Skip to main content

Home/ Sensorica Knowledge/ Group items tagged package

Rss Feed Group items tagged

Tiberius Brastaviceanu

The New Normal in Funding University Science | Issues in Science and Technology - 1 views

  • Government funding for academic research will remain limited, and competition for grants will remain high. Broad adjustments will be needed
  • he sequester simply makes acute a chronic condition that has been getting worse for years.
  • the federal budget sequester
  • ...72 more annotations...
  • systemic problems that arise from the R&D funding system and incentive structure that the federal government put in place after World War II
  • Researchers across the country encounter increasingly fierce competition for money.
  • unding rates in many National Institutes of Health (NIH) and National Science Foundation (NSF) programs are now at historical lows, declining from more than 30% before 2001 to 20% or even less in 2011
  • even the most prominent scientists will find it difficult to maintain funding for their laboratories, and young scientists seeking their first grant may become so overwhelmed that individuals of great promise will be driven from the field
  • anxiety and frustration
  • The growth of the scientific enterprise on university campuses during the past 60 years is not sustainable and has now reached a tipping point at which old models no longer work
  • Origins of the crisis
  • ederal funding agencies must work with universities to ensure that new models of funding do not stymie the progress of science in the United States
  • The demand for research money greatly exceeds the supply
  • the demand for research funding has gone up
  • The deeper sources of the problem lie in the incentive structure of the modern research university, the aspirations of scientists trained by those universities, and the aspirations of less research-intensive universities and colleges across the nation
  • competitive grants system
  • if a university wants to attract a significant amount of sponsored research money, it needs doctoral programs in the relevant fields and faculty members who are dedicated to both winning grants and training students
  • The production of science and engineering doctorates has grown apace
  • Even though not all doctorate recipients become university faculty, the size of the science and engineering faculty at U.S. universities has grown substantially
  • proposal pressure goes up
  • These strategies make sense for any individual university, but will fail collectively unless federal funding for R&D grows robustly enough to keep up with demand.
  • At the very time that universities were enjoying rapidly growing budgets, and creating modes of operation that assumed such largess was the new normal, Price warned that it would all soon come to a halt
  • the human and financial resources invested in science had been increasing much faster than the populations and economies of those regions
  • growth in the scientific enterprise would have to slow down at some point, growing no more than the population or the economy.
  • Dead-end solutions
  • studies sounded an alarm about the potential decline in U.S. global leadership in science and technology and the grave implications of that decline for economic growth and national security
  • Although we are not opposed to increasing federal funding for research, we are not optimistic that it will happen at anywhere near the rate the Academies seek, nor do we think it will have a large impact on funding rates
  • universities should not expect any radical increases in domestic R&D budgets, and most likely not in defense R&D budgets either, unless the discretionary budgets themselves grow rapidly. Those budgets are under pressure from political groups that want to shrink government spending and from the growth of spending in mandatory programs
  • The basic point is that the growth of the economy will drive increases in federal R&D spending, and any attempt to provide rapid or sustained increases beyond that growth will require taking money from other programs.
  • The demand for research money cannot grow faster than the economy forever and the growth curve for research money flattened out long ago.
  • Path out of crisis
  • The goal cannot be to convince the government to invest a higher proportion of its discretionary spending in research
  • Getting more is not in the cards, and some observers think the scientific community will be lucky to keep what it has
  • The potential to take advantage of the infrastructure and talent on university campuses may be a win-win situation for businesses and institutions of higher education.
  • Why should universities and colleges continue to support scientific research, knowing that the financial benefits are diminishing?
  • esearch culture
  • attract good students and faculty as well as raise their prestige
  • mission to expand the boundaries of human knowledge
  • faculty members are committed to their scholarship and will press on with their research programs even when external dollars are scarce
  • training
  • take place in
  • research laboratories
  • it is critical to have active research laboratories, not only in elite public and private research institutions, but in non-flagship public universities, a diverse set of private universities, and four-year colleges
  • How then do increasingly beleaguered institutions of higher education support the research efforts of the faculty, given the reality that federal grants are going to be few and far between for the majority of faculty members? What are the practical steps institutions can take?
  • change the current model of providing large startup packages when a faculty member is hired and then leaving it up to the faculty member to obtain funding for the remainder of his or her career
  • universities invest less in new faculty members and spread their internal research dollars across faculty members at all stages of their careers, from early to late.
    • Tiberius Brastaviceanu
       
