Skip to main content

Home/ Sensorica Knowledge/ Group items tagged internet

Rss Feed Group items tagged

Tiberius Brastaviceanu

Private 'Distributed Ledgers' Miss the Point of a Blockchain | Bank Think - 0 views

  • a new buzzword making waves throughout the financial industry: “distributed ledger.”
  • Some say it's a tool to enable transparency by ensuring that all members of a group receive cryptographically secured messages about participants’ activities
  • Some are even bold enough to predict that distributed ledgers will end the madness of managing multiple database and reconciliation structures.
  • ...13 more annotations...
  • Distributed ledgers have primarily claimed to supplant the need for Bitcoin's mining process by introducing trust requirements among participants. These ledgers also promise users the immutability of Bitcoin without the need for expensive mining operations.
  • the technology powering distributed ledgers predates blockchains by well over 20 years.
  • Proponents of distributed ledgers argue that they can displace centralized providers such as SWIFT,
  • by moving money faster
  • There’s no doubt that blockchain technology will facilitate disruptive innovations in finance
  • But a world of private ledgers sounds eerily similar to a range of “private Internets.”
  • Blockchain technology is useful not because it offers efficiency in a world of message-passing but because it uses a complex process to settle value between untrusted parties.
  • But distributed ledgers do not offer users the ability to easily convert their tokens and messages into fungible units of value. Nor do distributed ledgers escrow value between parties that don't trust each other.
  • If a ledger is not a public resource, it will have the pressures incumbent to existing settlement systems plus the overhead of maintaining a shared database among competitors. What efficiency will remain thereafter remains dubious.
  • Permissioned Blockchains
  • their institutional users will probably find it expedient to hash their private-chain transactions and use those hashes to create bitcoin addresses and then send tiny fractions of a bitcoin to them to register their data at a location that cannot be hacked or changed.
    • Tiberius Brastaviceanu
       
      This is also a problem with access, if an access event needs to be recorded in a way that cannot be altered, in a data location that cannot be altered, it will need to be stored on a block chain. 
  • In other words, all private ledger/blockchains will lead to Bitcoin's Rome, driven there by its low cost and high public accountability.
  •  
    the case against private chains.
Tiberius Brastaviceanu

Free-Form Authority Models - P2P Foundation - 0 views

  • ‘authority models’in peer production, contrasts owner-centric authority models from free-form models
  • define the authority models at work in such projects. The models define access and the workflow, and whether there is any quality control.
  • the owner-centric model, entries can only be modified with the permission of a specific ‘owner’ who has to defend the integrity of his module.
  • ...11 more annotations...
  • The free-form model connotes more of a sense that all users are on the “same level," and that expertise will be universally recognized and deferred to.
  • the owner-centric authority model assumes the owner is the de facto expert in the topic at hand
  • In the case of the Wikipedia, the adherents of the owner-centric model, active in the pre-Wikipedia "Nupedia" model, lost out, and presumable, the success of Wikipedia has proven them wrong
  • dominance of difficult people, trolls, and their enablers
  • Far too much credence and respect accorded to people who in other Internet contexts would be labelled "trolls."
  • Wikipedia has, to its credit, done something about the most serious trolling and other kinds of abuse: there is an Arbitration Committee that provides a process whereby the most disruptive users of Wikipedia can be ejected from the project. But there are myriad abuses and problems that never make it to mediation, let alone arbitration.
  • most people working on Wikipedia--the constant fighting can be so off-putting as to drive them away
  • any person who can and wants to work politely with well-meaning
  • root problem: anti-elitism, or lack of respect for expertise.
  • Wikipedia lacks the habit or tradition of respect for expertise
  • nearly everyone with much expertise but little patience will avoid editing Wikipedia
  •  
    from p2p foundation 
Tiberius Brastaviceanu

POWER-CURVE SOCIETY: The Future of Innovation, Opportunity and Social Equity in the Eme... - 1 views

