This tendency to view questions of freedom primarily through the lens of economic competition, to focus on the producer and the entrepreneur at the expense of everyone else, shaped O’Reilly’s thinking about technology.
The Baffler - 0 views
-
the O’Reilly brand essence is ultimately a story about the hacker as hero, the kid who is playing with technology because he loves it, but one day falls into a situation where he or she is called on to go forth and change the world,
-
His true hero is the hacker-cum-entrepreneur, someone who overcomes the insurmountable obstacles erected by giant corporations and lazy bureaucrats in order to fulfill the American Dream 2.0: start a company, disrupt an industry, coin a buzzword.
- ...139 more annotations...
-
making it seem as if the language of economics was, in fact, the only reasonable way to talk about the subject
-
It’s easy to forget this today, but there was no such idea as open source software before 1998; the concept’s seeming contemporary coherence is the result of clever manipulation and marketing.
-
Free Software Foundation, preoccupied with ensuring that users had rights with respect to their computer programs. Those rights weren’t many—users should be able to run the program for any purpose, to study how it works, to redistribute copies of it, and to release their improved version (if there was one) to the public
-
profound critique of the role that patent law had come to play in stifling innovation and creativity.
-
Plenty of developers contributed to “free software” projects for reasons that had nothing to do with politics. Some, like Linus Torvalds, the Finnish creator of the much-celebrated Linux operating system, did so for fun; some because they wanted to build more convenient software; some because they wanted to learn new and much-demanded skills.
-
By early 1998 several business-minded members of the free software community were ready to split from Stallman, so they masterminded a coup, formed their own advocacy outlet—the Open Source Initiative—and brought in O’Reilly to help them rebrand.
-
The label “open source” may have been new, but the ideas behind it had been in the air for some time.
-
This budding movement prided itself on not wanting to talk about the ends it was pursuing; except for improving efficiency and decreasing costs, those were left very much undefined.
-
“open source is not particularly a moral or a legal issue. It’s an engineering issue. I advocate open source, because . . . it leads to better engineering results and better economic results
-
While free software was meant to force developers to lose sleep over ethical dilemmas, open source software was meant to end their insomnia.
-
Stallman the social reformer could wait for decades until his ethical argument for free software prevailed in the public debate
-
O’Reilly the savvy businessman had a much shorter timeline: a quick embrace of open source software by the business community guaranteed steady demand for O’Reilly books and events
-
The coup succeeded. Stallman’s project was marginalized. But O’Reilly and his acolytes didn’t win with better arguments; they won with better PR.
-
A decade after producing a singular vision of the Internet to justify his ideas about the supremacy of the open source paradigm, O’Reilly is close to pulling a similar trick on how we talk about government reform.
-
O’Reilly cared for only one type of freedom: the freedom of developers to distribute software on whatever terms they fancied.
-
is that which protects “my choice as a creator to give, or not to give, the fruits of my work to you, as a ‘user’ of that work, and for you, as a user, to accept or reject the terms I place on that gift.”
-
O’Reilly opposed this agenda: “I completely support the right of Richard [Stallman] or any individual author to make his or her work available under the terms of the GPL; I balk when they say that others who do not do so are doing something wrong.”
-
According to this Randian interpretation of open source, the goal of regulation and public advocacy should be to ensure that absolutely nothing—no laws or petty moral considerations—stood in the way of the open source revolution
-
must be opposed, since it would taint the reputation of open source as technologically and economically superior to proprietary software
-
Many developers did stop thinking about licenses, and, having stopped thinking about licenses, they also stopped thinking about broader moral issues that would have remained central to the debates had “open source” not displaced “free software” as the paradigm du jour.
-
Profiting from the term’s ambiguity, O’Reilly and his collaborators likened the “openness” of open source software to the “openness” of the academic enterprise, markets, and free speech.
-
“For me, ‘open source’ in the broader sense means any system in which open access to code lowers the barriers to entry into the market”).
-
The language of economics was less alienating than Stallman’s language of ethics; “openness” was the kind of multipurpose term that allowed one to look political while advancing an agenda that had very little to do with politics
-
the availability of source code for universal examination soon became the one and only benchmark of openness
-
What the code did was of little importance—the market knows best!—as long as anyone could check it for bugs.
-
The new paradigm was presented as something that went beyond ideology and could attract corporate executives without losing its appeal to the hacker crowd.
