Skip to main content

Home/ Sensorica Knowledge/ Group items tagged services

Rss Feed Group items tagged

Tiberius Brastaviceanu

Beyond Blockchain: Simple Scalable Cryptocurrencies - The World of Deep Wealth - Medium - 0 views

  • I clarify the core elements of cryptocurrency and outline a different approach to designing such currencies rooted in biomimicry
  • This post outlines a completely different strategy for implementing cryptocurrencies with completely distributed chains
  • Rather than trying to make one global, anonymous, digital cash
  • ...95 more annotations...
  • we are interested in the resilience that comes from building a rich ecosystem of interoperable currencies
  • What are the core elements of a modern cryptocurrency?
  • Digital
  • Holdings are electronic and only exist and operate by virtue of a community’s agreement about how to interpret digital bits according to rules about operation and accounting of the currency.
  • Trustless
  • don’t have to trust a 3rd party central authority
  • Decentralized
  • Specifically, access, issuance, transaction accounting, rules & policies, should be collectively visible, known, and held.
  • Cryptographic
  • This cryptographic structure is used to enable a variety of people to host the data without being able to alter it.
  • Identity
  • there must be a way to associate these bits with some kind of account, wallet, owner, or agent who can use them
  • Other things that many take for granted in blockchains may not be core but subject to decisions in design and implementation, so they can vary between implementations
  • It does not have to be stored in a synchronized global ledger
  • does not have to be money. It may be a reputation currency, or data used for identity, or naming, etc
  • Its units do not have to be cryptographic tokens or coins
  • It does not have to protect the anonymity of users, although it may
  • if you think currency is only money, and that money must be artificially scarce
  • Then you must tackle the problem of always tracking which coins exist, and which have been spent. That is one approach — the one blockchain takes.
  • You might optimize for anonymity if you think of cryptocurrency as a tool to escape governments, regulations, and taxes.
  • if you want to establish and manage membership in new kinds of commons, then identity and accountability for actions may turn out to be necessary ingredients instead of anonymity.
  • In the case of the MetaCurrency Project, we are trying to support many use cases by building tools to enable a rich ecosystem of communities and current-sees (many are non-monetary) to enhance collective intelligence at all scales.
  • Managing consensus about a shared reality is a central challenge at the heart of all distributed computing solutions.
  • If we want to democratize money by having cryptocurrencies become a significant and viable means of transacting on a daily basis, I believe we need fundamentally more scalable approaches that don’t require expensive, dedicated hardware just to participate.
  • We should not need system wide consensus for two people to do a transaction in a cryptocurrency
  • Blockchain is about managing a consensus about what was “said.” Ceptr is about distributing a consensus about how to “speak.”
  • how nature gets the job done in massively scalable systems which require coordination and consistency
  • Replicate the same processes across all nodes
  • Empower every node with full agency
  • Hold this transformed state locally and reliably
  • Establish protocols for interaction
  • Each speaker of a language carries the processes to understand sentences they hear, and generate sentences they need
  • we certainly don’t carry some kind of global ledger of everything that’s ever been said, or require consensus about what has been said
  • Language IS a communication protocol we learn by emulating the processes of usage.
  • Dictionaries try to catch up when the usage
  • there is certainly no global ledger with consensus about the state of trillions of cells. Yet, from a single zygote’s copy of DNA, our cells coordinate in a highly decentralized manner, on scales of trillions, and without the latency or bottlenecks of central control.
  • Imagine something along the lines of a Java Virtual Machine connected to a distributed version of Github
  • Every time this JVM runs a program it confirms the hash of the code it is about to execute with the hash signed into the code repository by its developers
  • This allows each node that intends to be honest to be sure that they’re running the same processes as everyone else. So when two parties want to do a transaction, and each can have confidence their own code, and the results that your code produces
  • Then you treat it as authoritative and commit it to your local cryptographically self-validating data store
  • Allowing each node to treat itself as a full authority to process transactions (or interactions via shared protocols) is exactly how you empower each node with full agency. Each node runs its copy of the signed program/processes on its own virtual machine, taking the transaction request combined with the transaction chains of the parties to the transaction. Each node can confirm their counterparty’s integrity by replaying their transactions to produce their current state, while confirming signatures and integrity of the chain
  • If both nodes are in an appropriate state which allows the current transaction, then they countersign the transaction and append to their respective chains. When you encounter a corrupted or dishonest node (as evidenced by a breach of integrity of their chain — passing through an invalid state, broken signatures, or broken links), your node can reject the transaction you were starting to process. Countersigning allows consensus at the appropriate scale of the decision (two people transacting in this case) to lock data into a tamper-proof state so it can be stored in as many parallel chains as you need.
  • When your node appends a mutually validated and signed transaction to its chain, it has updated its local state and is able to represent the integrity of its data locally. As long as each transaction (link in the chain) has valid linkages and countersignatures, we can know that it hasn’t been tampered with.
  • If you can reliably embody the state of the node in the node itself using Intrinsic Data Integrity, then all nodes can interact in parallel, independent of other interactions to maximize scalability and simultaneous processing. Either the node has the credits or it doesn’t. I don’t have to refer to a global ledger to find out, the state of the node is in the countersigned, tamper-proof chain.
  • Just like any meaningful communication, a protocol needs to be established to make sure that a transaction carries all the information needed for each node to run the processes and produce a new signed and chained state. This could be debits or credits to an account which modify the balance, or recoding courses and grades to a transcript which modify a Grade Point Average, or ratings and feedback contributing to a reputation score, and so on.
  • By distributing process at the foundation, and leveraging Intrinsic Data Integrity, our approach results in massive improvements in throughput (from parallel simultaneous independent processing), speed, latency, efficiency, and cost of hardware.
  • You also don’t need to incent people to hold their own record — they already want it.
  • Another noteworthy observation about humans, cells, and atoms, is that each has a general “container” that gets configured to a specific use.
  • Likewise, the Receptors we’ve built are a general purpose framework which can load code for different distributed applications. These Receptors are a lightweight processing container for the Ceptr Virtual Machine Host
  • Ceptr enables a developer to focus on the rules and transactions for their use case instead of building a whole framework for distributed applications.
  • how units in a currency are issued
  • Most people think that money is just money, but there are literally hundreds of decisions you can make in designing a currency to target particular needs, niches, communities or patterns of flow.
  • Blockchain cryptocurrencies are fiat currencies. They create tokens or coins from nothing
  • These coins are just “spoken into being”
  • the challenging task of
  • ensure there is no counterfeiting or double-spending
  • Blockchain cryptocurrencies are fiat currencies
  • These coins are just “spoken into being”
  • the challenging task of tracking all the coins that exist to ensure there is no counterfeiting or double-spending
  • You wouldn’t need to manage consensus about whether a cryptocoin is spent, if your system created accounts which have normal balances based on summing their transactions.
  • In a mutual credit system, units of currency are issued when a participant extends credit to another user in a standard spending transaction
  • Alice pays Bob 20 credits for a haircut. Alice’s account now has -20, and Bob’s has +20.
  • Alice spent credits she didn’t have! True
  • Managing the currency supply in a mutual credit system is about managing credit limits — how far people can spend into a negative balance
  • Notice the net number units in the system remains zero
  • One elegant approach to managing mutual credit limits is to set them based on actual demand.
  • concerns about manufacturing fake accounts to game credit limits (Sybil Attacks)
  • keep in mind there can be different classes of accounts. Easy to create, anonymous accounts may get NO credit limit
  • What if I alter my code to give myself an unlimited credit limit, then spend as much as I want? As soon as you pass the credit limit encoded in the shared agreements, the next person you transact with will discover you’re in an invalid state and refuse the transaction.
  • If two people collude to commit an illegal transaction by both hacking their code to allow a normally invalid state, the same still pattern still holds. The next person they try to transact with using untampered code will detect the problem and decline to transact.
  • Most modern community currency systems have been implemented as mutual credit,
  • Hawala is a network of merchants and businessmen, which has been operating since the middle ages, performing money transfers on an honor system and typically settling balances through merchandise instead of transferring money
  • Let’s look at building a minimum viable cryptocurrency with the hawala network as our use case
  • To minimize key management infrastructure, each hawaladar’s public key is their address or identity on the network. To join the network you get a copy of the software from another hawaladar, generate your public and private keys, and complete your personal profile (name, location, contact info, etc.). You call, fax, or email at least 10 hawaladars who know you, and give them your IP address and ask them to vouch for you.
  • Once 10 other hawaladars have vouched for you, you can start doing other transactions because the protocol encoded in every node will reject a transaction chain that doesn’t start with at least 10 vouches
  • seeding your information with those other peers so you can be found by the rest of the network.
  • As described in the Mutual Credit section, at the time of transaction each party audits the counterparty’s transaction chain.
  • Our hawala crypto-clearinghouse protocol has two categories of transactions: some used for accounting and others for routing. Accounting transactions change balances. Routing transactions maintain network integrity by recording information about hawaladar
  • Accounting Transactions create signed data that changes account balances and contains these fields:
  • The final hash of all of the above fields is used as a unique transaction ID and is what each of party signs with their private keys. Signing indicates a party has agreed to the terms of the transaction. Only transactions signed by both parties are considered valid. Nodes can verify signatures by confirming that decryption of the signature using the public key yields a result which matches the transaction ID.
  • Routing Transactions sign data that changes the peers list and contain these fields:
  • As with accounting transactions, the hash of the above fields is used as the transaction’s unique key and the basis for the cryptographic signature of both counterparties.
  • Remember, instead of making changes to account balances, routing transactions change a node’s local list of peers for finding each other and processing.
  • a distributed network of mutual trust
  • operates across national boundaries
  • everyone already keeps and trusts their own separate records
  • Hawaladars are not anonymous
  • “double-spending”
  • It would be possible for someone to hack the code on their node to “forget” their most recent transaction (drop the head of their chain), and go back to their previous version of the chain before that transaction. Then they could append a new transaction, drop it, and append again.
  • After both parties have signed the agreed upon transaction, each party submits the transaction to separate notaries. Notaries are a special class of participant who validate transactions (auditing each chain, ensuring nobody passes through an invalid state), and then they sign an outer envelope which includes the signatures of the two parties. Notaries agree to run high-availability servers which collectively manage a Distributed Hash Table (DHT) servicing requests for transaction information. As their incentive for providing this infrastructure, notaries get a small transaction fee.
  • This approach introduces a few more steps and delays to the transaction process, but because it operates on independent parallel chains, it is still orders of magnitude more efficient and decentralized than reaching consensus on entries in a global ledger
  • millions of simultaneous transactions could be getting processed by other parties and notaries with no bottlenecks.
  • There are other solutions to prevent nodes from dropping the head of their transaction chain, but the approach of having notaries serve out a DHT solves a number of common objections to completely distributed accounting. Having access to reliable lookups in a DHT provides a similar big picture view that you get from a global ledger. For example, you may want a way to look up transactions even when the parties to that transaction are offline, or to be able to see the net system balance at a particular moment in time, or identify patterns of activity in the larger system without having to collect data from everyone individually.
  • By leveraging Intrinsic Data Integrity to run numerous parallel tamper-proof chains you can enable nodes to do various P2P transactions which don’t actually require group consensus. Mutual credit is a great way to implement cryptocurrencies to run in this peered manner. Basic PKI with a DHT is enough additional infrastructure to address main vulnerabilities. You can optimize your solution architecture by reserving reserve consensus work for tasks which need to guarantee uniqueness or actually involve large scale agreement by humans or automated contracts.
  • It is not only possible, but far more scalable to build cryptocurrencies without a global ledger consensus approach or cryptographic tokens.
  •  
    Article written by Arthur Brook, founder of Metacurrency project and of Ceptr.
Francois Bergeron