  • how technological innovation is restructuring productivity and the social and economic impact resulting from these changes
  • concern about the technological displacement of jobs, stagnant middle class income, and wealth disparities in an emerging "winner-take-all" economy
  • personal data ecosystems that could potentially unlock a revolutionary wave of individual economic empowerment
  • ...70 more annotations...
  • the bell curve described the wealth and income distribution of American society
  • As the technology boom of the 1990s increased productivity, many assumed that the rising water level of the economy was raising all those middle class boats. But a different phenomenon has also occurred. The wealthy have gained substantially over the past two decades while the middle class has remained stagnant in real income, and the poor are simply poorer.
  • America is turning into a power-curve society: one where there are a relative few at the top and a gradually declining curve with a long tail of relatively poorer people.
  • For the first time since the end of World War II, the middle class is apparently doing worse, not better, than previous generations.
  • an alarming trend
  • What is the role of technology in these developments?
  • a sweeping look at the relationship between innovation and productivity
  • New Economy of Personal Information
  • Power-Curve Society
  • the future of jobs
  • the report covers the social, policy and leadership implications of the “Power-Curve Society,”
  • World Wide Web
  • as businesses struggle to come to terms with this revolution, a new set of structural innovations is washing over businesses, organizations and government, forcing near-constant adaptation and change. It is no exaggeration to say that the explosion of innovative technologies and their dense interconnections is inventing a new kind of economy.
  • the new technologies are clearly driving economic growth and higher productivity, the distribution of these benefits is skewed in worrisome ways.
  • the networked economy seems to be producing a “power-curve” distribution, sometimes known as a “winner-take-all” economy
  • Economic and social insecurity is widespread.
  • major component of this new economy, Big Data, and the coming personal data revolution fomenting beneath it that seeks to put individuals, and not companies or governments, at the forefront. Companies in the power-curve economy rely heavily on big databases of personal information to improve their marketing, product design, and corporate strategies. The unanswered question is whether the multiplying reservoirs of personal data will be used to benefit individuals as consumers and citizens, or whether large Internet companies will control and monetize Big Data for their private gain.
  • Why are winner-take-all dynamics so powerful?
  • appear to be eroding the economic security of the middle class
  • A special concern is whether information and communications technologies are actually eliminating more jobs than they are creating—and in what countries and occupations.
  • How is the power-curve economy opening up opportunities or shutting them down?
  • Is it polarizing income and wealth distributions? How is it changing the nature of work and traditional organizations and altering family and personal life?
  • many observers fear a wave of social and political disruption if a society’s basic commitments to fairness, individual opportunity and democratic values cannot be honored
  • what role government should play in balancing these sometimes-conflicting priorities. How might educational policies, research and development, and immigration policies need to be altered?
  • The Innovation Economy
  • Conventional economics says that progress comes from new infusions of capital, whether financial, physical or human. But those are not necessarily the things that drive innovation
  • What drives innovation are new tools and then the use of those new tools in new ways.”
  • at least 50 percent of the acceleration of productivity over these years has been due to ICT
  • economists have developed a number of proxy metrics for innovation, such as research and development expenditures.
  • Atkinson believes that economists both underestimate and overestimate the scale and scope of innovation.
  • Calculating the magnitude of innovation is also difficult because many innovations now require less capital than they did previously.
  • Others scholars
  • see innovation as going in cycles, not steady trajectories.
  • A conventional approach is to see innovation as a linear, exponential phenomenon
  • leads to gross errors
  • Atkinson
  • believes that technological innovation follows the path of an “S-curve,” with a gradual increase accelerating to a rapid, steep increase, before it levels out at a higher level. One implication of this pattern, he said, is that “you maximize the ability to improve technology as it becomes more diffused.” This helps explain why it can take several decades to unlock the full productive potential of an innovation.
  • innovation keeps getting harder. It was pretty easy to invent stuff in your garage back in 1895. But the technical and scientific challenges today are huge.”
  • costs of innovation have plummeted, making it far easier and cheaper for more people to launch their own startup businesses and pursue their unconventional ideas
  • innovation costs are plummeting
  • Atkinson conceded such cost-efficiencies, but wonders if “the real question is that problems are getting more complicated more quickly than the solutions that might enable them.
  • we may need to parse the different stages of innovation: “The cost of innovation generally hasn’t dropped,” he argued. “What has become less expensive is the replication and diffusion of innovation.”
  • what is meant by “innovation,”
  • “invention plus implementation.”
  • A lot of barriers to innovation can be found in the lack of financing, organizational support systems, regulation and public policies.
  • 90 percent of innovation costs involve organizational capital,”
  • there is a serious mismatch between the pace of innovation unleashed by Moore’s Law and our institutional and social capacity to adapt.
  • This raises the question of whether old institutions can adapt—or whether innovation will therefore arise through other channels entirely. “Existing institutions are often run by followers of conventional wisdom,”
  • The best way to identify new sources of innovation, as Arizona State University President Michael Crow has advised, is to “go to the edge and ignore the center.”
  • Paradoxically, one of the most potent barriers to innovation is the accelerating pace of innovation itself.
  • Institutions and social practice cannot keep up with the constant waves of new technologies
  • “We are moving into an era of constant instability,”
  • “and the half-life of a skill today is about five years.”
  • Part of the problem, he continued, is that our economy is based on “push-based models” in which we try to build systems for scalable efficiencies, which in turn demands predictability.
  • The real challenge is how to achieve radical institutional innovations that prepare us to live in periods of constant two- or three-year cycles of change. We have to be able to pick up new ideas all the time.”
  • pace of innovation is a major story in our economy today.
  • The App Economy consists of a core company that creates and maintains a platform (such as Blackberry, Facebook or the iPhone), which in turn spawns an ecosystem of big and small companies that produce apps and/or mobile devices for that platform
  • tied this success back to the open, innovative infrastructure and competition in the U.S. for mobile devices
  • standard
  • The App Economy illustrates the rapid, fluid speed of innovation in a networked environment
  • crowdsourcing model
  • winning submissions are
  • globally distributed in an absolute sense
  • problem-solving is a global, Long Tail phenomenon
  • As a technical matter, then, many of the legacy barriers to innovation are falling.
  • small businesses are becoming more comfortable using such systems to improve their marketing and lower their costs; and, vast new pools of personal data are becoming extremely useful in sharpening business strategies and marketing.
  • Another great boost to innovation in some business sectors is the ability to forge ahead without advance permission or regulation,
  • “In bio-fabs, for example, it’s not the cost of innovation that is high, it’s the cost of regulation,”
  • This notion of “permissionless innovation” is crucial,
  • “In Europe and China, the law holds that unless something is explicitly permitted, it is prohibited. But in the U.S., where common law rather than Continental law prevails, it’s the opposite
Tiberius Brastaviceanu

