Skip to main content

Home/ Sensorica Knowledge/ Group items tagged software

Rss Feed Group items tagged

Tiberius Brastaviceanu

Beyond Blockchain: Simple Scalable Cryptocurrencies - The World of Deep Wealth - Medium - 0 views

  • I clarify the core elements of cryptocurrency and outline a different approach to designing such currencies rooted in biomimicry
  • This post outlines a completely different strategy for implementing cryptocurrencies with completely distributed chains
  • Rather than trying to make one global, anonymous, digital cash
  • ...95 more annotations...
  • we are interested in the resilience that comes from building a rich ecosystem of interoperable currencies
  • What are the core elements of a modern cryptocurrency?
  • Digital
  • Holdings are electronic and only exist and operate by virtue of a community’s agreement about how to interpret digital bits according to rules about operation and accounting of the currency.
  • Trustless
  • don’t have to trust a 3rd party central authority
  • Decentralized
  • Specifically, access, issuance, transaction accounting, rules & policies, should be collectively visible, known, and held.
  • Cryptographic
  • This cryptographic structure is used to enable a variety of people to host the data without being able to alter it.
  • Identity
  • there must be a way to associate these bits with some kind of account, wallet, owner, or agent who can use them
  • Other things that many take for granted in blockchains may not be core but subject to decisions in design and implementation, so they can vary between implementations
  • It does not have to be stored in a synchronized global ledger
  • does not have to be money. It may be a reputation currency, or data used for identity, or naming, etc
  • Its units do not have to be cryptographic tokens or coins
  • It does not have to protect the anonymity of users, although it may
  • if you think currency is only money, and that money must be artificially scarce
  • Then you must tackle the problem of always tracking which coins exist, and which have been spent. That is one approach — the one blockchain takes.
  • You might optimize for anonymity if you think of cryptocurrency as a tool to escape governments, regulations, and taxes.
  • if you want to establish and manage membership in new kinds of commons, then identity and accountability for actions may turn out to be necessary ingredients instead of anonymity.
  • In the case of the MetaCurrency Project, we are trying to support many use cases by building tools to enable a rich ecosystem of communities and current-sees (many are non-monetary) to enhance collective intelligence at all scales.
  • Managing consensus about a shared reality is a central challenge at the heart of all distributed computing solutions.
  • If we want to democratize money by having cryptocurrencies become a significant and viable means of transacting on a daily basis, I believe we need fundamentally more scalable approaches that don’t require expensive, dedicated hardware just to participate.
  • We should not need system wide consensus for two people to do a transaction in a cryptocurrency
  • Blockchain is about managing a consensus about what was “said.” Ceptr is about distributing a consensus about how to “speak.”
  • how nature gets the job done in massively scalable systems which require coordination and consistency
  • Replicate the same processes across all nodes
  • Empower every node with full agency
  • Hold this transformed state locally and reliably
  • Establish protocols for interaction
  • Each speaker of a language carries the processes to understand sentences they hear, and generate sentences they need
  • we certainly don’t carry some kind of global ledger of everything that’s ever been said, or require consensus about what has been said
  • Language IS a communication protocol we learn by emulating the processes of usage.
  • Dictionaries try to catch up when the usage
  • there is certainly no global ledger with consensus about the state of trillions of cells. Yet, from a single zygote’s copy of DNA, our cells coordinate in a highly decentralized manner, on scales of trillions, and without the latency or bottlenecks of central control.
  • Imagine something along the lines of a Java Virtual Machine connected to a distributed version of Github
  • Every time this JVM runs a program it confirms the hash of the code it is about to execute with the hash signed into the code repository by its developers
  • This allows each node that intends to be honest to be sure that they’re running the same processes as everyone else. So when two parties want to do a transaction, and each can have confidence their own code, and the results that your code produces
  • Then you treat it as authoritative and commit it to your local cryptographically self-validating data store
  • Allowing each node to treat itself as a full authority to process transactions (or interactions via shared protocols) is exactly how you empower each node with full agency. Each node runs its copy of the signed program/processes on its own virtual machine, taking the transaction request combined with the transaction chains of the parties to the transaction. Each node can confirm their counterparty’s integrity by replaying their transactions to produce their current state, while confirming signatures and integrity of the chain
  • If both nodes are in an appropriate state which allows the current transaction, then they countersign the transaction and append to their respective chains. When you encounter a corrupted or dishonest node (as evidenced by a breach of integrity of their chain — passing through an invalid state, broken signatures, or broken links), your node can reject the transaction you were starting to process. Countersigning allows consensus at the appropriate scale of the decision (two people transacting in this case) to lock data into a tamper-proof state so it can be stored in as many parallel chains as you need.
  • When your node appends a mutually validated and signed transaction to its chain, it has updated its local state and is able to represent the integrity of its data locally. As long as each transaction (link in the chain) has valid linkages and countersignatures, we can know that it hasn’t been tampered with.
  • If you can reliably embody the state of the node in the node itself using Intrinsic Data Integrity, then all nodes can interact in parallel, independent of other interactions to maximize scalability and simultaneous processing. Either the node has the credits or it doesn’t. I don’t have to refer to a global ledger to find out, the state of the node is in the countersigned, tamper-proof chain.
  • Just like any meaningful communication, a protocol needs to be established to make sure that a transaction carries all the information needed for each node to run the processes and produce a new signed and chained state. This could be debits or credits to an account which modify the balance, or recoding courses and grades to a transcript which modify a Grade Point Average, or ratings and feedback contributing to a reputation score, and so on.
  • By distributing process at the foundation, and leveraging Intrinsic Data Integrity, our approach results in massive improvements in throughput (from parallel simultaneous independent processing), speed, latency, efficiency, and cost of hardware.
  • You also don’t need to incent people to hold their own record — they already want it.
  • Another noteworthy observation about humans, cells, and atoms, is that each has a general “container” that gets configured to a specific use.
  • Likewise, the Receptors we’ve built are a general purpose framework which can load code for different distributed applications. These Receptors are a lightweight processing container for the Ceptr Virtual Machine Host
