Skip to main content

Home/ Sensorica Knowledge/ Group items tagged elements

Rss Feed Group items tagged

Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • Google Apps Script provides you with the ability to build a user interface for displaying or capturing information.
  • Viewing the Available User Interface Elements
  • Your scripts can display the user interface in two ways:
  • ...48 more annotations...
  • from a Spreadsheet
  • from a Site
  • As a stand-alone servlet
  • Deciding Whether to Run a Script from a Spreadsheet or as a Service
  • The built-in code autocomplete functionality in the editor requires you to type the trailing period that follows app.
  • Plan the script. What tasks should the script accomplish?
  • Write down the specific information you want to display to or collect from your users.
  • Draw the user interface
  • Determine what the script and interface should do in response to any user input.
  • Determine the conditions for exiting the script.
  • you need a UiApp application object to contain the user interface elements. After you create the UiApp application object, you can add buttons, dialog boxes, panels, and other elements to the UiApp application object.
  • The general syntax for these operations is as follows:
  • To create a UiApp application object, use the syntax var your_application_object_name = UiApp.createApplication();
  • To create a user interface element and associate it with your UiApp application object, use the syntax var your_ui_element_name= your_application_object_name.createElement_Name();.
  • To add one user interface element to another
  • use the syntax your_ui_element_name1.add(your_ui_element_name2);
  • a button with the text Press Me on it:
  • creates a vertical panel.
  • other kinds of panels
  • pop-up panels, stack panels, focus panels, form panels, and so on.
  • code for displaying your button on the panel:
  • add the panel to the application:
  • nstruct Google Apps Script to display the interface elements:
  • You can create the user interface elements in any order.
  • the display order
  • Creating the elements and adding them to your application are separate steps requiring separate instructions.
  • a short script that does nothing but display a panel with a button on it.
  • You can chain together setter methods
  • sets its title
  • set the size of the object:
  • how to use Grid objects and the setWidget method to create a more complex layout and also how to create text boxes and label them.
  • To make a user interface useful, you need the ability to update a Spreadsheet with information a user enters from the interface.
  • a short script that responds to an action in the interface by updating the Spreadsheet.
  • looping structure in the script to keep the panel displayed and active
  • Server-side means that the actions are performed by a server
  • same script, with functions added that enable the form to be used multiple times before a user chooses to exit.
  • script collects some information from text fields on a panel and writes that information into the Spreadsheet.
  • You can make a script's user interface available to users from inside a Spreadsheet or Site or by running it separately as a service.
  • how to make the user interface as a service.
  • A script that provides a stand-alone user interface must invoke the doGet(e) function or the doPost(e) function for an HTML form submit.
  • A script that provides the user interface from the Spreadsheet invokes doc.show(app).
  • The doGet(e) function takes the argument e, passing in the arguments for the user interface, including the user name of the person invoking the script.
  • After you write the script, you publish it as a service. During the publishing process, you define who has access to the script.
  • In a Google Apps domain, you can publish the script so that only you have access or so that everyone in the domain has access.
  • In a Google consumer account, you can publish the script so that only you have access or so that everyone in the world has access.
  • Updating a Spreadsheet from the User Interface, the user interface is displayed from the Spreadsheet where the script is stored. The following code defines how the user interface is displayed:
  • Here's the skeleton code for displaying a user interface as a stand-alone service:
  • some aspects of the two ways to display a user interface.
Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • how to accomplish some common tasks
  • add a custom menu to a Spreadsheet and link specific functions in your script to menu items
  • the menu items, the functions pops up a message box.
  • ...11 more annotations...
  • you will want the custom menu to be displayed as soon as the Spreadsheet is opened. To do this,include an onOpen function in your script
  • array of objects
  • An array is a collection of elements that works something like a Spreadsheet. Each element in an array can be identified by its location in the array, called an index point.
  • Arrays
  • are zero-based
  • Arrays are a convenient way to store and manipulate data within a computer program or script.
  • Each menu item is placed inside curly braces, and this syntax defines each name-function name pair as an object.
  • After the definition of the menu entries comes the definition of the menu itself:
  • Here's generalized code for creating menu items and a menu.
  • The following code pops up a message box when a user selects a menu item on the new menu:
  • the generalized code
Tiberius Brastaviceanu

Beyond Blockchain: Simple Scalable Cryptocurrencies - The World of Deep Wealth - Medium - 0 views

