Science shows that brainstorms can activate a neurological fear of rejection and that groups are not necessarily more creative than individuals.
23More
Innovation Is About Arguing, Not Brainstorming. Here's How To Argue Productively - 0 views
-
To innovate, we need environments that support imaginative thinking, where we can go through many crazy, tangential, and even bad ideas to come up with good ones.
- ...20 more annotations...
-
Multiple positions and views are expressed with a shared understanding that everyone is focused on a common goal. There is no hierarchy. It’s not debate because there are no opposing sides trying to “win.” Rather, it’s about working together to solve a problem and create new ideas.
-
Here are five key rules of engagement that we’ve found to yield fruitful sessions and ultimately lead to meaningful ideas.
-
-
We conduct ethnographic research to inform our intuition, so we can understand people’s needs, problems, and values.
-
accountable to something other than our own opinions, and it means we can push back on colleagues’ ideas without getting personal.
-
The statement of purpose establishes the rules: It reminds us that we are working together to move the ball down the field. As much as we may argue and disagree, anything that happens in the room counts toward our shared goal. This enables us to argue and discuss without hurting one another.
-
Deliberative discourse is a form of play, and for play to yield great ideas, we have to take it seriously.
40More
Welcome to the new reputation economy (Wired UK) - 1 views
-
banks take into account your online reputation alongside traditional credit ratings to determine your loan
-
reputation data becomes the window into how we behave, what motivates us, how our peers view us and ultimately whether we can or can't be trusted.
- ...37 more annotations...
-
The difference today is our ability to capture data from across an array of digital services. With every trade we make, comment we leave, person we "friend", spammer we flag or badge we earn, we leave a trail of how well we can or can't be trusted.
-
peer-to-peer marketplaces, where a high degree of trust is required between strangers; and where a traditional approach based on disjointed information sources is currently inefficient, such as recruiting.
-
But this wealth of data raises an important question -- who owns our reputation? Shouldn't our hard-earned online status be portable? If you're a SuperHost on Airbnb, shouldn't you be able to use that reputation to, say, get a loan, or start selling on Etsy?
-
"People are currently underusing their networks and reputation," King says. "I want to help people to understand and build their influence and reputation, and think of it as capital they can put to good use."
-
"The implication of our study is that different types of reward are coded by the same currency system." In other words, our brains neurologically compute personal reputation to be as valuable as money.
-
Personal reputation has been a means of making socioeconomic decisions for thousands of years. The difference today is that network technologies are digitally enabling the trust we used to experience face-to-face -- meaning that interactions and exchanges are taking place between total strangers.
-
Trust and reputation become acutely important in peer-to-peer marketplaces such as WhipCar and Airbnb, where members are taking a risk renting out their cars or their homes.
-
When you are trading peer-to-peer, you can't count on traditional credit scores. A different measurement is needed. Reputation fills this gap because it's the ultimate output of how much a community trusts you.
-
Welcome to the reputation economy, where your online history becomes more powerful than your credit history.
-
A wave of startups, including Connect.Me, TrustCloud, TrustRank, Legit and WhyTrusted, are trying to solve this problem by designing systems that correlate reputation data. By building a system based on "reputation API" -- a combination of a user's activity, ratings and reviews across sites -- Legit is working to build a service that gives users a score from zero to 100. In trying to create a universal metric for a person's trustworthiness, they are trying to "become the credit system of the sharing economy", says Jeremy Barton, the 27-year-old San Francisco-based cofounder of Legit.
-
His company, and other reputation ventures, face some big challenges if they are to become, effectively, the PayPal of trust. The most obvious is coming up with algorithms that can't be easily gamed or polluted by trolls. And then there's the critical hurdle of convincing online marketplaces not just to open up their reputation vaults, but create a standardised format for how they frame and collect reputation data. "We think companies will share reputation data for the same reasons banks give credit data to credit bureaux," says Rob Boyle, Legit cofounder and CTO. "It is beneficial for one company to give up their slice of reputation data if in return they get access to the bigger picture: aggregated data from other companies."
-
are measuring social influence, not reputation. "Influence measures your ability to drag someone into action,"
-
"Reputation is an indicator of whether a person is good or bad and, ultimately, are they trustworthy?"
-
Early influence and reputation aggregators will undoubtedly learn by trial and error -- but they will also face the significant challenge of pioneering the use of reputation data in a responsible way. And there's a challenge beyond that: reputation is largely contextual, so it's tricky to transport it to other situations.
-
Many of the ventures starting to make strides in the reputation economy are measuring different dimensions of reputation.
-
Reputation capital is not about combining a selection of different measures into a single number -- people are too nuanced and complex to be distilled into single digits or binary ratings.
-
It's the culmination of many layers of reputation you build in different places that genuinely reflect who you are as a person and figuring out exactly how that carries value in a variety of contexts.
-
we will be able to perform a Google- or Facebook-like search and see a picture of a person's behaviour in many different contexts, over a length of time. Slivers of data that have until now lived in secluded isolation online will be available in one place. Answers on Quora, reviews on TripAdvisor, comments on Amazon, feedback on Airbnb, videos posted on YouTube, social groups joined, or presentations on SlideShare; as well as a history and real-time stream of who has trusted you, when, where and why. The whole package will come together in your personal reputation dashboard, painting a comprehensive, definitive picture of your intentions, capabilities and values.
-
By the end of the decade, a good online reputation could be the most valuable currency in your possession.
Open-space technology - Wikipedia, the free encyclopedia - 3 views
en.wikipedia.org/...Open-space_technology
open-space technology brainstorming problem solving decision decision making
shared by Tiberius Brastaviceanu on 09 Dec 11
- No Cached
46More
Science and Technology Consultation - Industry Canada - 0 views
-
Under this strategy
-
Genome Canada, the Canadian Institute for Advanced Research and the Canada Foundation for Innovation.
-
Still, Canadian businesses continue to underperform when it comes to innovation—a primary driver of productivity growth—when compared to other competing nations. The performance of business R&D is one oft-cited measure used to gauge the level of innovative activity in a country's business sector.
- ...38 more annotations...
-
Canadians have reached top tier global performance in reading, mathematics, problem solving and science, and Canada has rising numbers of graduates with doctoral degrees in science and engineering.
-
The ease and ability of the academic community to collaborate, including through research networks, is also well-recognized.
-
Still, the innovative performance of Canada's firms and the productivity growth continue to lag behind competing nations.
-
The government is also committed to moving forward with a new approach to promoting business innovation—one that emphasizes active business-led initiatives and focuses resources on better fostering the growth of innovative firms.
-
Achieving this requires the concerted effort of all players in the innovation system—to ensure each does what one does best and to leverage one another's strengths.
-
the government has invested more to support science, technology and innovative companies than ever before
-
Canada must become more innovative
-
providing a new framework to guide federal ST&I investments and priorities. That is why the Government of Canada stated its intention to release an updated ST&I Strategy in the October 2013 Speech from the Throne.
-
seeking the views of stakeholders from all sectors of the ST&I system—including universities, colleges and polytechnics, the business community, and Canadians
-
encouraging partnerships with industry, attracting highly skilled researchers, continuing investments in discovery-driven research, strengthening Canada's knowledge base, supporting research infrastructure and providing incentives to private sector innovation.