  • Ceptr enables a developer to focus on the rules and transactions for their use case instead of building a whole framework for distributed applications.
  • how units in a currency are issued
  • Most people think that money is just money, but there are literally hundreds of decisions you can make in designing a currency to target particular needs, niches, communities or patterns of flow.
  • Blockchain cryptocurrencies are fiat currencies. They create tokens or coins from nothing
  • These coins are just “spoken into being”
  • the challenging task of
  • ensure there is no counterfeiting or double-spending
  • Blockchain cryptocurrencies are fiat currencies
  • These coins are just “spoken into being”
  • the challenging task of tracking all the coins that exist to ensure there is no counterfeiting or double-spending
  • You wouldn’t need to manage consensus about whether a cryptocoin is spent, if your system created accounts which have normal balances based on summing their transactions.
  • In a mutual credit system, units of currency are issued when a participant extends credit to another user in a standard spending transaction
  • Alice pays Bob 20 credits for a haircut. Alice’s account now has -20, and Bob’s has +20.
  • Alice spent credits she didn’t have! True
  • Managing the currency supply in a mutual credit system is about managing credit limits — how far people can spend into a negative balance
  • Notice the net number units in the system remains zero
  • One elegant approach to managing mutual credit limits is to set them based on actual demand.
  • concerns about manufacturing fake accounts to game credit limits (Sybil Attacks)
  • keep in mind there can be different classes of accounts. Easy to create, anonymous accounts may get NO credit limit
  • What if I alter my code to give myself an unlimited credit limit, then spend as much as I want? As soon as you pass the credit limit encoded in the shared agreements, the next person you transact with will discover you’re in an invalid state and refuse the transaction.
  • If two people collude to commit an illegal transaction by both hacking their code to allow a normally invalid state, the same still pattern still holds. The next person they try to transact with using untampered code will detect the problem and decline to transact.
  • Most modern community currency systems have been implemented as mutual credit,
  • Hawala is a network of merchants and businessmen, which has been operating since the middle ages, performing money transfers on an honor system and typically settling balances through merchandise instead of transferring money
  • Let’s look at building a minimum viable cryptocurrency with the hawala network as our use case
  • To minimize key management infrastructure, each hawaladar’s public key is their address or identity on the network. To join the network you get a copy of the software from another hawaladar, generate your public and private keys, and complete your personal profile (name, location, contact info, etc.). You call, fax, or email at least 10 hawaladars who know you, and give them your IP address and ask them to vouch for you.
  • Once 10 other hawaladars have vouched for you, you can start doing other transactions because the protocol encoded in every node will reject a transaction chain that doesn’t start with at least 10 vouches
  • seeding your information with those other peers so you can be found by the rest of the network.
  • As described in the Mutual Credit section, at the time of transaction each party audits the counterparty’s transaction chain.
  • Our hawala crypto-clearinghouse protocol has two categories of transactions: some used for accounting and others for routing. Accounting transactions change balances. Routing transactions maintain network integrity by recording information about hawaladar
  • Accounting Transactions create signed data that changes account balances and contains these fields:
  • The final hash of all of the above fields is used as a unique transaction ID and is what each of party signs with their private keys. Signing indicates a party has agreed to the terms of the transaction. Only transactions signed by both parties are considered valid. Nodes can verify signatures by confirming that decryption of the signature using the public key yields a result which matches the transaction ID.
  • Routing Transactions sign data that changes the peers list and contain these fields:
  • As with accounting transactions, the hash of the above fields is used as the transaction’s unique key and the basis for the cryptographic signature of both counterparties.
  • Remember, instead of making changes to account balances, routing transactions change a node’s local list of peers for finding each other and processing.
  • a distributed network of mutual trust
  • operates across national boundaries
  • everyone already keeps and trusts their own separate records
  • Hawaladars are not anonymous
  • “double-spending”
  • It would be possible for someone to hack the code on their node to “forget” their most recent transaction (drop the head of their chain), and go back to their previous version of the chain before that transaction. Then they could append a new transaction, drop it, and append again.
  • After both parties have signed the agreed upon transaction, each party submits the transaction to separate notaries. Notaries are a special class of participant who validate transactions (auditing each chain, ensuring nobody passes through an invalid state), and then they sign an outer envelope which includes the signatures of the two parties. Notaries agree to run high-availability servers which collectively manage a Distributed Hash Table (DHT) servicing requests for transaction information. As their incentive for providing this infrastructure, notaries get a small transaction fee.
  • This approach introduces a few more steps and delays to the transaction process, but because it operates on independent parallel chains, it is still orders of magnitude more efficient and decentralized than reaching consensus on entries in a global ledger
  • millions of simultaneous transactions could be getting processed by other parties and notaries with no bottlenecks.
  • There are other solutions to prevent nodes from dropping the head of their transaction chain, but the approach of having notaries serve out a DHT solves a number of common objections to completely distributed accounting. Having access to reliable lookups in a DHT provides a similar big picture view that you get from a global ledger. For example, you may want a way to look up transactions even when the parties to that transaction are offline, or to be able to see the net system balance at a particular moment in time, or identify patterns of activity in the larger system without having to collect data from everyone individually.
  • By leveraging Intrinsic Data Integrity to run numerous parallel tamper-proof chains you can enable nodes to do various P2P transactions which don’t actually require group consensus. Mutual credit is a great way to implement cryptocurrencies to run in this peered manner. Basic PKI with a DHT is enough additional infrastructure to address main vulnerabilities. You can optimize your solution architecture by reserving reserve consensus work for tasks which need to guarantee uniqueness or actually involve large scale agreement by humans or automated contracts.
  • It is not only possible, but far more scalable to build cryptocurrencies without a global ledger consensus approach or cryptographic tokens.
  •  
    Article written by Arthur Brook, founder of Metacurrency project and of Ceptr.
Tiberius Brastaviceanu