Is Shame Necessary? | Conversation | Edge - 0 views

  • What is shame's purpose? Is shame still necessary?
  • Shame is what is supposed to occur after an individual fails to cooperate with the group.
  • Whereas guilt is evoked by an individual's standards, shame is the result of group standards. Therefore, shame, unlike guilt, is felt only in the context of other people.
  • ...53 more annotations...
  • Many animals use visual observations to decide whether to work with others.
  • humans are more cooperative when they sense they're being watched.
  • The feeling of being watched enhances cooperation, and so does the ability to watch others. To try to know what others are doing is a fundamental part of being human
  • Shame serves as a warning to adhere to group standards or be prepared for peer punishment. Many individualistic societies, however, have migrated away from peer punishment toward a third-party penal system
  • Shame has become less relevant in societies where taking the law into one's own hands is viewed as a breach of civility.
  • Many problems, like most concerning the environment, are group problems. Perhaps to solve these problems we need a group emotion. Maybe we need shame.
  • Guilt prevails in many social dilemmas
  • It is perhaps unsurprising that a set of tools has emerged to assuage this guilt
  • Guilt abounds in many situations where conservation is an issue.
  • The problem is that environmental guilt, though it may well lead to conspicuous ecoproducts, does not seem to elicit conspicuous results.
  • The positive effect of idealistic consumers does exist, but it is masked by the rising demand and numbers of other consumers.
  • Guilt is a valuable emotion, but it is felt by individuals and therefore motivates only individuals. Another drawback is that guilt is triggered by an existing value within an individual. If the value does not exist, there is no guilt and hence no action
  • Getting rid of shaming seems like a pretty good thing, especially in regulating individual behavior that does no harm to others. In eschewing public shaming, society has begun to rely more heavily on individual feelings of guilt to enhance cooperation.
  • five thousand years ago, there arose another tool: writing
  • Judges in various states issue shaming punishments,
  • shaming by the state conflicts with the law's obligation to protect citizens from insults to their dignity.
  • What if government is not involved in the shaming?
  • Is this a fair use of shaming? Is it effective?
  • Shaming might work to change behavior in these cases, but in a world of urgent, large-scale problems, changing individual behavior is insignificant
  • vertical agitation
  • Guilt cannot work at the institutional level, since it is evoked by individual scruples, which vary widely
  • But shame is not evoked by scruples alone; since it's a public sentiment, it also affects reputation, which is important to an institution.
  • corporate brand reputation outranked financial performance as the most important measure of success
  • shame and reputation interact
  • in our early evolution we could gauge cooperation only firsthand
  • Shaming, as noted, is unwelcome in regulating personal conduct that doesn't harm others. But what about shaming conduct that does harm others?
  • why we learned to speak.1
  • Language
  • The need to accommodate the increasing number of social connections and monitor one another could be
  • allowed for gossip, a vector of social information.
  • in cooperation games that allowed players to gossip about one another's performance, positive gossip resulted in higher cooperation.
  • Of even greater interest, gossip affected the players' perceptions of others even when they had access to firsthand information.
  • Human society today is so big that its dimensions have outgrown our brains.
  • What tool could help us gossip in a group this size?
  • We can use computers to simulate some of the intimacy of tribal life, but we need humans to evoke the shame that leads to cooperation. The emergence of new tools— language, writing, the Internet—cannot completely replace the eyes. Face-to-face interactions, such as those outside Trader Joe's stores, are still the most impressive form of dissent.
  • what is stopping shame from catalyzing social change? I see three main drawbacks:
  • Today's world is rife with ephemeral, or "one-off," interactions.
  • Research shows, however, that if people know they will interact again, cooperation improves
  • Shame works better if the potential for future interaction is high
  • In a world of one-off interactions, we can try to compensate for anonymity with an image score,
  • which sends a signal to the group about an individual's or institution's degree of cooperation.
  • Today's world allows for amorphous identities
  • It's hard to keep track of who cooperates and who doesn't, especially if it's institutions you're monitoring
  • Shaming's biggest drawback is its insufficiency.
  • Some people have no shame
  • shame does not always encourage cooperation from players who are least cooperative
  • a certain fraction of a given population will always behave shamelessly
  • if the payoff is high enough
  • There was even speculation that publishing individual bankers' bonuses would lead to banker jealousy, not shame
  • shame is not enough to catalyze major social change
  • This is why punishment remains imperative.
  • Even if shaming were enough to bring the behavior of most people into line, governments need a system of punishment to protect the group from the least cooperative players.
  • Today we are faced with the additional challenge of balancing human interests and the interests of nonhuman life.
  •  
    The role of non-rational mechanisms in convergence - social emotions like shame and guilt 
Tiberius Brastaviceanu