  • I clarify the core elements of cryptocurrency and outline a different approach to designing such currencies rooted in biomimicry
  • This post outlines a completely different strategy for implementing cryptocurrencies with completely distributed chains
  • Rather than trying to make one global, anonymous, digital cash
  • ...95 more annotations...
  • we are interested in the resilience that comes from building a rich ecosystem of interoperable currencies
  • What are the core elements of a modern cryptocurrency?
  • Digital
  • Holdings are electronic and only exist and operate by virtue of a community’s agreement about how to interpret digital bits according to rules about operation and accounting of the currency.
  • Trustless
  • don’t have to trust a 3rd party central authority
  • Decentralized
  • Specifically, access, issuance, transaction accounting, rules & policies, should be collectively visible, known, and held.
  • Cryptographic
  • This cryptographic structure is used to enable a variety of people to host the data without being able to alter it.
  • Identity
  • there must be a way to associate these bits with some kind of account, wallet, owner, or agent who can use them
  • Other things that many take for granted in blockchains may not be core but subject to decisions in design and implementation, so they can vary between implementations
  • It does not have to be stored in a synchronized global ledger
  • does not have to be money. It may be a reputation currency, or data used for identity, or naming, etc
  • Its units do not have to be cryptographic tokens or coins
  • It does not have to protect the anonymity of users, although it may
  • if you think currency is only money, and that money must be artificially scarce
  • Then you must tackle the problem of always tracking which coins exist, and which have been spent. That is one approach — the one blockchain takes.
  • You might optimize for anonymity if you think of cryptocurrency as a tool to escape governments, regulations, and taxes.
  • if you want to establish and manage membership in new kinds of commons, then identity and accountability for actions may turn out to be necessary ingredients instead of anonymity.
  • In the case of the MetaCurrency Project, we are trying to support many use cases by building tools to enable a rich ecosystem of communities and current-sees (many are non-monetary) to enhance collective intelligence at all scales.
  • Managing consensus about a shared reality is a central challenge at the heart of all distributed computing solutions.
  • If we want to democratize money by having cryptocurrencies become a significant and viable means of transacting on a daily basis, I believe we need fundamentally more scalable approaches that don’t require expensive, dedicated hardware just to participate.
  • We should not need system wide consensus for two people to do a transaction in a cryptocurrency
  • Blockchain is about managing a consensus about what was “said.” Ceptr is about distributing a consensus about how to “speak.”
  • how nature gets the job done in massively scalable systems which require coordination and consistency
  • Replicate the same processes across all nodes
  • Empower every node with full agency
  • Hold this transformed state locally and reliably
  • Establish protocols for interaction
  • Each speaker of a language carries the processes to understand sentences they hear, and generate sentences they need
  • we certainly don’t carry some kind of global ledger of everything that’s ever been said, or require consensus about what has been said
  • Language IS a communication protocol we learn by emulating the processes of usage.
  • Dictionaries try to catch up when the usage
  • there is certainly no global ledger with consensus about the state of trillions of cells. Yet, from a single zygote’s copy of DNA, our cells coordinate in a highly decentralized manner, on scales of trillions, and without the latency or bottlenecks of central control.
  • Imagine something along the lines of a Java Virtual Machine connected to a distributed version of Github
  • Every time this JVM runs a program it confirms the hash of the code it is about to execute with the hash signed into the code repository by its developers
  • This allows each node that intends to be honest to be sure that they’re running the same processes as everyone else. So when two parties want to do a transaction, and each can have confidence their own code, and the results that your code produces
  • Then you treat it as authoritative and commit it to your local cryptographically self-validating data store
  • Allowing each node to treat itself as a full authority to process transactions (or interactions via shared protocols) is exactly how you empower each node with full agency. Each node runs its copy of the signed program/processes on its own virtual machine, taking the transaction request combined with the transaction chains of the parties to the transaction. Each node can confirm their counterparty’s integrity by replaying their transactions to produce their current state, while confirming signatures and integrity of the chain
  • If both nodes are in an appropriate state which allows the current transaction, then they countersign the transaction and append to their respective chains. When you encounter a corrupted or dishonest node (as evidenced by a breach of integrity of their chain — passing through an invalid state, broken signatures, or broken links), your node can reject the transaction you were starting to process. Countersigning allows consensus at the appropriate scale of the decision (two people transacting in this case) to lock data into a tamper-proof state so it can be stored in as many parallel chains as you need.
  • When your node appends a mutually validated and signed transaction to its chain, it has updated its local state and is able to represent the integrity of its data locally. As long as each transaction (link in the chain) has valid linkages and countersignatures, we can know that it hasn’t been tampered with.
  • If you can reliably embody the state of the node in the node itself using Intrinsic Data Integrity, then all nodes can interact in parallel, independent of other interactions to maximize scalability and simultaneous processing. Either the node has the credits or it doesn’t. I don’t have to refer to a global ledger to find out, the state of the node is in the countersigned, tamper-proof chain.
  • Just like any meaningful communication, a protocol needs to be established to make sure that a transaction carries all the information needed for each node to run the processes and produce a new signed and chained state. This could be debits or credits to an account which modify the balance, or recoding courses and grades to a transcript which modify a Grade Point Average, or ratings and feedback contributing to a reputation score, and so on.
  • By distributing process at the foundation, and leveraging Intrinsic Data Integrity, our approach results in massive improvements in throughput (from parallel simultaneous independent processing), speed, latency, efficiency, and cost of hardware.
  • You also don’t need to incent people to hold their own record — they already want it.
  • Another noteworthy observation about humans, cells, and atoms, is that each has a general “container” that gets configured to a specific use.
  • Likewise, the Receptors we’ve built are a general purpose framework which can load code for different distributed applications. These Receptors are a lightweight processing container for the Ceptr Virtual Machine Host
  • Ceptr enables a developer to focus on the rules and transactions for their use case instead of building a whole framework for distributed applications.
  • how units in a currency are issued
  • Most people think that money is just money, but there are literally hundreds of decisions you can make in designing a currency to target particular needs, niches, communities or patterns of flow.
  • Blockchain cryptocurrencies are fiat currencies. They create tokens or coins from nothing
  • These coins are just “spoken into being”
  • the challenging task of
  • ensure there is no counterfeiting or double-spending
  • Blockchain cryptocurrencies are fiat currencies
  • These coins are just “spoken into being”
  • the challenging task of tracking all the coins that exist to ensure there is no counterfeiting or double-spending
  • You wouldn’t need to manage consensus about whether a cryptocoin is spent, if your system created accounts which have normal balances based on summing their transactions.
  • In a mutual credit system, units of currency are issued when a participant extends credit to another user in a standard spending transaction
  • Alice pays Bob 20 credits for a haircut. Alice’s account now has -20, and Bob’s has +20.
  • Alice spent credits she didn’t have! True
  • Managing the currency supply in a mutual credit system is about managing credit limits — how far people can spend into a negative balance
  • Notice the net number units in the system remains zero
  • One elegant approach to managing mutual credit limits is to set them based on actual demand.
  • concerns about manufacturing fake accounts to game credit limits (Sybil Attacks)
  • keep in mind there can be different classes of accounts. Easy to create, anonymous accounts may get NO credit limit
  • What if I alter my code to give myself an unlimited credit limit, then spend as much as I want? As soon as you pass the credit limit encoded in the shared agreements, the next person you transact with will discover you’re in an invalid state and refuse the transaction.
  • If two people collude to commit an illegal transaction by both hacking their code to allow a normally invalid state, the same still pattern still holds. The next person they try to transact with using untampered code will detect the problem and decline to transact.
  • Most modern community currency systems have been implemented as mutual credit,
  • Hawala is a network of merchants and businessmen, which has been operating since the middle ages, performing money transfers on an honor system and typically settling balances through merchandise instead of transferring money
  • Let’s look at building a minimum viable cryptocurrency with the hawala network as our use case
  • To minimize key management infrastructure, each hawaladar’s public key is their address or identity on the network. To join the network you get a copy of the software from another hawaladar, generate your public and private keys, and complete your personal profile (name, location, contact info, etc.). You call, fax, or email at least 10 hawaladars who know you, and give them your IP address and ask them to vouch for you.
  • Once 10 other hawaladars have vouched for you, you can start doing other transactions because the protocol encoded in every node will reject a transaction chain that doesn’t start with at least 10 vouches
  • seeding your information with those other peers so you can be found by the rest of the network.
  • As described in the Mutual Credit section, at the time of transaction each party audits the counterparty’s transaction chain.
  • Our hawala crypto-clearinghouse protocol has two categories of transactions: some used for accounting and others for routing. Accounting transactions change balances. Routing transactions maintain network integrity by recording information about hawaladar
  • Accounting Transactions create signed data that changes account balances and contains these fields:
  • The final hash of all of the above fields is used as a unique transaction ID and is what each of party signs with their private keys. Signing indicates a party has agreed to the terms of the transaction. Only transactions signed by both parties are considered valid. Nodes can verify signatures by confirming that decryption of the signature using the public key yields a result which matches the transaction ID.
  • Routing Transactions sign data that changes the peers list and contain these fields:
  • As with accounting transactions, the hash of the above fields is used as the transaction’s unique key and the basis for the cryptographic signature of both counterparties.
  • Remember, instead of making changes to account balances, routing transactions change a node’s local list of peers for finding each other and processing.
  • a distributed network of mutual trust
  • operates across national boundaries
  • everyone already keeps and trusts their own separate records
  • Hawaladars are not anonymous
  • “double-spending”
  • It would be possible for someone to hack the code on their node to “forget” their most recent transaction (drop the head of their chain), and go back to their previous version of the chain before that transaction. Then they could append a new transaction, drop it, and append again.
  • After both parties have signed the agreed upon transaction, each party submits the transaction to separate notaries. Notaries are a special class of participant who validate transactions (auditing each chain, ensuring nobody passes through an invalid state), and then they sign an outer envelope which includes the signatures of the two parties. Notaries agree to run high-availability servers which collectively manage a Distributed Hash Table (DHT) servicing requests for transaction information. As their incentive for providing this infrastructure, notaries get a small transaction fee.
  • This approach introduces a few more steps and delays to the transaction process, but because it operates on independent parallel chains, it is still orders of magnitude more efficient and decentralized than reaching consensus on entries in a global ledger
  • millions of simultaneous transactions could be getting processed by other parties and notaries with no bottlenecks.
  • There are other solutions to prevent nodes from dropping the head of their transaction chain, but the approach of having notaries serve out a DHT solves a number of common objections to completely distributed accounting. Having access to reliable lookups in a DHT provides a similar big picture view that you get from a global ledger. For example, you may want a way to look up transactions even when the parties to that transaction are offline, or to be able to see the net system balance at a particular moment in time, or identify patterns of activity in the larger system without having to collect data from everyone individually.
  • By leveraging Intrinsic Data Integrity to run numerous parallel tamper-proof chains you can enable nodes to do various P2P transactions which don’t actually require group consensus. Mutual credit is a great way to implement cryptocurrencies to run in this peered manner. Basic PKI with a DHT is enough additional infrastructure to address main vulnerabilities. You can optimize your solution architecture by reserving reserve consensus work for tasks which need to guarantee uniqueness or actually involve large scale agreement by humans or automated contracts.
  • It is not only possible, but far more scalable to build cryptocurrencies without a global ledger consensus approach or cryptographic tokens.
  •  
    Article written by Arthur Brook, founder of Metacurrency project and of Ceptr.
Tiberius Brastaviceanu