Design Like No One Is Patenting - How SparkFun Stays Ahead of the Pack - 0 views

  • Electronics supplier SparkFun designs dozens of products a year and they haven’t patented a single one. It’s worked out pretty well so far.
  • makes its living by shipping kits and components like bread boards, servo motors and Arduino parts to a mixture of students, hobbyists, and professionals making prototypes
  • the company has made its name is in a stable of its own custom parts and kits, the designs for which it gives away for free.
  • ...40 more annotations...
  • “We find that people will copy your design no matter what you do,” she says. “You might as well just play the game and go ahead and innovate. It’s fun, it keeps us on our toes.”
  • “The open source model just forces us to innovate,” says Boudreaux.
  • the open hardware model means that SparkFun’s existence depends not on any particular product, but on an ongoing relationship with customers that’s not too dissimilar to the loyalty commanded by a fashion house.
  • wolf of obsolescence is always at electronics’ door
  • don’t spend much time worrying about the copyists, they just keep releasing new looks
  • it’s about staying relevant and filling the needs of the community
  • SparkFun’s rapid turnover model is one that echoes the fashion industry.
  • keep their service exemplary
  • listening to their customers
  • developed a community of loyal users and fans
  • weekly new product posts
  • You can learn a lot about what a company cares about by looking at what they give away and what they protect.
  • SparkFun’s actual value is in the community of fans and loyal customers that keep coming back, and the expertise under its roof in servicing their needs.
  • Their catalog has about 2,500 items at any given time
  • SparkFun orders parts from 500 suppliers
  • 15 new products every week
  • hey retire products at a similar rate, due to either low sales, or obsolescence
  • Of the 2,500 items, about 400 are things designed internally.
  • To handle the pace of change, SparkFun needs to keep its inventory lean.
  • “We try to do small runs and order in small quantities. Especially something that’s going to be obsolete quickly.”
  • To help manage the demand, they use an in-house software system
  • along with inventory and CMS management, tries to predict demand for different components and ensure they get ordered with sufficient lead time to account for how long it takes to get there.
  • the innovation (revisions and new releases) here at SparkFun is organic and not planned,” says Boudreaux, “But we do a few things to make sure we are keeping up.”
  • monitors all costumer feedback from emails to the comment section that is present on every page of the company’s site. They also ensure that team members have time to tinker in the office, write tutorials, and visit hackerspaces and maker events. “For us, designing (and revising) widgets is the job.”
  • anyone in the company can suggest ideas and contribute designs.
  • ideas run through an internal process of design, review, prototyping, testing and release.
  • “They eat these products up, even if the products are not ready for the mainstream & educator community due to minimal documentation or stability.”
  • symbiotic relationship with these early adopters, where feedback helps SparkFun revised and improve products for use by the rest of the community
  • I don’t think they help much
  • The risk of this rate of change is that SparkFun can end up outpacing some of their customers.
  • “There’s balance in everything,” says Boudreaux, “Innovation does not necessarily need speed in order to create valuable change. Sometimes innovation works at a slower pace, but that does not mean it is any less valuable to those that benefit from it, and we are constantly balancing the needs of two very different customers.”
  • unprotected and unencumbered by patents
  • racing to get the latest, coolest things in the hands of its customers.
  • patents
  • “We have to be willing to kill ideas that don’t work, take a lot of tough criticism, and move fast. If we stay agile, we stay relevant.”
  • cost $30,000 to $50,000
  • USPTO is so backed up you’ll have to wait three to five years to even hear back on their decision.
  • how much does technology change in five years?
  • company’s blog where they’ve been documenting production and business practices for years.
  • they even want to open source Sparkle. “It’s a wild ride,” she says, “but a fun one for sure.”
  •  
    shared by Jonathan, annotated by Tibi
Tiberius Brastaviceanu

