Skip to main content

Home/ Sensorica Knowledge/ Group items tagged tasks

Rss Feed Group items tagged

Kurt Laitner

Stigmergy | GeorgieBC's Blog - 0 views

  • As no one owns the system, there is no need for a competing group to be started to change ownership to a different group
    • Kurt Laitner
       
      but one needs a mechanism to ensure accidental duplication doesn't happen
  • there is no need for communication outside of task completion
    • Kurt Laitner
       
      disagree
  • endless discussion
  • ...12 more annotations...
  • personality conflicts
  • begin to steer direction
  • more interested and dedicated personalities emerge
    • Kurt Laitner
       
      as opposed to the 'strong' personalities earlier panned?
  • work most valued by the rest of the user group
    • Kurt Laitner
       
      determined how?
  • As more members are added, more will experience frustration at limited usefulness or autonomy
    • Kurt Laitner
       
      how to avoid this duplication of skills?
  • stigmergy encourages splintering
    • Kurt Laitner
       
      I would need to see a convincing argument for this, ant colonies are pretty large
  • as communication is easier and there is more autonomy in smaller groups, splintering is the more likely outcome of growth.
    • Kurt Laitner
       
      not convinced that splintering should be the outcome, fractal growth would be preferable, also communication is not limited to small groups, nor is it necessarily 'better' in them
  • Transparency allows information to travel freely between the various nodes
  • Information sharing is driven by the information, not personal relationships
  • it is inefficient to have the same task performed twice
    • Kurt Laitner
       