-
Canada has a world-class post-secondary education system that embraces and successfully leverages collaboration with the private sector, particularly through research networks
-
post-secondary and research institutions that attract and nurture highly qualified and skilled talent
-
-
Why a race? We need to change the way we see this!!! We need to open up. See the European Commission Horizon 2020 program http://ec.europa.eu/programmes/horizon2020/en/ They are acknowledging that Europe cannot do it alone, and are spending money on International collaboration.
-
-
-
There is nothing about non-institutionalized innovation, i.e. open source! There is nothing about the public in this equation like the Europeans do in the Digital Era for Europe program https://ec.europa.eu/digital-agenda/node/66731
-
-
low taxes, strong support for new businesses, a soundly regulated banking system, and ready availability of financial services
-
-
provide incentive for innovative activity in firms, improved access to venture capital, augmented and more coordinated direct support to firms, and deeper partnerships and connections between the public and private sectors.
30More
UK Indymedia - WOS4: The Creative Anti-Commons and the Poverty of Networks - 0 views
www.indymedia.org.uk/...350884.html
@ukindymedia commons free material vs immaterial exchange value use value rival goods non-rival goods
shared by Kurt Laitner on 31 Jan 14
- Cached
-
Further, unless it can be converted into exchange-value, how can the peer producers be able to acquire the material needs for their own subsistence?
-
For Social Production to have any effect on general material wealth it has to operate within the context of a total system of goods and services, where the physical means of production and the virtual means of production are both available in the commons for peer production.
- ...26 more annotations...
-
"All texts published in Situationist International may be freely reproduced, translated and edited, even without crediting the original source."
-
The website of the creative commons makes the following statement about it's purpose: "Creative Commons defines the spectrum of possibilities between full copyright -- all rights reserved -- and the public domain -- no rights reserved. Our licenses help you keep your copyright while inviting certain uses of your work -- a 'some rights reserved' copyright."
-
The website of the creative commons makes the following statement about it's purpose: "Creative Commons defines the spectrum of possibilities between full copyright -- all rights reserved -- and the public domain -- no rights reserved. Our licenses help you keep your copyright while inviting certain uses of your work -- a 'some rights reserved' copyright."
-
Or more specifically, who is a position to convert the use-value available in the "commons" into the exchange-value needed to acquire essential subsistence or accumulate wealth?
-
All texts published in Situationist International may be freely reproduced, translated and edited, even without crediting the original source
-
The point of the above is clear, the Creative Commons, is to help "you" (the "Producer") to keep control of "your" work. The right of the "consumer" is not mentioned, neither is the division of "producer" and "consumer" disputed.
-
Creative "Commons" is thus really an Anti-Commons, serving to legitimise, rather than deny, Producer-control and serving to enforce, rather than do away with, the distinction between producer and consumer
-
specifically providing a framework then, for "producers" to deny "consumers" the right to either create use-value or material exchange-value of the "common" stock of value in the Creative "Commons" in their own cultural production
-
Thus, the very problem presented by Lawrence Lessig, the problem of Producer-control, is not in anyway solved by the presented solution, the Creative Commons, so long as the producer has the exclusive right to chose the level of freedom to grant the consumer, a right which Lessig has always maintained support for
-
The Free Software foundation, publishers of the GPL, take a very different approach in their definition of "free," insisting on the "four freedoms:" The Freedom to use, the freedom to study, the freedom to share, and the freedom to modify.
-
The website of the creative commons makes the following statement about it's purpose: "Creative Commons defines the spectrum of possibilities between full copyright -- all rights reserved -- and the public domain -- no rights reserved. Our licenses help you keep your copyright while inviting certain uses of your work -- a 'some rights reserved' copyright
-
In all these cases what is evident is that the freedom being insisted upon is the freedom of the consumer to use and produce, not the "freedom" of the producer to control.
-
Moreover, proponents of free cultural must be firm in denying the right of Producer-control and denying the enforcement of distinction between producer and consumer
-
where a class-less community of workers ("peers") produce collaboratively within a property-less ("commons-based") society
-
However, if commons-based peer-production is limited exclusively to a commons made of digital property with virtual no reproduction costs then how can the use-value produced be translated into exchange-value?
-
Further, unless it can be converted into exchange-value, how can the peer producers be able to acquire the material needs for their own subsistence
-
The source of poverty is not reproduction costs, but rather extracted economic rents, forcing the producers to accept less than the full product of their labour as their wage by denying them independent access to the means of production
-
So long as commons-based peer-production is applied narrowly to only an information commons, while the capitalist mode of production still dominates the production of material wealth, owners of material property, namely land and capital, will continue to capture the marginal wealth created as a result of the productivity of the information commons.
-
Whatever exchange value is derived from the information commons will always be captured by owners of real property, which lays outside the commons.
-
For Social Production to have any effect on general material wealth it has to operate within the context of a total system of goods and services, where the physical means of production and the virtual means of production are both available in the commons for peer production
-
For free cultural to create a valuable common stock it must destroy the privilege of the producer to control the common stock, and for this common stock to increase the real material wealth of peer producers, the commons must include real property, not just information
-
Strong grasp of the issues, not entirely in agreement on the thesis that the solution is the removal of producer control as this does not support the initiation of an economy, only its ongoing function once established, and the economy is continuously intiating itself, so it is not a one time problem. I do support the notion that producers are in fact none other than consumers of prior art but also that effort is required to remix as much as the magical creation out of nothing. In order to incent this behavior then (or even merely to allow it) the basic scarce needs of the individual must be taken care of. This may be done by ensuring beneficial ownership, but even that suffers from the initiation problem, which the requires us to have a pool of wealth to kickstart the thing by supporting every last person on earth with a basic income - that wealth is in fact available...
73More
POWER-CURVE SOCIETY: The Future of Innovation, Opportunity and Social Equity in the Eme... - 1 views
-
how technological innovation is restructuring productivity and the social and economic impact resulting from these changes
-
concern about the technological displacement of jobs, stagnant middle class income, and wealth disparities in an emerging "winner-take-all" economy
-
personal data ecosystems that could potentially unlock a revolutionary wave of individual economic empowerment
- ...70 more annotations...
-
As the technology boom of the 1990s increased productivity, many assumed that the rising water level of the economy was raising all those middle class boats. But a different phenomenon has also occurred. The wealthy have gained substantially over the past two decades while the middle class has remained stagnant in real income, and the poor are simply poorer.
-
America is turning into a power-curve society: one where there are a relative few at the top and a gradually declining curve with a long tail of relatively poorer people.
-
For the first time since the end of World War II, the middle class is apparently doing worse, not better, than previous generations.
-
as businesses struggle to come to terms with this revolution, a new set of structural innovations is washing over businesses, organizations and government, forcing near-constant adaptation and change. It is no exaggeration to say that the explosion of innovative technologies and their dense interconnections is inventing a new kind of economy.
-
the new technologies are clearly driving economic growth and higher productivity, the distribution of these benefits is skewed in worrisome ways.
-
the networked economy seems to be producing a “power-curve” distribution, sometimes known as a “winner-take-all” economy
-
major component of this new economy, Big Data, and the coming personal data revolution fomenting beneath it that seeks to put individuals, and not companies or governments, at the forefront. Companies in the power-curve economy rely heavily on big databases of personal information to improve their marketing, product design, and corporate strategies. The unanswered question is whether the multiplying reservoirs of personal data will be used to benefit individuals as consumers and citizens, or whether large Internet companies will control and monetize Big Data for their private gain.