Partner State - P2P Foundation - 0 views

    • Tiberius Brastaviceanu
       
      we call this a custodian
    • Tiberius Brastaviceanu
       
      we call this a custodian
  • So here we have it, the new triarchy: - The state, with its public property and representative mechanisms of governance (in the best scenario) - The private sector, with the corporation and private property - The commons, with the Trust (or the for-benefit association), and which is the ‘property’ of all its members (not the right word in the context of the commons, since it has a different philosophy of ownership)
    • Tiberius Brastaviceanu
       
      so where is direct democracy in all this?
  • ...39 more annotations...
  • In a first phase, the commons simply emerges as an added alternative.
  • becoming a subsector of society, and starts influencing the whole
  • phase transition and transformation will need to occur.
  • how a commons-dominated, i.e. after the phase transition, society would look like.
  • At its core would be a collection of commons, represented by trusts and for-benefit associations, which protect their common assets for the benefit of present and future generations
  • The commons ‘rents out’ the use of its resources to entrepreneurs. In other words, business still exists, though infinite growth-based capitalism does not.
  • More likely is that the corporate forms will be influenced by the commons and that profit will be subsumed to other goals, that are congruent with the maintenance of the commons.
  • The state will still exist, but will have a radically different nature
  • Much of its functions will have been taken over by commons institutions, but since these institutions care primarily about their commons, and not the general common good, we will still need public authorities that are the guarantor of the system as a whole, and can regulate the various commons, and protect the commoners against possible abuses. So in our scenario, the state does not disappear, but is transformed, though it may greatly diminish in scope, and with its remaining functions thoroughly democratized and based on citizen participation.
  • In our vision, it is civil-society based peer production, through the Commons, which is the guarantor of value creation by the private sector, and the role of the state, as Partner State, is to enable and empower the creation of common value. The new peer to peer state then, though some may see that as a contradictio in terminis, is a state which is subsumed under the Commons, just as it is now under the private sector. Such a peer to peer state, if we are correct, will have a much more modest role than the state under a classic state society, with many of its functions taken over by civil society associations, interlinked in processes of global governance. The above then, this triarchy, is the institutional core which replaces the dual private-public binary system that is characteristic of the capitalist system that is presently the dominant format.
  • fundamental mission is to empower direct social-value creation, and to focus on the protection of the Commons sphere as well as on the promotion of sustainable models of entrepreneurship and participatory politics
  • the state becomes a 'partner state' and enables autonomous social production.
  • the state does exist, and I believe that we can’t just imagine that we live in a future state-less society
  • retreating from the binary state/privatization dilemma to the triarchical choice of an optimal mix amongst government regulation, private-market freedom and autonomous civil-society projects
  • the role of the state
  • “the peer production of common value requires civic wealth and strong civic institutions.
  • trigger the production/construction of new commons by - (co-) management of complexe resource systems which are not limited to local boundaries or specific communities (as manager and partner) - survey of rules (chartas) to care for the commons (mediator or judge) - kicking of or providing incentives for commoners governing their commons - here the point is to design intelligent rules which automatically protect the commons, like the GPL does (facilitator)"
  • the emergence of the digital commons. It is the experience of creating knowledge, culture, software and design commons, by a combination of voluntary contributions, entrepreneurial coalitions and infrastructure-protecting for-benefit associations, that has most tangibly re-introduced the idea of commons, for all to use without discrimination, and where all can contribute. It has drastically reduced the production, distribution, transaction and coordination costs for the immaterial value that is at the core also of all what we produce physically, since that needs to be made, needs to be designed. It has re-introduced communing as a mainstream experience for at least one billion internet users, and has come with proven benefits and robustness that has outcompeted and outcooperated its private rivals. It also of course offers new ways to re-imagine, create and protect physical commons.
  • stop enclosures
  • peer to peer, i.e. the ability to freely associate with others around the creation of common value
  • communal shareholding, i.e. the non-reciprocal exchange of an individual with a totality. It is totality that we call the commons.
  • It is customary to divide society into three sectors, and what we want to show is how the new peer to peer dynamic unleashed by networked infrastructures, changes the inter-relationship between these three sectors.
  • In the current ‘cognitive capitalist’ system, it is the private sector consisting of enterprises and businesses which is the primary factor, and it is engaged in competitive capital accumulation. The state is entrusted with the protection of this process. Though civil society, through the citizen, is in theory ‘sovereign’, and chooses the state; in practice, both civil society and the state are under the domination of the private sector.
  • it fulfills three contradictory functions
  • Of course, this is not to say that the state is a mere tool of private business.
  • protect the whole system, under the domination of private business
  • protector of civil society, depending on the balance of power and achievements of social movements
  • protector of its own independent interests
  • Under fascism, the state achieves great independence from the private sector , which may become subservient to the state. Under the welfare state, the state becomes a protector of the social balance of power and manages the achievements of the social movement; and finally, under the neoliberal corporate welfare state, or ‘market state’, it serves most directly the interests of the financial sector.
  • key institutions and forms of property.
  • The state managed a public sector, under its own property.
  • The private sector , under a regime of private ownership, is geared to profit, discounts social and natural externalities, both positive and negative, and uses its dominance in society to use and dominate the state.
  • civil society has a relative power as well, through its capability of creating social movements and associations
  • Capitalism has historically been a pendulum between the private and the public sector
  • However, this configuration is changing,
  • the endangerment of the biosphere through the workings of ‘selfish’ market players; the second is the role of the new digital commons.
  • participatory politics
  • Peer production gives us an advance picture of how a commons-oriented society would look like. At its core is a commons and a community contributing to it, either voluntarily, or as paid entrepreneurial employees. It does this through collaborative platforms using open standards. Around the commons emerges enterprises that create added value to operate on the marketplace, but also help the maintenance and the expansion of the commons they rely on. A third partner are the for-benefit associations that maintain the infrastructure of cooperation. Public authorities could play a role if they wanted to support existing commons or the creation of new commons, for the value they bring to society.
  • if a commons is not created as in the case of the digital commons, it is something that is inherited from nature or former generations, given in trust and usufruct, so that it can be transmitted to our descendents. The proper institution for such commons is therefore the trust, which is a corporate form that cannot touch its principal capital, but has to maintain it.
Tiberius Brastaviceanu