      that depends on the type of task, and the way it is being done, if it is repetative with a well understood solution, then yes, otherwise less so
  • It is neither reasonable nor desirable for individual thought and action to be subjugated to group consensus in matters which do not affect the group
  • it is frankly impossible to accomplish complex tasks if every decision must be presented for approval
Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • control over Google products
  • can access and control Google Spreadsheets and other products
  • scripts
  • ...44 more annotations...
  • run directly on Google servers in order to provide direct access to the products they control.
  • can also use Google Apps Script from Google Sites
  • Google Apps Script Template Gallery
  • Google Apps Script Blog
  • guide contains the information you need to use Google Apps Script, a server-side scripting language, based on JavaScript, that runs on Google's servers alongside Google Apps
  • enable varying degrees of interactivity among the applications
  • easy enough to use that you don't have to be a programmer to create scripts.
  • use it to automate complex tasks within Google Apps
  • You don't have to be a programmer to use Google Apps Script
  • A script is a series of instructions you write in a computer language to accomplish a particular task. You type in the instructions and save them as a script. The script runs only under circumstances you define.
  • The Google Apps Script API provides a set of objects. You can use these objects and their associates methods to access Google Docs and Spreadsheets, Gmail, Google Finance, and other Google applications.
  • To run a script, you must first add the script to a Google Spreadsheet or Google Site using the Script Editor.
  • You can retrieve information from a wide selection of Google Apps and Services and from external sources, including web pages and XML sources. You can use Google Apps Script to create email, spreadsheets, pages on Google Sites, and files in the Google Docs Document List.
  • The instructions in a script are grouped into functions.
  • objects
  • methods
  • for such tasks
  • Create pages on a Google Site
  • Customize a Spreadsheet
  • Send email based on information in a Spreadsheet
  • You can manipulate
  • numeric
  • financial
  • string
  • an XML document
  • controlling data in the following applications
  • Spreadsheets
  • Google Document List
  • Contacts
  • Calendar
  • Sites
  • Google Maps
  • create and display interactive user interface elements
  • interact with relational database management systems
  • create folders, subfolders, and files in the Google Docs document list
  • access to user, session, and browser information
  • access to web services
  • extract data from XML documents and then manipulate that data
  • obtain translations of text from one language to another
  • send email
  • UrlFetch services
  • encode and decode strings and format dates
  • store properties on a per-script and per-user basis
  • create, delete and update contact information for individuals and for groups in Google Contacts
Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • Use the Script Editor to write and run scripts, to set triggers, and to perform other actions such as sharing scripts.
  • start the Script Editor from a Google Site
  • declares a function called myFunction()
  • ...69 more annotations...
  • You can perform the following tasks from the Script Editor.
  • pening, deleting, renaming, and saving scripts
  • Cutting, copying, and pasting text
  • Find and replace
  • Setting a time zone
  • scripts with time-based triggers
  • Running functions
  • Viewing log messages
  • revision history
  • write pseudocode first
  • When you're planning a script
  • narrative version of what the script needs to do.
  • A particular script is associated with one and only one Google Spreadsheet.
  • If you make a copy of the Spreadsheet, the script is also copied.
  • A particular Spreadsheet can have multiple scripts associated with it.
  • use the onOpen event handler in more than one script associated with a particular Spreadsheet, all scripts begin to execute when you open the Spreadsheet and the order in which the scripts are executed is indeterminate.
  • event handler is a function executed when a particular event takes place.
  • see Running Scripts in Response to an Event.
  • A script cannot currently call or create another script and cannot call functions in another script.
  • If you want to store the results of a function, you must copy them into a spreadsheet cell.
  • You can trigger Apps Script events from links that are embedded in a Google Site. For information about how to do this, see Using Apps Scrip in Your Ssite.
  • You can insert a script into a Site as a gadget.
  • you must grant permission for the script to run as a service.
  • You also designate whether only you can invoke the service or whether all members of your domain can invoke the service.
  • you can assign functions within the script any arbitrary name.
  • The instructions in a function must be enclosed within curly braces.
  • event handler
  • when a spreadsheet is opened,
  • when a script is installed
  • when a spreadsheet is edited
  • at times you choose
  • menu item
  • Using a drawing or button embedded in a Spreadsheet
  • Using a custom function that is referenced as a Spreadsheet function
  • Clicking the Run button
  • object-oriented programming languages
  • Google Apps Script uses the JavaScript language.
  • Operations
  • are performed using the objects and methods described in the API documentation.
  • An API provides pre-packaged code for standard tasks you need to accomplish in scripts or programs.
  • API includes objects that you use to accomplish tasks such as sending email, creating calendar entries
  • A method describes the behavior of an object and is a function attached to an object.
  • MailApp
  • use to create and send email
  • To send email, you invoke the sendEmail method and provide values for the method arguments.
  • Google Apps Script can access or retrieve data in different formats in different ways.
  • A custom function
  • is called directly from a cell in a Spreadsheet using the syntax =myFunctionName()
  • they cannot set values outside the cells
  • have some restrictions not shared by other functions
  • cannot send email
  • cannot operate on a Google Site
  • cannot perform any operations that require user authorization
  • cannot perform any operations that require knowledge of who the user
  • onInstall function
  • onOpen function
  • Other functions run when you run them manually or when they are triggered by clicking
  • Custom functions and formulas in the spreadsheet execute any time the entire Spreadsheet is evaluated or when the data changes in the function or formula's cell.
  • share the Spreadsheet
  • publish the script to the Script Gallery
  • spreadsheet template
  • the color coding for that line will not be correct
  • A script with incorrect syntax or other errors does not run.
  • The Script Editor includes a debugger.
  • view the current state of variables and objects created by a script while that script runs.
  • step through the code line by line as it executes or set breakpoints
  • The debugger does not work with custom functions, onEdit functions, event triggers, or scripts running as a service.
  • use the debugger to find errors in scripts that are syntactically correct but still do not function correctly.
  • Functions ending in an underscore (_), for example, internalStuff_(), are treated differently from other functions. You do not see these function in the Run field in the Script Editor and they do not appear in the Script Manager in the Spreadsheet. You can use the underscore to indicate that users should not attempt to run the function and the function is available only to other functions.
Tiberius Brastaviceanu

Beyond Blockchain: Simple Scalable Cryptocurrencies - The World of Deep Wealth - Medium - 0 views