-
A special concern is whether information and communications technologies are actually eliminating more jobs than they are creating—and in what countries and occupations.
-
Is it polarizing income and wealth distributions? How is it changing the nature of work and traditional organizations and altering family and personal life?
-
many observers fear a wave of social and political disruption if a society’s basic commitments to fairness, individual opportunity and democratic values cannot be honored
-
what role government should play in balancing these sometimes-conflicting priorities. How might educational policies, research and development, and immigration policies need to be altered?
-
Conventional economics says that progress comes from new infusions of capital, whether financial, physical or human. But those are not necessarily the things that drive innovation
-
economists have developed a number of proxy metrics for innovation, such as research and development expenditures.
-
Atkinson believes that economists both underestimate and overestimate the scale and scope of innovation.
-
Calculating the magnitude of innovation is also difficult because many innovations now require less capital than they did previously.
-
believes that technological innovation follows the path of an “S-curve,” with a gradual increase accelerating to a rapid, steep increase, before it levels out at a higher level. One implication of this pattern, he said, is that “you maximize the ability to improve technology as it becomes more diffused.” This helps explain why it can take several decades to unlock the full productive potential of an innovation.
-
innovation keeps getting harder. It was pretty easy to invent stuff in your garage back in 1895. But the technical and scientific challenges today are huge.”
-
costs of innovation have plummeted, making it far easier and cheaper for more people to launch their own startup businesses and pursue their unconventional ideas
-
Atkinson conceded such cost-efficiencies, but wonders if “the real question is that problems are getting more complicated more quickly than the solutions that might enable them.
-
we may need to parse the different stages of innovation: “The cost of innovation generally hasn’t dropped,” he argued. “What has become less expensive is the replication and diffusion of innovation.”
-
A lot of barriers to innovation can be found in the lack of financing, organizational support systems, regulation and public policies.
-
there is a serious mismatch between the pace of innovation unleashed by Moore’s Law and our institutional and social capacity to adapt.
-
This raises the question of whether old institutions can adapt—or whether innovation will therefore arise through other channels entirely. “Existing institutions are often run by followers of conventional wisdom,”
-
The best way to identify new sources of innovation, as Arizona State University President Michael Crow has advised, is to “go to the edge and ignore the center.”
-
Paradoxically, one of the most potent barriers to innovation is the accelerating pace of innovation itself.
-
Part of the problem, he continued, is that our economy is based on “push-based models” in which we try to build systems for scalable efficiencies, which in turn demands predictability.
-
The real challenge is how to achieve radical institutional innovations that prepare us to live in periods of constant two- or three-year cycles of change. We have to be able to pick up new ideas all the time.”
-
The App Economy consists of a core company that creates and maintains a platform (such as Blackberry, Facebook or the iPhone), which in turn spawns an ecosystem of big and small companies that produce apps and/or mobile devices for that platform
-
tied this success back to the open, innovative infrastructure and competition in the U.S. for mobile devices
-
small businesses are becoming more comfortable using such systems to improve their marketing and lower their costs; and, vast new pools of personal data are becoming extremely useful in sharpening business strategies and marketing.
-
Another great boost to innovation in some business sectors is the ability to forge ahead without advance permission or regulation,
-
“In bio-fabs, for example, it’s not the cost of innovation that is high, it’s the cost of regulation,”
-
“In Europe and China, the law holds that unless something is explicitly permitted, it is prohibited. But in the U.S., where common law rather than Continental law prevails, it’s the opposite
57More
Is Shame Necessary? | Conversation | Edge - 0 views
-
Whereas guilt is evoked by an individual's standards, shame is the result of group standards. Therefore, shame, unlike guilt, is felt only in the context of other people.
- ...53 more annotations...
-
The feeling of being watched enhances cooperation, and so does the ability to watch others. To try to know what others are doing is a fundamental part of being human
-
Shame serves as a warning to adhere to group standards or be prepared for peer punishment. Many individualistic societies, however, have migrated away from peer punishment toward a third-party penal system
-
Shame has become less relevant in societies where taking the law into one's own hands is viewed as a breach of civility.
-
Many problems, like most concerning the environment, are group problems. Perhaps to solve these problems we need a group emotion. Maybe we need shame.
-
The problem is that environmental guilt, though it may well lead to conspicuous ecoproducts, does not seem to elicit conspicuous results.
-
The positive effect of idealistic consumers does exist, but it is masked by the rising demand and numbers of other consumers.
-
Guilt is a valuable emotion, but it is felt by individuals and therefore motivates only individuals. Another drawback is that guilt is triggered by an existing value within an individual. If the value does not exist, there is no guilt and hence no action
-
Getting rid of shaming seems like a pretty good thing, especially in regulating individual behavior that does no harm to others. In eschewing public shaming, society has begun to rely more heavily on individual feelings of guilt to enhance cooperation.
-
shaming by the state conflicts with the law's obligation to protect citizens from insults to their dignity.
-
Shaming might work to change behavior in these cases, but in a world of urgent, large-scale problems, changing individual behavior is insignificant
-
Guilt cannot work at the institutional level, since it is evoked by individual scruples, which vary widely
-
But shame is not evoked by scruples alone; since it's a public sentiment, it also affects reputation, which is important to an institution.
-
Shaming, as noted, is unwelcome in regulating personal conduct that doesn't harm others. But what about shaming conduct that does harm others?
-
The need to accommodate the increasing number of social connections and monitor one another could be
-
in cooperation games that allowed players to gossip about one another's performance, positive gossip resulted in higher cooperation.
-
Of even greater interest, gossip affected the players' perceptions of others even when they had access to firsthand information.
-
We can use computers to simulate some of the intimacy of tribal life, but we need humans to evoke the shame that leads to cooperation. The emergence of new tools— language, writing, the Internet—cannot completely replace the eyes. Face-to-face interactions, such as those outside Trader Joe's stores, are still the most impressive form of dissent.
-
It's hard to keep track of who cooperates and who doesn't, especially if it's institutions you're monitoring
-
There was even speculation that publishing individual bankers' bonuses would lead to banker jealousy, not shame
-
Even if shaming were enough to bring the behavior of most people into line, governments need a system of punishment to protect the group from the least cooperative players.
-
Today we are faced with the additional challenge of balancing human interests and the interests of nonhuman life.
84More
Digital Reality | Edge.org - 0 views
edge.org/...il_gershenfeld-digital-reality
*neilgershenfeld fab labs IoT molecular computing nano star trek replicator
shared by Kurt Laitner on 17 Feb 15
- No Cached
-
When you snap the bricks together, you don't need a ruler to play Lego; the geometry comes from the parts
- ...75 more annotations...