Access control - Wikipedia, the free encyclopedia - 0 views

  • The act of accessing may mean consuming, entering, or using.
  • Permission to access a resource is called authorization.
  • Locks and login credentials are two analogous mechanisms of access control.
  • ...26 more annotations...
  • Geographical access control may be enforced by personnel (e.g., border guard, bouncer, ticket checker)
  • n alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country
  • access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons
  • can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap.
  • Physical access control is a matter of who, where, and when
  • Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.[citation needed] Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked
  • When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked.
  • Access control system operation
  • The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input
  • There are three types (factors) of authenticating information:[2] something the user knows, e.g. a password, pass-phrase or PIN something the user has, such as smart card or a key fob something the user is, such as fingerprint, verified by biometric measurement
  • Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios
  • Credential
  • A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a biometric feature) or some combination of these items. This is known as multi-factor authentication. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.
  • An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list
  • monitor the door position
  • Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the doo
  • Access control topology
  • Access control decisions are made by comparing the credential to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the look-up out from a central host to the edge of the system, or the reader. The predominant topology circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks
  • Access control readers may be classified by the functions they are able to perform
  • and forward it to a control panel.
  • Basic (non-intelligent) readers: simply read
  • Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus.
  • Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers.
  • Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host
  • a built in webservice to make it user friendly
  • Some readers may have additional features such as an LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support
Kurt Laitner