  • I clarify the core elements of cryptocurrency and outline a different approach to designing such currencies rooted in biomimicry
  • This post outlines a completely different strategy for implementing cryptocurrencies with completely distributed chains
  • Rather than trying to make one global, anonymous, digital cash
  • ...95 more annotations...
  • we are interested in the resilience that comes from building a rich ecosystem of interoperable currencies
  • What are the core elements of a modern cryptocurrency?
  • Digital
  • Holdings are electronic and only exist and operate by virtue of a community’s agreement about how to interpret digital bits according to rules about operation and accounting of the currency.
  • Trustless
  • don’t have to trust a 3rd party central authority
  • Decentralized
  • Specifically, access, issuance, transaction accounting, rules & policies, should be collectively visible, known, and held.
  • Cryptographic
  • This cryptographic structure is used to enable a variety of people to host the data without being able to alter it.
  • Identity
  • there must be a way to associate these bits with some kind of account, wallet, owner, or agent who can use them
  • Other things that many take for granted in blockchains may not be core but subject to decisions in design and implementation, so they can vary between implementations
  • It does not have to be stored in a synchronized global ledger
  • does not have to be money. It may be a reputation currency, or data used for identity, or naming, etc
  • Its units do not have to be cryptographic tokens or coins
  • It does not have to protect the anonymity of users, although it may
  • if you think currency is only money, and that money must be artificially scarce
  • Then you must tackle the problem of always tracking which coins exist, and which have been spent. That is one approach — the one blockchain takes.
  • You might optimize for anonymity if you think of cryptocurrency as a tool to escape governments, regulations, and taxes.
  • if you want to establish and manage membership in new kinds of commons, then identity and accountability for actions may turn out to be necessary ingredients instead of anonymity.
  • In the case of the MetaCurrency Project, we are trying to support many use cases by building tools to enable a rich ecosystem of communities and current-sees (many are non-monetary) to enhance collective intelligence at all scales.
  • Managing consensus about a shared reality is a central challenge at the heart of all distributed computing solutions.
  • If we want to democratize money by having cryptocurrencies become a significant and viable means of transacting on a daily basis, I believe we need fundamentally more scalable approaches that don’t require expensive, dedicated hardware just to participate.
  • We should not need system wide consensus for two people to do a transaction in a cryptocurrency
  • Blockchain is about managing a consensus about what was “said.” Ceptr is about distributing a consensus about how to “speak.”
  • how nature gets the job done in massively scalable systems which require coordination and consistency
  • Replicate the same processes across all nodes
  • Empower every node with full agency
  • Hold this transformed state locally and reliably
  • Establish protocols for interaction
  • Each speaker of a language carries the processes to understand sentences they hear, and generate sentences they need
  • we certainly don’t carry some kind of global ledger of everything that’s ever been said, or require consensus about what has been said
  • Language IS a communication protocol we learn by emulating the processes of usage.
  • Dictionaries try to catch up when the usage
  • there is certainly no global ledger with consensus about the state of trillions of cells. Yet, from a single zygote’s copy of DNA, our cells coordinate in a highly decentralized manner, on scales of trillions, and without the latency or bottlenecks of central control.
  • Imagine something along the lines of a Java Virtual Machine connected to a distributed version of Github
  • Every time this JVM runs a program it confirms the hash of the code it is about to execute with the hash signed into the code repository by its developers
  • This allows each node that intends to be honest to be sure that they’re running the same processes as everyone else. So when two parties want to do a transaction, and each can have confidence their own code, and the results that your code produces
  • Then you treat it as authoritative and commit it to your local cryptographically self-validating data store
  • Allowing each node to treat itself as a full authority to process transactions (or interactions via shared protocols) is exactly how you empower each node with full agency. Each node runs its copy of the signed program/processes on its own virtual machine, taking the transaction request combined with the transaction chains of the parties to the transaction. Each node can confirm their counterparty’s integrity by replaying their transactions to produce their current state, while confirming signatures and integrity of the chain
  • If both nodes are in an appropriate state which allows the current transaction, then they countersign the transaction and append to their respective chains. When you encounter a corrupted or dishonest node (as evidenced by a breach of integrity of their chain — passing through an invalid state, broken signatures, or broken links), your node can reject the transaction you were starting to process. Countersigning allows consensus at the appropriate scale of the decision (two people transacting in this case) to lock data into a tamper-proof state so it can be stored in as many parallel chains as you need.
  • When your node appends a mutually validated and signed transaction to its chain, it has updated its local state and is able to represent the integrity of its data locally. As long as each transaction (link in the chain) has valid linkages and countersignatures, we can know that it hasn’t been tampered with.
  • If you can reliably embody the state of the node in the node itself using Intrinsic Data Integrity, then all nodes can interact in parallel, independent of other interactions to maximize scalability and simultaneous processing. Either the node has the credits or it doesn’t. I don’t have to refer to a global ledger to find out, the state of the node is in the countersigned, tamper-proof chain.
  • Just like any meaningful communication, a protocol needs to be established to make sure that a transaction carries all the information needed for each node to run the processes and produce a new signed and chained state. This could be debits or credits to an account which modify the balance, or recoding courses and grades to a transcript which modify a Grade Point Average, or ratings and feedback contributing to a reputation score, and so on.
  • By distributing process at the foundation, and leveraging Intrinsic Data Integrity, our approach results in massive improvements in throughput (from parallel simultaneous independent processing), speed, latency, efficiency, and cost of hardware.
  • You also don’t need to incent people to hold their own record — they already want it.
  • Another noteworthy observation about humans, cells, and atoms, is that each has a general “container” that gets configured to a specific use.
  • Likewise, the Receptors we’ve built are a general purpose framework which can load code for different distributed applications. These Receptors are a lightweight processing container for the Ceptr Virtual Machine Host