-
What Raymond and O’Reilly failed to grasp, or decided to overlook, is that their effort to present open source as non-ideological was underpinned by a powerful ideology of its own—an ideology that worshiped innovation and efficiency at the expense of everything else.
-
What they had in common was disdain for Stallman’s moralizing—barely enough to justify their revolutionary agenda, especially among the hacker crowds who were traditionally suspicious of anyone eager to suck up to the big corporations that aspired to dominate the open source scene.
-
As long as everyone believed that “open source” implied “the Internet” and that “the Internet” implied “open source,” it would be very hard to resist the new paradigm
-
Telling a coherent story about open source required finding some inner logic to the history of the Internet
-
“If you believe me that open source is about Internet-enabled collaboration, rather than just about a particular style of software license,”
-
The way O’Reilly saw it, many of the key developments of Internet culture were already driven by what he called “open source behavior,” even if such behavior was not codified in licenses.
-
No moralizing (let alone legislation) was needed; the Internet already lived and breathed open source
-
Openness as a happenstance of market conditions is a very different beast from openness as a guaranteed product of laws.
-
One of the key consequences of linking the Internet to the world of open source was to establish the primacy of the Internet as the new, reinvented desktop
-
This is where the now-forgotten language of “freedom” made a comeback, since it was important to ensure that O’Reilly’s heroic Randian hacker-entrepreneurs were allowed to roam freely.
-
Soon this “freedom to innovate” morphed into “Internet freedom,” so that what we are trying to preserve is the innovative potential of the platform, regardless of the effects on individual users.
-
Lumping everything under the label of “Internet freedom” did have some advantages for those genuinely interested in promoting rights such as freedom of expression
-
Forced to choose between preserving the freedom of the Internet or that of its users, we were supposed to choose the former—because “the Internet” stood for progress and enlightenment.
-
their value proposition lay in the information they delivered, not in the software function they executed.
-
to argue that the Internet could help humanity augment its “collective intelligence” and that, once again, open source software was crucial to this endeavor.
-
Now it was all about Amazon learning from its customers and Google learning from the sites in its index.
-
in 2004, O’Reilly and his business partner Dale Dougherty hit on the idea of “Web 2.0.” What did “2.0” mean, exactly?
-
he primary goal was to show that the 2001 market crash did not mean the end of the web and that it was time to put the crash behind us and start learning from those who survived.
-
Tactically, “Web 2.0” could also be much bigger than “open source”; it was the kind of sexy umbrella term that could allow O’Reilly to branch out from boring and highly technical subjects to pulse-quickening futurology
-
O’Reilly couldn’t improve on a concept as sexy as “collective intelligence,” so he kept it as the defining feature of this new phenomenon.
-
What set Web 2.0 apart from Web 1.0, O’Reilly claimed, was the simple fact that those firms that didn’t embrace it went bust
-
O’Reilly eventually stuck a 2.0 label on anything that suited his business plan, running events with titles like “Gov 2.0” and “Where 2.0.” Today, as everyone buys into the 2.0 paradigm, O’Reilly is quietly dropping it
-
assumption that, thanks to the coming of Web 2.0, we are living through unique historical circumstances
-
Take O’Reilly’s musings on “Enterprise 2.0.” What is it, exactly? Well, it’s the same old enterprise—for all we know, it might be making widgets—but now it has learned something from Google and Amazon and found a way to harness “collective intelligence.”
-
tendency to redescribe reality in terms of Internet culture, regardless of how spurious and tenuous the connection might be, is a fine example of what I call “Internet-centrism.”
-
“Open source” gave us the “the Internet,” “the Internet” gave us “Web 2.0,” “Web 2.0” gave us “Enterprise 2.0”: in this version of history, Tim O’Reilly is more important than the European Union
-
For Postman, each human activity—religion, law, marriage, commerce—represents a distinct “semantic environment” with its own tone, purpose, and structure. Stupid talk is relatively harmless; it presents no threat to its semantic environment and doesn’t cross into other ones.
-
Crazy talk, in contrast, challenges a semantic environment, as it “establishes different purposes and assumptions from those we normally accept.” To argue, as some Nazis did, that the German soldiers ended up far more traumatized than their victims is crazy talk.
-
For Postman, one of the main tasks of language is to codify and preserve distinctions among different semantic environments.