Towards a Material Commons | Guerrilla Translation! - 0 views

  • the modes of communication we use are very tightly coupled with the modes of production that finance them
  • I’m focused on the policy formation around this transition to a new, open knowledge and commons-based economy, and that’s the research work I’m doing here
  • The problem is I can only make a living by still working for capital.
  • ...88 more annotations...
  • We now have a technology which allows us to globally scale small group dynamics, and to create huge productive communities, self-organized around the collaborative production of knowledge, code, and design. But the key issue is that we are not able to live from that, right
  • A lot of co-ops have been neo-liberalizing, as it were, have become competitive enterprises competing against other companies but also against other co-ops, and they don’t share their knowledge
  • We cannot create our own livelihood within that sphere
  • instead of having a totally open commons, which allows multinationals to use our commons and reinforce the system of capital, the idea is to keep the accumulation within the sphere of the commons.
  • The result would be a type of open cooperative-ism, a kind of synthesis or convergence between peer production and cooperative modes of production
  • then the material work, the work of working for clients and making a livelihood, would be done through co-ops
  • But it hasn’t had much of a direct connection to this emerging commons movement, which shares so many of the values and  principles of the traditional cooperative movement.
  • There’s also a lot of peer-to-peer work going on, but it’s not very well versed around issues like cooperative organization, formal or legal forms of ownership, which are based on reciprocity and cooperation, and how to interpret the commons vision with a structure, an organizational structure and a legal structure that actually gives it economic power, market influence, and a means of connecting it to organizational forms that have durability over the long-term.
  • The young people, the developers in open source or free software, the people who are in co-working centers, hacker spaces, maker spaces. When they are thinking of making a living, they think startups
  • They have a kind of generic reaction, “oh, let’s do a startup”, and then they look for venture funds. But this is a very dangerous path to take
  • Typically, the venture capital will ask for a controlling stake, they have the right to close down your start up whenever they feel like it, when they feel that they’re not going to make enough money
  • Don’t forget that with venture capital, only 1 out of 10 companies will actually make it, and they may be very rich, but it’s a winner-take-all system
  • we don’t have what Marx used to call social reproduction
  • I would like John to talk about the solidarity co-ops, and how that integrates the notion of the commons or the common good in the very structure of the co-op
  • They don’t have a commons of design or code, they privatize and patent, just like private competitive enterprise, their knowledge
  • Cooperatives, which are basically a democratic and collective form of enterprise where members have control rights and democratically direct the operations of the co-op, have been the primary stakeholders in any given co-op – whether it’s a consumer co-op, or a credit union, or a worker co-op.
  • Primarily, the co-op is in the service of its immediate members
  • What was really fascinating about the social co-ops was that, although they had members, their mission was not only to serve the members but also to provide service to the broader community
  • In the city of Bologna, for example, over 87% of the social services provided in that city are provided through contract with social co-ops
  • democratically run
  • much more participatory, and a much more engaged model
  • The difference, however, is that the structure of social co-ops is still very much around control rights, in other words, members have rights of control and decision-making within how that organization operates
  • And it is an incorporated legal structure that has formal recognition by the legislation of government of the state, and it has the power, through this incorporated power, to negotiate with and contract with government for the provision of these public services
  • In Québec they’re called Solidarity co-ops
  • So, the social economy, meaning organizations that have a mutual aim in their purpose, based on the principles of reciprocity, collective benefit, social benefit, is emerging as an important player for the design and delivery of public services
  • This, too, is in reaction to the failure of the public market for provision of services like affordable housing or health care or education services
  • This is a crisis in the role of the state as a provider of public services. So the question has emerged: what happens when the state fails to provide or fulfill its mandate as a provider or steward of public goods and services, and what’s the role of civil society and the social economy in response?
  • we have commonses of knowledge, code and design. They’re more easily created, because as a knowledge worker, if you have access to the network and some means, however meager, of subsistence, through effort and connection you can actually create knowledge. However, this is not the case if you move to direct physical production, like the open hardware movement
  • I originally encountered Michel after seeing some talks by Benkler and Lessig at the Wizard of OS 4, in 2006, and I wrote an essay criticizing that from a materialist perspective, it was called “The creative anti-commons and the poverty of networks”, playing on the terms that both those people used.
  • In hardware, we don’t see that, because you need to buy material, machines, plastic, metal.
  • Some people have called the open hardware community a “candy” economy, because if you’re not part of these open hardware startups, you’re basically not getting anything for your efforts
  • democratic foundations like the Apache foundation
  • They conceive of peer production, especially Benkler, as being something inherently immaterial, a form of production that can only exist in the production of immaterial wealth
  • From my materialist point of view, that’s not a mode of production, because a mode of production must, in the first place, reproduce its productive inputs, its capital, its labor, and whatever natural wealth it consumes
  • From a materialist point of view, it becomes  obvious that the entire exchange value produced in these immaterial forms would be captured by the same old owners of materialist wealth
  • different definition of peer production
  • independent producers collectively sharing a commons of productive assets
  • I wanted to create something like a protocol for the formation and allocation of physical goods, the same way we have TCP/IP and so forth, as a way to allocate immaterial goods
  • share and distribute and collectively create immaterial wealth, and become independent producers based on this collective commons.
