Skip to main content

Home/ Sensorica Knowledge/ Group items tagged response

Rss Feed Group items tagged

Tiberius Brastaviceanu

Designing the Void | Management Innovation eXchange - 0 views

    • Tiberius Brastaviceanu
       
      This is about self-organization, putting in place bounderies and internal mechanisms to make the the system self-organize into something desirable.  You can see this from a game theory perspective - how to set a game which will drive a specific human behavior. 
    • Tiberius Brastaviceanu
       
      This is about self-organization, putting in place bounderies and internal mechanisms to make the the system self-organize into something desirable.  You can see this from a game theory perspective - how to set a game which will drive a specific human behavior. 
    • Tiberius Brastaviceanu
       
      Very similar to SENSORICA, an environment of entrepreneurs. The argument against this is that not everyone is a risk taker or has initiative. The answer to it is that not every role in the organization requires that. 
    • Tiberius Brastaviceanu
       
      Very similar to SENSORICA, an environment of entrepreneurs. The argument against this is that not everyone is a risk taker or has initiative. The answer to it is that not every role in the organization requires that. 
  • The system is not made up of artifacts but rather an elegantly designed void. He says “I prefer to use the analogy of rescuing an endangered species from extinction, rather than engaging in an invasive breeding program the focus should be on the habitat that supports the species. Careful crafting of the habitat by identifying the influential factors; removing those that are detrimental, together with reinforcing those that are encouraging, the species will naturally re-establish itself. Crafting the habitat is what I mean by designing the void.”
  • ...75 more annotations...
  • It is essential that autonomy is combined with responsibility.
  • staff typically manage the whole work process from making sales, manufacture, accounts, to dispatch
  • they are also responsible for managing their own capitalization; a form of virtual ownership develops. Everything they need for their work, from office furniture to high-end machinery will appear on their individual balance sheet; or it will need to be bought in from somewhere else in the company on a pay-as-you go or lease basis. All aspects of the capital deployed in their activities must be accounted for and are therefore treated with the respect one accords one’s own property.
    • Tiberius Brastaviceanu
       
      So they have a value accounting system, like SENSORICA, where they log "uses" and "consumes". 
    • Tiberius Brastaviceanu
       
      ...
    • Tiberius Brastaviceanu
       
      So they have a value accounting system, like SENSORICA, where they log "uses" and "consumes".  
  • The result is not simply a disparate set of individuals doing their own thing under the same roof. Together they benefit from an economy of scale as well as their combined resources to tackle large projects; they are an interconnected whole. They have in common a brand, which they jointly represent, and also a business management system (the Say-Do-Prove system) - consisting not only of system-wide boundaries but also proprietary business management software which helps each take care of the back-end accounting and administrative processing. The effect is a balance between freedom and constraint, individualism and social process.
  • embodiment of meaning
  • But culture is a much more personal phenomenon
  • Culture is like climate- it does not exist in and of itself- it cannot exist in a vacuum, it must exist within a medium.
  • underlying culture
  • Incompatibility between the presenting culture and the underlying one provide a great source of tension
  • The truth of course is that when tension builds to a critical level it takes just a small perturbation to burst the bubble and the hidden culture reveals itself powered by the considerable pent-up energy.
    • Tiberius Brastaviceanu
       
      SENSORICA had this problem of different cultures, and it caused the 2 crisis in 2014. 
    • Tiberius Brastaviceanu
       
      SENSORICA had this problem of different cultures, and it caused the 2 crisis in 2014. 
  • Consider again the idea that for the health of an endangered species; the conditions in their habitat must be just right. In business, the work environment can be considered analogous to this idea of habitat.
  • A healthy environment is one that provides a blank canvas; it should be invisible in that it allows culture to be expressed without taint
  • The over-arching, high-level obligations are applied to the organization via contractual and legal terms.
  • But it is these obligations that the traditional corporate model separates out into functions and then parcels off to distinct groups. The effect is that a clear sight of these ‘higher’ obligations by the people at the front-end is obstructed. The overall sense of responsibility is not transmitted but gets lost in the distortions, discontinuities and contradictions inherent in the corporate systems of hierarchy and functionalization.
  • employees are individually rewarded for their contribution to each product. They are not “compensated” for the hours spent at work. If an employee wants to calculate their hourly rate, then they are free to do so however, they are only rewarded for the outcome not the duration of their endeavors.
  • Another simplification is the application of virtual accounts (Profit and Loss (P&L) account and Balance Sheet) on each person within the business.
  • The company systems simply provide a mechanism for cheaply measuring the success of each individual’s choices. For quality the measure is customer returns, for delivery it is an on-time-and-in-full metric and profit is expressed in terms of both pounds sterling and ROI (return on investment).
    • Tiberius Brastaviceanu
       