  • Ceptr enables a developer to focus on the rules and transactions for their use case instead of building a whole framework for distributed applications.
  • how units in a currency are issued
  • Most people think that money is just money, but there are literally hundreds of decisions you can make in designing a currency to target particular needs, niches, communities or patterns of flow.
  • Blockchain cryptocurrencies are fiat currencies. They create tokens or coins from nothing
  • These coins are just “spoken into being”
  • the challenging task of
  • ensure there is no counterfeiting or double-spending
  • Blockchain cryptocurrencies are fiat currencies
  • These coins are just “spoken into being”
  • the challenging task of tracking all the coins that exist to ensure there is no counterfeiting or double-spending
  • You wouldn’t need to manage consensus about whether a cryptocoin is spent, if your system created accounts which have normal balances based on summing their transactions.
  • In a mutual credit system, units of currency are issued when a participant extends credit to another user in a standard spending transaction
  • Alice pays Bob 20 credits for a haircut. Alice’s account now has -20, and Bob’s has +20.
  • Alice spent credits she didn’t have! True
  • Managing the currency supply in a mutual credit system is about managing credit limits — how far people can spend into a negative balance
  • Notice the net number units in the system remains zero
  • One elegant approach to managing mutual credit limits is to set them based on actual demand.
  • concerns about manufacturing fake accounts to game credit limits (Sybil Attacks)
  • keep in mind there can be different classes of accounts. Easy to create, anonymous accounts may get NO credit limit
  • What if I alter my code to give myself an unlimited credit limit, then spend as much as I want? As soon as you pass the credit limit encoded in the shared agreements, the next person you transact with will discover you’re in an invalid state and refuse the transaction.
  • If two people collude to commit an illegal transaction by both hacking their code to allow a normally invalid state, the same still pattern still holds. The next person they try to transact with using untampered code will detect the problem and decline to transact.
  • Most modern community currency systems have been implemented as mutual credit,
  • Hawala is a network of merchants and businessmen, which has been operating since the middle ages, performing money transfers on an honor system and typically settling balances through merchandise instead of transferring money
  • Let’s look at building a minimum viable cryptocurrency with the hawala network as our use case
  • To minimize key management infrastructure, each hawaladar’s public key is their address or identity on the network. To join the network you get a copy of the software from another hawaladar, generate your public and private keys, and complete your personal profile (name, location, contact info, etc.). You call, fax, or email at least 10 hawaladars who know you, and give them your IP address and ask them to vouch for you.
  • Once 10 other hawaladars have vouched for you, you can start doing other transactions because the protocol encoded in every node will reject a transaction chain that doesn’t start with at least 10 vouches
  • seeding your information with those other peers so you can be found by the rest of the network.
  • As described in the Mutual Credit section, at the time of transaction each party audits the counterparty’s transaction chain.
  • Our hawala crypto-clearinghouse protocol has two categories of transactions: some used for accounting and others for routing. Accounting transactions change balances. Routing transactions maintain network integrity by recording information about hawaladar
  • Accounting Transactions create signed data that changes account balances and contains these fields:
  • The final hash of all of the above fields is used as a unique transaction ID and is what each of party signs with their private keys. Signing indicates a party has agreed to the terms of the transaction. Only transactions signed by both parties are considered valid. Nodes can verify signatures by confirming that decryption of the signature using the public key yields a result which matches the transaction ID.
  • Routing Transactions sign data that changes the peers list and contain these fields:
  • As with accounting transactions, the hash of the above fields is used as the transaction’s unique key and the basis for the cryptographic signature of both counterparties.
  • Remember, instead of making changes to account balances, routing transactions change a node’s local list of peers for finding each other and processing.
  • a distributed network of mutual trust
  • operates across national boundaries
  • everyone already keeps and trusts their own separate records
  • Hawaladars are not anonymous
  • “double-spending”
  • It would be possible for someone to hack the code on their node to “forget” their most recent transaction (drop the head of their chain), and go back to their previous version of the chain before that transaction. Then they could append a new transaction, drop it, and append again.
  • After both parties have signed the agreed upon transaction, each party submits the transaction to separate notaries. Notaries are a special class of participant who validate transactions (auditing each chain, ensuring nobody passes through an invalid state), and then they sign an outer envelope which includes the signatures of the two parties. Notaries agree to run high-availability servers which collectively manage a Distributed Hash Table (DHT) servicing requests for transaction information. As their incentive for providing this infrastructure, notaries get a small transaction fee.
  • This approach introduces a few more steps and delays to the transaction process, but because it operates on independent parallel chains, it is still orders of magnitude more efficient and decentralized than reaching consensus on entries in a global ledger
  • millions of simultaneous transactions could be getting processed by other parties and notaries with no bottlenecks.
  • There are other solutions to prevent nodes from dropping the head of their transaction chain, but the approach of having notaries serve out a DHT solves a number of common objections to completely distributed accounting. Having access to reliable lookups in a DHT provides a similar big picture view that you get from a global ledger. For example, you may want a way to look up transactions even when the parties to that transaction are offline, or to be able to see the net system balance at a particular moment in time, or identify patterns of activity in the larger system without having to collect data from everyone individually.
  • By leveraging Intrinsic Data Integrity to run numerous parallel tamper-proof chains you can enable nodes to do various P2P transactions which don’t actually require group consensus. Mutual credit is a great way to implement cryptocurrencies to run in this peered manner. Basic PKI with a DHT is enough additional infrastructure to address main vulnerabilities. You can optimize your solution architecture by reserving reserve consensus work for tasks which need to guarantee uniqueness or actually involve large scale agreement by humans or automated contracts.
  • It is not only possible, but far more scalable to build cryptocurrencies without a global ledger consensus approach or cryptographic tokens.
  •  
    Article written by Arthur Brook, founder of Metacurrency project and of Ceptr.
Kurt Laitner