Association science et bien commun - 0 views

  •  
    " l'Association a pour mission de stimuler la vigilance et l'action pour une science publique au service du bien commun." Selected by Yasir
Tiberius Brastaviceanu

The Baffler - 0 views

  • This tendency to view questions of freedom primarily through the lens of economic competition, to focus on the producer and the entrepreneur at the expense of everyone else, shaped O’Reilly’s thinking about technology.
  • the O’Reilly brand essence is ultimately a story about the hacker as hero, the kid who is playing with technology because he loves it, but one day falls into a situation where he or she is called on to go forth and change the world,
  • His true hero is the hacker-cum-entrepreneur, someone who overcomes the insurmountable obstacles erected by giant corporations and lazy bureaucrats in order to fulfill the American Dream 2.0: start a company, disrupt an industry, coin a buzzword.
  • ...139 more annotations...
  • gospel of individualism, small government, and market fundamentalism
  • innovation is the new selfishness
  • mastery of public relations
  • making it seem as if the language of economics was, in fact, the only reasonable way to talk about the subject
  • memes are for losers; the real money is in epistemes.
  • “Open source software” was also the first major rebranding exercise overseen by Team O’Reill
  • It’s easy to forget this today, but there was no such idea as open source software before 1998; the concept’s seeming contemporary coherence is the result of clever manipulation and marketing.
  • ideological cleavage between two groups
  • Richard Stallman
  • Free Software Foundation, preoccupied with ensuring that users had rights with respect to their computer programs. Those rights weren’t many—users should be able to run the program for any purpose, to study how it works, to redistribute copies of it, and to release their improved version (if there was one) to the public
  • “free software.”
  • association with “freedom” rather than “free beer”
  • copyleft
  • profound critique of the role that patent law had come to play in stifling innovation and creativity.
  • Plenty of developers contributed to “free software” projects for reasons that had nothing to do with politics. Some, like Linus Torvalds, the Finnish creator of the much-celebrated Linux operating system, did so for fun; some because they wanted to build more convenient software; some because they wanted to learn new and much-demanded skills.
  • Stallman’s rights-talk, however, risked alienating the corporate types
  • he was trying to launch a radical social movement, not a complacent business association
  • By early 1998 several business-minded members of the free software community were ready to split from Stallman, so they masterminded a coup, formed their own advocacy outlet—the Open Source Initiative—and brought in O’Reilly to help them rebrand.
  • “open source”
  • The label “open source” may have been new, but the ideas behind it had been in the air for some time.
  • In those early days, the messaging around open source occasionally bordered on propaganda
  • This budding movement prided itself on not wanting to talk about the ends it was pursuing; except for improving efficiency and decreasing costs, those were left very much undefined.
  • extremely decentralized manner, using Internet platforms, with little central coordination.
  • In contrast to free software, then, open source had no obvious moral component.
  • “open source is not particularly a moral or a legal issue. It’s an engineering issue. I advocate open source, because . . . it leads to better engineering results and better economic results
  • While free software was meant to force developers to lose sleep over ethical dilemmas, open source software was meant to end their insomnia.
  • Stallman the social reformer could wait for decades until his ethical argument for free software prevailed in the public debate
  • O’Reilly the savvy businessman had a much shorter timeline: a quick embrace of open source software by the business community guaranteed steady demand for O’Reilly books and events
  • The coup succeeded. Stallman’s project was marginalized. But O’Reilly and his acolytes didn’t win with better arguments; they won with better PR.
  • A decade after producing a singular vision of the Internet to justify his ideas about the supremacy of the open source paradigm, O’Reilly is close to pulling a similar trick on how we talk about government reform.
  • much of Stallman’s efforts centered on software licenses
  • O’Reilly’s bet wa
  • the “cloud”
  • licenses would cease to matter
  • Since no code changed hands
  • So what did matter about open source? Not “freedom”
  • O’Reilly cared for only one type of freedom: the freedom of developers to distribute software on whatever terms they fancied.
  • the freedom of the producer
  • who must be left to innovate, undisturbed by laws and ethics.
  • The most important freedom,
  • is that which protects “my choice as a creator to give, or not to give, the fruits of my work to you, as a ‘user’ of that work, and for you, as a user, to accept or reject the terms I place on that gift.”
  • O’Reilly opposed this agenda: “I completely support the right of Richard [Stallman] or any individual author to make his or her work available under the terms of the GPL; I balk when they say that others who do not do so are doing something wrong.”
  • The right thing to do, according to O’Reilly, was to leave developers alone.
  • According to this Randian interpretation of open source, the goal of regulation and public advocacy should be to ensure that absolutely nothing—no laws or petty moral considerations—stood in the way of the open source revolution
  • Any move to subject the fruits of developers’ labor to public regulation
  • must be opposed, since it would taint the reputation of open source as technologically and economically superior to proprietary software
  • the advent of the Internet made Stallman’s obsession with licenses obsolete
  • Many developers did stop thinking about licenses, and, having stopped thinking about licenses, they also stopped thinking about broader moral issues that would have remained central to the debates had “open source” not displaced “free software” as the paradigm du jour.
  • Profiting from the term’s ambiguity, O’Reilly and his collaborators likened the “openness” of open source software to the “openness” of the academic enterprise, markets, and free speech.
  • “open to intellectual exchange”
  • “open to competition”
  • “For me, ‘open source’ in the broader sense means any system in which open access to code lowers the barriers to entry into the market”).
  • “Open” allowed O’Reilly to build the largest possible tent for the movement.
  • The language of economics was less alienating than Stallman’s language of ethics; “openness” was the kind of multipurpose term that allowed one to look political while advancing an agenda that had very little to do with politics
  • highlight the competitive advantages of openness.
  • the availability of source code for universal examination soon became the one and only benchmark of openness
  • What the code did was of little importance—the market knows best!—as long as anyone could check it for bugs.
  • The new paradigm was presented as something that went beyond ideology and could attract corporate executives without losing its appeal to the hacker crowd.
  • What Raymond and O’Reilly failed to grasp, or decided to overlook, is that their effort to present open source as non-ideological was underpinned by a powerful ideology of its own—an ideology that worshiped innovation and efficiency at the expense of everything else.
  • What they had in common was disdain for Stallman’s moralizing—barely enough to justify their revolutionary agenda, especially among the hacker crowds who were traditionally suspicious of anyone eager to suck up to the big corporations that aspired to dominate the open source scene.
  • linking this new movement to both the history of the Internet and its future
  • As long as everyone believed that “open source” implied “the Internet” and that “the Internet” implied “open source,” it would be very hard to resist the new paradigm
  • Telling a coherent story about open source required finding some inner logic to the history of the Internet
  • “If you believe me that open source is about Internet-enabled collaboration, rather than just about a particular style of software license,”
  • everything on the Internet was connected to everything else—via open source.
  • The way O’Reilly saw it, many of the key developments of Internet culture were already driven by what he called “open source behavior,” even if such behavior was not codified in licenses.
  • No moralizing (let alone legislation) was needed; the Internet already lived and breathed open source
  • apps might be displacing the browser
  • the openness once taken for granted is no more
  • Openness as a happenstance of market conditions is a very different beast from openness as a guaranteed product of laws.
  • One of the key consequences of linking the Internet to the world of open source was to establish the primacy of the Internet as the new, reinvented desktop
  • This is where the now-forgotten language of “freedom” made a comeback, since it was important to ensure that O’Reilly’s heroic Randian hacker-entrepreneurs were allowed to roam freely.
  • Soon this “freedom to innovate” morphed into “Internet freedom,” so that what we are trying to preserve is the innovative potential of the platform, regardless of the effects on individual users.
  • Lumping everything under the label of “Internet freedom” did have some advantages for those genuinely interested in promoting rights such as freedom of expression
  • Forced to choose between preserving the freedom of the Internet or that of its users, we were supposed to choose the former—because “the Internet” stood for progress and enlightenment.
  • infoware
  • Yahoo
  • their value proposition lay in the information they delivered, not in the software function they executed.
  • The “infoware” buzzword didn’t catch on, so O’Reilly turned to the work of Douglas Engelbart
  • to argue that the Internet could help humanity augment its “collective intelligence” and that, once again, open source software was crucial to this endeavor.