      Sharing of resources, see SENSORICA's NRP
  • national conversation about changes in startup packages and by careful consultations with prospective faculty hires about long-term support of their research efforts
  • Many prospective hires may find smaller startup packages palatable, if they can be convinced that the smaller packages are coupled with an institutional commitment to ongoing research support and more reasonable expectations about winning grants.
  • Smaller startup packages mean that in many situations, new faculty members will not be able to establish a functioning stand-alone laboratory. Thus, space and equipment will need to be shared to a greater extent than has been true in the past.
  • construction of open laboratory spaces and the strategic development of well-equipped research centers capable of efficiently servicing the needs of an array of researchers
  • phaseout of the individual laboratory
  • enhanced opportunities for communication and networking among faculty members and their students
  • Collaborative proposals and the assembly of research teams that focus on more complex problems can arise relatively naturally as interactions among researchers are facilitated by proximity and the absence of walls between laboratories.
  • An increased emphasis on team research
  • investments in the research enterprise
  • can be directed at projects that have good buy-in from the faculty
  • learn how to work both as part of a team and independently
  • Involvement in multiple projects should be encouraged
  • The more likely trajectory of a junior faculty member will evolve from contributing team member to increasing leadership responsibilities to team leader
  • nternal evaluations of contributions and potential will become more important in tenure and promotion decisions.
    • Tiberius Brastaviceanu
       
      Need value accounting system
  • relationships with foundations, donors, state agencies, and private business will become increasingly important in the funding game
  • The opportunities to form partnerships with business are especially intriguing
    • Tiberius Brastaviceanu
       
      The problem is to change the model and go open source, because IP stifles other processes that might benefit Universities!!!
  • Further complicating university collaborations with business is that past examples of such partnerships have not always been easy or free of controversy.
  • some faculty members worried about firms dictating the research priorities of the university, pulling graduate students into proprietary research (which could limit what they could publish), and generally tugging the relevant faculty in multiple directions.
  • developed rules and guidelines to control them
  • University faculty and businesspeople often do not understand each other’s cultures, needs, and constraints, and such gaps can lead to more mundane problems in university/industry relations, not least of which are organizational demands and institutional cultures
    • Tiberius Brastaviceanu
       
      Needs for mechanisms to govern, coordinate, structure an ecosystem -See SENSORICA's Open Alliance model
  • n addition to funding for research, universities can receive indirect benefits from such relationships. High-profile partnerships with businesses will underline the important role that universities can play in the economic development of a region.
  • Universities have to see firms as more than just deep pockets, and firms need to see universities as more than sources of cheap skilled labor.
  • foundations or other philanthropy
  • We do not believe that research proposed and supervised by individual principal investigators will disappear anytime soon. It is a research model that has proven to be remarkably successful and enduring
  • However, we believe that the most vibrant scientific communities on university and college campuses, and the ones most likely to thrive in the new reality of funding for the sciences, will be those that encourage the formation of research teams and are nimble with regard to funding sources, even as they leave room for traditional avenues of funding and research.
Francois Bergeron