-
As he put it, “When language becomes undifferentiated, human situations disintegrate: Science becomes indistinguishable from religion, which becomes indistinguishable from commerce, which becomes indistinguishable from law, and so on.
-
Some words—like “law”—are particularly susceptible to crazy talk, as they mean so many different things: from scientific “laws” to moral “laws” to “laws” of the market to administrative “laws,” the same word captures many different social relations. “Open,” “networks,” and “information” function much like “law” in our own Internet discourse today.
-
For Korzybski, the world has a relational structure that is always in flux; like Heraclitus, who argued that everything flows, Korzybski believed that an object A at time x1 is not the same object as object A at time x2
-
Our language could never properly account for the highly fluid and relational structure of our reality—or as he put it in his most famous aphorism, “the map is not the territory.”
-
Korzybski argued that we relate to our environments through the process of “abstracting,” whereby our neurological limitations always produce an incomplete and very selective summary of the world around us.
-
nothing harmful in this per se—Korzybski simply wanted to make people aware of the highly selective nature of abstracting and give us the tools to detect it in our everyday conversations.
-
He also encouraged his followers to start using “etc.” at the end of their statements as a way of making them aware of their inherent inability to say everything about a given subject and to promote what he called the “consciousness of abstraction.”
-
“What are the characteristics of language which lead people into making false evaluations of the world around them?”
-
O’Reilly openly acknowledges his debt to Korzybski, listing Science and Sanity among his favorite books
-
It would be a mistake to think that O’Reilly’s linguistic interventions—from “open source” to “Web 2.0”—are random or spontaneous.
-
There is a philosophy to them: a philosophy of knowledge and language inspired by Korzybski. However, O’Reilly deploys Korzybski in much the same way that the advertising industry deploys the latest findings in neuroscience: the goal is not to increase awareness, but to manipulate.
-
O’Reilly, of course, sees his role differently, claiming that all he wants is to make us aware of what earlier commentators may have overlooked. “A metaphor is just that: a way of framing the issues such that people can see something they might otherwise miss,
-
But Korzybski’s point, if fully absorbed, is that a metaphor is primarily a way of framing issues such that we don’t see something we might otherwise see.
-
In public, O’Reilly modestly presents himself as someone who just happens to excel at detecting the “faint signals” of emerging trends. He does so by monitoring a group of überinnovators that he dubs the “alpha geeks.” “The ‘alpha geeks’ show us where technology wants to go. Smart companies follow and support their ingenuity rather than trying to suppress it,
-
His own function is that of an intermediary—someone who ensures that the alpha geeks are heard by the right executives: “The alpha geeks are often a few years ahead of their time. . . . What we do at O’Reilly is watch these folks, learn from them, and try to spread the word by writing down (
-
The name of his company’s blog—O’Reilly Radar—is meant to position him as an independent intellectual who is simply ahead of his peers in grasping the obvious.
-
As Web 2.0 becomes central to everything, O’Reilly—the world’s biggest exporter of crazy talk—is on a mission to provide the appropriate “context” to every field.
-
The thinker who emerges there is very much at odds with the spirit of objectivity that O’Reilly seeks to cultivate in public
-
meme-engineering lets us organize and shape ideas so that they can be transmitted more effectively, and have the desired effect once they are transmitted
-
O’Reilly meme-engineers a nice euphemism—“meme-engineering”—to describe what has previously been known as “propaganda.”
-
how one can meme-engineer a new meaning for “peer-to-peer” technologies—traditionally associated with piracy—and make them appear friendly and not at all threatening to the entertainment industry.
-
O’Reilly and his acolytes “changed the canonical list of projects that we wanted to hold up as exemplars of the movement,” while also articulating what broader goals the projects on the new list served. He then proceeds to rehash the already familiar narrative: O’Reilly put the Internet at the center of everything, linking some “free software” projects like Apache or Perl to successful Internet start-ups and services. As a result, the movement’s goal was no longer to produce a completely free, independent, and fully functional operating system but to worship at the altar of the Internet gods.
-
His “correspondents” at O’Reilly Radar don’t work beats; they work memes and epistemes, constantly reframing important public issues in accordance with the templates prophesied by O’Reilly.
-
Now, who stands to benefit from “cyberwarfare” being defined more broadly? Could it be those who, like O’Reilly, can’t currently grab a share of the giant pie that is cybersecurity funding?