Access control - Wikipedia, the free encyclopedia - 0 views

  • The act of accessing may mean consuming, entering, or using.
  • Permission to access a resource is called authorization.
  • Locks and login credentials are two analogous mechanisms of access control.
  • ...26 more annotations...
  • Geographical access control may be enforced by personnel (e.g., border guard, bouncer, ticket checker)
  • n alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country
  • access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons
  • can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap.
  • Physical access control is a matter of who, where, and when
  • Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.[citation needed] Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked
  • Credential
  • Access control system operation
  • The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input
  • There are three types (factors) of authenticating information:[2] something the user knows, e.g. a password, pass-phrase or PIN something the user has, such as smart card or a key fob something the user is, such as fingerprint, verified by biometric measurement
  • Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios
  • When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked.
  • A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a biometric feature) or some combination of these items. This is known as multi-factor authentication. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.
  • An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list
  • monitor the door position
  • Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the doo
  • Access control topology
  • Access control decisions are made by comparing the credential to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the look-up out from a central host to the edge of the system, or the reader. The predominant topology circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks
  • Access control readers may be classified by the functions they are able to perform
  • and forward it to a control panel.
  • Basic (non-intelligent) readers: simply read
  • Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus.
  • Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers.
  • Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host
  • a built in webservice to make it user friendly
  • Some readers may have additional features such as an LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support
Tiberius Brastaviceanu

Designing the Void | Management Innovation eXchange - 0 views

    • Tiberius Brastaviceanu
       
      This is about self-organization, putting in place bounderies and internal mechanisms to make the the system self-organize into something desirable.  You can see this from a game theory perspective - how to set a game which will drive a specific human behavior. 
    • Tiberius Brastaviceanu
       
      This is about self-organization, putting in place bounderies and internal mechanisms to make the the system self-organize into something desirable.  You can see this from a game theory perspective - how to set a game which will drive a specific human behavior. 
    • Tiberius Brastaviceanu
       
      Very similar to SENSORICA, an environment of entrepreneurs. The argument against this is that not everyone is a risk taker or has initiative. The answer to it is that not every role in the organization requires that. 
    • Tiberius Brastaviceanu
       
      Very similar to SENSORICA, an environment of entrepreneurs. The argument against this is that not everyone is a risk taker or has initiative. The answer to it is that not every role in the organization requires that. 
  • The system is not made up of artifacts but rather an elegantly designed void. He says “I prefer to use the analogy of rescuing an endangered species from extinction, rather than engaging in an invasive breeding program the focus should be on the habitat that supports the species. Careful crafting of the habitat by identifying the influential factors; removing those that are detrimental, together with reinforcing those that are encouraging, the species will naturally re-establish itself. Crafting the habitat is what I mean by designing the void.”
  • ...75 more annotations...
  • It is essential that autonomy is combined with responsibility.
  • staff typically manage the whole work process from making sales, manufacture, accounts, to dispatch
  • they are also responsible for managing their own capitalization; a form of virtual ownership develops. Everything they need for their work, from office furniture to high-end machinery will appear on their individual balance sheet; or it will need to be bought in from somewhere else in the company on a pay-as-you go or lease basis. All aspects of the capital deployed in their activities must be accounted for and are therefore treated with the respect one accords one’s own property.
    • Tiberius Brastaviceanu
       
      So they have a value accounting system, like SENSORICA, where they log "uses" and "consumes". 
    • Tiberius Brastaviceanu
       
      ...
    • Tiberius Brastaviceanu
       
      So they have a value accounting system, like SENSORICA, where they log "uses" and "consumes".  
  • The result is not simply a disparate set of individuals doing their own thing under the same roof. Together they benefit from an economy of scale as well as their combined resources to tackle large projects; they are an interconnected whole. They have in common a brand, which they jointly represent, and also a business management system (the Say-Do-Prove system) - consisting not only of system-wide boundaries but also proprietary business management software which helps each take care of the back-end accounting and administrative processing. The effect is a balance between freedom and constraint, individualism and social process.
  • embodiment of meaning
  • But culture is a much more personal phenomenon
  • Culture is like climate- it does not exist in and of itself- it cannot exist in a vacuum, it must exist within a medium.
  • underlying culture
  • Incompatibility between the presenting culture and the underlying one provide a great source of tension
  • The truth of course is that when tension builds to a critical level it takes just a small perturbation to burst the bubble and the hidden culture reveals itself powered by the considerable pent-up energy.
    • Tiberius Brastaviceanu
       
      SENSORICA had this problem of different cultures, and it caused the 2 crisis in 2014. 
    • Tiberius Brastaviceanu
       
      SENSORICA had this problem of different cultures, and it caused the 2 crisis in 2014. 
  • Consider again the idea that for the health of an endangered species; the conditions in their habitat must be just right. In business, the work environment can be considered analogous to this idea of habitat.
  • A healthy environment is one that provides a blank canvas; it should be invisible in that it allows culture to be expressed without taint
  • The over-arching, high-level obligations are applied to the organization via contractual and legal terms.
  • But it is these obligations that the traditional corporate model separates out into functions and then parcels off to distinct groups. The effect is that a clear sight of these ‘higher’ obligations by the people at the front-end is obstructed. The overall sense of responsibility is not transmitted but gets lost in the distortions, discontinuities and contradictions inherent in the corporate systems of hierarchy and functionalization.
  • employees are individually rewarded for their contribution to each product. They are not “compensated” for the hours spent at work. If an employee wants to calculate their hourly rate, then they are free to do so however, they are only rewarded for the outcome not the duration of their endeavors.
  • Another simplification is the application of virtual accounts (Profit and Loss (P&L) account and Balance Sheet) on each person within the business.
  • The company systems simply provide a mechanism for cheaply measuring the success of each individual’s choices. For quality the measure is customer returns, for delivery it is an on-time-and-in-full metric and profit is expressed in terms of both pounds sterling and ROI (return on investment).
    • Tiberius Brastaviceanu
       