Partner State - P2P Foundation - 0 views

    • Tiberius Brastaviceanu
       
      we call this a custodian
    • Tiberius Brastaviceanu
       
      we call this a custodian
  • So here we have it, the new triarchy: - The state, with its public property and representative mechanisms of governance (in the best scenario) - The private sector, with the corporation and private property - The commons, with the Trust (or the for-benefit association), and which is the ‘property’ of all its members (not the right word in the context of the commons, since it has a different philosophy of ownership)
    • Tiberius Brastaviceanu
       
      so where is direct democracy in all this?
  • ...39 more annotations...
  • In a first phase, the commons simply emerges as an added alternative.
  • becoming a subsector of society, and starts influencing the whole
  • phase transition and transformation will need to occur.
  • how a commons-dominated, i.e. after the phase transition, society would look like.
  • At its core would be a collection of commons, represented by trusts and for-benefit associations, which protect their common assets for the benefit of present and future generations
  • The commons ‘rents out’ the use of its resources to entrepreneurs. In other words, business still exists, though infinite growth-based capitalism does not.
  • More likely is that the corporate forms will be influenced by the commons and that profit will be subsumed to other goals, that are congruent with the maintenance of the commons.
  • The state will still exist, but will have a radically different nature
  • Much of its functions will have been taken over by commons institutions, but since these institutions care primarily about their commons, and not the general common good, we will still need public authorities that are the guarantor of the system as a whole, and can regulate the various commons, and protect the commoners against possible abuses. So in our scenario, the state does not disappear, but is transformed, though it may greatly diminish in scope, and with its remaining functions thoroughly democratized and based on citizen participation.
  • In our vision, it is civil-society based peer production, through the Commons, which is the guarantor of value creation by the private sector, and the role of the state, as Partner State, is to enable and empower the creation of common value. The new peer to peer state then, though some may see that as a contradictio in terminis, is a state which is subsumed under the Commons, just as it is now under the private sector. Such a peer to peer state, if we are correct, will have a much more modest role than the state under a classic state society, with many of its functions taken over by civil society associations, interlinked in processes of global governance. The above then, this triarchy, is the institutional core which replaces the dual private-public binary system that is characteristic of the capitalist system that is presently the dominant format.
  • fundamental mission is to empower direct social-value creation, and to focus on the protection of the Commons sphere as well as on the promotion of sustainable models of entrepreneurship and participatory politics
  • the state becomes a 'partner state' and enables autonomous social production.
  • the state does exist, and I believe that we can’t just imagine that we live in a future state-less society
  • retreating from the binary state/privatization dilemma to the triarchical choice of an optimal mix amongst government regulation, private-market freedom and autonomous civil-society projects
  • the role of the state
  • “the peer production of common value requires civic wealth and strong civic institutions.
  • trigger the production/construction of new commons by - (co-) management of complexe resource systems which are not limited to local boundaries or specific communities (as manager and partner) - survey of rules (chartas) to care for the commons (mediator or judge) - kicking of or providing incentives for commoners governing their commons - here the point is to design intelligent rules which automatically protect the commons, like the GPL does (facilitator)"
  • the emergence of the digital commons. It is the experience of creating knowledge, culture, software and design commons, by a combination of voluntary contributions, entrepreneurial coalitions and infrastructure-protecting for-benefit associations, that has most tangibly re-introduced the idea of commons, for all to use without discrimination, and where all can contribute. It has drastically reduced the production, distribution, transaction and coordination costs for the immaterial value that is at the core also of all what we produce physically, since that needs to be made, needs to be designed. It has re-introduced communing as a mainstream experience for at least one billion internet users, and has come with proven benefits and robustness that has outcompeted and outcooperated its private rivals. It also of course offers new ways to re-imagine, create and protect physical commons.
  • stop enclosures
  • peer to peer, i.e. the ability to freely associate with others around the creation of common value
  • communal shareholding, i.e. the non-reciprocal exchange of an individual with a totality. It is totality that we call the commons.
  • It is customary to divide society into three sectors, and what we want to show is how the new peer to peer dynamic unleashed by networked infrastructures, changes the inter-relationship between these three sectors.
