • Access control topology
  • Access control decisions are made by comparing the credential to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the look-up out from a central host to the edge of the system, or the reader. The predominant topology circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks
  • Access control readers may be classified by the functions they are able to perform
  • and forward it to a control panel.
  • Basic (non-intelligent) readers: simply read
  • Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus.
  • Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers.
  • Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host
  • a built in webservice to make it user friendly
  • Some readers may have additional features such as an LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support
Kurt Laitner

Asia Times Online :: Nondominium - the Caspian solution - 0 views

  • A Caspian partnership The proposal is that the littoral states should form a Caspian Foundation legal entity, and commit to that entity all existing rights in respect of the use, and the fruits of use (usufruct), of the Caspian Sea, and everything on it, in it, or under it. The Caspian Foundation would act as custodian or steward and the nations would have agreed governance rights of veto. This negative or passive veto right of stewardship is very different from conventional property rights of absolute ownership and temporary use under condominium. Moreover, it does not have the active power of control held under common law by a trustee on behalf of beneficiaries, and the legal complexities and management conflicts which go with it. The Caspian Foundation would be a subscriber to a Caspian Partnership framework agreement between the nations, investors of money or money's worth, and a consortium of service providers. This Caspian Partnership would not be yet another international organization, with everything that goes with that. It would not own anything, employ anyone or contract with anyone: it would simply be an associative framework agreement within which Caspian nations self-organize to the common purpose of the sustainable development of the Caspian Sea.
  • Nondominium - the Caspian solution By Chris Cook Twenty-first century problems cannot be solved with 20th century solutions. Nowhere is that saying so true as in territorial disputes where oil and gas are involved. The riches of the Caspian Sea have been the subject of dispute for years, and relatively simple - but still intractable - binary issues between Iran and Russia are now multiplied by the conflicting claims of what are now five littoral Caspian nations: Azerbaijan, Iran; Kazakhstan; Russia and Turkmenistan. Their claims relate not just to rights on the Caspian Sea surface, but to rights in the sea, and above all to the rights to the treasures that lie under it. There are two 20th century legal approaches: international law //ad information var tf_adModel = "FEV"; var tf_adType = "InBannerVideo"; var tf_commonLocation = "http://cdnx.tribalfusion.com/media/common/expand/"; //leave this variable as it is var tf_cookieFlash = "http://cdnx.tribalfusion.com/media/common/TFSObj_v2s"; var tf_isExpansionHandle = true; var tf_floatAdScriptPath = "http://cdnx.tribalfusion.com/media/common/floating/TF_FloatAdLibrary.js"; var tf_zoomFlash = "http://cdnx.tribalfusion.com/media/common/floating/TFScale_v1"; var tf_banner = { "flag" : "inBanner", "width" : 300, "height" : 250, "widthExpanded" : 600, "heightExpanded" : 450, "widthFloating" : 950, "heightFloating" : 570, "iWin" : [ ], "flashFile" : "http://cdnx.tribalfusion.com/media/4523336/Glow_Banner_Square_Template_V201", extraFlashVars:"tf_showPanelonLoad=true&tf_phase2=false", "video_expand" : "http://cdnx.tribalfusion.com/media/4523336/video.flv", "imageFile" : "http://cdnx.tribalfusion.com/media/4523336/300.jpg", "video" : "http://cdnx.tribalfusion.com/media/4523336/video.flv", "clickTag" : "http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=tf&c=20&mc=click&pli=8816678&PluID=0&ord=619093658", "clickTag1" : "http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=tf&c=20&mc=click&pli=8816678&PluID=0&ord=619093658", "clickTag2" : "http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=tf&c=20&mc=click&pli=8816678&PluID=0&ord=619093658", "socialNetworks" : [ ], "video_expand_start" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=0pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_midpoint" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=50pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_firstQuartile" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=25pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_thirdQuartile" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=75pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_complete" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=100pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_mute" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=MuteLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_unmute" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=UnmuteLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_pause" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=PauseLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_rewind" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=RewindLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_resume" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=ResumeLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_replay" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=ReplayLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_fullscreen" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=FSLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_close" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=VCloseLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "clickTag_tracking" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=ClickLive&ord=619093658&custom1=Save 3 Now(Click Tag)&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;ph:@phase@", "clickTag1_tracking" : "http:
  • A Caspian partnership The proposal is that the littoral states should form a Caspian Foundation legal entity, and commit to that entity all existing rights in respect of the use, and the fruits of use (usufruct), of the Caspian Sea, and everything on it, in it, or under it. The Caspian Foundation would act as custodian or steward and the nations would have agreed governance rights of veto. This negative or passive veto right of stewardship is very different from conventional property rights of absolute ownership and temporary use under condominium. Moreover, it does not have the active power of control held under common law by a trustee on behalf of beneficiaries, and the legal complexities and management conflicts which go with it. The Caspian Foundation would be a subscriber to a Caspian Partnership framework agreement between the nations, investors of money or money's worth, and a consortium of service providers. This Caspian Partnership would not be yet another international organization, with everything that goes with that. It would not own anything, employ anyone or contract with anyone: it would simply be an associative framework agreement within which Caspian nations self-organize to the common purpose of the sustainable development of the Caspian Sea.
  • ...1 more annotation...
  • A Caspian partnership The proposal is that the littoral states should form a Caspian Foundation legal entity, and commit to that entity all existing rights in respect of the use, and the fruits of use (usufruct), of the Caspian Sea, and everything on it, in it, or under it. The Caspian Foundation would act as custodian or steward and the nations would have agreed governance rights of veto. This negative or passive veto right of stewardship is very different from conventional property rights of absolute ownership and temporary use under condominium. Moreover, it does not have the active power of control held under common law by a trustee on behalf of beneficiaries, and the legal complexities and management conflicts which go with it. The Caspian Foundation would be a subscriber to a Caspian Partnership framework agreement between the nations, investors of money or money's worth, and a consortium of service providers. This Caspian Partnership would not be yet another international organization, with everything that goes with that. It would not own anything, employ anyone or contract with anyone: it would simply be an associative framework agreement within which Caspian nations self-organize to the common purpose of the sustainable development of the Caspian Sea.
Tiberius Brastaviceanu