  • Now it was all about Amazon learning from its customers and Google learning from the sites in its index.
  • The idea of the Internet as both a repository and incubator of “collective intelligence”
  • in 2004, O’Reilly and his business partner Dale Dougherty hit on the idea of “Web 2.0.” What did “2.0” mean, exactly?
  • he primary goal was to show that the 2001 market crash did not mean the end of the web and that it was time to put the crash behind us and start learning from those who survived.
  • Tactically, “Web 2.0” could also be much bigger than “open source”; it was the kind of sexy umbrella term that could allow O’Reilly to branch out from boring and highly technical subjects to pulse-quickening futurology
  • O’Reilly couldn’t improve on a concept as sexy as “collective intelligence,” so he kept it as the defining feature of this new phenomenon.
  • What set Web 2.0 apart from Web 1.0, O’Reilly claimed, was the simple fact that those firms that didn’t embrace it went bust
  • find a way to harness collective intelligence and make it part of their business model.
  • By 2007, O’Reilly readily admitted that “Web 2.0 was a pretty crappy name for what’s happening.”
  • O’Reilly eventually stuck a 2.0 label on anything that suited his business plan, running events with titles like “Gov 2.0” and “Where 2.0.” Today, as everyone buys into the 2.0 paradigm, O’Reilly is quietly dropping it
  • assumption that, thanks to the coming of Web 2.0, we are living through unique historical circumstances
  • Take O’Reilly’s musings on “Enterprise 2.0.” What is it, exactly? Well, it’s the same old enterprise—for all we know, it might be making widgets—but now it has learned something from Google and Amazon and found a way to harness “collective intelligence.”
  • tendency to redescribe reality in terms of Internet culture, regardless of how spurious and tenuous the connection might be, is a fine example of what I call “Internet-centrism.”
  • “Open source” gave us the “the Internet,” “the Internet” gave us “Web 2.0,” “Web 2.0” gave us “Enterprise 2.0”: in this version of history, Tim O’Reilly is more important than the European Union
  • For Postman, each human activity—religion, law, marriage, commerce—represents a distinct “semantic environment” with its own tone, purpose, and structure. Stupid talk is relatively harmless; it presents no threat to its semantic environment and doesn’t cross into other ones.
  • Since it mostly consists of falsehoods and opinions
  • it can be easily corrected with facts
  • to say that Tehran is the capital of Iraq is stupid talk
  • Crazy talk, in contrast, challenges a semantic environment, as it “establishes different purposes and assumptions from those we normally accept.” To argue, as some Nazis did, that the German soldiers ended up far more traumatized than their victims is crazy talk.
  • For Postman, one of the main tasks of language is to codify and preserve distinctions among different semantic environments.
  • As he put it, “When language becomes undifferentiated, human situations disintegrate: Science becomes indistinguishable from religion, which becomes indistinguishable from commerce, which becomes indistinguishable from law, and so on.
  • pollution
  • Some words—like “law”—are particularly susceptible to crazy talk, as they mean so many different things: from scientific “laws” to moral “laws” to “laws” of the market to administrative “laws,” the same word captures many different social relations. “Open,” “networks,” and “information” function much like “law” in our own Internet discourse today.
  • For Korzybski, the world has a relational structure that is always in flux; like Heraclitus, who argued that everything flows, Korzybski believed that an object A at time x1 is not the same object as object A at time x2
  • Our language could never properly account for the highly fluid and relational structure of our reality—or as he put it in his most famous aphorism, “the map is not the territory.”
  • Korzybski argued that we relate to our environments through the process of “abstracting,” whereby our neurological limitations always produce an incomplete and very selective summary of the world around us.
  • nothing harmful in this per se—Korzybski simply wanted to make people aware of the highly selective nature of abstracting and give us the tools to detect it in our everyday conversations.
  • Korzybski developed a number of mental tools meant to reveal all the abstracting around us
  • He also encouraged his followers to start using “etc.” at the end of their statements as a way of making them aware of their inherent inability to say everything about a given subject and to promote what he called the “consciousness of abstraction.”
  • There was way too much craziness and bad science in Korzybski’s theories
  • but his basic question
  • “What are the characteristics of language which lead people into making false evaluations of the world around them?”
  • Tim O’Reilly is, perhaps, the most high-profile follower of Korzybski’s theories today.
  • O’Reilly openly acknowledges his debt to Korzybski, listing Science and Sanity among his favorite books
  • It would be a mistake to think that O’Reilly’s linguistic interventions—from “open source” to “Web 2.0”—are random or spontaneous.
  • There is a philosophy to them: a philosophy of knowledge and language inspired by Korzybski. However, O’Reilly deploys Korzybski in much the same way that the advertising industry deploys the latest findings in neuroscience: the goal is not to increase awareness, but to manipulate.
  • O’Reilly, of course, sees his role differently, claiming that all he wants is to make us aware of what earlier commentators may have overlooked. “A metaphor is just that: a way of framing the issues such that people can see something they might otherwise miss,
  • But Korzybski’s point, if fully absorbed, is that a metaphor is primarily a way of framing issues such that we don’t see something we might otherwise see.
  • In public, O’Reilly modestly presents himself as someone who just happens to excel at detecting the “faint signals” of emerging trends. He does so by monitoring a group of überinnovators that he dubs the “alpha geeks.” “The ‘alpha geeks’ show us where technology wants to go. Smart companies follow and support their ingenuity rather than trying to suppress it,
  • His own function is that of an intermediary—someone who ensures that the alpha geeks are heard by the right executives: “The alpha geeks are often a few years ahead of their time. . . . What we do at O’Reilly is watch these folks, learn from them, and try to spread the word by writing down (
  • The name of his company’s blog—O’Reilly Radar—is meant to position him as an independent intellectual who is simply ahead of his peers in grasping the obvious.
  • “the skill of writing is to create a context in which other people can think”
  • As Web 2.0 becomes central to everything, O’Reilly—the world’s biggest exporter of crazy talk—is on a mission to provide the appropriate “context” to every field.
  • In a fascinating essay published in 2000, O’Reilly sheds some light on his modus operandi.
  • The thinker who emerges there is very much at odds with the spirit of objectivity that O’Reilly seeks to cultivate in public
  • meme-engineering lets us organize and shape ideas so that they can be transmitted more effectively, and have the desired effect once they are transmitted
  • O’Reilly meme-engineers a nice euphemism—“meme-engineering”—to describe what has previously been known as “propaganda.”
  • how one can meme-engineer a new meaning for “peer-to-peer” technologies—traditionally associated with piracy—and make them appear friendly and not at all threatening to the entertainment industry.
  • O’Reilly and his acolytes “changed the canonical list of projects that we wanted to hold up as exemplars of the movement,” while also articulating what broader goals the projects on the new list served. He then proceeds to rehash the already familiar narrative: O’Reilly put the Internet at the center of everything, linking some “free software” projects like Apache or Perl to successful Internet start-ups and services. As a result, the movement’s goal was no longer to produce a completely free, independent, and fully functional operating system but to worship at the altar of the Internet gods.
  • Could it be that O’Reilly is right in claiming that “open source” has a history that predates 1998?
  • Seen through the prism of meme-engineering, O’Reilly’s activities look far more sinister.
  • His “correspondents” at O’Reilly Radar don’t work beats; they work memes and epistemes, constantly reframing important public issues in accordance with the templates prophesied by O’Reilly.
  • Or take O’Reilly’s meme-engineering efforts around cyberwarfare.
  • Now, who stands to benefit from “cyberwarfare” being defined more broadly? Could it be those who, like O’Reilly, can’t currently grab a share of the giant pie that is cybersecurity funding?
  • Frank Luntz lists ten rules of effective communication: simplicity, brevity, credibility, consistency, novelty, sound, aspiration, visualization, questioning, and context.
  • Thus, O’Reilly’s meme-engineering efforts usually result in “meme maps,” where the meme to be defined—whether it’s “open source” or “Web 2.0”—is put at the center, while other blob-like terms are drawn as connected to it.
  • The exact nature of these connections is rarely explained in full, but this is all for the better, as the reader might eventually interpret connections with their own agendas in mind. This is why the name of the meme must be as inclusive as possible: you never know who your eventual allies might be. “A big part of meme engineering is giving a name that creates a big tent that a lot of people want to be under, a train that takes a lot of people where they want to go,”
  • News April 4 mail date March 29, 2013 Baffler party March 6, 2013 Žižek on seduction February 13, 2013 More Recent Press I’ve Seen the Worst Memes of My Generation Destroyed by Madness io9, April 02, 2013 The Baffler’s New Colors Imprint, March 21, 2013
  • There is considerable continuity across O’Reilly’s memes—over time, they tend to morph into one another.
Kurt Laitner