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
Tiberius Brastaviceanu

GitHub Has Big Dreams for Open-Source Software, and More - NYTimes.com - 0 views

  • GitHub has no managers among its 140 employees, for example. “Everyone has management interests,” he said. “People can work on things that are interesting to them. Companies should exist to optimize happiness, not money. Profits follow.” He does, however, retain his own title and decides things like salaries.
  • Another member of GitHub has posted a talk that stresses how companies flourish when people want to work on certain things, not because they are told to.
  • Asana bases work on a series of to-do lists that people assign one another. Inside Asana there are no formal titles, though like GitHub there are bosses at the top who make final decisions.
  • ...8 more annotations...
  • For all the happiness and sharing, real money is involved here. In July GitHub received $100 million from the venture capital firm Andreessen Horowitz. This early in most software companies’ lives, $20 million would be a fortune.
  • GitHub’s popularity has also made it an important way for companies to recruit engineers, because some of the best people in the business are showing their work or dissecting the work of others inside some of the public pull requests.
  • Mr. Preston-Werner thinks the way open source requires a high degree of trust and collaboration among relative equals (plus a few high-level managers who define the scope of a job and make final decisions) can be extended more broadly, even into government.
  • “For now this is about code, but we can make the burden of decision-making into an opportunity,” he said. “It would be useful if you could capture the process of decision-making, and see who suggested the decisions that created a law or a bill.”
  • Can this really be extended across a large, complex organization, however?
  • As complex as an open-source project may be, it is also based on a single, well-defined outcome, and an engineering task that is generally free of concepts like fairness and justice, about which people can debate endlessly.
  • Google once prided itself on few managers and fast action, but has found that getting big can also involve lots more meetings.
  • Still, these fast-rising successes may be on to something more than simply universalizing the means of their own good fortune. An early guru of the Information Age, Peter Drucker, wrote often in the latter part of his career of the need for managers to define tasks, and for workers to seek fulfillment before profits.
Francois Bergeron