Protective Case Inserts - 0 views

  •  
    foam case inserts and plastic cases
Tiberius Brastaviceanu

Welcome to the new reputation economy (Wired UK) - 1 views

  • banks take into account your online reputation alongside traditional credit ratings to determine your loan
  • headhunters hire you based on the expertise you've demonstrated on online forums
  • reputation data becomes the window into how we behave, what motivates us, how our peers view us and ultimately whether we can or can't be trusted.
  • ...37 more annotations...
  • At the heart of Movenbank is a concept call CRED.
  • The difference today is our ability to capture data from across an array of digital services. With every trade we make, comment we leave, person we "friend", spammer we flag or badge we earn, we leave a trail of how well we can or can't be trusted.
  • An aggregated online reputation having a real-world value holds enormous potential
  • peer-to-peer marketplaces, where a high degree of trust is required between strangers; and where a traditional approach based on disjointed information sources is currently inefficient, such as recruiting.
  • opportunity to reinvent the way people found jobs through online reputation
  • "It's not about your credit, but your credibility," King says.
  • But this wealth of data raises an important question -- who owns our reputation? Shouldn't our hard-earned online status be portable? If you're a SuperHost on Airbnb, shouldn't you be able to use that reputation to, say, get a loan, or start selling on Etsy?
  • "People are currently underusing their networks and reputation," King says. "I want to help people to understand and build their influence and reputation, and think of it as capital they can put to good use."
  • Social scientists have long been trying to quantify the value of reputation.
  • Using functional magnetic resonance imaging, the researchers monitored brain activity
  • "The implication of our study is that different types of reward are coded by the same currency system." In other words, our brains neurologically compute personal reputation to be as valuable as money.
  • Personal reputation has been a means of making socioeconomic decisions for thousands of years. The difference today is that network technologies are digitally enabling the trust we used to experience face-to-face -- meaning that interactions and exchanges are taking place between total strangers.
  • Trust and reputation become acutely important in peer-to-peer marketplaces such as WhipCar and Airbnb, where members are taking a risk renting out their cars or their homes.
  • When you are trading peer-to-peer, you can't count on traditional credit scores. A different measurement is needed. Reputation fills this gap because it's the ultimate output of how much a community trusts you.
  • Welcome to the reputation economy, where your online history becomes more powerful than your credit history.
  • Presently, reputation data doesn't transfer between verticals.
  • A wave of startups, including Connect.Me, TrustCloud, TrustRank, Legit and WhyTrusted, are trying to solve this problem by designing systems that correlate reputation data. By building a system based on "reputation API" -- a combination of a user's activity, ratings and reviews across sites -- Legit is working to build a service that gives users a score from zero to 100. In trying to create a universal metric for a person's trustworthiness, they are trying to "become the credit system of the sharing economy", says Jeremy Barton, the 27-year-old San Francisco-based cofounder of Legit.
  • His company, and other reputation ventures, face some big challenges if they are to become, effectively, the PayPal of trust. The most obvious is coming up with algorithms that can't be easily gamed or polluted by trolls. And then there's the critical hurdle of convincing online marketplaces not just to open up their reputation vaults, but create a standardised format for how they frame and collect reputation data. "We think companies will share reputation data for the same reasons banks give credit data to credit bureaux," says Rob Boyle, Legit cofounder and CTO. "It is beneficial for one company to give up their slice of reputation data if in return they get access to the bigger picture: aggregated data from other companies."
  • PeerIndex, Kred and Klout,
  • are measuring social influence, not reputation. "Influence measures your ability to drag someone into action,"
  • "Reputation is an indicator of whether a person is good or bad and, ultimately, are they trustworthy?"
  • Early influence and reputation aggregators will undoubtedly learn by trial and error -- but they will also face the significant challenge of pioneering the use of reputation data in a responsible way. And there's a challenge beyond that: reputation is largely contextual, so it's tricky to transport it to other situations.
  • Many of the ventures starting to make strides in the reputation economy are measuring different dimensions of reputation.
  • reputation is a measure of knowledge
  • a measure of trust
  • a measure of propensity to pay
  • measure of influence
  • Reputation capital is not about combining a selection of different measures into a single number -- people are too nuanced and complex to be distilled into single digits or binary ratings.
  • It's the culmination of many layers of reputation you build in different places that genuinely reflect who you are as a person and figuring out exactly how that carries value in a variety of contexts.
  • The most basic level is verification of your true identity
  • reliability and helpfulness
  • do what we say we are going to do
  • respect another person's property
  • trusted to pay on time
  • we will be able to perform a Google- or Facebook-like search and see a picture of a person's behaviour in many different contexts, over a length of time. Slivers of data that have until now lived in secluded isolation online will be available in one place. Answers on Quora, reviews on TripAdvisor, comments on Amazon, feedback on Airbnb, videos posted on YouTube, social groups joined, or presentations on SlideShare; as well as a history and real-time stream of who has trusted you, when, where and why. The whole package will come together in your personal reputation dashboard, painting a comprehensive, definitive picture of your intentions, capabilities and values.
  • idea of global reputation
  • By the end of the decade, a good online reputation could be the most valuable currency in your possession.
kozak30k