The basic orientation of p2p theory towards societal reform: transforming civil society... - 1 views

  • under the ‘leadership’ of corporations and those members of our society who have access to capital.
  • Despite all democratic advances, the state forms have clearly been captured by private interests.
  • in a capitalist system, ‘civil society’ is not directly productive of the goods and services that we need to survive, live and thrive
  • ...22 more annotations...
  • everything that needs to be made, has to be designed through collaborative innovation in the first place
  • continuous interchange and dialogue of citizens as they determine their collective life
  • Both civil society and the notion of citizenship can be criticized for being insufficiently inclusionary, and therefore as ‘mechanisms of exclusion’.
  • consisting of shared depositories of knowledge, code and design; the communities of contributors and users of such commons
  • infrastructures of collaboration, which are managed by a new type of ‘for-benefit associations’
  • democratically governed by all participants and stakeholders in such commons
    • Kurt Laitner
       
      hmm
  • which are not derived or secondary from either the private or state forms.
  • civil society is the locus of the shared abundance of value creation, and the place for the continual dialogue regarding the necessities of common life.
  • democratically decide
    • Kurt Laitner
       
      ? our values need be expressed in every action within the matrix, not just when a 'vote' is held, in fact general democratic 'voting' should probably disappear
  • the ‘common good’ of society as a whole
    • Kurt Laitner
       
      there is no such thing
  • The difference is that the commons where the immaterial value is created are positioned in a field of abundance characteristic for non-rival or anti-rival goods; while the for-benefit associations are responsible for the sometimes contentious allocation of rival infrastructures.
    • Kurt Laitner
       