-
Frank Luntz lists ten rules of effective communication: simplicity, brevity, credibility, consistency, novelty, sound, aspiration, visualization, questioning, and context.
-
Thus, O’Reilly’s meme-engineering efforts usually result in “meme maps,” where the meme to be defined—whether it’s “open source” or “Web 2.0”—is put at the center, while other blob-like terms are drawn as connected to it.
-
The exact nature of these connections is rarely explained in full, but this is all for the better, as the reader might eventually interpret connections with their own agendas in mind. This is why the name of the meme must be as inclusive as possible: you never know who your eventual allies might be. “A big part of meme engineering is giving a name that creates a big tent that a lot of people want to be under, a train that takes a lot of people where they want to go,”
-
News April 4 mail date March 29, 2013 Baffler party March 6, 2013 Žižek on seduction February 13, 2013 More Recent Press I’ve Seen the Worst Memes of My Generation Destroyed by Madness io9, April 02, 2013 The Baffler’s New Colors Imprint, March 21, 2013
-
There is considerable continuity across O’Reilly’s memes—over time, they tend to morph into one another.
The Semantic Economy | Digital Tonto - 0 views
semantic-mediawiki.org - 0 views
Smart Contracts - 0 views
-
Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
-
A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
-
The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
- ...77 more annotations...
-
A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
-
And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
-
Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
-
The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
-
A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
-
The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
-
The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
-
Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
-
From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
-
The disciplines of auditing and investigation roughly correspond with verification of contract performance
-
The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
-
This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
-
The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
-
Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
-
Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
-
In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
-
Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
-
Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
-
The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
-
One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
-
There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
-
Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
-
To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
-
Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
-
Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
-
Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
-
All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
-
If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
-
The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
-
How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
-
The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
-
1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
-
3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
-
PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
-
Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
-
"Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
-
A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
-
With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
-
A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
-
A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
-
A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
-
Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
-
Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
-
The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
-
These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
-
To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
-
A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
-
A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
-
Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
-
Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
-
Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
-
One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
-
A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
-
Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
-
What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
-
If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
-
Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
The Suggested Upper Merged Ontology (SUMO) - Ontology Portal - 1 views
www.ontologyportal.org
ontology sumo ontologies semanticweb taxonomy semantic-web owl tools tool infrastructure

The Energy Efficiency of Trust & Vulnerability: A Conversation | Switch and Shift - 0 views
- ...34 more annotations...
-
When we don’t trust, we exert a lot of energy to keep up our guard, to continually assess and verify. This uses a lot of energy and time.
-
As we let ourselves be vulnerable, we also leave ourselves more open to new ideas, new ways of thinking which leads to empathy and innovation.
-
It lets us reallocate our resources to what matters and utilize our skills and those around us to increase effectiveness…impact.
-
If we are working together, we need to agree on the meaning of ‘done’. When are we done, what does that look like?
-
As the ability to replicate something has become more of a commodity, we are increasingly seeing that complex interactions are the way to create ‘value from difference’ (as opposed to ‘value from sameness’).
-
Efficient systems are great at dealing with complicated things – things that have many parts and sequences, but they fall flat dealing with complex systems, which is most of world today.
-
When we never do the same thing or have the same conversation twice, it becomes much more important to figure out why and what we do than how we do it (process, which is a given)
Google Open Source Blog: Learning the meaning behind words - 0 views

Stanford scientists put free text-analysis tool on the web | Engineering - 1 views

James Grier Miller, Living Systems (1978) - 0 views
- ...266 more annotations...
-
My presentation of a general theory of living systems will employ two sorts of spaces in which they may exist, physical or geographical space and conceptual or abstracted spaces
-
The characteristics and constraints of physical space affect the action of all concrete systems, living and nonliving.
-
These conceptual and abstracted spaces do not have the same characteristics and are not subject to the same constraints as physical space
-
Social and some biological scientists find conceptual or abstracted spaces useful because they recognize that physical space is not a major determinant of certain processes in the living systems they study
-
one cannot measure comparable processes at different levels of systems, to confirm or disconfirm cross-level hypotheses, unless one can measure different levels of systems or dimensions in the same spaces or in different spaces with known transformations among them
-
It must be possible, moreover, to make such measurements precisely enough to demonstrate whether or not there is a formal identity across levels
-
Any change of state of matter-energy or its movement over space, from one point to another, I shall call action.