  • One was the Georgist idea of using rent, economic rent, as a fundamental mutualizing source of wealth
  • Mutualizing unearned income
  • So, the unearned income, the portion of income derived from ownership of productive assets is evenly distributed
  • This protocol would seek to normalize that, but in a way that doesn’t require administration
  • typical statist communist reaction to the cooperative movement is saying that cooperatives can exclude and exploit one another
  • But then, as we’ve seen in history, there’s something that develops called an administrative class,  which governs over the collective of cooperatives or the socialist state, and can become just as counterproductive and often exploitive as capitalist class
  • So, how do we create cooperation among cooperatives, and distribution of wealth among cooperatives, without creating this administrative class?
  • This is why I borrowed from the work of Henry George and Silvio Gesell in created this idea of rent sharing.
  • This is not done administratively, this is simply done as a protocol
  • The idea is that if a cooperative wants an asset, like, an example is if one of the communes would like to have a tractor, then essentially the central commune is like a bond market. They float a bond, they say I want a tractor, I am willing to pay $200 a month for this tractor in rent, and other members of the cooperative can say, hey, yeah, that’s a good idea,we think that’s a really good allocation of these productive assets, so we are going to buy these bonds. The bond sale clears, the person gets the tractor, the money from the rent of the tractor goes back to clear the bonds, and  after that, whatever further money is collected through the rent on this tractor – and I don’t only mean tractors, same would be applied to buildings, to land, to any other productive assets – all this rent that’s collected is then distributed equally among all of the workers.
  • The idea is that people earn income not only by producing things, but by owning the means of production, owning productive assets, and our society is unequal because the distribution of productive assets is unequal
  • This means that if you use your exact per capita share of property, no more no less than what you pay in rent and what you received in social dividend, will be equal
  • But if you’re not working at that time, because you’re old, or otherwise unemployed, then obviously the the productive assets that you will be using will be much less than the mean and the median, so what you’ll receive as dividend will be much more than what you pay in rent, essentially providing a basic income
  • venture communism doesn’t seek to control the product of the cooperatives
  • It doesn’t seek to limit, control, or even tell them how they should distribute it, or under what means; what they produce is entirely theirs, it’s only the collective management of the commons of productive assets
  • On paper this would seem to work, but the problem is that this assumes that we have capital to allocate in this way, and that is not the case for most of the world workers
  • how do we get to that stage?
  • other two being counter politics and insurrectionary finance
  • do we express our activism through the state, or do we try to achieve our goals by creating the alternative society outside
  • pre-figurative politics, versus statist politics
  • My materialist background tells me that when you sell your labor on the market, you have nothing more than your subsistence costs at the end of it, so where is this wealth meant to come from
  • I believe that the only reason that we have any extra wealth beyond subsistence is because of organized social political struggle; because we have organized in labor movements, in the co-op movement, and in other social forms
  • To create the space for prefiguring presupposes engagement with the state, and struggle within parliaments, and struggle within the public social forum
  • Instead, we should think that no, we must engage in the state in order to protect our ability to have alternative societies
  • We can only get rid of the state in these areas once we have alternative, distributed, cooperative means to provide those same functions
  • We can only eliminate the state from these areas once they actually exist, which means we actually have to build them
  • What I mean by insurrectionary finance is that we have to acknowledge that it’s not only forming capital and distributing capital, it’s also important how intensively we use capital
  • I’m not proposing that the cooperative movement needs to engage in the kind of derivative speculative madness that led to the financial crisis, but at the same time we can’t… it can’t be earn a dollar, spend a dollar
  • We have to find ways to create liquidity
  • to deal with economic cycles
  • they did things the organized left hasn’t been able to do, which is takeover industrial means of production
  • if they can take over these industrial facilities, just in order to shut them down and asset strip them, why can’t we take them over and mutualize them?
  • more ironic once you understand that the source of investment that Milken and his colleagues were working with were largely workers pension funds
  • idea of venture communism
  • pooling, based on the capture of unearned income
  • in Québec, there is a particular form of co-op that’s been developed that allows small or medium producers to pool their capital to purchase machinery and to use it jointly
  • The other idea I liked was trying to minimize a management class
  • much more lean and accountable because they are accountable to boards of directors that represent the interests of the members
  • I’ve run into this repeatedly among social change activists who immediately recoil at the notion of thinking about markets and capital, as part of their change agenda
  • I had thought previously, like so many, that economics is basically a bought discipline, and that it serves the interests of existing elites. I really had a kind of reaction against that
  • complete rethinking of economics
  • recapture the initiative around vocabulary, and vision, with respect to economics
  • reimagining and reinterpreting, for a popular and common good, the notion of market and capital
  • advocating for a vision of social change that isn’t just about politics, and isn’t just about protest, it has to be around how do we reimagine and reclaim economics
  • markets actually belong to communities and people
  • capital wasn’t just an accumulated wealth for the rich
  • I think what we’re potentially  talking about here is to make the social economy hyper-productive, hyper-competitive, hyper-cooperative
  • The paradox is that capital already knows this. Capital is investing in these peer production projects
  • Part of the proposal of the FLOK society project in Ecuador will be to get that strategic reorganization to make the social economy strategic
  •  
    A lot of really interesting points of discussion in here.
Tiberius Brastaviceanu