Starter Kit for Arduino - Flex - SparkFun Electronics - 0 views

    • kozak30k
       
      Users want starter instructions/project cookbook, spec sheet, ideas for cool projects.
  • The package I received contained some warranty info, but not even a spec sheet for the Duo R3. I was hoping to have it programmed to make an LED blink today, but I’m at a dead end from the get go here.
  • Inventors Kit Guide too.
  •  
    Feedback and comments from users for the Arduino Starter Kit
  •  
    Nice discovery Tony
Tiberius Brastaviceanu

PeerPoint « Poor Richard's Almanack 2010 - 1 views

  • Each PeerPoint is an autonomous node on a p2p network with no centralized corporate  infrastructure.
  • The PeerPoint will be connected between the user’s pc, home network, or mobile device and the ISP connection.
  • The PeerPoint is designed to Occupy the Internet.
  • ...7 more annotations...
  • provide greater user value
  • For numerous reasons the services provided by the commercial companies do not adequately meet the creative, social, political, and financial needs of the 99%
  • allows self-selected individuals to coalesce into powerful workgroups, forums, and movements.
  • With the PeerPoint approach, each user will own her own inexpensive internet appliance and all the data and content she creates
  • If a FreedomBox were used as a starting platform, the PeerPoint application package would be added on top of the FreedomBox security stack.
  • The common requirements for each PeerPoint app are: world class, best-of-breed open source p2p architecture consistent, granular, user-customizable security management and identity protection integrated with other apps in the suite via a common distributed database and/or “data bus” architecture. consistent, user-customizable large, medium, and small-screen (mobile device) user interfaces ability to interface with its corresponding major-market-share service (Facebook, Twitter, etc.) GPS enabled
  • First tier applications: distributed database social networking  (comparison of distributed social network applications) trust/reputation metrics crowdsourcing: content collaboration & management  (wiki, Google Docs, or better) project management/workflow data visualization (data sets, projects, networks, etc.) user-customizable complementary currency and barter exchange (Community Forge or better) crowd funding (http://www.quora.com/Is-there-an-open-source-crowdfunding-platform) voting (LiquidFeedback or better) universal search across all PeerPoint data/content and world wide web content
Kurt Laitner

FedEx Expands Sensor-Based SenseAware Service for General Use | FedEx Newsroom - 0 views