      They have a value accounting system. 
    • Tiberius Brastaviceanu
       
      They have a value accounting system. 
  • The innumerable direct links back to an external reality -like the fragile ties that bound giant Gulliver, seem much more effective at aligning the presenting culture and the underlying embodied culture, and in doing so work to remove the existing tension.
  • With a culture that responds directly to reality, the rules in the environment can be “bounding” rather than “binding”- limiting rather than instructive; this way individual behavior need not be directed at all. The goal is to free the individual to express himself fully through his work, bounded only by the limits of the law. With clever feedback (self-referencing feedback loops) integrated into the design, the individuals can themselves grow to collectively take charge of the system boundaries, culture and even the environment itself, always minded of the inherent risks they are balancing, leaving the law of the land as the sole artificial boundary.
  • the conventional company, which, instead of rewarding enterprise, trains compliance by suppressing individual initiative under layer upon layer of translation tools.
  • apply accountability to the individual not command-and-control.
  • without the divisive and overbearing management cabal the natural reaction of humans is to combine their efforts
  • a new member of staff at Matt Black Systems
  • recruited by another staff member (sponsor) and they will help you learn the basics of the business management system- they will help you get to know the ropes.
  • jobs are passed to new staff members, a royalty payment can be established on the work passed over.
  • Along with that job you will be given a cash float (risk capital), P&L Account, a Balance Sheet and computer software to help plan and record your activities. Your operation is monitored by your sponsor to see if you increase the margin or volume, and so establish a sustainable operation. Training and mentoring is provided to support the steep learning curve - but without removing the responsibility of producing a return on the sponsor’s risk capital.
  • You will, in the meantime be looking to establish some of your own work for which you will not have to pay a commission or royalty to your sponsor and this will provide you with more profitable operations such that eventually you might pass back to the sponsor the original operation, as it has become your lowest margin activity. It will then find its way to a new employee (along with the associated Balance Sheet risk capital) where the process is repeated by the sponsor.[4]
  • Remuneration for staff is calibrated in a way that reflects the balance of different forces around ‘pay’
  • there is an obligation upon the company to pay a minimum wage even if the profitability of the operation does not support this
  • there are therefore two aspects of the basic pay structure: one is “absolute” and reflects the entrepreneurial skill level of the employee according to a sophisticated grading scale
  • A further 20% of the original profit will be paid into his risk capital account, which will be his responsibility to deploy in any way he sees fit as part of his Balance Sheet. Of the three remaining 20% slices of the original profit, one is paid out as corporation tax, another as a dividend to the shareholders and the last retained as collective risk capital on the company’s balance sheet- a war chest so to speak.
  • Julian Wilson and Andrew Holm sell products / services to their staff (such as office space and software) they have an identical customer/supplier relationship with the other employees.
  • Naturally there are some people that can’t generate a profit. The sponsor’s risk capital will eventually be consumed through pay. After a process of rescue and recovery- where their shortcomings are identified and they are given the opportunity to put them right, they either improve or leave, albeit with a sizeable increase in their skills.
  • there is a gradual process of accustomisation; the void of the new employee is surrounded by others dealing with their particular activities, offering both role models and operations they may wish to relinquish. One step at a time the new employee acquires the skills to become completely self-managing, to increase their margins, to make investments, to find new business, to become a creator of their own success. Ultimately, they learn to be an entrepreneur.
  • responsible autonomy as an alternative vision to traditional hierarchy
  • Matt Black Systems it is not simply commitment that they targeted in their employees, rather they aim for the specific human qualities they sum up as magic- those of curiosity, imagination, creativity, cooperation, self-discipline and realization (bringing ideas to reality).
  • a new form of association of individuals working together under the umbrella of a company structure: a kind of collective autonomy
  • The business is called Matt Black Systems, based in Poole in dorset
  • Turning an organisation on its head- removing all management, establishing a P&L account and Balance Sheet on everyone in the organisation and having customers payment go first into the respective persons P&L account has revolutionised this company. 
  • This innovative company’s approach views business success as wholly reliant upon human agency, and its wellspring at the individual level.
  • problem (of unnecessarily high overheads placed on production) that arguably is behind the decline in western manufacturing
  • over-managed business
  • Autonomy Enables Productivity
  • organizational design brings to light the unconscious socio-philosophical paradigm of the society in which it exists, organizational development points to how change occurs.
  • a mechanistic approach to organization
  • scientific management employs rationalism and determinism in pursuit of efficiency, but leaves no place for self-determination for most people within the system.
  • Command and Control
  • today, a really “modern” view of an organization is more likely to be depicted in terms that are akin to an organism.
  • When it comes to getting work done, the simple question is: are people the problem or the solution?
  • the Taylorist approach may be more real in theory than in practice: its instrumentalist view of the workforce is cursed by unintended consequences. When workers have no space for their own creative expression, when they are treated like automata not unique individuals, when they become demotivated and surly, when they treat their work as a necessary evil; this is no recipe for a functional organization.
  • The natural, human reaction to this is unionization, defiance and even outright rebellion; to counter this, management grows larger and more rigid in pursuit of compliance, organizations become top heavy with staff who do not contribute directly to the process of value creation but wield power over those who do.
  • voluntary slavery of ‘wagery’
  • Even when disgruntled employees strike free and start their own businesses they seem unable to resist the hegemony of the conventional command-and-control approach
  • Making the transition involves adherence to a whole new sociology of work with all the challenging social and psychological implications that brings.
  • first principal that people in the business have the ability to provide the solution
  • In the “theory of constraints” the goal is to align front-line staff into a neat, compact line for maximum efficiency. Surely the most considered approach is to have front-line staff self-align in pursuit of their individual goals?
  • The removal of hierarchy and specialization is key to a massive improvement in both profitability and productivity. In summary: there are no managers in the company, or foremen, or sales staff, or finance departments; the company is not functionally compartmentalized and there is no hierarchy of command. In fact every member of staff operates as a virtual micro-business with their own Profit & Loss account and Balance Sheet, they manage their own work and see processes through from end to end
  • Formal interaction between colleagues takes place via “customer and supplier” relationships.
  • autonomy enables productivity
  • if one creates a space in which staff pursue their own goals and are not paid by the hour, they will focus on their activities not the clock; if they are not told what to do, they will need to develop their own initiative; if they are free to develop their own processes, they will discover through their own creative faculties how to work more productively- in pursuit of their goals
  • The human qualities which are of greatest potential value to the business are: curiosity, imagination, creativity, cooperation, self-discipline and realization (bringing ideas to reality)
  • These qualities are the very ones most likely to be withheld by an individual when the environment is ‘wrong’.
  • Any elements in the business environment that undermine the autonomy and purpose of the individual will see the above qualities withheld
  • High on the list of undermining elements come power-hierarchy and over-specialization
  • the responsibility of the individual is formalized, specified and restricted. An improved system is not one where responsibility is distributed perfectly but rather one where there is simply no opportunity for responsibility to be lost (via the divisions between the chunks). Systems must be reorganized so responsibility -the most essential of qualities -is protected and wholly preserved.
  • Matt Black Systems believe this can only be done by containing the whole responsibility within an individual, holding them both responsible and giving them ‘response-ability’
  • The experience of Matt Black Systems demonstrates that radical change is possible
  • productivity is up 300%, the profit margin is up 10%[3], customer perception has shifted from poor to outstanding, product returns are at less than 1%, “on time and in full” delivery is greater than 96%, pay has increased 100%.
  • staff develop broader and deeper skills and feel greater job security; they get direct feedback from their customers which all go to fuel self-confidence and self-esteem.
  • the staff manage themselves
  • “only variety can absorb variety”.
  • What is particular about their story is that behind it is a very consciously crafted design that surrounds the individualism of each person with hard boundaries of the customer, the law and the business. It is these boundaries rather than the instructive persona of ‘the boss’ that gives rise to the discipline in which individuals can develop. Autonomy is not the same as freedom, at least not in the loose sense of ‘do as you please’. An autonomous person is a person who has become self-governing, who has developed a capacity for self-regulation, quite a different notion from the absence of boundaries. Indeed, it is with establishing the right boundaries that the business philosophy is most concerned. The company provides the crucible in which the individual can develop self-expression but the container itself is bounded. Wilson calls this “designing the void”. This crucible is carefully constructed from an all-encompassing, interconnecting set of boundaries that provide an ultimate limit to behaviours (where they would fall foul of the law or take risks with catastrophic potential). It is an illusion to think, as a director of a company, that you are not engaged in a process of social conditioning; the basis of the culture is both your responsibility and the result of your influence. The trick is to know what needs to be defined and what needs to be left open. The traditional authoritarian, controlling characters that often dominate business are the antithesis of this in their drive to fill this void with process, persona and instruction. Alternatively, creating an environment that fosters enterprise, individuals discover how to be enterprising.
Kurt Laitner