Co-Creating as Disruption to the Dominant Cultural Framework » Wirearchy - 0 views

  • more open people processes
  • Participative processes like Open Space, World Cafes, Unconferences, Peer Circles
  • Barcamps, Wordcamps, Govcamps, Foo Camps, Unconferences, high-end celebrity-and-marketing-and venture-capital ‘experience’ markets, new cultural and artistic festivals with technology-and-culture-making themes
  • ...45 more annotations...
  • maker faires
  • community-and-consensus building, organizing for activism and fundraising
  • The impetus behind this explosion is both technological and sociological
  • Technological
  • information technology and the creation and evolution of the Internet and the Web
  • appearance, development and evolution of social tools, web services, massive storage, and the ongoing development of computer-and-smart-devices development
  • Sociological
  • People are searching for ways to find others with similar interests and motivations so that they can engage in activities that help them learn, find work, grow capabilities and skills, and tackle vexing social and economic problems
  • get informed and take action
  • Developing familiarity and practice with open and collaborative processes
  • play and work together
  • rules about self-management, operate democratically, and produce results grounded in ownership and the responsibilities that have been agreed upon by the ‘community’
  • The relationships and flows of information can be transferred to online spaces and often benefit from wider connectivity.
  • Today, our culture-making activities are well engaged in the early stages of cultural mutation
  • What’s coming along next ?  “Smart” devices and Internet everywhere in our lives ?  Deep(er) changes to the way things are conceived, carried out, managed and used ?  New mental models ?  Or, will we discover real societal limits to what can be done given the current framework of laws, institutions and established practices with which people are familiar and comfortable ?
  • Shorter cycle-based development and release
  • Agile development
  • It is clear evidence that the developmental and learning dynamics generated by continuous or regular feedback loops are becoming the norm in areas of activity in which change and short cycles of product development are constants.
  • The Internet of Things (IoT)
  • clothes, homes, cars, buildings, roads, and a wide range of other objects that have a place in peoples’ daily life activities
  • experiencing major growth, equally in terms of hardware, software and with respect to the way the capabilities are configured and used
  • The IoT concept is being combined with the new-ish concepts of Open Data and Big Data
  • ethical, political and social impact policy decisions
  • that key opportunities associated with widespread uptake of the IoT are derived from the impact upon peoples’ activities and lives
  • ‘we’ are on our way towards more integrated eco-systems of issues, people and technologies
  • participation and inclusion enabled by interconnectedness are quickly becoming the ‘new rules’
  • What the Future May Hold
  • the ‘scenario planning’ approach
  • world’s politics, economics, anthropology, technology, psychology, sociology and philosophy
  • A scenario planning exercise carried out by the Rockefeller Foundation
  • Clearly these early (and now not-so-weak) signals and patterns tell us that the core assumptions and principles that have underpinned organized human activities for most of the past century
  • are being changed by the combinations and permutations of new, powerful, inexpensive and widely accessible information-processing technologies
  • The short description of each scenario reinforces the perception that we are both individually and collectively in transition from a linear, specialized, efficiency-driven paradigm towards a paradigm based on continuous feedback loops and principles of participation, both large and small in scope.
  • cultural ‘mutation’
  • Wirearchy
  • a dynamic two-way flow of power and authority based on knowledge, trust, credibility and a focus on results, enabled by interconnected people and technology.
  • the role of social media and smart mobile devices in the uprisings in Egypt, Libya and elsewhere in the Middle East
  • The roots of organizational development (OD) are in humanistic psychology and sociology action and ethnographic and cybernetic/ socio-technical systems theory.  It’s a domain that emerged essentially as a counter-balance to the mechanistic and machine-metaphor-based core assumptions about the organized activities in our society.
  • Organizational development principles are built upon some basic assumptions about human motivations, engagement and activities.
  • Participative Work Design – The Six Criteria
  • in recent years created models that help clarify how to evaluate and respond to the continuous turbulence and ambiguity generated by participating in interconnected flows of information.
  • contexts characterized by either Simple, Complicated or Chaotic dynamics (from complexity theory fundamentals). Increasingly, Complexity is emerging as a key definer of the issues, problems and opportunities faced by our societies.
  • peer-to-peer movement(s) unfolding around the world
  • Co-creating in a wide range of forms, processes and purpose may become an effective and important antidote to the spreading enclosure of human creative activity.
  • But .. the dominant models of governance, commercial ownership and the use and re-use of that which is co-created by people are going to have to undergo much more deep change in order to disrupt the existing paradigm of proprietary commercial creation and the model of socio-economic power that this paradigm enables and carries today.
Tiberius Brastaviceanu

opscientia/desci - 0 views

  •  
    "We are actively building the software stack for empowering citizen science communities."
Tiberius Brastaviceanu

Obsidian - 1 views

  •  
    I really like Obsidian. I've started to use it to do some ecosystem mapping.
Tiberius Brastaviceanu

Business models for Open Hardware - 1 views

  • guidelines for the development and evaluation of licenses for Open Source Hardware
  • Open Hardware is “a term for tangible artifacts — machines, devices, or other physical things — whose design has been released to the public in such a way that anyone can make, modify, distribute, and use those things“.
  • Open Hardware is derivative: here a fork is the rule, not the exception.
  • ...35 more annotations...
  • hardware hacking community
  • overviews of Open Hardware can be found on Make Magazine’s Blog, MIT Technology Review, Computerworld, O’Reilly Radar.
  • Lists of existing Open Hardware projects can be found on the GOpen Hardware 2009 website, on the P2P Foundation website (here and here), on Make Magazine’s Blog, Open Innovation Projects and Open Knowledge Foundation.
  • 4 possible levels of Openness in Open Hardware projects,
  • by SparkFun Electronics (USA)
  • Open Interface
  • Open Design
  • Open Implementation
  • Arduino
  • most popular Open Hardware project
  • open-source electronics prototyping platform based on flexible, easy-to-use hardware and software
  • ommercially produced
  • Most of Arduino official boards are manufactured by SmartProjects in Italy.
  • Arduino brand name
  • Gravitech (USA).
  • starting point
  • Closed
  • ecosystem
  • community
  • mature and simple
  • Creative Commons license
  • produce
  • redesign
  • sell boards
  • you just have to credit the original Arduino group and use the same CC license
  • without paying a license fee or even ask permission
  • the name Arduino
  • is trademarked
  • cheap and durable enough
  • two different business model
  • sharing open hardware to sell expertise, knowledge and custom services and projects around it;
  • hardware is becoming a commodity
  • selling the hardware but trying to keep ahead of competition with better products
  • companies that are selling open source hardware
  • the open source hardware community to reach $ 1 billion by 2015
mayssamd

Mojaloop Foundation - 1 views

  •  
    Open Source Software for Payment Interoperability
Tiberius Brastaviceanu

hREA - 0 views

  •  
    Scalable & distributed framework for economic network coordination |
« First ‹ Previous 81 - 96 of 96
Showing 20 items per page