      They have a value accounting system. 
    • Tiberius Brastaviceanu
       
      They have a value accounting system. 
  • The innumerable direct links back to an external reality -like the fragile ties that bound giant Gulliver, seem much more effective at aligning the presenting culture and the underlying embodied culture, and in doing so work to remove the existing tension.
  • With a culture that responds directly to reality, the rules in the environment can be “bounding” rather than “binding”- limiting rather than instructive; this way individual behavior need not be directed at all. The goal is to free the individual to express himself fully through his work, bounded only by the limits of the law. With clever feedback (self-referencing feedback loops) integrated into the design, the individuals can themselves grow to collectively take charge of the system boundaries, culture and even the environment itself, always minded of the inherent risks they are balancing, leaving the law of the land as the sole artificial boundary.
  • the conventional company, which, instead of rewarding enterprise, trains compliance by suppressing individual initiative under layer upon layer of translation tools.
  • apply accountability to the individual not command-and-control.
  • without the divisive and overbearing management cabal the natural reaction of humans is to combine their efforts
  • a new member of staff at Matt Black Systems
  • recruited by another staff member (sponsor) and they will help you learn the basics of the business management system- they will help you get to know the ropes.
  • jobs are passed to new staff members, a royalty payment can be established on the work passed over.
  • Along with that job you will be given a cash float (risk capital), P&L Account, a Balance Sheet and computer software to help plan and record your activities. Your operation is monitored by your sponsor to see if you increase the margin or volume, and so establish a sustainable operation. Training and mentoring is provided to support the steep learning curve - but without removing the responsibility of producing a return on the sponsor’s risk capital.
  • You will, in the meantime be looking to establish some of your own work for which you will not have to pay a commission or royalty to your sponsor and this will provide you with more profitable operations such that eventually you might pass back to the sponsor the original operation, as it has become your lowest margin activity. It will then find its way to a new employee (along with the associated Balance Sheet risk capital) where the process is repeated by the sponsor.[4]
  • Remuneration for staff is calibrated in a way that reflects the balance of different forces around ‘pay’
  • there is an obligation upon the company to pay a minimum wage even if the profitability of the operation does not support this
  • there are therefore two aspects of the basic pay structure: one is “absolute” and reflects the entrepreneurial skill level of the employee according to a sophisticated grading scale
  • A further 20% of the original profit will be paid into his risk capital account, which will be his responsibility to deploy in any way he sees fit as part of his Balance Sheet. Of the three remaining 20% slices of the original profit, one is paid out as corporation tax, another as a dividend to the shareholders and the last retained as collective risk capital on the company’s balance sheet- a war chest so to speak.
  • Julian Wilson and Andrew Holm sell products / services to their staff (such as office space and software) they have an identical customer/supplier relationship with the other employees.
  • Naturally there are some people that can’t generate a profit. The sponsor’s risk capital will eventually be consumed through pay. After a process of rescue and recovery- where their shortcomings are identified and they are given the opportunity to put them right, they either improve or leave, albeit with a sizeable increase in their skills.
  • there is a gradual process of accustomisation; the void of the new employee is surrounded by others dealing with their particular activities, offering both role models and operations they may wish to relinquish. One step at a time the new employee acquires the skills to become completely self-managing, to increase their margins, to make investments, to find new business, to become a creator of their own success. Ultimately, they learn to be an entrepreneur.
  • responsible autonomy as an alternative vision to traditional hierarchy
  • Matt Black Systems it is not simply commitment that they targeted in their employees, rather they aim for the specific human qualities they sum up as magic- those of curiosity, imagination, creativity, cooperation, self-discipline and realization (bringing ideas to reality).
  • a new form of association of individuals working together under the umbrella of a company structure: a kind of collective autonomy
  • The business is called Matt Black Systems, based in Poole in dorset
  • Turning an organisation on its head- removing all management, establishing a P&L account and Balance Sheet on everyone in the organisation and having customers payment go first into the respective persons P&L account has revolutionised this company. 
  • This innovative company’s approach views business success as wholly reliant upon human agency, and its wellspring at the individual level.
  • problem (of unnecessarily high overheads placed on production) that arguably is behind the decline in western manufacturing
  • over-managed business
  • Autonomy Enables Productivity
  • organizational design brings to light the unconscious socio-philosophical paradigm of the society in which it exists, organizational development points to how change occurs.
  • a mechanistic approach to organization
  • scientific management employs rationalism and determinism in pursuit of efficiency, but leaves no place for self-determination for most people within the system.
  • Command and Control
  • today, a really “modern” view of an organization is more likely to be depicted in terms that are akin to an organism.
  • When it comes to getting work done, the simple question is: are people the problem or the solution?
  • the Taylorist approach may be more real in theory than in practice: its instrumentalist view of the workforce is cursed by unintended consequences. When workers have no space for their own creative expression, when they are treated like automata not unique individuals, when they become demotivated and surly, when they treat their work as a necessary evil; this is no recipe for a functional organization.
  • The natural, human reaction to this is unionization, defiance and even outright rebellion; to counter this, management grows larger and more rigid in pursuit of compliance, organizations become top heavy with staff who do not contribute directly to the process of value creation but wield power over those who do.
  • voluntary slavery of ‘wagery’
  • Even when disgruntled employees strike free and start their own businesses they seem unable to resist the hegemony of the conventional command-and-control approach
  • Making the transition involves adherence to a whole new sociology of work with all the challenging social and psychological implications that brings.
  • first principal that people in the business have the ability to provide the solution
  • In the “theory of constraints” the goal is to align front-line staff into a neat, compact line for maximum efficiency. Surely the most considered approach is to have front-line staff self-align in pursuit of their individual goals?
  • The removal of hierarchy and specialization is key to a massive improvement in both profitability and productivity. In summary: there are no managers in the company, or foremen, or sales staff, or finance departments; the company is not functionally compartmentalized and there is no hierarchy of command. In fact every member of staff operates as a virtual micro-business with their own Profit & Loss account and Balance Sheet, they manage their own work and see processes through from end to end
  • Formal interaction between colleagues takes place via “customer and supplier” relationships.
  • autonomy enables productivity
  • if one creates a space in which staff pursue their own goals and are not paid by the hour, they will focus on their activities not the clock; if they are not told what to do, they will need to develop their own initiative; if they are free to develop their own processes, they will discover through their own creative faculties how to work more productively- in pursuit of their goals
  • The human qualities which are of greatest potential value to the business are: curiosity, imagination, creativity, cooperation, self-discipline and realization (bringing ideas to reality)
  • These qualities are the very ones most likely to be withheld by an individual when the environment is ‘wrong’.
  • Any elements in the business environment that undermine the autonomy and purpose of the individual will see the above qualities withheld
  • High on the list of undermining elements come power-hierarchy and over-specialization
  • the responsibility of the individual is formalized, specified and restricted. An improved system is not one where responsibility is distributed perfectly but rather one where there is simply no opportunity for responsibility to be lost (via the divisions between the chunks). Systems must be reorganized so responsibility -the most essential of qualities -is protected and wholly preserved.
  • Matt Black Systems believe this can only be done by containing the whole responsibility within an individual, holding them both responsible and giving them ‘response-ability’
  • The experience of Matt Black Systems demonstrates that radical change is possible
  • productivity is up 300%, the profit margin is up 10%[3], customer perception has shifted from poor to outstanding, product returns are at less than 1%, “on time and in full” delivery is greater than 96%, pay has increased 100%.
  • staff develop broader and deeper skills and feel greater job security; they get direct feedback from their customers which all go to fuel self-confidence and self-esteem.
  • the staff manage themselves
  • “only variety can absorb variety”.
  • What is particular about their story is that behind it is a very consciously crafted design that surrounds the individualism of each person with hard boundaries of the customer, the law and the business. It is these boundaries rather than the instructive persona of ‘the boss’ that gives rise to the discipline in which individuals can develop. Autonomy is not the same as freedom, at least not in the loose sense of ‘do as you please’. An autonomous person is a person who has become self-governing, who has developed a capacity for self-regulation, quite a different notion from the absence of boundaries. Indeed, it is with establishing the right boundaries that the business philosophy is most concerned. The company provides the crucible in which the individual can develop self-expression but the container itself is bounded. Wilson calls this “designing the void”. This crucible is carefully constructed from an all-encompassing, interconnecting set of boundaries that provide an ultimate limit to behaviours (where they would fall foul of the law or take risks with catastrophic potential). It is an illusion to think, as a director of a company, that you are not engaged in a process of social conditioning; the basis of the culture is both your responsibility and the result of your influence. The trick is to know what needs to be defined and what needs to be left open. The traditional authoritarian, controlling characters that often dominate business are the antithesis of this in their drive to fill this void with process, persona and instruction. Alternatively, creating an environment that fosters enterprise, individuals discover how to be enterprising.
Tiberius Brastaviceanu