-
In a 3D printer today, what you can make is limited by the size of the machine. The geometry is external
-
is the Lego tower is more accurate than the child because the constraint of assembling the bricks lets you detect and correct errors
-
detect and correct state to correct errors to get an exponential reduction in error, which gives you an exponential increase in complexity
-
The last one is when you're done with Lego you don't put it in the trash; you take it apart and reuse it because there's state in the materials. In a forest there's no trash; you die and your parts get disassembled and you're made into new stuff. When you make a 3D print or laser cut, when you're done there's recycling attempts but there's no real notion of reusing the parts
-
The metrology coming from the parts, detecting and correcting errors, joining dissimilar materials, disconnecting, reusing the components
-
On the very smallest scale, the most exciting work on digital fabrication is the creation of life from scratch. The cell does everything we're talking about. We've had a great collaboration with the Venter Institute on microfluidic machinery to load designer genomes into cells. One step up from that we're developing tabletop chip fab instead of a billion dollar fab, using discrete assembly of blocks of electronic materials to build things like integrated circuits in a tabletop process
-
There's a series of books by David Gingery on how to make a machine shop starting with charcoal and iron ore.
-
There are twenty amino acids. With those twenty amino acids you make the motors in the molecular muscles in my arm, you make the light sensors in my eye, you make my neural synapses. The way that works is the twenty amino acids don't encode light sensors, or motors. They’re very basic properties like hydrophobic or hydrophilic. With those twenty properties you can make you. In the same sense, digitizing fabrication in the deep sense means that with about twenty building blocks—conducting, insulating, semiconducting, magnetic, dielectric—you can assemble them to create modern technology
-
By discretizing those three parts we can make all those 500,000 resistors, and with a few more parts everything else.
-
Now, there's a casual sense, which means a computer controls something to make something, and then there's the deep sense, which is coding the materials. Intellectually, that difference is everything but now I'm going to explain why it doesn't matter.
-
Then in turn, the next surprise was they weren't there for research, they weren't there for theses, they wanted to make stuff. I taught additive, subtractive, 2D, 3D, form, function, circuits, programming, all of these skills, not to do the research but just using the existing machines today
-
What they were answering was the killer app for digital fabrication is personal fabrication, meaning, not making what you can buy at Walmart, it’s making what you can't buy in Walmart, making things for a market of one person
-
the Altair was life changing for people like me. It was the first computer you could own as an individual. But it was almost useless
-
It was hard to use but it brought the cost from a million dollars to 100,000 and the size from a warehouse down to a room. What that meant is a workgroup could have one. When a workgroup can have one it meant Ken Thompson and Dennis Ritchie at Bell Labs could invent UNIX—which all modern operating systems descend from—because they didn't have to get permission from a whole corporation to do it
-
At the PC stage what happened is graphics, storage, processing, IO, all of the subsystems got put in a box
-
To line that up with fabrication, MIT's 1952 NC Mill is similar to the million-dollar machines in my lab today. These are the mainframes of fab. You need a big organization to have them. The fab labs I'll tell you about are exactly analogous to the cost and complexity of minicomputers. The machines that make machines I'll tell you about are exactly analogous to the cost and complexity of the hobbyist computers. The research we're doing, which is leading up to the Star Trek Replicator, is what leads to the personal fabricator, which is the integrated unit that makes everything
-
The fab lab is 2 tons, a $100,000 investment. It fills a few thousand square feet, 3D scanning and printing, precision machining, you can make circuit boards, molding and casting tooling, computer controlled cutting with a knife, with a laser, large format machining, composite layup, surface mount rework, sensors, actuators, embedded programming— technology to make technology.
-
Ten years you can just plot this doubling. Today, you can send a design to a fab lab and you need ten different machines to turn the data into something. Twenty years from now, all of that will be in one machine that fits in your pocket.
-
We've been living with this notion that making stuff is an illiberal art for commercial gain and it's not part of the means of expression. But, in fact, today, 3D printing, micromachining, and microcontroller programming are as expressive as painting paintings or writing sonnets but they're not means of expression from the Renaissance. We can finally fix that boundary between art and artisans
-
Over the next maybe five years we'll be transitioning from buying machines to using machines to make machines. Self-reproducing machines
-
But they still have consumables like the motors, and they still cut or squirt. Then the interesting transition comes when we go from cutting or printing to assembling and disassembling, to moving to discretely assembled materials
-
because if anybody can make anything anywhere, it challenges everything
-
Now, the biggest surprise for me in this is I thought the research was hard. It's leading to how to make the Star Trek Replicator. The insight now is that's an exercise in embodied computation—computation in materials, programming their construction. Lots of work to come, but we know what to do
-
And that's when you do tabletop chip fab or make airplanes. That's when technical trash goes away because you can disassemble.
-
At something like a Maker Faire, there's hall after hall of repeated reinventions of bad 3D printers and there isn't an easy process to take people from easy to hard
-
We started a project out of desperation because we kept failing to succeed in working with existing schools, called the Fab Academy. Now, to understand how that works, MIT is based on scarcity. You assume books are scarce, so you have to go there for the library; you assume tools are scarce, so you have to go there for the machines; you assume people are scarce, so you have to go there to see them; and geography is scarce. It adds up to we can fit a few thousand people at a time. For those few thousand people it works really well. But the planet is a few billion people. We're off by six orders of magnitude.
-
Next year we're starting a new class with George Church that we've called "How to Grow Almost Anything", which is using fab labs to make bio labs and then teach biotech in it. What we're doing is we're making a new global kind of university
-
Amusingly, I went to my friends at Educause about accrediting the Fab Academy and they said, "We love it. Where are you located?" And I said, "Yes" and they said, "No." Meaning, "We're all over the earth." And they said, "We have no mechanism. We're not allowed to do that. There's no notion of global accreditation."
-
The way the Fab Academy works, in computing terms, it's like the Internet. Students have peers in workgroups, with mentors, surrounded by machines in labs locally. Then we connect them globally by video and content sharing and all of that. It's an educational network. There are these critical masses of groups locally and then we connect them globally
-
You still have Microsoft or IBM now but, with all respect to colleagues there, arguably that's the least interesting part of software
-
To understand the economic and social implications, look at software and look at music to understand what's happening now for fabrication
-
There's a core set of skills a place like MIT can do but it alone doesn't scale to a billion people. This is taking the social engineering—the character of MIT—but now doing it on this global scale.
-
Mainframes didn't go away but what opened up is all these tiers of software development that weren't economically viable
-
If you look at music development, the most interesting stuff in music isn't the big labels, it's all the tiers of music that weren't viable before
-
You can make music for yourself, for one, ten, 100, 1,000, a million. If you look at the tracks on your device, music is now in tiers that weren't economically viable before. In that example it's a string of data and it becomes a sound. Now in digital fab, it's a string of data and it becomes a thing.
-
What is work? For the average person—not the people who write for Edge, but just an average person working—you leave home to go to a place you'd rather not be, doing a repetitive operation you'd rather not do, making something designed by somebody you don't know for somebody you'll never see, to get money to then go home and buy something. But what if you could skip that and just make the thing?
-
It took about ten years for the dot com industry to realize pretty much across the board you don't directly sell the thing. You sell the benefits of the thing
-
2016 it's in Shenzhen because they're pivoting from mass manufacturing to enabling personal fabrication. We've set Shenzhen as the goal in 2016 for Fab Lab 2.0, which is fab labs making fab labs
-
To rewind now, you can send something to Shenzhen and mass manufacture it. There's a more interesting thing you can do, which is you go to market by shipping data and you produce it on demand locally, and so you produce it all around the world.
-
But their point was a lot of printers producing beautiful pages slowly scales if all the pages are different
-
In the same sense it scales to fabricate globally by doing it locally, not by shipping the products but shipping the data.