      !!!
  • Whereas the commons themselves are plurarchies based on permissionless contribution, forking and other rights guaranteeing the diversity of contributions and contributors; the for-benefit associations are democratically governed.
  • true reform of the private sector and the corporate form.
    • Kurt Laitner
       
      really?
  • Under conditions of the rule of capital, for-profit corporations are beholden to work for the interests of the shareholders. This format allows for the accumulation of capital, but also indirectly of political power, through the power of money to influence politics and politicians. For-profit corporations are part of a system of infinite growth and compound interest, must continuously compete with other corporations, and therefore, also minimize costs. For-profit corporations are designed to ignore negative environmental externalities by avoiding to pay the costs associated with them; and to ignore positive social externalities, also by avoiding to pay for them. In terms of sustainability, corporations practice planned obsolescence as a rule, because while the market is a scarcity allocation mechanism, capitalism itself is a scarcity maintenance and creation mechanism. Anti-sustainable practices are systemic and part of the DNA of the for-profit corporation.
  • Under conditions of peer production, design and innovation moves to commons-based communitiies, which lack the incentive for unsustainable design; products are inherently design for sustainability, and the production process itself is designed for openness and distribution.
  • designed to make the commoners and the commons themselves sustainable, by not ‘leaking’ surplus value to external shareholders
  • mission-oriented, community supportive, sustainability-oriented corporate forms, that operate in the marketplace but do not themselves reproduce capitalism.
  • surplus value stays within the commons, allows its autonomous social reproduction, and sustains the commoners
  • ethical mechanism that subsumes profit making under the social goal of strengthening the commons.
  • because commons and their communities are themselves specific, and do not automatically take into account the common good of society as a whole .
  • A Partner State functions center around enabling and empowering social production and abandons some of the paternalistic aspects of the welfare state by focusing on strengthening the possibilities of autonomy.
  • mobilization of social forces to obtain a new social contract
  •  
    Good synopsis of the big picture by Michel
Kurt Laitner

The Revolution at hand - Op-Ed - Domus - 0 views

  • Currently, our education prepares us to perform a job — at times any job — that pays us in terms of what we can possess and consume or, in other words, the goods that design and mass production consider to be to our satisfaction — at least partially.
  • We have produced artificial needs for years under this mantra
  • creating almost nonexistent necessities that are readily available and easy to narrate rather than investigating the problems and real needs of people and communities
  • ...13 more annotations...
  • the need for large-scale production is disappearing due to the crystalline democratization of the means of production
  • Mediocrity is obsolete
  • Money has become absurdly limited
  • unable to model the exchanges that serve to give way to a new mode of radically inclusive and more equitable cooperative production
  • design becomes a political tool
  • Innovation and meaning have been restricted, trapped and suffocated by mechanisms of protection, monopolies, patents and copyrights.
  • If you're lucky you will have patrons, not customers. Customers barely exist in the creative world now.
  • Production will occur only when there is a demand — and not a moment before
  • We need a new cultural infrastructure
  • A new distributed network of places of cultural and tangible production must be affirmed. The network will stem from fablabs, makerspaces and hackerspaces — the new factories — around the world, or from ambitious projects like the Italian Bottega 21: initiatives that unite the existing cultural heritage of places and traditions with currently available technologies
  • design itself must be independent from specific materials
  • We will teach students to investigate, discover and create work, products and services that the community needs, rather than merely follow any old curriculum while waiting for a "phantom" labour market to claim them
  • "The question we have to begin to ask ourselves is not 'how do we employ all the people who are rendered obsolete by technology', but 'how can we organize a society around something other than employment?'
sebastianklemm

Crypto4Good - 2 views

  •  
    Crypto4Good is a French NGO organizing charity events supported by the French-speaking crypto community. Best Practice: During a 24 hours live event by Crypto4Good + Binance Charity on 19 June 2021, two professional trading teams - Kryll.io & Diabolo.io - leveraged an experimental fund that was collected throughout the French crypto community in the weeks before the event. The two trading teams competed to make the most out of this fund within 24 hours of trading. Finally, both the money fundraised as well as the money sucessfully traded by Kryll.io & Diabolo.io will be given to NGOs in France. In the next weeks the event teams will travel to 5 cities in France: Lille, Paris, Lyon, Nantes, Toulouse, and use all of the donations collected and the money traded to buy as much food and basic necessities as possible. All these products will be donated to social services: https://www.binance.charity/fight-hunger-worldwide
Tiberius Brastaviceanu

Designing the Void | Management Innovation eXchange - 0 views

    • Tiberius Brastaviceanu
       
      This is about self-organization, putting in place bounderies and internal mechanisms to make the the system self-organize into something desirable.  You can see this from a game theory perspective - how to set a game which will drive a specific human behavior. 
    • Tiberius Brastaviceanu
       
      This is about self-organization, putting in place bounderies and internal mechanisms to make the the system self-organize into something desirable.  You can see this from a game theory perspective - how to set a game which will drive a specific human behavior. 
    • Tiberius Brastaviceanu
       
      Very similar to SENSORICA, an environment of entrepreneurs. The argument against this is that not everyone is a risk taker or has initiative. The answer to it is that not every role in the organization requires that. 
    • Tiberius Brastaviceanu
       
      Very similar to SENSORICA, an environment of entrepreneurs. The argument against this is that not everyone is a risk taker or has initiative. The answer to it is that not every role in the organization requires that. 
  • The system is not made up of artifacts but rather an elegantly designed void. He says “I prefer to use the analogy of rescuing an endangered species from extinction, rather than engaging in an invasive breeding program the focus should be on the habitat that supports the species. Careful crafting of the habitat by identifying the influential factors; removing those that are detrimental, together with reinforcing those that are encouraging, the species will naturally re-establish itself. Crafting the habitat is what I mean by designing the void.”
  • ...75 more annotations...
  • It is essential that autonomy is combined with responsibility.
  • staff typically manage the whole work process from making sales, manufacture, accounts, to dispatch
  • they are also responsible for managing their own capitalization; a form of virtual ownership develops. Everything they need for their work, from office furniture to high-end machinery will appear on their individual balance sheet; or it will need to be bought in from somewhere else in the company on a pay-as-you go or lease basis. All aspects of the capital deployed in their activities must be accounted for and are therefore treated with the respect one accords one’s own property.
    • Tiberius Brastaviceanu
       
      So they have a value accounting system, like SENSORICA, where they log "uses" and "consumes". 
    • Tiberius Brastaviceanu
       
      ...
    • Tiberius Brastaviceanu
       
      So they have a value accounting system, like SENSORICA, where they log "uses" and "consumes".  
  • The result is not simply a disparate set of individuals doing their own thing under the same roof. Together they benefit from an economy of scale as well as their combined resources to tackle large projects; they are an interconnected whole. They have in common a brand, which they jointly represent, and also a business management system (the Say-Do-Prove system) - consisting not only of system-wide boundaries but also proprietary business management software which helps each take care of the back-end accounting and administrative processing. The effect is a balance between freedom and constraint, individualism and social process.
  • embodiment of meaning
  • But culture is a much more personal phenomenon
  • Culture is like climate- it does not exist in and of itself- it cannot exist in a vacuum, it must exist within a medium.
  • underlying culture
  • Incompatibility between the presenting culture and the underlying one provide a great source of tension
  • The truth of course is that when tension builds to a critical level it takes just a small perturbation to burst the bubble and the hidden culture reveals itself powered by the considerable pent-up energy.
    • Tiberius Brastaviceanu
       
      SENSORICA had this problem of different cultures, and it caused the 2 crisis in 2014. 
    • Tiberius Brastaviceanu
       