ISSI-5-2014 - 0 views

  • The proposals should include an international dimension in particular with the following countries: Brazil, Republic of South Africa, India, Canada, Australia, Russia, United States of America, Japan and China.
  • encourage the modernisation of institutional practices and culture in research institutions, Higher Education Institutions and funding agencies, to promote Responsible Research and Innovation
  • increase Responsible Research and Innovation uptake in research organizations
  • ...1 more annotation...
  • developing a Responsible Research and Innovation Plan covering five RRI keys (societal engagement, gender equality and gender in research and innovation content, open access, science education and ethics) in each participating institution.
  •  
    "Topic: Supporting structural change in research organisations to promote Responsible Research and Innovation"
Tiberius Brastaviceanu

The commons law project: A vision of green governance - 0 views

  • “commons law” (not to be confused with common law)
  • Commons law consists of those social practices, cultural traditions and specific bodies of formal law that recognize the rights of commoners to manage their own resources
  • Ever since the rise of the nation-state and especially industrialized markets, however, commons law has been marginalized if not eclipsed by contemporary forms of market-based law
  • ...19 more annotations...
  • individual property rights and market exchange have been elevated over most everything else, and this has only eroded the rights of commoners,
  • reframe the very notion of “the economy” to incorporate non-market sharing and collaboration.
  • we had concluded that incremental efforts to expand human rights and environmental protection within the framework of the State/Market duopoly were simply not going to achieve much
  • the existing system of regulation and international treaties has been a horrendous failure over the past forty years. Neoliberal economics has corrupted and compromised law and regulation, slashing away at responsible stewardship of our shared inheritance while hastening a steady decline of the world’s ecosystems
  • We concluded that new forms of ecological governance that respect human rights, draw upon commons models and reframe our understanding of economic value, hold great promise
  • An economics and supporting civic polity that valorizes growth and material development as the precondition for virtually everything else is ultimately a dead end—literally.
  • Achieving a clean, healthy and ecologically balanced environment requires that we cultivate a practical governance paradigm based on, first, a logic of respect for nature, sufficiency, interdependence, shared responsibility and fairness among all human beings; and, second, an ethic of integrated global and local citizenship that insists upon transparency and accountability in all activities affecting the integrity of the environment.
  • We believe that commons- and rights-based ecological governance—green governance—can fulfill this logic and ethic. Properly done, it can move us beyond the neoliberal State and Market alliance—what we call the ‘State/Market’—which is chiefly responsible for the current, failed paradigm of ecological governance.
  • The basic problem is that the price system, seen as the ultimate governance mechanism of our polity, falls short in its ability to represent notions of value that are subtle, qualitative, long-term and complicated.
  • These are, however, precisely the attributes of natural systems.
  • Exchange value is the primary if not the exclusive concern.
  • anything that does not have a price and exists ‘outside’ the market is regarded (for the purposes of policy-making) as having subordinate or no value.
  • industry lobbies have captured if not corrupted the legislative process
  • regulation has become ever more insulated from citizen influence and accountability as scientific expertise and technical proceduralism have come to be more and more the exclusive determinants of who may credibly participate in the process
  • we have reached the limits of leadership and innovation within existing institutions and policy structures
  • it will not be an easy task to make the transition from State/Market ecological governance to commons- and rights-based ecological governance
  • It requires that we enlarge our understanding of ‘value’ in economic thought to account for nature and social well-being; that we expand our sense of human rights and how they can serve strategic as well as moral purposes; that we liberate ourselves from the limitations of State-centric models of legal process; and that we honor the power of non-market participation, local context and social diversity in structuring economic activity and addressing environmental problems.
  • articulate and foster a coherent new paradigm
  • deficiencies of centralized governments (corruption, lack of transparency, rigidity, a marginalized citizenry)
Kurt Laitner