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
Kurt Laitner

Guidelines on Measuring Subjective Well-being.pdf - 0 views

  • such as interest,engagement and meaning,
  • subjective well-being is taken to be:2Good mental states, including all of the various evaluations, positive and negative, that peoplemake of their lives, and the affective reactions of people to their experiences
  • “subjective well-being is an umbrella term for the different valuationspeople make regarding their lives, the events happening to them, their bodies and minds,and the circumstances in which they live”.
  • ...16 more annotations...
  • In measuring overall human well-being then, subjective well-being should be placedalongside measures of non-subjective outcomes, such as income, health, knowledge andskills, safety, environmental quality and social connections
  • Inparticular, a distinction is commonly made between life evaluations, which involve acognitive evaluation of the respondent’s life as a whole (or aspects of it), and measures ofaffect, which capture the feelings experienced by the respondent at a particular point in time(Diener, 1984; Kahneman et al., 1999
  • eudaimonic aspect ofsubjective well-being, reflecting people’s sense of purpose and engagement
  • The framework used here covers all three concepts of well-being:●Life evaluation.●Affect.●Eudaimonia (psychological “flourishing”)
  • the result of a judgement by the individual rather than thedescription of an emotional state.
  • Elements of subjective well-beingLife evaluation
  • making an evaluation of this sort as involving the individual constructing a “standard” thatthey perceive as appropriate for themselves, and then comparing the circumstances oftheir life to that standard
  • Life evaluations are based on how people remember their experiences (Kahneman et al.,1999) and can differ significantly from how they actually experienced things at the time
  • It is for this reason that life evaluations are sometimes characterised as measures of“decision utility” in contrast to “experienced utility”
  • One of the mostwell documented measures of life evaluation – thePersonal Wellbeing Index– consists of eightquestions, covering satisfactions with eight different aspects of life, which are summedusing equal weights to calculate an overall index (International Wellbeing Group, 2006)
  • (job satisfaction, financial satisfaction, house satisfaction, healthsatisfaction, leisure satisfaction and environmental satisfaction),
  • AffectAffect is the term psychologists use to describe a person’s feelings. Measures of affectcan be thought of as measures of particular feelings or emotional states, and they aretypically measured with reference to a particular point in time.
  • Such measures capturehow people experience life rather than how they remember it (Kahneman and Krueger,2006
  • While an overall evaluation of life can be captured in a single measure, affect has atleast two distinct hedonic dimensions: positive affect and negative affect (Kahneman et al.,1999; Diener et al., 1999
  • positive affect is thought to be largely uni-dimensional
  • negative affect may be more multi-dimensional.
Tiberius Brastaviceanu

Key management - Wikipedia, the free encyclopedia - 1 views

  • Key management
  • his includes dealing with the generation, exchange, storage, use, and replacement of keys.
  • Key management concerns keys at the user level, either between users or systems.
  • ...4 more annotations...
  • This is in contrast to key scheduling; key scheduling typically refers to the internal handling of key material within the operation of a cipher.
  • it involves system policy, user training, organizational and departmental interactions, and coordination between all of these elements.
  • Public Key Infrastructure (PKI)
  • A public key infrastructure is a type of key management system that uses hierarchical digital certificates to provide authentication, and public keys to provide encryption. PKIs are used in World Wide Web traffic, commonly in the form of SSL and TLS.
Francois Bergeron

Automatic Micro Manipulation System for Cell Manipulation - 1 views

  • Here, we applied piezo impact drive mechanism, which utilizes rapid deformation of piezoelectric element, to realize smooth insertion of the micro pipette into the cytoplasm without deformation. This mechanism had already been commercialized and being used in many institutes.
  •  
    that may be nice to add force feedback control
Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • control over Google products
  • can access and control Google Spreadsheets and other products
  • scripts
  • ...44 more annotations...
  • run directly on Google servers in order to provide direct access to the products they control.
  • can also use Google Apps Script from Google Sites
  • Google Apps Script Template Gallery
  • Google Apps Script Blog
  • guide contains the information you need to use Google Apps Script, a server-side scripting language, based on JavaScript, that runs on Google's servers alongside Google Apps
  • enable varying degrees of interactivity among the applications
  • easy enough to use that you don't have to be a programmer to create scripts.
  • use it to automate complex tasks within Google Apps
  • You don't have to be a programmer to use Google Apps Script
  • A script is a series of instructions you write in a computer language to accomplish a particular task. You type in the instructions and save them as a script. The script runs only under circumstances you define.
  • The Google Apps Script API provides a set of objects. You can use these objects and their associates methods to access Google Docs and Spreadsheets, Gmail, Google Finance, and other Google applications.
  • To run a script, you must first add the script to a Google Spreadsheet or Google Site using the Script Editor.
  • You can retrieve information from a wide selection of Google Apps and Services and from external sources, including web pages and XML sources. You can use Google Apps Script to create email, spreadsheets, pages on Google Sites, and files in the Google Docs Document List.
  • The instructions in a script are grouped into functions.
  • objects
  • methods
  • for such tasks
  • Create pages on a Google Site
  • Customize a Spreadsheet
  • Send email based on information in a Spreadsheet
  • You can manipulate
  • numeric
  • financial
  • string
  • an XML document
  • controlling data in the following applications
  • Spreadsheets
  • Google Document List
  • Contacts
  • Calendar
  • Sites
  • Google Maps
  • create and display interactive user interface elements
  • interact with relational database management systems
  • create folders, subfolders, and files in the Google Docs document list
  • access to user, session, and browser information
  • access to web services
  • extract data from XML documents and then manipulate that data
  • obtain translations of text from one language to another
  • send email
  • UrlFetch services
  • encode and decode strings and format dates
  • store properties on a per-script and per-user basis
  • create, delete and update contact information for individuals and for groups in Google Contacts
Tiberius Brastaviceanu

Permaculture Principles | Design Principles - 1 views

  • how the principles of permaculture might apply to business.
  • The shift will be from merely prioritising output to thinking more widely.
  • how to build resilience for business
  • ...64 more annotations...
  • observation
  • A post-peak world will depend on detailed observation and good design rather than energy-intensive solutions.
  • not rely on weather forecasts but to learn to read the clouds,
  • “instead of researching the market, be the market”
  • businesses should be out there observing.
  • larger businesses tend to rely more on surveys and on second-hand information.
  • direct contact with customers.
  • move our idea of ‘capital’ from what we have in the bank, to the resources we have around us
  • not running a business on a constant high speed cash throughput with little or no capital reserves
  • lack of resilience in the just-in-time supply approach
  • a shift to storages of parts and materials, as well as the need to financially not be so dependent on debt financing
  • work slower with more financial reserves and take less risks, not building beyond what the company’s financial resources can support.
  • either to not borrow any money at all, or to borrow so much money that you can’t fail, being bigger than the people you borrow money from, so they have a vested interest in your succeeding!
  • energy efficient
  • long term
  • Looking to make buildings as autonomous as possible in a world entering energy descent is critical
  • see things that are flowing past and through the business that others don’t see as being a resource and having no monetary value as being valuable.
  • any intervention we make in a system, any changes we make or elements we introduce ought to be productive
  • This is instinctive to businesses
  • Obtain a Yield, in this context, is out of balance
  • much of business
  • have taken this to extremes
  • A well-designed system using permaculture principles should be able to self-regulate, and require the minimum of intervention and maintenance, like a woodland ecosystem, which requires no weeding, fertiliser or pest control.
  • moving from “we’re just obeying the law” to being proactive, acting before you get hit over the head with regulation and other vulnerabilities.
  • be able to put a foot on the break, not just going hell for leather on profit maximisation.
  • apply applied restraint, avoiding excessive, overfast growth that hasn’t been consolidated
  • looking for the negative feedbacks, from customers and from the environment in general
  • We need to increase the tightness of feedbacks.
  • Where nature can perform particular functions
  • we should utilise these attributes, rather than thinking we can replace them
  • Where nature can take some work off our hands we should let it.
  • a shift towards renewable resources
  • The emerging opportunities for businesses are things that are renewable. Renewable energy sources are the ones that will ensure a business’s stability in the long run. We can also broaden the concept of renewable resources to include things like goodwill and trust, things which a business can rebuild with good husbandry. Most business doesn’t just depend on law and competition, trust is at the heart of much business and it is very much a renewable resource.
  • The concept of waste is essentially a reflection of poor design. Every output from one system could become the input to another system. We need to think cyclically rather than in linear systems.
  • looking at our work from a range of perspectives
  • wider context
  • keep a clearer sense of the wider canvas on which we are painting, and the forces that affect what we are doing.
  • being strategic is important too
  • ask how is what we are doing part of a bigger picture, the move away from globalisation and towards the local, taking steps back from the everyday.
  • This can be done firstly by allowing space for Devil’s advocates, for black sheep, for hearing the voices of those outside of the dominant culture of the organisation and secondly by looking from a holistic perspective of how things interconnect, rather than just relying on experts who are embedded in detail. It emphasises the need to value the generalist, to give value to holistic thinkers.
  • allowing people to imagine different possibilities.
  • scenario planning
  • Permaculture has been described as the science of maximising beneficial relationships.
  • Solutions are to be found in integrated holistic solutions rather than increased specialisation and compartmentalisation
  • The challenge here is to move to seeing business as being part of the geographical community, as being rooted in place, rather than just part of a globalised community. At the moment for many larger businesses, the local is something one pays lip-service to as a source of good PR, something one is passing through, rather than actually being an integral part of the community.
  • This is a profound structural challenge for large organisations. Part of the resilience of the organisation comes from the degree of lateral integration. Resilience is in all solutions, it is the characteristic of ecological systems. If we apply these principles, resilience is one of the emergent properties
  • the notion that big is best needs to be challenged
  • new opportunities are very hard to understand and exploit from a macro level perspective, and are much better done from small scale perspective. It is here that the idea of appropriateness of scale becomes key.
  • more diverse systems have much more inbuilt resilience
  • have a diversity of small businesses, local currencies, food sources, energy sources and so on than if they are just dependent on centralised systems, globalisation’s version of monoculture.
  • not having all your eggs in one basket.
  • In the short term this kind of diversification could reduce profits, but in the longer term it will be more secure
  • this is about the reverse of specialisation, about having a mixed portfolio, and presents a big culture change for businesses.
  • it is a good strategy for business to keep a diverse portfolio of what sustains the business, keep some things that appear to be peripheral. They may not at this stage appear to be a serious part of how the business is run, but in this new world they will increasingly become so
  • ‘edge’
  • the point where two ecosystems meet is often more productive than either of those systems on their own.
  • overlap systems where possible so as to maximise their potential.
  • recognising that innovation doesn’t come from the centre but from fringe thinkers.
  • giving status to the marginal
  • It is important that the business has as many fingers in as many pies as possible, as many interfaces, and recognises that every person working for the business represents it in the community.
  • Natural systems are constantly in flux, evolving and growing.
  • Remaining observant of the changes around you, and not fixing onto the idea that anything around you is fixed or permanent will help too.
  • be flexible, lean and adaptable
  • A healthy approach is to start with no complete plan, to allow the process to be emergent. This is not a time when we can work to a rigid plan as conditions will change so fast. Organisations will need to stay on their toes, without rigid management.
Tiberius Brastaviceanu