Taskworld: Improving how the world collaborates-one task at a time™ - 2 views

  • A task management platform that measures performance and improves execution
Tiberius Brastaviceanu

Just One Giant Lab - Learning and Solving Together - 1 views

  •  
    "research and innovation laboratory operating as a distributed, open and massive mobilisation platform for collaborative task solving."
Tiberius Brastaviceanu

The commons law project: A vision of green governance - 0 views

  • “commons law” (not to be confused with common law)
  • Commons law consists of those social practices, cultural traditions and specific bodies of formal law that recognize the rights of commoners to manage their own resources
  • Ever since the rise of the nation-state and especially industrialized markets, however, commons law has been marginalized if not eclipsed by contemporary forms of market-based law
  • ...19 more annotations...
  • individual property rights and market exchange have been elevated over most everything else, and this has only eroded the rights of commoners,
  • reframe the very notion of “the economy” to incorporate non-market sharing and collaboration.
  • we had concluded that incremental efforts to expand human rights and environmental protection within the framework of the State/Market duopoly were simply not going to achieve much
  • the existing system of regulation and international treaties has been a horrendous failure over the past forty years. Neoliberal economics has corrupted and compromised law and regulation, slashing away at responsible stewardship of our shared inheritance while hastening a steady decline of the world’s ecosystems
  • We concluded that new forms of ecological governance that respect human rights, draw upon commons models and reframe our understanding of economic value, hold great promise
  • An economics and supporting civic polity that valorizes growth and material development as the precondition for virtually everything else is ultimately a dead end—literally.
  • Achieving a clean, healthy and ecologically balanced environment requires that we cultivate a practical governance paradigm based on, first, a logic of respect for nature, sufficiency, interdependence, shared responsibility and fairness among all human beings; and, second, an ethic of integrated global and local citizenship that insists upon transparency and accountability in all activities affecting the integrity of the environment.
  • We believe that commons- and rights-based ecological governance—green governance—can fulfill this logic and ethic. Properly done, it can move us beyond the neoliberal State and Market alliance—what we call the ‘State/Market’—which is chiefly responsible for the current, failed paradigm of ecological governance.
  • The basic problem is that the price system, seen as the ultimate governance mechanism of our polity, falls short in its ability to represent notions of value that are subtle, qualitative, long-term and complicated.
  • These are, however, precisely the attributes of natural systems.
  • Exchange value is the primary if not the exclusive concern.
  • anything that does not have a price and exists ‘outside’ the market is regarded (for the purposes of policy-making) as having subordinate or no value.
  • industry lobbies have captured if not corrupted the legislative process
  • regulation has become ever more insulated from citizen influence and accountability as scientific expertise and technical proceduralism have come to be more and more the exclusive determinants of who may credibly participate in the process
  • we have reached the limits of leadership and innovation within existing institutions and policy structures
  • it will not be an easy task to make the transition from State/Market ecological governance to commons- and rights-based ecological governance
  • It requires that we enlarge our understanding of ‘value’ in economic thought to account for nature and social well-being; that we expand our sense of human rights and how they can serve strategic as well as moral purposes; that we liberate ourselves from the limitations of State-centric models of legal process; and that we honor the power of non-market participation, local context and social diversity in structuring economic activity and addressing environmental problems.
  • articulate and foster a coherent new paradigm
  • deficiencies of centralized governments (corruption, lack of transparency, rigidity, a marginalized citizenry)
Kurt Laitner