-
It doesn't replace mass manufacturing but mass manufacturing becomes the least interesting stuff where everybody needs the same thing. Instead, what you open up is all these tiers that weren't viable before
-
There, they consider IKEA the enemy because IKEA defines your taste. Far away they make furniture and flat pack it and send it to a big box store. Great design sense in Barcelona, but 50 percent youth unemployment. A whole generation can't work. Limited jobs. But ships come in from the harbor, you buy stuff in a big box store. And then after a while, trucks go off to a trash dump. They describe it as products in, trash out. Ships come in with products, trash goes out
-
instead of working to get money to buy products made somewhere else, you can make them locally
-
The biggest tool is a ShotBot 4'x8'x1' NC mill, and you can make beautiful furniture with it. That's what furniture shops use
-
it means you can make many of the things you consume directly rather than this very odd remote economic loop
-
the most interesting part of the DIY phone projects is if you're making a do-it-yourself phone, you can also start to make the things that the phones talk to. You can start to build your own telco providers where the users provide the network rather than spending lots of money on AT&T or whoever
-
Traditional manufacturing is exactly replaying the script of the computer companies saying, "That's a toy," and it's shining a light to say this creates entirely new economic activity. The new jobs don't come back to the old factories. The ability to make stuff on demand is creating entirely new jobs
-
To keep playing that forward, when I was in Barcelona for the meeting of all these labs hosted by the city architect and the city, the mayor, Xavier Trias, pushed a button that started a forty-year countdown to self-sufficiency. Not protectionism
-
I need high-torque efficient motors with integrated lead screws at low cost, custom-produced on demand. All sorts of the building blocks that let us do what I'm doing currently rest on a global supply chain including China's manufacturing agility
-
The short-term answer is you can't get rid of them because we need them in the supply chain. But the long-term answer is Shenzhen sees the future isn't mass producing for everybody. That's a transitional stage to producing locally
-
The real thing ultimately that's driving the fab labs ... the vacuum we filled is a technical one. The means to make stuff. Nobody was providing that. But in turn, the spaces become magnets. Everybody talks about innovation or knowledge economy, but then most things that label that strangle it. The labs become vehicles for bright inventive people who don't fit locally. You can think about the culture of MIT but on this global scale
-
My allegiance isn't to any one border, it's to the brainpower of the planet and this is building the infrastructure to scale to that brainpower
-
If you zoom from transistors to microcode to object code to a program, they don't look like each other. But if we take this room and go from city, state, country, it's hierarchical but you preserve geometry
-
The reason that's so important for the digital fabrication piece is once we build molecular assemblers to build arbitrary systems, you don't want to then paste a few lines of code in it. You need to overlay computation with geometry. It's leading to this complete do-over of computer science
-
If you take digital fab, plus the real sense of Internet of Things—not the garbled sense—plus the real future of computing aligning hardware and software, it all adds up to this ability to program reality
-
I run a giant video infrastructure and I have collaborators all over the world that I see more than many of my colleagues at MIT because we're all too busy on campus. The next Silicon Valley is a network, it's not a place. Invention happens in these networks.
-
When Edwin Land was kicked out of Polaroid, he made the Rowland Institute, which was making an ideal research institute with the best facilities and the best people and they could do whatever they want. But almost nothing came from it because there was no turnover of the gene pool, there was no evolutionary pressure.
-
the wrong way to do research, which is to believe there's a privileged set of people that know more than anybody else and to create a barrier that inhibits communication from the inside to the outside
-
you need evolutionary pressure, you need traffic, you need to be forced to deal with people you don't think you need to encounter, and you need to recognize that to be disruptive it helps to know what people know
-
For me the hardest thing isn't the research. That's humming along nicely. It's that we're finding we have to build a completely new kind of social order and that social entrepreneurship—figuring out how you live, learn, work, play—is hard and there's a very small set of people who can do that kind of organizational creation.
Free currency - 0 views
99More
Beyond Blockchain: Simple Scalable Cryptocurrencies - The World of Deep Wealth - Medium - 0 views
-
I clarify the core elements of cryptocurrency and outline a different approach to designing such currencies rooted in biomimicry
-
This post outlines a completely different strategy for implementing cryptocurrencies with completely distributed chains
- ...95 more annotations...
-
we are interested in the resilience that comes from building a rich ecosystem of interoperable currencies
-
Holdings are electronic and only exist and operate by virtue of a community’s agreement about how to interpret digital bits according to rules about operation and accounting of the currency.
-
Specifically, access, issuance, transaction accounting, rules & policies, should be collectively visible, known, and held.
-
This cryptographic structure is used to enable a variety of people to host the data without being able to alter it.
-
there must be a way to associate these bits with some kind of account, wallet, owner, or agent who can use them
-
Other things that many take for granted in blockchains may not be core but subject to decisions in design and implementation, so they can vary between implementations
-
does not have to be money. It may be a reputation currency, or data used for identity, or naming, etc
-
Then you must tackle the problem of always tracking which coins exist, and which have been spent. That is one approach — the one blockchain takes.
-
You might optimize for anonymity if you think of cryptocurrency as a tool to escape governments, regulations, and taxes.
-
if you want to establish and manage membership in new kinds of commons, then identity and accountability for actions may turn out to be necessary ingredients instead of anonymity.
-
In the case of the MetaCurrency Project, we are trying to support many use cases by building tools to enable a rich ecosystem of communities and current-sees (many are non-monetary) to enhance collective intelligence at all scales.
-
Managing consensus about a shared reality is a central challenge at the heart of all distributed computing solutions.
-
If we want to democratize money by having cryptocurrencies become a significant and viable means of transacting on a daily basis, I believe we need fundamentally more scalable approaches that don’t require expensive, dedicated hardware just to participate.
-
Blockchain is about managing a consensus about what was “said.” Ceptr is about distributing a consensus about how to “speak.”
-
how nature gets the job done in massively scalable systems which require coordination and consistency
-
Each speaker of a language carries the processes to understand sentences they hear, and generate sentences they need
-
we certainly don’t carry some kind of global ledger of everything that’s ever been said, or require consensus about what has been said
-
there is certainly no global ledger with consensus about the state of trillions of cells. Yet, from a single zygote’s copy of DNA, our cells coordinate in a highly decentralized manner, on scales of trillions, and without the latency or bottlenecks of central control.
-
Imagine something along the lines of a Java Virtual Machine connected to a distributed version of Github
-
Every time this JVM runs a program it confirms the hash of the code it is about to execute with the hash signed into the code repository by its developers
-
This allows each node that intends to be honest to be sure that they’re running the same processes as everyone else. So when two parties want to do a transaction, and each can have confidence their own code, and the results that your code produces
-
Then you treat it as authoritative and commit it to your local cryptographically self-validating data store
-
Allowing each node to treat itself as a full authority to process transactions (or interactions via shared protocols) is exactly how you empower each node with full agency. Each node runs its copy of the signed program/processes on its own virtual machine, taking the transaction request combined with the transaction chains of the parties to the transaction. Each node can confirm their counterparty’s integrity by replaying their transactions to produce their current state, while confirming signatures and integrity of the chain
-
If both nodes are in an appropriate state which allows the current transaction, then they countersign the transaction and append to their respective chains. When you encounter a corrupted or dishonest node (as evidenced by a breach of integrity of their chain — passing through an invalid state, broken signatures, or broken links), your node can reject the transaction you were starting to process. Countersigning allows consensus at the appropriate scale of the decision (two people transacting in this case) to lock data into a tamper-proof state so it can be stored in as many parallel chains as you need.