-
Meaning is the significance of information to a system which processes it: it constitutes a change in that system's processes elicited by the information, often resulting from associations made to it on previous experience with it
-
Information is a simpler concept: the degrees of freedom that exist in a given situation to choose among signals, symbols, messages, or patterns to be transmitted.
-
. The amount of information is measured as the logarithm to the base 2 of the number of alternate patterns
-
Signals convey information to the receiving system only if they do not duplicate information already in the receiver. As Gabor says:
-
[The information of a message can] be defined as the 'minimum number of binary decisions which enable the receiver to construct the message, on the basis of the data already available to him.'
-
The term marker was used by von Neumann to refer to those observable bundles, units, or changes of matter-energy whose patterning bears or conveys the informational symbols from the ensemble or repertoire.
-
If a marker can assume n different states of which only one is present at any given time, it can represent at most log2n bits of information. The marker may be static, as in a book or in a computer's memory
-
Communication of almost every sort requires that the marker move in space, from the transmitting system to the receiving system, and this movement follows the same physical laws as the movement of any other sort of matter-energy. The advance of communication technology over the years has been in the direction of decreasing the matter-energy costs of storing and transmitting the markers which bear information.
-
There are, therefore, important practical matter-energy constraints upon the information processing of all living systems exerted by the nature of the matter-energy which composes their markers.
-
If two parts are interrelated either quantitatively or qualitatively, knowledge of the state of one must yield some information about the state of the other. Information measures can demonstrate when such relationships exist
-
The disorder, disorganization, lack of patterning, or randomness of organization of a system is known as its entropy (S)
-
Increase of entropy was thus interpreted as the passage of a system from less probable to more probable states.
-
according to the second law, a system tends to increase in entropy over time, it must tend to decrease in negentropy or information.
-
. Making one or more copies of a given informational pattern does not increase information overall, though it may increase the information in the system which receives the copied information.
-
the concept of Prigogine that in an open system (that is one in which both matter and energy can be exchanged with the environment) the rate of entropy production within the system, which is always positive, is minimized when the system is in a steady state.
-
in systems with internal feedbacks, internal entropy production is not always minimized when the system is in a stationary state. In other words, feedback couplings between the system parameters may cause marked changes in the rate of development of entropy. Thus it may be concluded that the "information flow" which is essential for this feedback markedly alters energy utilization and the rate of development of entropy, at least in some such special cases which involve feedback control. While the explanation of this is not clear, it suggests an important relationship between information and entropy
-
amount of energy actually required to transmit the information in the channel is a minute part of the total energy in the system, the "housekeeping energy" being by far the largest part of it
-
In recent years systems theorists have been fascinated by the new ways to study and measure information flows, but matter-energy flows are equally important. Systems theory is more than information theory, since it must also deal with energetics - such matters as
-
Only a minute fraction of the energy used by most living systems is employed for information processing
-
I have noted above that the movement of matter-energy over space, action, is one form of process. Another form of process is information processing or communication, which is the change of information from one state to another or its movement from one point to another over space
-
Communications, while being processed, are often shifted from one matter-energy state to another, from one sort of marker to another
-
One basic reason why communication is of fundamental importance is that informational patterns can be processed over space and the local matter-energy at the receiving point can be organized to conform to, or comply with, this information
-
. Conversely there is no regular movement in a system unless there is a difference in potential between two points, which is negative entropy or information
-
If the receiver responds primarily to the material or energic aspect, I shall call it, for brevity, a matter-energy transmission; if the response is primarily to the information, I shall call it an information transmission
-
Moreover, just as living systems must have specific forms of matter-energy, so they must have specific patterns of information
-
.The word "set" implies that the units have some common properties. These common properties are essential if the units are to interact or have relationships. The state of each unit is constrained by, conditioned by, or dependent on the state of other units. The units are coupled. Moreover, there is at least one measure of the sum of its units which is larger than the sum of that measure of its units.