  • In the current ‘cognitive capitalist’ system, it is the private sector consisting of enterprises and businesses which is the primary factor, and it is engaged in competitive capital accumulation. The state is entrusted with the protection of this process. Though civil society, through the citizen, is in theory ‘sovereign’, and chooses the state; in practice, both civil society and the state are under the domination of the private sector.
  • it fulfills three contradictory functions
  • Of course, this is not to say that the state is a mere tool of private business.
  • protect the whole system, under the domination of private business
  • protector of civil society, depending on the balance of power and achievements of social movements
  • protector of its own independent interests
  • Under fascism, the state achieves great independence from the private sector , which may become subservient to the state. Under the welfare state, the state becomes a protector of the social balance of power and manages the achievements of the social movement; and finally, under the neoliberal corporate welfare state, or ‘market state’, it serves most directly the interests of the financial sector.
  • key institutions and forms of property.
  • The state managed a public sector, under its own property.
  • The private sector , under a regime of private ownership, is geared to profit, discounts social and natural externalities, both positive and negative, and uses its dominance in society to use and dominate the state.
  • civil society has a relative power as well, through its capability of creating social movements and associations
  • Capitalism has historically been a pendulum between the private and the public sector
  • However, this configuration is changing,
  • the endangerment of the biosphere through the workings of ‘selfish’ market players; the second is the role of the new digital commons.
  • participatory politics
  • Peer production gives us an advance picture of how a commons-oriented society would look like. At its core is a commons and a community contributing to it, either voluntarily, or as paid entrepreneurial employees. It does this through collaborative platforms using open standards. Around the commons emerges enterprises that create added value to operate on the marketplace, but also help the maintenance and the expansion of the commons they rely on. A third partner are the for-benefit associations that maintain the infrastructure of cooperation. Public authorities could play a role if they wanted to support existing commons or the creation of new commons, for the value they bring to society.
  • if a commons is not created as in the case of the digital commons, it is something that is inherited from nature or former generations, given in trust and usufruct, so that it can be transmitted to our descendents. The proper institution for such commons is therefore the trust, which is a corporate form that cannot touch its principal capital, but has to maintain it.
Tiberius Brastaviceanu

Access control - Wikipedia, the free encyclopedia - 0 views

  • The act of accessing may mean consuming, entering, or using.
  • Permission to access a resource is called authorization.
  • Locks and login credentials are two analogous mechanisms of access control.
  • ...26 more annotations...
  • Geographical access control may be enforced by personnel (e.g., border guard, bouncer, ticket checker)
  • n alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country
  • access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons
  • can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap.
  • Physical access control is a matter of who, where, and when
  • Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.[citation needed] Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked
  • Credential
  • Access control system operation
  • The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input
  • There are three types (factors) of authenticating information:[2] something the user knows, e.g. a password, pass-phrase or PIN something the user has, such as smart card or a key fob something the user is, such as fingerprint, verified by biometric measurement
  • Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios
  • When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked.
  • A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a biometric feature) or some combination of these items. This is known as multi-factor authentication. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.
  • An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list
  • monitor the door position
  • Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the doo
  • Access control topology
  • Access control decisions are made by comparing the credential to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the look-up out from a central host to the edge of the system, or the reader. The predominant topology circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks
  • Access control readers may be classified by the functions they are able to perform
  • and forward it to a control panel.
  • Basic (non-intelligent) readers: simply read
  • Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus.
  • Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers.
  • Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host
  • a built in webservice to make it user friendly
  • Some readers may have additional features such as an LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support
Kurt Laitner