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
Kurt Laitner

The Energy Efficiency of Trust & Vulnerability: A Conversation | Switch and Shift - 0 views

  • trusting people because of who they are personally vs. who they are professionally
  • also need to trust systems
  • our own resources
  • ...34 more annotations...
  • How much we need to trust others depends on the context,
  • how much we trust ourselves,
  • our ability to understand the context we are in
  • When we trust, we re-allocate that energy and time to getting things done and making an impact
  • the more information and/or experience we have, the better we can decide whether or not to trust
  • Trust is a tool to assess and manage (reduce and/or increase) risk, depending on the situation.
  • Trusting someone implies making oneself more vulnerable
  • When we don’t trust, we exert a lot of energy to keep up our guard, to continually assess and verify.  This uses a lot of energy and time.
  • If the alternative is worse, we might opt for no trust
  • As we let ourselves be vulnerable, we also leave ourselves more open to new ideas, new ways of thinking which leads to empathy and innovation.
  • the more we can focus on the scope and achievement of our goals
  • trusting is efficient….and effective
  • Being vulnerable is a way to preserve energy
  • It lets us reallocate our resources to what matters and utilize our skills and those around us to increase effectiveness…impact.
  • If we are working together, we need to agree on the meaning of ‘done’.  When are we done, what does that look like?
  • “Control is for Beginners”
  • Strategic sloppiness is a way to preserve energy
  • Build on the same shared mental models
  • use the same language
  • As the ability to replicate something has become more of a commodity, we are increasingly seeing that complex interactions are the way to create ‘value from difference’ (as opposed to ‘value from sameness’).
  • allow for larger margins of error in our response and our acceptance of others
  • higher perfection slows down the tempo
  • We can’t minimize the need to be effective.
  • Efficient systems are great at dealing with complicated things – things that have many parts and sequences, but they fall flat dealing with complex systems, which is most of world today.
  • make sure we hear and see the same thing (reduce buffers around our response)
  • timing
  • intuition
  • judgment
  • experience
  • ability to look at things from many different perspective
  • to discover, uncover, understand and empathize is critical
  • focus on meaning and purpose for work (outcomes) instead of just money and profit (outputs)
  • When we have a common goal of WHY we want to do something, we are better able to trust
  • When we never do the same thing or have the same conversation twice, it becomes much more important to figure out why and what we do than how we do it (process, which is a given)
  •  
    spot on conversation on *trust, I see creating a trustful environment quickly among strangers as a key capability of an OVN, we need to quickly get past the need to protect and verify and move on to making purpose and goals happen
Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • script that you want to run every day at a specific time
  • script that should run after a user submits a data-collection form.
  • Google Apps Script provides simple event handlers and installable event handlers, which are easy ways for you to specify functions to run at a particular time or in response to an event.
  • ...39 more annotations...
  • let's consider the terminology we use for events
  • event triggers
  • triggers
  • in response
  • event handler
  • event
  • onInstall function
  • onOpen function.
  • onEdit function
  • the simple event handlers are restricted in what they are permitted to do:
  • The spreadsheet containing the script must be opened for editing
  • cannot determine the current user
  • cannot access any services that require authentication as that user
  • Calendar, Mail and Site are not anonymous and the simple event handlers cannot access those services.
  • can only modify the current spreadsheet. Access to other spreadsheets is forbidden.
  • see Understanding Permissions and Script Execution.
  • The onOpen function runs automatically when a user opens a spreadsheet.
  • add custom menu items to the spreadsheet's menu bar.
  • onEdit function runs automatically when any cell of the spreadsheet is edited.
  • record the last modified time in a comment on the cell that was edited.
  • The onInstall function is called when a script is installed from the Script Gallery.
  • setting up custom menus for the user.
  • the script can call onOpen from onInstall.
  • Installable event handlers are set on the Triggers menu within the Script Editor, and they're called triggers in this document.
  • When a specific time is reached
  • When a form is submitted
  • When a Spreadsheet is edited
  • When a Spreadsheet is opened.
  • They can potentially access all services available to the user who installed the handler.
  • are fully-capable scripts with none of the access limitations of simple event handlers
  • may not be able to determine which user triggered the event being handled
  • The spreadsheet containing the script does not have to be open for the event to be triggered and the script to run.
  • You can connect triggers to one or more functions in a script. Any function can have multiple triggers attached. In addition, you can add trigger attributes to a function to further refine how the trigger behaves.
  • When a script runs because of a trigger, the script runs using the identity of the person who installed the trigger, not the identity of the user whose action triggered the event. This is for security reasons.
  • Installing an event handler may prompt for authorization to access
  • An event is passed to every event handler as the argument (e). You can add attributes to the (e) argument that further define how the trigger works or that capture information about how the script was triggered.
  • an example of a function that sends email to a designated individual containing information captured by a Spreadsheet when a form is submitted.
  • With Google Apps, forms have the option to automatically record the submitter's username, and this is available to the script as e.namedValues["Username"]. Note: e.namedValues are only available for Google Apps domains and not for consumer Google accounts.
  • The available attributes for triggers are described in the following tables.
  •  
    script that you want to run every day at a specific time
Tiberius Brastaviceanu