  •  
    a low cost version of this for consumers to use regardless of their shipping company could be interesting
Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • Use the Script Editor to write and run scripts, to set triggers, and to perform other actions such as sharing scripts.
  • start the Script Editor from a Google Site
  • declares a function called myFunction()
  • ...69 more annotations...
  • You can perform the following tasks from the Script Editor.
  • pening, deleting, renaming, and saving scripts
  • Cutting, copying, and pasting text
  • Find and replace
  • Setting a time zone
  • scripts with time-based triggers
  • Running functions
  • Viewing log messages
  • revision history
  • write pseudocode first
  • When you're planning a script
  • narrative version of what the script needs to do.
  • A particular script is associated with one and only one Google Spreadsheet.
  • If you make a copy of the Spreadsheet, the script is also copied.
  • A particular Spreadsheet can have multiple scripts associated with it.
  • use the onOpen event handler in more than one script associated with a particular Spreadsheet, all scripts begin to execute when you open the Spreadsheet and the order in which the scripts are executed is indeterminate.
  • event handler is a function executed when a particular event takes place.
  • see Running Scripts in Response to an Event.
  • A script cannot currently call or create another script and cannot call functions in another script.
  • If you want to store the results of a function, you must copy them into a spreadsheet cell.
  • You can trigger Apps Script events from links that are embedded in a Google Site. For information about how to do this, see Using Apps Scrip in Your Ssite.
  • You can insert a script into a Site as a gadget.
  • you must grant permission for the script to run as a service.
  • You also designate whether only you can invoke the service or whether all members of your domain can invoke the service.
  • you can assign functions within the script any arbitrary name.
  • The instructions in a function must be enclosed within curly braces.
  • event handler
  • when a spreadsheet is opened,
  • when a script is installed
  • when a spreadsheet is edited
  • at times you choose
  • menu item
  • Using a drawing or button embedded in a Spreadsheet
  • Using a custom function that is referenced as a Spreadsheet function
  • Clicking the Run button
  • object-oriented programming languages
  • Google Apps Script uses the JavaScript language.
  • Operations
  • are performed using the objects and methods described in the API documentation.
  • An API provides pre-packaged code for standard tasks you need to accomplish in scripts or programs.
  • API includes objects that you use to accomplish tasks such as sending email, creating calendar entries
  • A method describes the behavior of an object and is a function attached to an object.
  • MailApp
  • use to create and send email
  • To send email, you invoke the sendEmail method and provide values for the method arguments.
  • Google Apps Script can access or retrieve data in different formats in different ways.
  • A custom function
  • is called directly from a cell in a Spreadsheet using the syntax =myFunctionName()
  • they cannot set values outside the cells
  • have some restrictions not shared by other functions
  • cannot send email
  • cannot operate on a Google Site
  • cannot perform any operations that require user authorization
  • cannot perform any operations that require knowledge of who the user
  • onInstall function
  • onOpen function
  • Other functions run when you run them manually or when they are triggered by clicking
  • Custom functions and formulas in the spreadsheet execute any time the entire Spreadsheet is evaluated or when the data changes in the function or formula's cell.
  • share the Spreadsheet
  • publish the script to the Script Gallery
  • spreadsheet template
  • the color coding for that line will not be correct
  • A script with incorrect syntax or other errors does not run.
  • The Script Editor includes a debugger.
  • view the current state of variables and objects created by a script while that script runs.
  • step through the code line by line as it executes or set breakpoints
  • The debugger does not work with custom functions, onEdit functions, event triggers, or scripts running as a service.
  • use the debugger to find errors in scripts that are syntactically correct but still do not function correctly.
  • Functions ending in an underscore (_), for example, internalStuff_(), are treated differently from other functions. You do not see these function in the Run field in the Script Editor and they do not appear in the Script Manager in the Spreadsheet. You can use the underscore to indicate that users should not attempt to run the function and the function is available only to other functions.
mayssamd

Ponko - digital manufacturing service. - 2 views

  •  
    A creator can use the digital platform to present and sell his designs and cutting plans of a product. Customers who like a product design can pay for the design in the Pomoko online shop and download the files. After successfully downloading the files the customer can have the product manufactured by the producer of his confidence or by Ponoko. Then it is packaged and shipped to the customer.
  •  
    I went on the website, I don't think this service includes other manufacturers. This seams to be a company that offers digital fabrication services, pretty classical, if not for the high-tech digital fabrication means.
Kurt Laitner

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
1 - 9 of 9
Showing 20 items per page