-
a correspondence between two variables, x and y, such that for each value of x there is a definite value of y, and no two y's have the same x, and this correspondence is: determined by some rule
-
the set of values on some scale, numerical or otherwise, which its variables have at a given instant
-
If these comparable variations are so similar that they can be expressed by the same function, a formal identity exists between the two systems
-
Science advances as the formal identity or isomorphism increases between a theoretical conceptual system and objective findings about concrete or abstracted systems
-
A conceptual system may be purely logical or mathematical, or its terms and relationships may be intended to have some sort of formal identity or isomorphism with units and relationships empirically determinable by some operation carried out by an observer
-
a nonrandom accumulation of matter-energy, in a region in physical space-time, which is organized into interacting interrelated subsystems or components.
-
Both units and relationships in concrete systems are empirically determinable by some operation carried out by an observer
-
distinguishes a concrete system from unorganized entities in its environment by the following criteria
-
Their boundaries are discovered by empirical operations available to the general scientific community rather than set conceptually by a single observer
-
which can potentially change over time, and whose change can potentially be measured by specific operations, is a variable of a concrete system
-
number of its subsystems or components, its size, its rate of movement in space, its rate of growth, the number of bits of information it can process per second, or the intensity of a sound to which it responds
-
not to be confused with intersystemic variations which may be observed among individual systems, types, or levels.
-
Most concrete systems have boundaries which are at least partially permeable, permitting sizable magnitudes of at least certain sorts of matter-energy or information transmissions to pass them. Such a system is an open system. In open systems entropy may increase, remain in steady state, or decrease.
-
impermeable boundaries through which no matter-energy or information transmissions of any sort can occur is a closed system
-
In closed systems, entropy generally increases, exceptions being when certain reversible processes are carried on which do not increase it. It can never decrease.
-
the general case of concrete systems, of which living systems are a very special case. Nonliving systems need not have the same critical subsystems as living systems, though they often have some of them
-
maintain a steady state of negentropy even though entropic changes occur in them as they do everywhere else
-
The difference permits them to restore their own energy and repair breakdowns in their own organized structure.
-
They have a decider, the essential critical sub-system which controls the entire system, causing its subsystems and components to interact. Without such interaction under decider control there is no system.
-
other specific critical sub-systems or they have symbiotic or parasitic relationships with other living or nonliving systems
-
Their subsystems are integrated together to form actively self-regulating, developing, unitary systems with purposes and goals
-
A partipotential system must interact with other systems that can carry out the processes which it does not, or it will not survive
-
-
relationships abstracted or selected by an observer in the light of his interests, theoretical viewpoint, or philosophical bias.
-
Some relationships may be empirically determinable by some operation carried out by the observer, but others are not, being only his concepts
-
The relationships mentioned above are observed to inhere and interact in concrete, usually living, systems
-
The verbal usages of theoretical statements concerning abstracted systems are often the reverse of those concerning concrete systems
-
representing a class of phenomena all of which are considered to have some similar "class characteristic." The members of such a class are not thought to interact or be interrelated, as are the relationships in an abstracted system
-
their physical limits often do not coincide spatially with the boundaries of any concrete system, although they may.
-
important difference between the physical and biological hierarchies, on the one hand, and social hierarchies, on the other
-
we propose to identify social hierarchies not by observing who lives close to whom but by observing who interacts with whom
-
in most biological and physical systems relatively intense interaction implies relative spatial propinquity
-
To the extent that interactions are channeled through specialized communications and transportation systems, spatial propinquity becomes less determinative of structure.
-
-
cumulative body of knowledge of the past, contained in memories and assumptions of people who express this knowledge in definite ways
-
-
On the other hand, the society is an aggregate of social subsystems, and as a limiting case it is that social system which comprises all the roles of all the individuals who participate.
-
What Ruesch calls the social system is something concrete in space-time, observable and presumably measurable by techniques like those of natural science
-
To Parsons the system is abstracted from this, being the set of relationships which are the form of organization. To him the important units are classes of input-output relationships of subsystems rather than the subsystems themselves
-
system is a system of relationship in action, it is neither a physical organism nor an object of physical perception
-
[action] is not concerned with the internal structure of processes of the organism, but is concerned with the organism as a unit in a set of relationships and the other terms of that relationship, which he calls situation
-
One fundamental distinction between abstracted and concrete systems is that the boundaries of abstracted systems may at times be conceptually established at regions which cut through the units and relationships in the physical space occupied by concrete systems, but the boundaries of these latter systems are always set at regions which include within them all the units and internal relationships of each system
-
If the diverse fields of science are to be unified, it would be helpful if all disciplines were oriented either to concrete or to abstracted systems.