SEAC-2-2014 - 0 views

  •  
    "Topic: Responsible Research and Innovation in Higher Education Curricula"
Tiberius Brastaviceanu

Welcome to the new reputation economy (Wired UK) - 1 views

  • banks take into account your online reputation alongside traditional credit ratings to determine your loan
  • headhunters hire you based on the expertise you've demonstrated on online forums
  • reputation data becomes the window into how we behave, what motivates us, how our peers view us and ultimately whether we can or can't be trusted.
  • ...37 more annotations...
  • At the heart of Movenbank is a concept call CRED.
  • The difference today is our ability to capture data from across an array of digital services. With every trade we make, comment we leave, person we "friend", spammer we flag or badge we earn, we leave a trail of how well we can or can't be trusted.
  • An aggregated online reputation having a real-world value holds enormous potential
  • peer-to-peer marketplaces, where a high degree of trust is required between strangers; and where a traditional approach based on disjointed information sources is currently inefficient, such as recruiting.
  • opportunity to reinvent the way people found jobs through online reputation
  • "It's not about your credit, but your credibility," King says.
  • But this wealth of data raises an important question -- who owns our reputation? Shouldn't our hard-earned online status be portable? If you're a SuperHost on Airbnb, shouldn't you be able to use that reputation to, say, get a loan, or start selling on Etsy?
  • "People are currently underusing their networks and reputation," King says. "I want to help people to understand and build their influence and reputation, and think of it as capital they can put to good use."
  • Social scientists have long been trying to quantify the value of reputation.
  • Using functional magnetic resonance imaging, the researchers monitored brain activity
  • "The implication of our study is that different types of reward are coded by the same currency system." In other words, our brains neurologically compute personal reputation to be as valuable as money.
  • Personal reputation has been a means of making socioeconomic decisions for thousands of years. The difference today is that network technologies are digitally enabling the trust we used to experience face-to-face -- meaning that interactions and exchanges are taking place between total strangers.
  • Trust and reputation become acutely important in peer-to-peer marketplaces such as WhipCar and Airbnb, where members are taking a risk renting out their cars or their homes.
  • When you are trading peer-to-peer, you can't count on traditional credit scores. A different measurement is needed. Reputation fills this gap because it's the ultimate output of how much a community trusts you.
  • Welcome to the reputation economy, where your online history becomes more powerful than your credit history.
  • Presently, reputation data doesn't transfer between verticals.
  • A wave of startups, including Connect.Me, TrustCloud, TrustRank, Legit and WhyTrusted, are trying to solve this problem by designing systems that correlate reputation data. By building a system based on "reputation API" -- a combination of a user's activity, ratings and reviews across sites -- Legit is working to build a service that gives users a score from zero to 100. In trying to create a universal metric for a person's trustworthiness, they are trying to "become the credit system of the sharing economy", says Jeremy Barton, the 27-year-old San Francisco-based cofounder of Legit.
  • His company, and other reputation ventures, face some big challenges if they are to become, effectively, the PayPal of trust. The most obvious is coming up with algorithms that can't be easily gamed or polluted by trolls. And then there's the critical hurdle of convincing online marketplaces not just to open up their reputation vaults, but create a standardised format for how they frame and collect reputation data. "We think companies will share reputation data for the same reasons banks give credit data to credit bureaux," says Rob Boyle, Legit cofounder and CTO. "It is beneficial for one company to give up their slice of reputation data if in return they get access to the bigger picture: aggregated data from other companies."
  • PeerIndex, Kred and Klout,
  • are measuring social influence, not reputation. "Influence measures your ability to drag someone into action,"
  • "Reputation is an indicator of whether a person is good or bad and, ultimately, are they trustworthy?"
  • Early influence and reputation aggregators will undoubtedly learn by trial and error -- but they will also face the significant challenge of pioneering the use of reputation data in a responsible way. And there's a challenge beyond that: reputation is largely contextual, so it's tricky to transport it to other situations.
  • Many of the ventures starting to make strides in the reputation economy are measuring different dimensions of reputation.
  • reputation is a measure of knowledge
  • a measure of trust
  • a measure of propensity to pay
  • measure of influence
  • Reputation capital is not about combining a selection of different measures into a single number -- people are too nuanced and complex to be distilled into single digits or binary ratings.
  • It's the culmination of many layers of reputation you build in different places that genuinely reflect who you are as a person and figuring out exactly how that carries value in a variety of contexts.
  • The most basic level is verification of your true identity
  • reliability and helpfulness
  • do what we say we are going to do
  • respect another person's property
  • trusted to pay on time
  • we will be able to perform a Google- or Facebook-like search and see a picture of a person's behaviour in many different contexts, over a length of time. Slivers of data that have until now lived in secluded isolation online will be available in one place. Answers on Quora, reviews on TripAdvisor, comments on Amazon, feedback on Airbnb, videos posted on YouTube, social groups joined, or presentations on SlideShare; as well as a history and real-time stream of who has trusted you, when, where and why. The whole package will come together in your personal reputation dashboard, painting a comprehensive, definitive picture of your intentions, capabilities and values.
  • idea of global reputation
  • By the end of the decade, a good online reputation could be the most valuable currency in your possession.
Justin McCollen