James Grier Miller, Living Systems (1978) - 0 views

  • reality as an integrated hierarchy of organizations of matter and energy
  • General living systems theory is concerned with a special subset of all systems, the living ones
  • a space is a set of elements which conform to certain postulate
  • ...266 more annotations...
  • s. Euclidean space
  • metric space
  • topological space
  • Physical space is the extension surrounding a point
  • My presentation of a general theory of living systems will employ two sorts of spaces in which they may exist, physical or geographical space and conceptual or abstracted spaces
  • Physical or geographical space
  • Euclidean space
  • distance
  • moving
  • maximum speed
  • objects moving in such space cannot pass through one another
  • friction
  • The characteristics and constraints of physical space affect the action of all concrete systems, living and nonliving.
  • information can flow worldwide almost instantly
  • Physical space is a common space
  • Most people learn that physical space exists, which is not true of many spaces
  • They can give the location of objects in it
  • Conceptual or abstracted spaces
  • Peck order
  • Social class space
  • Social distance
  • Political distance
  • life space
  • semantic space
  • Sociometric space
  • A space of time costs of various modes of transportation
  • space of frequency of trade relations among nations.
  • A space of frequency of intermarriage among ethnic groups.
  • These conceptual and abstracted spaces do not have the same characteristics and are not subject to the same constraints as physical space
  • Social and some biological scientists find conceptual or abstracted spaces useful because they recognize that physical space is not a major determinant of certain processes in the living systems they study
  • interpersonal relations
  • one cannot measure comparable processes at different levels of systems, to confirm or disconfirm cross-level hypotheses, unless one can measure different levels of systems or dimensions in the same spaces or in different spaces with known transformations among them
  • It must be possible, moreover, to make such measurements precisely enough to demonstrate whether or not there is a formal identity across levels
  • fundamental "fourth dimension" of the physical space-time continuum
  • is the particular instant at which a structure exists or a process occurs
  • or the measured or measurable period over which a structure endures or a process continues.
  • durations
  • speeds
  • rates
  • accelerations
  • irreversible unidirectionality of time
  • thermodynamics
  • negentropy
  • "time's arrow."
  • Matter and energy
  • Matter is anything which has mass (m) and occupies physical space.
  • Energy (E) is defined in physics as the ability to do work.
  • kinetic energy
  • potential energy
  • rest mass energy
  • Mass and energy are equivalent
  • Living systems need specific types of matter-energy in adequate amounts
  • Energy for the processes of living systems is derived from the breakdown of molecules
  • Any change of state of matter-energy or its movement over space, from one point to another, I shall call action.
  • It is one form of process.
  • information (H)
  • Transmission of Information
  • Meaning is the significance of information to a system which processes it: it constitutes a change in that system's processes elicited by the information, often resulting from associations made to it on previous experience with it
  • Information is a simpler concept: the degrees of freedom that exist in a given situation to choose among signals, symbols, messages, or patterns to be transmitted.
  • The set of all these possible categories (the alphabet) is called the ensemble or repertoire
  • .) The unit is the binary digit, or bit of information
  • . The amount of information is measured as the logarithm to the base 2 of the number of alternate patterns
  • Signals convey information to the receiving system only if they do not duplicate information already in the receiver. As Gabor says:
  • [The information of a message can] be defined as the 'minimum number of binary decisions which enable the receiver to construct the message, on the basis of the data already available to him.'
  • meaning cannot be precisely measured
  • Information is the negative of uncertainty.
  • information is the amount of formal patterning or complexity in any system.
  • The term marker was used by von Neumann to refer to those observable bundles, units, or changes of matter-energy whose patterning bears or conveys the informational symbols from the ensemble or repertoire.
  • If a marker can assume n different states of which only one is present at any given time, it can represent at most log2n bits of information. The marker may be static, as in a book or in a computer's memory
  • Communication of almost every sort requires that the marker move in space, from the transmitting system to the receiving system, and this movement follows the same physical laws as the movement of any other sort of matter-energy. The advance of communication technology over the years has been in the direction of decreasing the matter-energy costs of storing and transmitting the markers which bear information.
  • There are, therefore, important practical matter-energy constraints upon the information processing of all living systems exerted by the nature of the matter-energy which composes their markers.
  • organization is based upon the interrelations among parts.
  • If two parts are interrelated either quantitatively or qualitatively, knowledge of the state of one must yield some information about the state of the other. Information measures can demonstrate when such relationships exist
  • The disorder, disorganization, lack of patterning, or randomness of organization of a system is known as its entropy (S)
  • the statistical measure for the negative of entropy is the same as that for information
  • entropy becomes a measure of the probability
  • Increase of entropy was thus interpreted as the passage of a system from less probable to more probable states.
  • according to the second law, a system tends to increase in entropy over time, it must tend to decrease in negentropy or information.
  • therefore no principle of the conservation of information
  • The total information can be decreased in any system without increasing it elsewhere
  • but it cannot be increased without decreasing it elsewhere
  • . Making one or more copies of a given informational pattern does not increase information overall, though it may increase the information in the system which receives the copied information.
  • transforms information into negative entropy
  • smallest possible amount of energy used in observing one bit of information
  • calculations of the amount of information accumulated by living systems throughout growth.
  • the concept of Prigogine that in an open system (that is one in which both matter and energy can be exchanged with the environment) the rate of entropy production within the system, which is always positive, is minimized when the system is in a steady state.
  • in systems with internal feedbacks, internal entropy production is not always minimized when the system is in a stationary state. In other words, feedback couplings between the system parameters may cause marked changes in the rate of development of entropy. Thus it may be concluded that the "information flow" which is essential for this feedback markedly alters energy utilization and the rate of development of entropy, at least in some such special cases which involve feedback control. While the explanation of this is not clear, it suggests an important relationship between information and entropy
  • amount of energy actually required to transmit the information in the channel is a minute part of the total energy in the system, the "housekeeping energy" being by far the largest part of it
  • In recent years systems theorists have been fascinated by the new ways to study and measure information flows, but matter-energy flows are equally important. Systems theory is more than information theory, since it must also deal with energetics - such matters as
  • the flow of raw materials through societies
  • Only a minute fraction of the energy used by most living systems is employed for information processing