-
When your node appends a mutually validated and signed transaction to its chain, it has updated its local state and is able to represent the integrity of its data locally. As long as each transaction (link in the chain) has valid linkages and countersignatures, we can know that it hasn’t been tampered with.
-
If you can reliably embody the state of the node in the node itself using Intrinsic Data Integrity, then all nodes can interact in parallel, independent of other interactions to maximize scalability and simultaneous processing. Either the node has the credits or it doesn’t. I don’t have to refer to a global ledger to find out, the state of the node is in the countersigned, tamper-proof chain.
-
Just like any meaningful communication, a protocol needs to be established to make sure that a transaction carries all the information needed for each node to run the processes and produce a new signed and chained state. This could be debits or credits to an account which modify the balance, or recoding courses and grades to a transcript which modify a Grade Point Average, or ratings and feedback contributing to a reputation score, and so on.
-
By distributing process at the foundation, and leveraging Intrinsic Data Integrity, our approach results in massive improvements in throughput (from parallel simultaneous independent processing), speed, latency, efficiency, and cost of hardware.
-
Another noteworthy observation about humans, cells, and atoms, is that each has a general “container” that gets configured to a specific use.
-
Likewise, the Receptors we’ve built are a general purpose framework which can load code for different distributed applications. These Receptors are a lightweight processing container for the Ceptr Virtual Machine Host
-
Ceptr enables a developer to focus on the rules and transactions for their use case instead of building a whole framework for distributed applications.
-
Most people think that money is just money, but there are literally hundreds of decisions you can make in designing a currency to target particular needs, niches, communities or patterns of flow.
-
the challenging task of tracking all the coins that exist to ensure there is no counterfeiting or double-spending
-
You wouldn’t need to manage consensus about whether a cryptocoin is spent, if your system created accounts which have normal balances based on summing their transactions.
-
In a mutual credit system, units of currency are issued when a participant extends credit to another user in a standard spending transaction
-
Managing the currency supply in a mutual credit system is about managing credit limits — how far people can spend into a negative balance
-
keep in mind there can be different classes of accounts. Easy to create, anonymous accounts may get NO credit limit
-
What if I alter my code to give myself an unlimited credit limit, then spend as much as I want? As soon as you pass the credit limit encoded in the shared agreements, the next person you transact with will discover you’re in an invalid state and refuse the transaction.
-
If two people collude to commit an illegal transaction by both hacking their code to allow a normally invalid state, the same still pattern still holds. The next person they try to transact with using untampered code will detect the problem and decline to transact.
-
Hawala is a network of merchants and businessmen, which has been operating since the middle ages, performing money transfers on an honor system and typically settling balances through merchandise instead of transferring money
-
To minimize key management infrastructure, each hawaladar’s public key is their address or identity on the network. To join the network you get a copy of the software from another hawaladar, generate your public and private keys, and complete your personal profile (name, location, contact info, etc.). You call, fax, or email at least 10 hawaladars who know you, and give them your IP address and ask them to vouch for you.
-
Once 10 other hawaladars have vouched for you, you can start doing other transactions because the protocol encoded in every node will reject a transaction chain that doesn’t start with at least 10 vouches
-
As described in the Mutual Credit section, at the time of transaction each party audits the counterparty’s transaction chain.
-
Our hawala crypto-clearinghouse protocol has two categories of transactions: some used for accounting and others for routing. Accounting transactions change balances. Routing transactions maintain network integrity by recording information about hawaladar
-
The final hash of all of the above fields is used as a unique transaction ID and is what each of party signs with their private keys. Signing indicates a party has agreed to the terms of the transaction. Only transactions signed by both parties are considered valid. Nodes can verify signatures by confirming that decryption of the signature using the public key yields a result which matches the transaction ID.
-
As with accounting transactions, the hash of the above fields is used as the transaction’s unique key and the basis for the cryptographic signature of both counterparties.
-
Remember, instead of making changes to account balances, routing transactions change a node’s local list of peers for finding each other and processing.
-
It would be possible for someone to hack the code on their node to “forget” their most recent transaction (drop the head of their chain), and go back to their previous version of the chain before that transaction. Then they could append a new transaction, drop it, and append again.
-
After both parties have signed the agreed upon transaction, each party submits the transaction to separate notaries. Notaries are a special class of participant who validate transactions (auditing each chain, ensuring nobody passes through an invalid state), and then they sign an outer envelope which includes the signatures of the two parties. Notaries agree to run high-availability servers which collectively manage a Distributed Hash Table (DHT) servicing requests for transaction information. As their incentive for providing this infrastructure, notaries get a small transaction fee.
-
This approach introduces a few more steps and delays to the transaction process, but because it operates on independent parallel chains, it is still orders of magnitude more efficient and decentralized than reaching consensus on entries in a global ledger
-
millions of simultaneous transactions could be getting processed by other parties and notaries with no bottlenecks.
-
There are other solutions to prevent nodes from dropping the head of their transaction chain, but the approach of having notaries serve out a DHT solves a number of common objections to completely distributed accounting. Having access to reliable lookups in a DHT provides a similar big picture view that you get from a global ledger. For example, you may want a way to look up transactions even when the parties to that transaction are offline, or to be able to see the net system balance at a particular moment in time, or identify patterns of activity in the larger system without having to collect data from everyone individually.
-
By leveraging Intrinsic Data Integrity to run numerous parallel tamper-proof chains you can enable nodes to do various P2P transactions which don’t actually require group consensus. Mutual credit is a great way to implement cryptocurrencies to run in this peered manner. Basic PKI with a DHT is enough additional infrastructure to address main vulnerabilities. You can optimize your solution architecture by reserving reserve consensus work for tasks which need to guarantee uniqueness or actually involve large scale agreement by humans or automated contracts.
-
It is not only possible, but far more scalable to build cryptocurrencies without a global ledger consensus approach or cryptographic tokens.
29More
Access control - Wikipedia, the free encyclopedia - 0 views
en.wikipedia.org/...Access_control
blockchainaccess_project wikipedia paper access passport IoPA tech
shared by Tiberius Brastaviceanu on 09 Jun 16
- No Cached
- ...26 more annotations...
-
Geographical access control may be enforced by personnel (e.g., border guard, bouncer, ticket checker)
-
n alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country
-
access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons
-
can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap.
-
Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.[citation needed] Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked
-
The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input
-
There are three types (factors) of authenticating information:[2] something the user knows, e.g. a password, pass-phrase or PIN something the user has, such as smart card or a key fob something the user is, such as fingerprint, verified by biometric measurement
-
Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios
-
When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked.
-
A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a biometric feature) or some combination of these items. This is known as multi-factor authentication. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.
-
An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list
-
Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the doo
-
Access control decisions are made by comparing the credential to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the look-up out from a central host to the edge of the system, or the reader. The predominant topology circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks
-
Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus.
-
Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers.