Top Quality Spill Control Products and Services - 2 views

Bunding

started by Justin McCollen on 01 Mar 13 no follow-up yet
Tiberius Brastaviceanu

P2P Foundation » Blog Archive » Ethical Marketing in Age of Horizontal Social... - 0 views

  • the development of marketing is sensible to its environment and is hence already self-limiting itself according to the previously mentioned legal and social framework
  • neuromarketing
  • explore new inner dynamics of marketing, new directions in the field of possibilities offered by the current organology and its articulations between techniques and social organization in order to influence and shape marketing as an associative force – in opposition to its current dissociative force – in the larger psychic, social and technic organology
  • ...70 more annotations...
  • find new ways of efficiency
  • arbitration between efficiency and care
  • a global thinking of the problem
  • Fighting the attention and desire resource shortage: stoping to use advertisement?
  • The question is rather here to think the moderation of the psychopower
  • empower transindividuation, i.e. to make sure that an economic activity creates more possibilities of individuation than it tend to destroy by attempting to capture attention and canalize motivation in a funnel. Empower transindividuation would imply to empowering actors of their own lifestyle, winning back the savoir-vivre prescribing production
  • Should marketing stop using psychopower?
  • marketing ethics guidelines
  • transactions are more likely to be morally defensible if both parties enter it freely and fully informed
  • the goal of marketing should be to increase the likelihood and frequency of free and informed transactions in the marketplace
  • putting freedom as a criteria of morality
  • the industrial use of pycho- and neuropower tend to fall under the category of barriers to freedom
  • neurotechniques – to capture the attention
  • psychotechniques – to attempt to create motivation
  • Most people think commercials are a small price to pay for these benefits
  • advertising
  • denying the schemes of addiction and the fact that we are becoming through the objects of attentions
  • right to avoid attention capture by advertising
  • progress made in cognitive sciences proving that
  • reward system being abnormally stimulated
  • Advertisements exploit
  • vulnerability and reinforce their overconsumption behaviors
  • “if food advertising on TV were banned, significant reductions in the prevalence of childhood obesity are possible.” (Veerman et al. 2009)
  • What is at stake falls to be much more complex than the sole Freedom of Speech invoked for the advertiser
  • liberty of non-reception
  • would mean to guaranty every citizen the right to choose where and when he wants to access the advertising information
  • Change in the industrial and commercial paradigm
  • Economy of contribution and peer production
  • An economy of contribution means that users of a service are contributing to the production of these services.
  • example
  • is open-source software that are contributively build by potentially hundreds of developers organized in communities
  • minimize the gap between the producer and consumer
  • blur the frontier between professionals and amateurs
  • The Copernican revolution of the Vendor Relationship Management paradigm
  • change in the commercial paradigm, described as an Intention Economy i.e. the opposite of the Attention Economy
  • consumers are charged to express and discuss their intention
  • with businesses rather than the usual paradigm in which businesses where fighting for a piece of canalized motivation
  • Implementing such a system would nevertheless imply that marketing departments dispose of a system in which they could value their supplies and where they could be easily found by customers. Doc Searls promotes his answer to this issue: the Vendor Relationship Management system.
  • the belief that free customers are more valuable than captive ones — to themselves, to vendors, and to the larger economy.
  • To be free
  • 1. Customers must enter relationships with vendors as independent actors.
  • 2. Customers must be the points of integration for their own data.
  • 3. Customers must have control of data they generate and gather. This means they must be able to share data selectively and voluntarily.
  • 4. Customers must be able to assert their own terms of engagement.
  • 5. Customers must be free to express their demands and intentions outside of any one company’s control.
  • This is a profoundly game-changing approach
  • big data that is the rush for consumers’ information potentially leading to the same dead-end of attention destruction and affective saturation than the former offline paradigm
  • VRM system working as a marketplace
  • the goal of marketing should be to increase the likelihood and frequency of free and informed transactions in the marketplace
  • less imperfect and less biased information in a cultural context overvaluing transparency, and a bigger atomicity due to the hereafter introduced trend for re-localized peer production.
  • 3.2.2.3 VRM and externalization of the socialization process
  • Promoting the end of advertisement
  • means to find a new way to make the information circulate, what was the primary goal of advertisement
  • Until there is no alternative to massive advertisement campaign for the information circulation, it is indeed hard to ask entrepreneurs and managers to get rid of those successors of propaganda: such a transition process necessarily imply adaptation costs from the producer and the consumer side, and possible competitive disadvantage against competitors still maximizing profit through advertisement means
  • But the internet transformation of the general organology offers new way to think information circuits and potentially constitute an opportunity to externalize the socialization process of products that is to empower citizen-consumers organized in communities
  • Empowering groups of citizen doesn’t annihilate the risks of mis-use or counterproductive interest-taker behaviors but a well-designed system of trust between peers could minimize this risk by creating a dependency to what social capital other peers give you, as it is happening in the sharing economy: the credibility of a contributive peer would be guaranteed through what the P2P Foundation calls Feedback systems and peer-police
  • a strong structuration of products characteristics, allowing customers to personalize their choices according to their desire and constraints: such a “VRM+” system
  • Marketing would then be the art of being as high as possible in this ranking, as it is happening in SEO for search engines, but in this context of criteria explosion, marketing would then be the disciple of listening to customers’ wishes and aspiration needing an attention, in order to kick in the production or to adapt the following series.
  • 3.2.2.4 Toward a possible equi-power
  • Such a system would tremendously re-configure the balance of power and tend toward a form of equi-power i.e. a social organization in which abuses of a “big” would be the potential object of a ranking sanction by the peers
  • self-regulative function
  • a form of economic Darwinism would let to conscious organization the right to curve their path toward a durable configuration in accordance with the social ecosystem.
  • the idea of equi-power is a form of homogenization of the social matter, in which the distortions in the balance of power would be compensated by the gathering of small forces sharing a common interest
  • Such a sanction systems, if successfully implemented, would make value-destructing businesses progressively decline and hopefully bankrupt,
  • long-term valuable strategic choice
  • long term satisfyingly high ranking
  • It would be utopic to think that the “being cool” marketing
  • would disappear, but marketers would have to make those two objectives compose together.
  • This social capital contagion is nevertheless a tool that would need to be controlled in its form of violence by extensive testings and iterations with forms of protections for the smallest peers, that is to say to keep this form of social violence to institutionalized, classic forms of businesses, clearly beyond the line of what should be acceptable in the global village.
  • the goal is here to create an artificial form of majority that is a self-censuring responsible behavior of corporations
Francois Bergeron