Value Creating Service Systems: From Service Systems to Digital Lives - 0 views

  •  
    "Service dominant logic suggest that value is always co-created in context of use and experience. Co-creation is not an option (Vargo and Lusch, 2004, 2008). "Moving things along meant a focus on 2 key aspects. philosophy and methods. "An SD logic approach is not one that you can run a survey of attitude, behaviours or intentions. The person is embedded in his actions and practices of value creation. The focus on context means the unit of analysis is in the sociology of real life behaviours. A sociological approach makes methods a problem because we've inherited a world where we have created tools from analysing water in a bucket, not by looking at its behaviour in a river. "GD logic is compelling not only because it is entrenched for over 500 years, but also because you could measure its constructs. GDP, sales, revenues, CPI - they are all constructs of a GD logic society. What SD logic needed was better methods and new constructs. "To that end, and rather ironically, I found an ally in digital technology. Here was a world of sensors and actuators with an enthusiastic community looking for novel ways of deploying them into homes and buildings i.e. the internet-of-things. "I also found, as an ally, the thinking around new economic and business models. Here was another strand of literature largely marginalised by mainstream business literature because it was (the way I interpreted it) taking a systemic view of value proposition, value creation and value capture (ie, change one, change all) and the way the organisation had to be agile and transformed for it - which sat very nicely with SD logic. "Customised products are firm centric. Personalised products are customer initiated and empowering. Personalised products also tend to move the product into becoming platforms to afford co-creation, which advanced the notion of symmetry in value co-creation further. Finally, with the advent of platforms, the economics of 2 or multi-sided markets completed my set of theoretica
  •  
    an interesting starting point for research
Tiberius Brastaviceanu

Open Collaboration - The Next Economic Paradigm - 0 views

  • we’re in the midst of a collapsing paradigm
  • to be replaced by something new
  • I will explain what the new paradigm
  • ...40 more annotations...
  • business
  • government
  • education
  • research
  • The old economic paradigm was a service economy built on the digital communications revolution that began in the early 1970′s.
  • financial capital has decoupled from productive capital
  • financial meltdown
  • major societal institutions have stalled
  • the funding models
  • no longer work properly
  • The new model is the Open Collaboration Paradigm
  • we will see a radical departure from old institutional models.
  • social capital is increasingly recognized
  • generating wealth for society
  • This will be a profoundly social economy, built on unprecedented capabilities to self-organize people and resources in the crowd.
  • Social media
  • connect ideas, people, and institutions
  • blur the inside/outside distinctions
  • Network connections
  • radical transparency will be the new norm
  • Another profound shift will occur in the realm of ownership
  • No longer
  • viable
  • to horde intellectual property
  •  Collaborative consumption will arise as a more robust business paradigm,
  • risk is distributed
  • implications for business
  •  Those who can leverage the wisdom of crowds for market research, product development, and efficient resource allocation will be more adept and agile in the face of rapid change.
  • Those who build walls around themselves will fail to tap into the flow of knowledge and resources running rampant in the crowd
  • governments will have to become more transparent and responsive to their citizens
  • information becomes more immersive and dynamic
  • Research has already begun to use open collaboration that goes beyond the halls of academia.
  • collaborative approach to research will become the norm,
  • The era of “user generated content” and “prosumption” — where consumers of goods and services co-create what they will consume — is now a decade along in its evolution.  We will increasingly see collaborative design and production of consumables across society.
  • In the education arena, we will see more curricula as shareware and an increased emphasis on multi-perspective teamwork as the necessary skills for engaging in collaborative projects.
  • Expert/amateur boundaries have already blurred to the point where individuals can acquire graduate-level knowledge through self-directed learning on the internet.
  • distance learning
  •  Lifetime learning
  • active pedagogy
  • So get ready for the new economic paradigm.
‹ Previous 21 - 40 of 40
Showing 20 items per page