      SENSORICA had this problem of different cultures, and it caused the 2 crisis in 2014. 
  • Consider again the idea that for the health of an endangered species; the conditions in their habitat must be just right. In business, the work environment can be considered analogous to this idea of habitat.
  • A healthy environment is one that provides a blank canvas; it should be invisible in that it allows culture to be expressed without taint
  • The over-arching, high-level obligations are applied to the organization via contractual and legal terms.
  • But it is these obligations that the traditional corporate model separates out into functions and then parcels off to distinct groups. The effect is that a clear sight of these ‘higher’ obligations by the people at the front-end is obstructed. The overall sense of responsibility is not transmitted but gets lost in the distortions, discontinuities and contradictions inherent in the corporate systems of hierarchy and functionalization.
  • employees are individually rewarded for their contribution to each product. They are not “compensated” for the hours spent at work. If an employee wants to calculate their hourly rate, then they are free to do so however, they are only rewarded for the outcome not the duration of their endeavors.
  • Another simplification is the application of virtual accounts (Profit and Loss (P&L) account and Balance Sheet) on each person within the business.
  • The company systems simply provide a mechanism for cheaply measuring the success of each individual’s choices. For quality the measure is customer returns, for delivery it is an on-time-and-in-full metric and profit is expressed in terms of both pounds sterling and ROI (return on investment).
    • Tiberius Brastaviceanu
       
      They have a value accounting system. 
    • Tiberius Brastaviceanu
       
      They have a value accounting system. 
  • The innumerable direct links back to an external reality -like the fragile ties that bound giant Gulliver, seem much more effective at aligning the presenting culture and the underlying embodied culture, and in doing so work to remove the existing tension.
  • With a culture that responds directly to reality, the rules in the environment can be “bounding” rather than “binding”- limiting rather than instructive; this way individual behavior need not be directed at all. The goal is to free the individual to express himself fully through his work, bounded only by the limits of the law. With clever feedback (self-referencing feedback loops) integrated into the design, the individuals can themselves grow to collectively take charge of the system boundaries, culture and even the environment itself, always minded of the inherent risks they are balancing, leaving the law of the land as the sole artificial boundary.
  • the conventional company, which, instead of rewarding enterprise, trains compliance by suppressing individual initiative under layer upon layer of translation tools.
  • apply accountability to the individual not command-and-control.
  • without the divisive and overbearing management cabal the natural reaction of humans is to combine their efforts
  • a new member of staff at Matt Black Systems
  • recruited by another staff member (sponsor) and they will help you learn the basics of the business management system- they will help you get to know the ropes.
  • jobs are passed to new staff members, a royalty payment can be established on the work passed over.
  • Along with that job you will be given a cash float (risk capital), P&L Account, a Balance Sheet and computer software to help plan and record your activities. Your operation is monitored by your sponsor to see if you increase the margin or volume, and so establish a sustainable operation. Training and mentoring is provided to support the steep learning curve - but without removing the responsibility of producing a return on the sponsor’s risk capital.
  • You will, in the meantime be looking to establish some of your own work for which you will not have to pay a commission or royalty to your sponsor and this will provide you with more profitable operations such that eventually you might pass back to the sponsor the original operation, as it has become your lowest margin activity. It will then find its way to a new employee (along with the associated Balance Sheet risk capital) where the process is repeated by the sponsor.[4]
  • Remuneration for staff is calibrated in a way that reflects the balance of different forces around ‘pay’
  • there is an obligation upon the company to pay a minimum wage even if the profitability of the operation does not support this
  • there are therefore two aspects of the basic pay structure: one is “absolute” and reflects the entrepreneurial skill level of the employee according to a sophisticated grading scale
  • A further 20% of the original profit will be paid into his risk capital account, which will be his responsibility to deploy in any way he sees fit as part of his Balance Sheet. Of the three remaining 20% slices of the original profit, one is paid out as corporation tax, another as a dividend to the shareholders and the last retained as collective risk capital on the company’s balance sheet- a war chest so to speak.
  • Julian Wilson and Andrew Holm sell products / services to their staff (such as office space and software) they have an identical customer/supplier relationship with the other employees.
  • Naturally there are some people that can’t generate a profit. The sponsor’s risk capital will eventually be consumed through pay. After a process of rescue and recovery- where their shortcomings are identified and they are given the opportunity to put them right, they either improve or leave, albeit with a sizeable increase in their skills.
  • there is a gradual process of accustomisation; the void of the new employee is surrounded by others dealing with their particular activities, offering both role models and operations they may wish to relinquish. One step at a time the new employee acquires the skills to become completely self-managing, to increase their margins, to make investments, to find new business, to become a creator of their own success. Ultimately, they learn to be an entrepreneur.
  • responsible autonomy as an alternative vision to traditional hierarchy
  • Matt Black Systems it is not simply commitment that they targeted in their employees, rather they aim for the specific human qualities they sum up as magic- those of curiosity, imagination, creativity, cooperation, self-discipline and realization (bringing ideas to reality).
  • a new form of association of individuals working together under the umbrella of a company structure: a kind of collective autonomy
  • The business is called Matt Black Systems, based in Poole in dorset
  • Turning an organisation on its head- removing all management, establishing a P&L account and Balance Sheet on everyone in the organisation and having customers payment go first into the respective persons P&L account has revolutionised this company. 
  • This innovative company’s approach views business success as wholly reliant upon human agency, and its wellspring at the individual level.
  • problem (of unnecessarily high overheads placed on production) that arguably is behind the decline in western manufacturing
  • over-managed business
  • Autonomy Enables Productivity
  • organizational design brings to light the unconscious socio-philosophical paradigm of the society in which it exists, organizational development points to how change occurs.
  • a mechanistic approach to organization
  • scientific management employs rationalism and determinism in pursuit of efficiency, but leaves no place for self-determination for most people within the system.
  • Command and Control
  • today, a really “modern” view of an organization is more likely to be depicted in terms that are akin to an organism.
  • When it comes to getting work done, the simple question is: are people the problem or the solution?
  • the Taylorist approach may be more real in theory than in practice: its instrumentalist view of the workforce is cursed by unintended consequences. When workers have no space for their own creative expression, when they are treated like automata not unique individuals, when they become demotivated and surly, when they treat their work as a necessary evil; this is no recipe for a functional organization.
  • The natural, human reaction to this is unionization, defiance and even outright rebellion; to counter this, management grows larger and more rigid in pursuit of compliance, organizations become top heavy with staff who do not contribute directly to the process of value creation but wield power over those who do.
  • voluntary slavery of ‘wagery’
  • Even when disgruntled employees strike free and start their own businesses they seem unable to resist the hegemony of the conventional command-and-control approach
  • Making the transition involves adherence to a whole new sociology of work with all the challenging social and psychological implications that brings.
  • first principal that people in the business have the ability to provide the solution
  • In the “theory of constraints” the goal is to align front-line staff into a neat, compact line for maximum efficiency. Surely the most considered approach is to have front-line staff self-align in pursuit of their individual goals?
  • The removal of hierarchy and specialization is key to a massive improvement in both profitability and productivity. In summary: there are no managers in the company, or foremen, or sales staff, or finance departments; the company is not functionally compartmentalized and there is no hierarchy of command. In fact every member of staff operates as a virtual micro-business with their own Profit & Loss account and Balance Sheet, they manage their own work and see processes through from end to end
  • Formal interaction between colleagues takes place via “customer and supplier” relationships.
  • autonomy enables productivity
  • if one creates a space in which staff pursue their own goals and are not paid by the hour, they will focus on their activities not the clock; if they are not told what to do, they will need to develop their own initiative; if they are free to develop their own processes, they will discover through their own creative faculties how to work more productively- in pursuit of their goals
  • The human qualities which are of greatest potential value to the business are: curiosity, imagination, creativity, cooperation, self-discipline and realization (bringing ideas to reality)
  • These qualities are the very ones most likely to be withheld by an individual when the environment is ‘wrong’.
  • Any elements in the business environment that undermine the autonomy and purpose of the individual will see the above qualities withheld
  • High on the list of undermining elements come power-hierarchy and over-specialization
  • the responsibility of the individual is formalized, specified and restricted. An improved system is not one where responsibility is distributed perfectly but rather one where there is simply no opportunity for responsibility to be lost (via the divisions between the chunks). Systems must be reorganized so responsibility -the most essential of qualities -is protected and wholly preserved.
  • Matt Black Systems believe this can only be done by containing the whole responsibility within an individual, holding them both responsible and giving them ‘response-ability’
  • The experience of Matt Black Systems demonstrates that radical change is possible
  • productivity is up 300%, the profit margin is up 10%[3], customer perception has shifted from poor to outstanding, product returns are at less than 1%, “on time and in full” delivery is greater than 96%, pay has increased 100%.
  • staff develop broader and deeper skills and feel greater job security; they get direct feedback from their customers which all go to fuel self-confidence and self-esteem.
  • the staff manage themselves
  • “only variety can absorb variety”.
  • What is particular about their story is that behind it is a very consciously crafted design that surrounds the individualism of each person with hard boundaries of the customer, the law and the business. It is these boundaries rather than the instructive persona of ‘the boss’ that gives rise to the discipline in which individuals can develop. Autonomy is not the same as freedom, at least not in the loose sense of ‘do as you please’. An autonomous person is a person who has become self-governing, who has developed a capacity for self-regulation, quite a different notion from the absence of boundaries. Indeed, it is with establishing the right boundaries that the business philosophy is most concerned. The company provides the crucible in which the individual can develop self-expression but the container itself is bounded. Wilson calls this “designing the void”. This crucible is carefully constructed from an all-encompassing, interconnecting set of boundaries that provide an ultimate limit to behaviours (where they would fall foul of the law or take risks with catastrophic potential). It is an illusion to think, as a director of a company, that you are not engaged in a process of social conditioning; the basis of the culture is both your responsibility and the result of your influence. The trick is to know what needs to be defined and what needs to be left open. The traditional authoritarian, controlling characters that often dominate business are the antithesis of this in their drive to fill this void with process, persona and instruction. Alternatively, creating an environment that fosters enterprise, individuals discover how to be enterprising.
Tiberius Brastaviceanu