  • I have noted above that the movement of matter-energy over space, action, is one form of process. Another form of process is information processing or communication, which is the change of information from one state to another or its movement from one point to another over space
  • Communications, while being processed, are often shifted from one matter-energy state to another, from one sort of marker to another
  • transformations go on in living systems
  • One basic reason why communication is of fundamental importance is that informational patterns can be processed over space and the local matter-energy at the receiving point can be organized to conform to, or comply with, this information
  • the delivery of "flowers by telegraph."
  • Matter-energy and information always flow together
  • Information is always borne on a marker
  • . Conversely there is no regular movement in a system unless there is a difference in potential between two points, which is negative entropy or information
  • If the receiver responds primarily to the material or energic aspect, I shall call it, for brevity, a matter-energy transmission; if the response is primarily to the information, I shall call it an information transmission
  • Moreover, just as living systems must have specific forms of matter-energy, so they must have specific patterns of information
  • example
  • example
  • develop normally
  • have appropriate information inputs in infancy
  • pairs of antonyms
  • one member of which is associated with the concept of information (H)
  • the other member of which is associated with its negative, entropy (S)
  • System
  • A system is a set of interacting units with relationships among them
  • .The word "set" implies that the units have some common properties. These common properties are essential if the units are to interact or have relationships. The state of each unit is constrained by, conditioned by, or dependent on the state of other units. The units are coupled. Moreover, there is at least one measure of the sum of its units which is larger than the sum of that measure of its units.
  • Conceptual system
  • Units
  • terms
  • Relationships
  • a set of pairs of units, each pair being ordered in a similar way
  • expressed by words
  • or by logical or mathematical symbols
  • operations
  • The conceptual systems of science
  • observer
  • selects
  • particular sets to study
  • Variable
  • Each member of such a set becomes a variable of the observer's conceptual system
  • conceptual system may be loose or precise, simple or elaborate
  • Indicator
  • an instrument or technique used to measure fluctuations of variables in concrete systems
  • Function
  • a correspondence between two variables, x and y, such that for each value of x there is a definite value of y, and no two y's have the same x, and this correspondence is: determined by some rule
  • Any function is a simple conceptual system
  • Parameter
  • An independent variable through functions of which other functions may be expressed
  • The state of a conceptual system
  • the set of values on some scale, numerical or otherwise, which its variables have at a given instant
  • Formal identity
  • variables
  • varies comparably to a variable in another system
  • If these comparable variations are so similar that they can be expressed by the same function, a formal identity exists between the two systems
  • Relationships between conceptual and other sorts of systems
  • Science advances as the formal identity or isomorphism increases between a theoretical conceptual system and objective findings about concrete or abstracted systems
  • A conceptual system may be purely logical or mathematical, or its terms and relationships may be intended to have some sort of formal identity or isomorphism with units and relationships empirically determinable by some operation carried out by an observer
  • Concrete system
  • a nonrandom accumulation of matter-energy, in a region in physical space-time, which is organized into interacting interrelated subsystems or components.
  • Units
  • are also concrete systems
  • Relationships
  • spatial
  • temporal
  • spatiotemporal
  • causal
  • Both units and relationships in concrete systems are empirically determinable by some operation carried out by an observer
  • patterns of relationships or processes
  • The observer of a concrete system
  • distinguishes a concrete system from unorganized entities in its environment by the following criteria
  • physical proximity of its units
  • similarity of its units
  • common fate of its units
  • distinct or recognizable patterning of its units.
  • Their boundaries are discovered by empirical operations available to the general scientific community rather than set conceptually by a single observer
  • Variable of a concrete system
  • Any property of a unit or relationship within a system which can be recognized by an observer
  • which can potentially change over time, and whose change can potentially be measured by specific operations, is a variable of a concrete system
  • Examples
  • number of its subsystems or components, its size, its rate of movement in space, its rate of growth, the number of bits of information it can process per second, or the intensity of a sound to which it responds
  • A variable is intrasystemic
  • not to be confused with intersystemic variations which may be observed among individual systems, types, or levels.
  • The state of a concrete system
  • its structure
  • represented by the set of values on some scale which its variables have at that instant
  • Open system
  • Most concrete systems have boundaries which are at least partially permeable, permitting sizable magnitudes of at least certain sorts of matter-energy or information transmissions to pass them. Such a system is an open system. In open systems entropy may increase, remain in steady state, or decrease.
  • Closed system
  • impermeable boundaries through which no matter-energy or information transmissions of any sort can occur is a closed system
  • special case
  • No actual concrete system is completely closed
  • In closed systems, entropy generally increases, exceptions being when certain reversible processes are carried on which do not increase it. It can never decrease.
  • Nonliving system
  • the general case of concrete systems, of which living systems are a very special case. Nonliving systems need not have the same critical subsystems as living systems, though they often have some of them
  • Living system
  • a special subset of the set of all possible concrete systems
  • They all have the following characteristics:
  • open systems
  • inputs
  • throughputs
  • outputs
  • of various sorts of matter-energy and information.
  • maintain a steady state of negentropy even though entropic changes occur in them as they do everywhere else
  • by taking in inputs
  • higher in complexity or organization or negentropy
  • than their outputs
  • The difference permits them to restore their own energy and repair breakdowns in their own organized structure.
  • In living systems many substances are produced as well as broken down
  • To do this such systems must be open and have continual inputs of matter-energy and information
  • entropy will always increase in walled-off living systems
  • They have more than a certain minimum degree of complexity
  • They either contain genetic material composed of deoxyribonucleic acid (DNA)
  • or have a charter
  • blueprint
  • program
  • of their structure and process from the moment of their origin
  • may also include nonliving components.
  • They have a decider, the essential critical sub-system which controls the entire system, causing its subsystems and components to interact. Without such interaction under decider control there is no system.
  • other specific critical sub-systems or they have symbiotic or parasitic relationships with other living or nonliving systems
  • Their subsystems are integrated together to form actively self-regulating, developing, unitary systems with purposes and goals
  • They can exist only in a certain environment
  • change in their environment
  • produces stresses
  • Totipotential system
  • capable of carrying out all critical subsystem processes necessary for life is totipotential
  • Partipotential system
  • does not itself carry out all critical subsystem processes is partipotential
  • A partipotential system must interact with other systems that can carry out the processes which it does not, or it will not survive
  • parasitic
  • symbiotic
    • Tiberius Brastaviceanu
       