Co-Creating as Disruption to the Dominant Cultural Framework » Wirearchy - 0 views

  • more open people processes
  • Participative processes like Open Space, World Cafes, Unconferences, Peer Circles
  • Barcamps, Wordcamps, Govcamps, Foo Camps, Unconferences, high-end celebrity-and-marketing-and venture-capital ‘experience’ markets, new cultural and artistic festivals with technology-and-culture-making themes
  • ...45 more annotations...
  • maker faires
  • community-and-consensus building, organizing for activism and fundraising
  • The impetus behind this explosion is both technological and sociological
  • Technological
  • information technology and the creation and evolution of the Internet and the Web
  • appearance, development and evolution of social tools, web services, massive storage, and the ongoing development of computer-and-smart-devices development
  • Sociological
  • People are searching for ways to find others with similar interests and motivations so that they can engage in activities that help them learn, find work, grow capabilities and skills, and tackle vexing social and economic problems
  • get informed and take action
  • Developing familiarity and practice with open and collaborative processes
  • play and work together
  • rules about self-management, operate democratically, and produce results grounded in ownership and the responsibilities that have been agreed upon by the ‘community’
  • The relationships and flows of information can be transferred to online spaces and often benefit from wider connectivity.
  • Today, our culture-making activities are well engaged in the early stages of cultural mutation
  • What’s coming along next ?  “Smart” devices and Internet everywhere in our lives ?  Deep(er) changes to the way things are conceived, carried out, managed and used ?  New mental models ?  Or, will we discover real societal limits to what can be done given the current framework of laws, institutions and established practices with which people are familiar and comfortable ?
  • Shorter cycle-based development and release
  • Agile development
  • It is clear evidence that the developmental and learning dynamics generated by continuous or regular feedback loops are becoming the norm in areas of activity in which change and short cycles of product development are constants.
  • The Internet of Things (IoT)
  • clothes, homes, cars, buildings, roads, and a wide range of other objects that have a place in peoples’ daily life activities
  • experiencing major growth, equally in terms of hardware, software and with respect to the way the capabilities are configured and used
  • The IoT concept is being combined with the new-ish concepts of Open Data and Big Data
  • ethical, political and social impact policy decisions
  • that key opportunities associated with widespread uptake of the IoT are derived from the impact upon peoples’ activities and lives
  • ‘we’ are on our way towards more integrated eco-systems of issues, people and technologies
  • participation and inclusion enabled by interconnectedness are quickly becoming the ‘new rules’
  • What the Future May Hold
  • the ‘scenario planning’ approach
  • world’s politics, economics, anthropology, technology, psychology, sociology and philosophy
  • A scenario planning exercise carried out by the Rockefeller Foundation
  • Clearly these early (and now not-so-weak) signals and patterns tell us that the core assumptions and principles that have underpinned organized human activities for most of the past century
  • are being changed by the combinations and permutations of new, powerful, inexpensive and widely accessible information-processing technologies
  • The short description of each scenario reinforces the perception that we are both individually and collectively in transition from a linear, specialized, efficiency-driven paradigm towards a paradigm based on continuous feedback loops and principles of participation, both large and small in scope.
  • cultural ‘mutation’
  • Wirearchy
  • a dynamic two-way flow of power and authority based on knowledge, trust, credibility and a focus on results, enabled by interconnected people and technology.
  • the role of social media and smart mobile devices in the uprisings in Egypt, Libya and elsewhere in the Middle East
  • The roots of organizational development (OD) are in humanistic psychology and sociology action and ethnographic and cybernetic/ socio-technical systems theory.  It’s a domain that emerged essentially as a counter-balance to the mechanistic and machine-metaphor-based core assumptions about the organized activities in our society.
  • Organizational development principles are built upon some basic assumptions about human motivations, engagement and activities.
  • Participative Work Design – The Six Criteria
  • in recent years created models that help clarify how to evaluate and respond to the continuous turbulence and ambiguity generated by participating in interconnected flows of information.
  • contexts characterized by either Simple, Complicated or Chaotic dynamics (from complexity theory fundamentals). Increasingly, Complexity is emerging as a key definer of the issues, problems and opportunities faced by our societies.
  • peer-to-peer movement(s) unfolding around the world
  • Co-creating in a wide range of forms, processes and purpose may become an effective and important antidote to the spreading enclosure of human creative activity.
  • But .. the dominant models of governance, commercial ownership and the use and re-use of that which is co-created by people are going to have to undergo much more deep change in order to disrupt the existing paradigm of proprietary commercial creation and the model of socio-economic power that this paradigm enables and carries today.
mayssamd

List of Companies with p2p related practices - 0 views

  •  
    The description does say "companies" yet Sensorica is on the list
1 - 18 of 18
Showing 20 items per page