Key (lock) - Wikipedia, the free encyclopedia - 0 views

  • Key systems
  • Individually keyed system (KD)[edit] With an individually keyed system, each cylinder can be opened by its unique key
  • Keyed alike (KA)[edit] This system allows for a number of cylinders to be operated by the same key. It is ideally suited to residential and commercial applications such as front and back doors.
  • ...10 more annotations...
  • Common entrance suite / Maison keying (CES)[edit] This system is widely used in apartments, office blocks and hotels. Each apartment (for example) has its own individual key which will not open the doors to any other apartments, but will open common entrance doors and communal service areas. It is often combined with a master-keyed system in which the key is kept by the landlord.
  • Master keyed (MK)
  • A master key operates a set of several locks. Usually, there is nothing special about the key itself, but rather the locks into which it will fit.
  • A practical attack exists to create a working master key for an entire system given only access to a single master-keyed lock, its associated change key, a supply of appropriate key blanks, and the ability to cut new keys. This is described in Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks.[36] However, for systems with many levels of master keys, it may be necessary to collect information from locks in different "subsystems" in order to deduce the master key. Locksmiths may also determine cuts for a replacement master key, when given several different key examples from a given system.
  • Control key
  • A control key is a special key used in removable core locking systems. The control key enables a user, who has very little skill, to remove from the core, with a specific combination, and replace it with a core that has a different combination.
  • Do not duplicate key
  • A "do not duplicate" key (or DND key, for short) is one that has been stamped "do not duplicate", "duplication prohibited
  • Restricted key
  • A restricted keyblank has a keyway for which a manufacturer has set up a restricted level of sales and distribution. Restricted keys are often protected by patent, which prohibits other manufacturers from making unauthorized productions of the key blank. In many cases, customers must provide proof of ID before a locksmith will cut additional keys using restricted blanks. Some companies, such as Medeco High Security Locks, have keyways that are restricted to having keys cut in the factory only. This is done to ensure the highest amount of security. These days, many restricted keys have special in-laid features, such as magnets, different types of metal, or even small computer chips to prevent duplication.
Tiberius Brastaviceanu

Co-Creating as Disruption to the Dominant Cultural Framework » Wirearchy - 0 views

  • more open people processes
  • Participative processes like Open Space, World Cafes, Unconferences, Peer Circles
  • Barcamps, Wordcamps, Govcamps, Foo Camps, Unconferences, high-end celebrity-and-marketing-and venture-capital ‘experience’ markets, new cultural and artistic festivals with technology-and-culture-making themes
  • ...45 more annotations...
  • maker faires
  • community-and-consensus building, organizing for activism and fundraising
  • The impetus behind this explosion is both technological and sociological
  • Technological
  • information technology and the creation and evolution of the Internet and the Web
  • appearance, development and evolution of social tools, web services, massive storage, and the ongoing development of computer-and-smart-devices development
  • Sociological
  • People are searching for ways to find others with similar interests and motivations so that they can engage in activities that help them learn, find work, grow capabilities and skills, and tackle vexing social and economic problems
  • get informed and take action
  • Developing familiarity and practice with open and collaborative processes
  • play and work together
  • rules about self-management, operate democratically, and produce results grounded in ownership and the responsibilities that have been agreed upon by the ‘community’
  • The relationships and flows of information can be transferred to online spaces and often benefit from wider connectivity.
  • Today, our culture-making activities are well engaged in the early stages of cultural mutation
  • What’s coming along next ?  “Smart” devices and Internet everywhere in our lives ?  Deep(er) changes to the way things are conceived, carried out, managed and used ?  New mental models ?  Or, will we discover real societal limits to what can be done given the current framework of laws, institutions and established practices with which people are familiar and comfortable ?
  • Shorter cycle-based development and release
  • Agile development
  • It is clear evidence that the developmental and learning dynamics generated by continuous or regular feedback loops are becoming the norm in areas of activity in which change and short cycles of product development are constants.
  • The Internet of Things (IoT)
  • clothes, homes, cars, buildings, roads, and a wide range of other objects that have a place in peoples’ daily life activities
  • experiencing major growth, equally in terms of hardware, software and with respect to the way the capabilities are configured and used
  • The IoT concept is being combined with the new-ish concepts of Open Data and Big Data
  • ethical, political and social impact policy decisions
  • that key opportunities associated with widespread uptake of the IoT are derived from the impact upon peoples’ activities and lives
  • ‘we’ are on our way towards more integrated eco-systems of issues, people and technologies
  • participation and inclusion enabled by interconnectedness are quickly becoming the ‘new rules’
  • What the Future May Hold
  • the ‘scenario planning’ approach
  • world’s politics, economics, anthropology, technology, psychology, sociology and philosophy
  • A scenario planning exercise carried out by the Rockefeller Foundation
  • Clearly these early (and now not-so-weak) signals and patterns tell us that the core assumptions and principles that have underpinned organized human activities for most of the past century
  • are being changed by the combinations and permutations of new, powerful, inexpensive and widely accessible information-processing technologies
  • The short description of each scenario reinforces the perception that we are both individually and collectively in transition from a linear, specialized, efficiency-driven paradigm towards a paradigm based on continuous feedback loops and principles of participation, both large and small in scope.
  • cultural ‘mutation’
  • Wirearchy
  • a dynamic two-way flow of power and authority based on knowledge, trust, credibility and a focus on results, enabled by interconnected people and technology.
  • the role of social media and smart mobile devices in the uprisings in Egypt, Libya and elsewhere in the Middle East
  • The roots of organizational development (OD) are in humanistic psychology and sociology action and ethnographic and cybernetic/ socio-technical systems theory.  It’s a domain that emerged essentially as a counter-balance to the mechanistic and machine-metaphor-based core assumptions about the organized activities in our society.
  • Organizational development principles are built upon some basic assumptions about human motivations, engagement and activities.
  • Participative Work Design – The Six Criteria
  • in recent years created models that help clarify how to evaluate and respond to the continuous turbulence and ambiguity generated by participating in interconnected flows of information.
  • contexts characterized by either Simple, Complicated or Chaotic dynamics (from complexity theory fundamentals). Increasingly, Complexity is emerging as a key definer of the issues, problems and opportunities faced by our societies.
  • peer-to-peer movement(s) unfolding around the world
  • Co-creating in a wide range of forms, processes and purpose may become an effective and important antidote to the spreading enclosure of human creative activity.
  • But .. the dominant models of governance, commercial ownership and the use and re-use of that which is co-created by people are going to have to undergo much more deep change in order to disrupt the existing paradigm of proprietary commercial creation and the model of socio-economic power that this paradigm enables and carries today.
Kurt Laitner