A model for device development | Researchers at the Stanford University Program in Biod... - 2 views

  • clinical need.
  • estimated market size and clinical impact associated with each.
  • prior art related
  • ...4 more annotations...
  • barriers to further development exist from an intellectual property perspective
  • Inventors must also determine if they are in a position to efficiently seize the market opportunity.
  • regulatory considerations, reimbursement strategies, intellectual property, and business development objectives. This leads to Phase I of the development model.
  • R&D in Phase II is responsible for generating early concepts. Brainstorming sessions are often held during this stage of development with members of R&D, marketing, and physician consultants. Computational analyses, such as stress and flow studies, are conducted to further understand the behavior of a proposed device. The team often develops a 3D CAD model of a proposed device
  •  
    medical device development steps
Tiberius Brastaviceanu

Is it time to change the way we work? | What Would The Internet Do? - 2 views

  • company culture
  • how important some values are for them to prosper and generate value
  • We are seeing some organization being more successful in creating a culture than others
  • ...24 more annotations...
  • some of the principles of the Internet culture are actually becoming critical in creating successful organizations
  • the Internet culture is setting the foundation for a different way of generating economic and social value.
  • set of values that I believe are relevant for all organization wishing to reinvent their model to be more successful, attract talent and be more sustainable.
  • Resilience
  • more chances to successfully face complexity, speed and unpredictability
  • Bouncing back is more valuable than being tough.
  • resources from your network, from outside, rather than stocking them.
  • establish a circle of trust
  • Compasses (instead of maps)
  • through clear principles and transparency.
  • groups of people can produce a better outcome than single individuals.
  • post-sale structure
  • Portfolios (instead of planning)/ Practice (instead of theory)
  • Prototype, and leverage the ecosystem to fail fast (or scale rapidly).
  • testing less than perfect products into a receptive and responsive ecosystem
  • Systems (instead of objects)
  • the social components, and the interdependence of people, groups and objects.
  • a new set of currency that will merge the intrinsic value with the extrinsic social components associated with it.
  • Pull (instead of push)/ Smart crowd (instead of experts)
  • planning everything excludes the unexpected
  • keeping the eyes open
  • Encourage rebellion (instead of compliance)/Constant learning (instead of education)
  • asking questions and not accepting the traditional answers as given
  • structurally encouraged to question in order to guarantee future development and innovation
Kurt Laitner

Call for Papers: Defining the Spatiality of Co-Creation, Collaboration and Peer Product... - 0 views

  •  
    Another way to reuse work on the industry canada paper this one due Feb 10 in abstract, not sure of the process from there
Kurt Laitner

Introducing Edgeryders: the corporation without permission | Contrordine compagni - 0 views

  • we are a corporation without permission.
  • Anyone can claim to represent Edgeryders:
  • provided the project is not in contrast with the community’s values
  • ...7 more annotations...
  • gets hired f
  • Edgeryders LBG provides the corporate infrastructure to deploy it: team building, technology, outreach and engagement, invoicing, banking, whatever. This is regulated by ad-hoc agreements between project leaders and the company, because every project is different. Once a contract is signed, the company’s board of directors takes on legal responsibility for delivering on it, just as with any other corporation.
  • self-selection
  • This much openness guarantees a very high rate of idea generation – and an equally high rate of idea rejection by lack of momentum. Anything that lives through this much natural selection has to be very, very good – and clients stand to benefit from it.
  • You can never hire them – they would not get through your HR firewall, because your HR people don’t understand or recognize their qualifications.
  • many of them don’t function well in hierarchies and bureaucracy
  • We provide an interface for them to keep true to themselves while meeting your accountability requirements
  •  
    some interesting parallels, unfortunately not as fully explored as I would like
Tiberius Brastaviceanu

Feedback Form (Responses) - Google Sheets - 0 views

Tiberius Brastaviceanu

Post course survey (Responses) - 0 views

Tiberius Brastaviceanu

Collaboration Is Misunderstood and Overused - Andrew Campbell - Harvard Business Review - 0 views