      The Exchange fime is a symbiotic system to SENSORICA
  • Fully functioning system
  • when it
  • Partially functioning system
  • it must do its own deciding, or it is not a system
  • Abstracted system
  • Units
  • relationships abstracted or selected by an observer in the light of his interests, theoretical viewpoint, or philosophical bias.
  • Some relationships may be empirically determinable by some operation carried out by the observer, but others are not, being only his concepts
  • Relationships
  • The relationships mentioned above are observed to inhere and interact in concrete, usually living, systems
  • these concrete systems are the relationships of abstracted systems.
  • The verbal usages of theoretical statements concerning abstracted systems are often the reverse of those concerning concrete systems
  • An abstracted system differs from an abstraction, which is a concept
  • representing a class of phenomena all of which are considered to have some similar "class characteristic." The members of such a class are not thought to interact or be interrelated, as are the relationships in an abstracted system
  • Abstracted systems are much more common in social science theory than in natural science.
  • are oriented toward relationships rather than toward the concrete systems
  • spatial arrangements are not usually emphasized
  • their physical limits often do not coincide spatially with the boundaries of any concrete system, although they may.
  • important difference between the physical and biological hierarchies, on the one hand, and social hierarchies, on the other
  • Most physical and biological hierarchies are described in spatial terms
  • we propose to identify social hierarchies not by observing who lives close to whom but by observing who interacts with whom
  • intensity of interaction
  • in most biological and physical systems relatively intense interaction implies relative spatial propinquity
  • To the extent that interactions are channeled through specialized communications and transportation systems, spatial propinquity becomes less determinative of structure.
    • Tiberius Brastaviceanu
       
      This is the case of SENSORICA, built on web-based communication and coordination tools. 
  • PARSONS
  • the unit of a partial social system is a role and not the individual.
  • culture
  • cumulative body of knowledge of the past, contained in memories and assumptions of people who express this knowledge in definite ways
  • The social system is the actual habitual network of communication between people.
  • RUESCH
  • A social system is a behavioral system
  • It is an organized set of behaviors of persons interacting with each other: a pattern of roles.
  • The roles are the units of a social system
    • Tiberius Brastaviceanu
       
      That is why we need a role system in SENSORICA
  • On the other hand, the society is an aggregate of social subsystems, and as a limiting case it is that social system which comprises all the roles of all the individuals who participate.
  • What Ruesch calls the social system is something concrete in space-time, observable and presumably measurable by techniques like those of natural science
  • To Parsons the system is abstracted from this, being the set of relationships which are the form of organization. To him the important units are classes of input-output relationships of subsystems rather than the subsystems themselves
  • system is a system of relationship in action, it is neither a physical organism nor an object of physical perception
  • evolution
  • differentiation
  • growth
  • from earlier and simpler forms and functions
  • capacities for specializations and gradients
  • [action] is not concerned with the internal structure of processes of the organism, but is concerned with the organism as a unit in a set of relationships and the other terms of that relationship, which he calls situation
  • Abstracted versus concrete systems
  • One fundamental distinction between abstracted and concrete systems is that the boundaries of abstracted systems may at times be conceptually established at regions which cut through the units and relationships in the physical space occupied by concrete systems, but the boundaries of these latter systems are always set at regions which include within them all the units and internal relationships of each system
  • A science of abstracted systems certainly is possible and under some conditions may be useful.
  • If the diverse fields of science are to be unified, it would be helpful if all disciplines were oriented either to concrete or to abstracted systems.
  • It is of paramount importance for scientists to distinguish clearly between them
Kurt Laitner

Club of Amsterdam blog: The impact of culture on education - 0 views

  • For example in some countries the objective of education is: to develop a critical mind, which in other cultures is viewed as absurd. In these countries students are supposed to try to learn as much as possible from the older generation and only when you are fully initiated you may communicate to have ideas of yourself.
  • For example in some countries the objective of education is: to develop a critical mind, which in other cultures is viewed as absurd. In these countries students are supposed to try to learn as much as possible from the older generation and only when you are fully initiated you may communicate to have ideas of yourself.
  • The combined scores for each country explain variations in behavior of people and organizations. The scores indicate the relative differences between cultures.
  • ...13 more annotations...
  • n masculine cultures like USA, UK, Germany, Japan and Italy the dominant values are achievement and success. The dominant values in feminine cultures are consensus seeking, caring for others and quality of life. Sympathy is for the underdog. People try to avoid situations distinguishing clear winners and losers.  In masculine cultures performance and achievement are important. The sympathy is for the winners. Status is important to show success. Feminine cultures like the Scandinavian countries and the Netherlands have a people orientation. Small is beautiful and status is not so important.
  • In masculine cultures like USA, UK, Germany, Japan and Italy the dominant values are achievement and success. The dominant values in feminine cultures are consensus seeking, caring for others and quality of life. Sympathy is for the underdog. People try to avoid situations distinguishing clear winners and losers.  In masculine cultures performance and achievement are important. The sympathy is for the winners. Status is important to show success. Feminine cultures like the Scandinavian countries and the Netherlands have a people orientation. Small is beautiful and status is not so important.
  • In masculine cultures like USA, UK, Germany, Japan and Italy the dominant values are achievement and success. The dominant values in feminine cultures are consensus seeking, caring for others and quality of life. Sympathy is for the underdog. People try to avoid situations distinguishing clear winners and losers.  In masculine cultures performance and achievement are important. The sympathy is for the winners. Status is important to show success. Feminine cultures like the Scandinavian countries and the Netherlands have a people orientation. Small is beautiful and status is not so important.
  • For example in some countries the objective of education is: to develop a critical mind, which in other cultures is viewed as absurd. In these countries students are supposed to try to learn as much as possible from the older generation and only when you are fully initiated you may communicate to have ideas of yourself.
  • c. Masculinity vs. Femininity (MAS) In masculine cultures like USA, UK, Germany, Japan and Italy the dominant values are achievement and success. The dominant values in feminine cultures are consensus seeking, caring for others and quality of life. Sympathy is for the underdog. People try to avoid situations distinguishing clear winners and losers.  In masculine cultures performance and achievement are important. The sympathy is for the winners. Status is important to show success. Feminine cultures like the Scandinavian countries and the Netherlands have a people orientation. Small is beautiful and status is not so important.
  • He defines culture as “the collective programming of the mind that distinguishes the members of one group or category of people from others”.
  • Analyzing his data, Hofstede found five value clusters (or “dimensions”) being the most fundamental in understanding and explaining the differences in answers to the single questions in his questionnaires
  • The five dimensions of national culture identified by Hofstede are:  Power Distance Index (PDI)  Individualism vs. collectivism (IDV)  Masculinity vs. femininity (MAS)  Uncertainty Avoidance Index (UAI)  Long Term Orientation (LTO)
  • Power distance is the extent to which less powerful members of a society accept that power is distributed unequally. In high power-distance cultures everybody has his/her rightful place in society. Old age is respected, and status is important. In low power-distance cultures people try to look younger and powerful people try to look less powerful
  • In individualistic cultures, like almost all the rich Western countries, people look after themselves and their immediate family only; in collectivist cultures like Asia and Africa people belong to "in-groups" who look after them in exchange for loyalty
  • In masculine cultures like USA, UK, Germany, Japan and Italy the dominant values are achievement and success. The dominant values in feminine cultures are consensus seeking, caring for others and quality of life. Sympathy is for the underdog. People try to avoid situations distinguishing clear winners and losers.  In masculine cultures performance and achievement are important. The sympathy is for the winners. Status is important to show success. Feminine cultures like the Scandinavian countries and the Netherlands have a people orientation. Small is beautiful and status is not so important
  • Uncertainty avoidance (or uncertainty control) stands for the extent to which people feel threatened by uncertainty and ambiguity. In cultures with strong uncertainty avoidance, people have a strong emotional need for rules and formality to structure life
  • The last element of culture is the Long Term Orientation which is the extent to which a society exhibits a future-orientated perspective rather than a near term point of view.  Low scoring countries like the USA and West European countries are usually those under the influence of monotheistic religious systems, such as the Christian, Islamic or Jewish systems. People in these countries believe there is an absolute and indivisible truth. In high scoring countries such as Hong Kong, Taiwan, China, for example those practicing Buddhism, Shintoism or Hinduism,  people believe truth depends on time, context and situation
  •  
    has explanatory power over many of the fundamental disagreements I have seen play out in sensorica discussions - may be worthwhile to understand constituents based on this model
1 - 14 of 14
Showing 20 items per page