The Link Economy and Creditright - Geeks Bearing Gifts - Medium - 3 views

  • Online, content with no links has no value because it has no audience
  • News Commons used Repost as the basis of a content- and audience-sharing network among dozens of sites big and small in the state’s new ecosystem
  • Huffington Post and Twitter can get thousands of writers — including me — to make content for free because it brings us audience and attention.
  • ...25 more annotations...
  • Consider an alternative to syndication. I’ll call it reverse syndication. Instead of selling my content to you, what say I give it to you for free? Better yet, I pay you to publish it on your site. The condition: I get to put my ad on the content. I will pay you a share of what I earn from that ad based on how much audience you bring me.
  • That model values the creation of the audience
  • If content could travel with its business model attached, we could set it free to travel across the web, gathering recommendations and audience and value as it goes
  • She searched Google for “embeddable article” and up came Repost.us, already created by entrepreneur and technologist John Pettitt. Repost very cleverly allowed embeddable articles to travel with the creator’s own brand, advertising, analytics, and links.
  • First, he found that the overlap in audience between a creator’s and an embedder’s sites generally ran between 2 and 5 percent. That is to say, the embedders brought a mostly new audience to the creator’s content.
  • Instead, Pettitt found that click-through ran amazingly high: 5 to 7 percent — and these were highly qualified clicks of people who knew what they were going to get on the other side of a link
  • I call this creditright. We need a means to attach credit to content for those who contribute value to it so that each constituent has the opportunity to negotiate and extract value along the chain, so that each can gain permission to take part in the chain, and so that behaviors that benefit others in the chain can be rewarded and encouraged
    • Kurt Laitner
       
      so *net basically, or OVN contributory value accounting
  • Each creator’s ads traveled with its content — though that wasn’t necessarily optimal, because an ad for a North Jersey hairdresser wouldn’t perform terribly well with South Jersey readers brought in through embedding.
  • key factor in its failure: Repost could find many sites willing and eager to make their content embeddable. It didn’t find enough sites to embed the content.
  • But the embedders got nothing aside from the free use of content — content that was just a link away anyway
  • Our ultimate problem in media is that we do not have sufficient technical and legal frameworks for alternate business models.
  • That formula was the key insight behind Google: that links to content are a signal of its value; thus, the more links to a page from sites that themselves have more links, the more useful, relevant, or valuable that content is likely to be
  • Silicon Valley’s: Those people are your fans who are bringing value to you by sending you audiences and by contributing their creativity, and you’d be wise to build your businesses around making it easier, not harder, for them to get and share your content when and how they want it.
  • And so, we came to agree that we need new technological and legal frameworks flexible enough to enable multiple models to support creativity.
  • Hollywood’s side: People who download our content without buying it or who remix it without our permission — and the platforms that facilitate these behaviors — are stealing from us and must be stopped and punished.
  • Imagine you are a songwriter. You hear a street poet and her words inspire you to write a song about her, quoting her in the piece. You go to a crowdfunding platform — Kickstarter, Indiegogo, or Patreon — to raise money for you to go into the studio and perform and distribute your song. Another songwriter comes along and remixes it, making a new version and also sampling from others’ songs. Both end up on YouTube and Soundcloud, on iTunes and Google Play. Audience members discover and share the songs. A particularly popular artist shares the remixed version on Twitter and Facebook and it explodes. A label has one of its stars record it. The star appears on TV performing it. A movie studio includes that song in a soundtrack. There are many constituents in that process: the subject, the songwriter, the patrons, the fans, the remixer, the distributor, the label, the star, the show, the studio, and the platforms. Each contributed value.
  • Each may want to recognize value — but not all will want cash. There are other currencies in play: The poet may want credit and fame; the songwriter may want to sell concert tickets; the patrons may want social capital for discovering and supporting a new artist; the remixer may want permission to remix; the platforms may want a cut of sales or of subscription revenue; the show may want audience and advertising; the studio will want a return on its investment and risk.
  • I’ve suggested they would be wiser to seek another currency from Google: data about the users, helping build better services for readers and advertisers and thus better businesses
  • We will need a way to attach metadata to content, recording and revealing its source and the contributions of others in the chain of continuing creation and distribution.
  • We need a marketplace to measure and value their contributions and a means to negotiate rewards and permissions
  • We need payment structures to handle multiple currencies: data as well as money
  • And we need a legal framework to allow the flexible exploration of new models, some of which we cannot yet imagine.
  • It took many more years for society to develop principles of free speech to balance the economic and political interests of those who would attempt to control a new tool of speech.
  • We must reimagine the business of media and news from the first penny, asking where value is created, who contributes to it, where it resides, and how to extract it
  • Thus, we need new measures of value
Tiberius Brastaviceanu

Business models for Open Hardware - 1 views

  • guidelines for the development and evaluation of licenses for Open Source Hardware
  • Open Hardware is “a term for tangible artifacts — machines, devices, or other physical things — whose design has been released to the public in such a way that anyone can make, modify, distribute, and use those things“.
  • Open Hardware is derivative: here a fork is the rule, not the exception.
  • ...35 more annotations...
  • hardware hacking community
  • overviews of Open Hardware can be found on Make Magazine’s Blog, MIT Technology Review, Computerworld, O’Reilly Radar.
  • Lists of existing Open Hardware projects can be found on the GOpen Hardware 2009 website, on the P2P Foundation website (here and here), on Make Magazine’s Blog, Open Innovation Projects and Open Knowledge Foundation.
  • 4 possible levels of Openness in Open Hardware projects,
  • by SparkFun Electronics (USA)
  • Open Interface
  • Open Design
  • Open Implementation
  • Arduino
  • most popular Open Hardware project
  • open-source electronics prototyping platform based on flexible, easy-to-use hardware and software
  • ommercially produced
  • Most of Arduino official boards are manufactured by SmartProjects in Italy.
  • Arduino brand name
  • Gravitech (USA).
  • starting point
  • Closed
  • ecosystem
  • community
  • mature and simple
  • Creative Commons license
  • produce
  • redesign
  • sell boards
  • you just have to credit the original Arduino group and use the same CC license
  • without paying a license fee or even ask permission
  • the name Arduino
  • is trademarked
  • cheap and durable enough
  • two different business model
  • sharing open hardware to sell expertise, knowledge and custom services and projects around it;
  • hardware is becoming a commodity
  • selling the hardware but trying to keep ahead of competition with better products
  • companies that are selling open source hardware
  • the open source hardware community to reach $ 1 billion by 2015
Tiberius Brastaviceanu

Boundaryless - 3 views

  •  
    Dig this source, Simone Cicero is involved, must be full of info !
  •  
    They work under the Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) license. it says everywhere that their material is OS but I can't seem to bae able to find it.
  •  
    Create open-source frameworks for platform design and entrepreneurial organization development: we support a global community of organizations, institutions, and individuals through workshops, training, and consulting services.
« First ‹ Previous 81 - 96 of 96
Showing 20 items per page