  • managers in different functions or different business units seem surprisingly reluctant to work together
  • Jealousies, misunderstandings and enmity seem more common than collaboration
  • Why does collaboration fail? There are lots of reasons. Collaboration can be time-consuming. It creates risks for the participants. Competing objectives can be hard to resolve
  • ...27 more annotations...
  • people confuse collaboration with teamwork.
    • Tiberius Brastaviceanu
       
      "Competing objectives can be hard to resolve", well, this is what happens when you try to create a culture of collaboration within an overarching competitive environment.
  • Teams are created when managers need to work closely together to achieve a joint outcome.
  • actions are interdependent
  • committed to a single result
  • joint decisions
  • cautious about taking unilateral action
  • someone with the authority to resolve disputes
  • Team members may dislike
  • each other
  • But with a good leader they can still perform.
  • Collaborators face a different challenge
  • they often also have competing goals
  • the shared goal is usually only a small part of their responsibilities
  • collaborators cannot rely on a leader to resolve differences
  • collaborators cannot walk away from each other, when they disagree.
  • a collaborative relationship
  • is a form of customer-supplier relationship in which the participants have all the difficulties of contracting with each other without the power to walk away if the other party is being unreasonable or insensitive.
  • my advice is to avoid relying on a collaborative relationship except in the rare cases when a company objective is important enough to warrant some collaborative action but not so important as to warrant a dedicated team.
  • collaboration requires emotional engagement
  • respect
  • first-among-equals
  • creatively bargain
  • other over costs and benefits.
  • don't think of it as a permanent solution
  • collaborative relationship
  • transition to an easier form of interaction
Steve Bosserman

Food Safety in China, and the Risk to the U.S. - 0 views

  •  
    Three years after the melamine-in-milk scandal that made 300,000 children sick, and two years after China passed its first-ever food safety law in response, the country is still struggling to keep its food supply healthy. The Chinese government recently cracked down, closing almost 5,000 food-producing businesses and arresting 2,000 people -- but China experts say a needlessly complex bureaucracy and ferocious determination to turn a profit mean the contamination will keep coming. (On forums where expats chat, Westerners living in China wonder whether there is anything safe to eat.) (Update: Commenters at the China Law Blog, many of them apparently resident in China, reflect the same anxiety.)
Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • Google Apps Script provides you with the ability to build a user interface for displaying or capturing information.
  • Viewing the Available User Interface Elements
  • Your scripts can display the user interface in two ways:
  • ...48 more annotations...
  • from a Spreadsheet
  • from a Site
  • As a stand-alone servlet
  • Deciding Whether to Run a Script from a Spreadsheet or as a Service
  • The built-in code autocomplete functionality in the editor requires you to type the trailing period that follows app.
  • Plan the script. What tasks should the script accomplish?
  • Write down the specific information you want to display to or collect from your users.
  • Draw the user interface
  • Determine what the script and interface should do in response to any user input.
  • Determine the conditions for exiting the script.
  • you need a UiApp application object to contain the user interface elements. After you create the UiApp application object, you can add buttons, dialog boxes, panels, and other elements to the UiApp application object.
  • The general syntax for these operations is as follows:
  • To create a UiApp application object, use the syntax var your_application_object_name = UiApp.createApplication();
  • To create a user interface element and associate it with your UiApp application object, use the syntax var your_ui_element_name= your_application_object_name.createElement_Name();.
  • To add one user interface element to another
  • use the syntax your_ui_element_name1.add(your_ui_element_name2);
  • a button with the text Press Me on it:
  • creates a vertical panel.
  • other kinds of panels
  • pop-up panels, stack panels, focus panels, form panels, and so on.
  • code for displaying your button on the panel:
  • add the panel to the application:
  • nstruct Google Apps Script to display the interface elements:
  • You can create the user interface elements in any order.
  • the display order
  • Creating the elements and adding them to your application are separate steps requiring separate instructions.
  • a short script that does nothing but display a panel with a button on it.
  • You can chain together setter methods
  • sets its title
  • set the size of the object:
  • how to use Grid objects and the setWidget method to create a more complex layout and also how to create text boxes and label them.
  • To make a user interface useful, you need the ability to update a Spreadsheet with information a user enters from the interface.
  • a short script that responds to an action in the interface by updating the Spreadsheet.
  • looping structure in the script to keep the panel displayed and active
  • Server-side means that the actions are performed by a server
  • same script, with functions added that enable the form to be used multiple times before a user chooses to exit.
  • script collects some information from text fields on a panel and writes that information into the Spreadsheet.
  • You can make a script's user interface available to users from inside a Spreadsheet or Site or by running it separately as a service.
  • how to make the user interface as a service.
  • A script that provides a stand-alone user interface must invoke the doGet(e) function or the doPost(e) function for an HTML form submit.
  • A script that provides the user interface from the Spreadsheet invokes doc.show(app).
  • The doGet(e) function takes the argument e, passing in the arguments for the user interface, including the user name of the person invoking the script.
  • After you write the script, you publish it as a service. During the publishing process, you define who has access to the script.
  • In a Google Apps domain, you can publish the script so that only you have access or so that everyone in the domain has access.
  • In a Google consumer account, you can publish the script so that only you have access or so that everyone in the world has access.
  • Updating a Spreadsheet from the User Interface, the user interface is displayed from the Spreadsheet where the script is stored. The following code defines how the user interface is displayed:
  • Here's the skeleton code for displaying a user interface as a stand-alone service:
  • some aspects of the two ways to display a user interface.
1 - 20 of 32 Next ›
Showing 20 items per page