-
Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host
-
Some readers may have additional features such as an LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support
4More
Asia Times Online :: Nondominium - the Caspian solution - 0 views
-
A Caspian partnership The proposal is that the littoral states should form a Caspian Foundation legal entity, and commit to that entity all existing rights in respect of the use, and the fruits of use (usufruct), of the Caspian Sea, and everything on it, in it, or under it. The Caspian Foundation would act as custodian or steward and the nations would have agreed governance rights of veto. This negative or passive veto right of stewardship is very different from conventional property rights of absolute ownership and temporary use under condominium. Moreover, it does not have the active power of control held under common law by a trustee on behalf of beneficiaries, and the legal complexities and management conflicts which go with it. The Caspian Foundation would be a subscriber to a Caspian Partnership framework agreement between the nations, investors of money or money's worth, and a consortium of service providers. This Caspian Partnership would not be yet another international organization, with everything that goes with that. It would not own anything, employ anyone or contract with anyone: it would simply be an associative framework agreement within which Caspian nations self-organize to the common purpose of the sustainable development of the Caspian Sea.
-
Nondominium - the Caspian solution By Chris Cook Twenty-first century problems cannot be solved with 20th century solutions. Nowhere is that saying so true as in territorial disputes where oil and gas are involved. The riches of the Caspian Sea have been the subject of dispute for years, and relatively simple - but still intractable - binary issues between Iran and Russia are now multiplied by the conflicting claims of what are now five littoral Caspian nations: Azerbaijan, Iran; Kazakhstan; Russia and Turkmenistan. Their claims relate not just to rights on the Caspian Sea surface, but to rights in the sea, and above all to the rights to the treasures that lie under it. There are two 20th century legal approaches: international law //ad information var tf_adModel = "FEV"; var tf_adType = "InBannerVideo"; var tf_commonLocation = "http://cdnx.tribalfusion.com/media/common/expand/"; //leave this variable as it is var tf_cookieFlash = "http://cdnx.tribalfusion.com/media/common/TFSObj_v2s"; var tf_isExpansionHandle = true; var tf_floatAdScriptPath = "http://cdnx.tribalfusion.com/media/common/floating/TF_FloatAdLibrary.js"; var tf_zoomFlash = "http://cdnx.tribalfusion.com/media/common/floating/TFScale_v1"; var tf_banner = { "flag" : "inBanner", "width" : 300, "height" : 250, "widthExpanded" : 600, "heightExpanded" : 450, "widthFloating" : 950, "heightFloating" : 570, "iWin" : [ ], "flashFile" : "http://cdnx.tribalfusion.com/media/4523336/Glow_Banner_Square_Template_V201", extraFlashVars:"tf_showPanelonLoad=true&tf_phase2=false", "video_expand" : "http://cdnx.tribalfusion.com/media/4523336/video.flv", "imageFile" : "http://cdnx.tribalfusion.com/media/4523336/300.jpg", "video" : "http://cdnx.tribalfusion.com/media/4523336/video.flv", "clickTag" : "http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=tf&c=20&mc=click&pli=8816678&PluID=0&ord=619093658", "clickTag1" : "http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=tf&c=20&mc=click&pli=8816678&PluID=0&ord=619093658", "clickTag2" : "http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=tf&c=20&mc=click&pli=8816678&PluID=0&ord=619093658", "socialNetworks" : [ ], "video_expand_start" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=0pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_midpoint" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=50pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_firstQuartile" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=25pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_thirdQuartile" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=75pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_complete" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=100pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_mute" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=MuteLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_unmute" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=UnmuteLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_pause" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=PauseLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_rewind" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=RewindLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_resume" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=ResumeLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_replay" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=ReplayLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_fullscreen" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=FSLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_close" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=VCloseLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "clickTag_tracking" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=ClickLive&ord=619093658&custom1=Save 3 Now(Click Tag)&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;ph:@phase@", "clickTag1_tracking" : "http:
-
A Caspian partnership The proposal is that the littoral states should form a Caspian Foundation legal entity, and commit to that entity all existing rights in respect of the use, and the fruits of use (usufruct), of the Caspian Sea, and everything on it, in it, or under it. The Caspian Foundation would act as custodian or steward and the nations would have agreed governance rights of veto. This negative or passive veto right of stewardship is very different from conventional property rights of absolute ownership and temporary use under condominium. Moreover, it does not have the active power of control held under common law by a trustee on behalf of beneficiaries, and the legal complexities and management conflicts which go with it. The Caspian Foundation would be a subscriber to a Caspian Partnership framework agreement between the nations, investors of money or money's worth, and a consortium of service providers. This Caspian Partnership would not be yet another international organization, with everything that goes with that. It would not own anything, employ anyone or contract with anyone: it would simply be an associative framework agreement within which Caspian nations self-organize to the common purpose of the sustainable development of the Caspian Sea.
- ...1 more annotation...
-
A Caspian partnership The proposal is that the littoral states should form a Caspian Foundation legal entity, and commit to that entity all existing rights in respect of the use, and the fruits of use (usufruct), of the Caspian Sea, and everything on it, in it, or under it. The Caspian Foundation would act as custodian or steward and the nations would have agreed governance rights of veto. This negative or passive veto right of stewardship is very different from conventional property rights of absolute ownership and temporary use under condominium. Moreover, it does not have the active power of control held under common law by a trustee on behalf of beneficiaries, and the legal complexities and management conflicts which go with it. The Caspian Foundation would be a subscriber to a Caspian Partnership framework agreement between the nations, investors of money or money's worth, and a consortium of service providers. This Caspian Partnership would not be yet another international organization, with everything that goes with that. It would not own anything, employ anyone or contract with anyone: it would simply be an associative framework agreement within which Caspian nations self-organize to the common purpose of the sustainable development of the Caspian Sea.
165More
If not Global Captalism - then What? - 0 views
-
I posit an optimistic view of the potential for Society from the emergence of a new and “Open” form of Capitalism.
- ...162 more annotations...
-
‘Enterprise’ is defined as ‘any entity within which two or more individuals create, accumulate or exchange Value”.
-
Pirsig’s approach Capital may be viewed as “Static” Value and Money as “Dynamic” Value. “Transactions” are the “events” at which individuals (Subjects) interact with each other or with Capital (both as Objects) to create forms of Value and at which “Value judgments” are made based upon a “Value Unit”.
-
The result of these Value Events /Transactions is to create subject/object pairings in the form of data ie Who “owns” or has rights of use in What,
-
It, too, may then be defined in a subject/object pairing through the concept of “intellectual property”.
-
“The purpose of money is to facilitate barter by splitting the transaction into two parts, the acceptor of money reserving the power to requisition value from any trader at any time
-
The monetary process is a dynamic one involving the creation and recording of obligations as between individuals and the later fulfilment of these obligations
-
Static Value – which only becomes “Money”/ Dynamic Value when exchanged in the transitory Monetary process.
-
the practice of Lending involves an incomplete exchange in terms of risk and reward: a Lender, as opposed to an Investor, has no interest in the outcome of the Loan, and requires the repayment of Principal no matter the ability of the Borrower to repay.
-
-
"The Lender has no interest in the outcome of the loan", i.e doesn't care what happens in the end. The Lender ins not interested in the economical outcome of the Lender-Loner relation. So in fact there is no real risk sharing. the only risk for the Lender is when the Loner doesn't pay back, which is not really a risk... In fact it is a risk for the small bank, who has to buy money from the central bank, but not for the central bank.
-
-
an “Object” circulating but rather a dynamic process of Value creation and exchange by reference to a “Value Unit”.
-
in relation to Productive Capital relates to the extent of “property rights” which may be held over it thereby allowing individuals to assert “absolute” permanent and exclusive ownership - in particular in relation to Land
-
need for institutions which outlived the lives of the Members led to the development of the Corporate body with a legal existence independent of its Members
-
The key development in the history of Capitalism was the creation of the ‘Joint Stock’ Corporate with liability limited by shares of a ‘Nominal’ or ‘Par’ value
-
over the next 150 years the Limited Liability Corporate evolved into the Public Limited Liability Corporate
-
Such “Closed” Shares of “fixed” value constitute an absolute and permanent claim over the assets and revenues of the Enterprise to the exclusion of all other “stakeholders” such as Suppliers, Customers, Staff, and Debt Financiers.
-
It has the characteristics of what biologists call a ‘semi-permeable membrane’ in the way that it allows Economic Value to be extracted from other stakeholders but not to pass the other way.
-
-
Capital most certainly is and always has been - through the discontinuity (see diagram) between:‘Fixed’ Capital in the form of shares ie Equity; and ‘Working’ Capital in the form of debt finance, credit from suppliers, pre-payments by customers and obligations to staff and management.
-
xchange of Economic Value in a Closed Corporate is made difficult and true sharing of Risk and Reward is simply not possible
-
All that is needed is a simple ‘Member Agreement’ – a legal protocol which sets out the Aims, Objectives. Principles of Governance, Revenue Sharing, Dispute Resolution, Transparency and any other matters that Members agree should be included. Amazingly enough, this Agreement need not even be in writing, since in the absence of a written agreement Partnership Law is applied by way of default.
-
The ease of use and total flexibility enables the UK LLP to be utilised in a way never intended – as an ‘Open’ Corporate partnership.
-
it is now possible for any stakeholder to become a Member of a UK LLP simply through signing a suitably drafted Member Agreement
-
may instead become true Partners in the Enterprise with their interests aligned with other stakeholders.
-
-
no profit or loss in an Open Corporate Partnership, merely Value creation and exchange between members in conformance with the Member Agreement.
-
in an Enterprise constitute an infinitely divisible, flexible and scaleable form of Capital capable of distributing or accumulating Value organically as the Enterprise itself grows in Value or chooses to distribute it.
-
Within the OCP Capital and Revenue are continuous: to the extent that an Investee pays Rental in advance of the due date he becomes an Investor.
-
A Co-operative is not an enterprise structure: it is a set of Principles that may be applied to different types of enterprise structure.
-
the crippling factors in practical terms have been, inter alia: the liability to which Member partners are exposed from the actions of their co-partners on their behalf; limited ability to raise capital.
-
they favour the interests of other stakeholders, are relatively restricted in accessing investment; are arguably deficient in incentivising innovation.
-
The ‘new’ LLP was expressly created to solve the former problem by limiting the liability of Member partners to those assets which they choose to place within its protective ‘semi-permeable membrane’
-
However, the ability to configure the LLP as an “Open” Corporate permits a new and superior form of Enterprise.
-
it is possible to re-organise any existing enterprise as either a partnership or as a partnership of partnerships.
-
would be divided among Members in accordance with the LLP Agreement. This means that all Members share a common interest in collaborating/co-operating to maximise the Value generated by the LLP collectively as opposed to competing with other stakeholders to maximise their individual share at the other stakeholders’ expense.
-
he ‘Commercial’ Enterprise LLP – where the object is for a closed group of individuals to maximise the value generated in their partnership. There are already over 7,000 of these.
-
-
the Profit generated in a competitive economy based upon shareholder value and unsustainable growth results from a transfer of risks outwards, and the transfer of reward inwards, leading to a one way transfer of Economic Value.
-
Whether its assets are protected within a corporate entity with limited liability or not, it will always operate co-operatively – for mutual profit.
-
continuity between Capital as Static Value and Money as Dynamic Value which has never before been possible due to the dichotomy between the absolute/infinite and the absolute/finite durations of the competing claims over assets – “Equity” and “Debt”
-
Open Capital Partnership gives rise to a new form of Financial Capital of indeterminate duration. It enables the Capitalisation of assets and the monetisation of revenue streams in an entirely new way.
-
It is possible to envisage a Society within which individuals are members of a portfolio of Enterprises constituted as partnerships, whether limited in liability or otherwise.
-
‘Commercial’ enterprises of all kinds aimed at co-operatively working together to maximise value for the Members.
-
It can only be replaced by another ‘emergent’ phenomenon, which is adopted ‘virally’ because any Enterprise which does not utilise it will be at a disadvantage to an Enterprise which does.
-
The ‘Open’ Corporate Partnership is: capable of linking any individuals anywhere in respect of collective ownership of assets anywhere; extremely cheap and simple to operate; and because one LLP may be a Member of another it is organically flexible and ‘scaleable’. The phenomenon of “Open Capital” – which is already visible in the form of significant commercial transactions - enables an extremely simple and continuous relationship between those who wish to participate indefinitely in an Enterprise and those who wish to participate for a defined period of time.
-
Moreover, the infinitely divisible proportionate “shares” which constitute ‘Open’ Capital allow stakeholder interests to grow flexibly and organically with the growth in Value of the Enterprise. In legal terms, the LLP agreement is essentially consensual and ‘pre-distributive’: it is demonstrably superior to prescriptive complex contractual relationships negotiated adversarially and subject to subsequent re-distributive legal action. Above all, the ‘Open’ Corporate Partnership is a Co-operative phenomenon which is capable, the author believes, of unleashing the “Co-operative Advantage” based upon the absence of a requirement to pay returns to “rentier” Capitalists.
34More
Dark Intellectual Property. Why We Need a Kickstarter for Patents - 0 views
www.wired.com/...need-a-kickstarter-for-patents
ip academia paper argument Tibi Greg university dark IP
shared by Tiberius Brastaviceanu on 06 Aug 13
- No Cached
-
“dark IP,” the intellectual property (IP) that remains on the shelf: undiscovered, unexplored, untapped
-
our ability to catch so much in the net by dragging the surface (to use Mike Bergman’s analogy) actually still misses the invisible wealth of what lies beneath.
-
But dark IP is different than the other hidden-depths knowledge since it’s also unfair. Because taxpayers paid for much of the research — whether basic understanding with long-term benefits or more applied research with shorter-term benefits — that now lies collecting dust on university shelves.
- ...31 more annotations...
-
the people of the United States spent an average of nearly $40 billion every year supporting institutional research
-
most of the IP (much of which we paid for) isn’t actually on the street, where entrepreneurial folks can do something with it.
-
very few people are aware of — let alone able to access — an invention outside the social circle of its inventors, the scientific community involved, or even the “crowd” that’s sometimes harnessed in open innovation
-
Not democratizing the IP itself — institutions should still own and generate profits from the intellectual property they’ve created — but democratizing the ways in which we allow this IP to be discovered and licensed.
-
-
This turns off the average entrepreneur, who doesn’t have the patience and bandwidth to engage in all the unnecessary overhead of searching, browsing, and licensing IP.
-
Another missing piece is ways of allowing the crowd to interact with each other and decide which technologies should be licensed
-
-
Most of the examples I listed above haven’t changed much over the past decade or broken into the mainstream.
-
Such a website would bring together not just funds and transactions, but communities — with their attendant feedback mechanisms — that are interested in creating something novel around unused patents.