Goodbye, Dilbert: 'The Rise of the Naked Economy' » Knowledge@Wharton - 2 views

  • “teaming”: bringing together a team of professionals for a specific task
  • The old cubicle-based, static company is increasingly being replaced by a more fluid and mobile model: “the constant assembly, disassembly, and reassembly of people, talent, and ideas around a range of challenges and opportunities.”
  • Therefore, the new economy and its “seminomadic workforce” will require “new places to gather, work, live, and interact.”
  • ...17 more annotations...
  • The consumer electronics company Plantronics, for example, knowing that on any given day 40% of its workforce will be working elsewhere, designed its corporate campus to only 60% capacity
  • Their joint enterprise, NextSpace, became their first venture into what they call “coworking,” or the creation of “shared collaborative workspaces.”
  • also nurtures what the authors call “managed serendipity” — ad hoc collaboration between people with diverging but complementary skills
  • the number of coworking spaces worldwide has shot up from 30 in 2006 to 1,130 in 2011
  • someone needs to keep an eye on the big picture, to “connect the dots.”
  • workspaces are designed on a flexible, on-demand and as-needed basis
  • Coonerty and Neuner found that the most productive collaborations tended to pair highly specialized experts with big-picture thinkers
  • they were struck by the number of entrepreneurs and freelancers working at coffee shops in the area
  • Business Talent Group
  • Clients get the specialized help they need at a cost below that of a full-time employee or traditional consulting firm, and specialists are well compensated and rewarded with flexible schedules and a greater degree of choice about which projects to take.
  • This has produced a new market dynamic in which the headhunter of yesteryear has been replaced by “talent brokers” who connect highly specialized talent with companies on a project-by-project basis
  • Matthew Mullenweg, doesn’t have much faith in traditional office buildings or corporate campuses: “I would argue that most offices are full of people not working.”
  • On the other hand, Mullenweg is a big believer in face-to-face collaboration and brainstorming, and flies his teams all over the globe to do so.
  • He also set up an informal workspace in San Francisco called the Lounge
  • Additionally, a 2010 Kauffman-Rand study worried that employer-based health insurance, by discouraging risk-taking, will be an ongoing drag on entrepreneurship
  • the problem of payroll taxes for freelancers
  • up to 44% of independent workers encounter difficulty getting paid fully for their work
Kurt Laitner

Value Accounting System - P2P Foundation - 0 views

  • are not exchanging anything among themselves
    • Kurt Laitner
       
      Not sure this is true in all cases or even in this one
  • A value creation process that requires more than one individual can be based on following 3 arrangements
  • stigmergic coordination
  • ...16 more annotations...
  • collaboration
  • cooperation,
  • The problem is that this economic dependency is not symmetrical
  • All labor is transferred into fluid equity through a value accounting system, which grants ownership to the participant member to a percentage of the future revenue generated for the lifetime of the product created
  • risk is shared among all contributors
  • based on contributions
    • Kurt Laitner
       
      and RISK, and...
  • anyone can add value
  • decentralized in terms of allocation of resources
  • horizontal governance system
    • Kurt Laitner
       
      not necessarily
  • A prearrangement on revenue is impossible in this context
  • impossible to do time management
  • no one can force anyone else to work more
  • the value equation embodies positive and negative (intrinsic) incentives
  • contains parameters to incentivise periodic and frequent contributions
  • quality of execution
  • priority level of tasks.
Kurt Laitner

On the Phenomenon of Bullshit Jobs - STRIKE! - 1 views

  • financial services or telemarketing, or the unprecedented expansion of sectors like corporate law, academic and health administration, human resources, and public relations
  • provide administrative, technical, or security support for these industries, or for that matter the whole host of ancillary industries (dog-washers, all-night pizza deliverymen) that only exist because everyone else is spending so much of their time working in all the other ones
  • It’s as if someone were out there making up pointless jobs just for the sake of keeping us all working. And here, precisely, lies the mystery. In capitalism, this is exactly what is not supposed to happen
  • ...23 more annotations...
  • Sure, in the old inefficient socialist states like the Soviet Union, where employment was considered both a right and a sacred duty, the system made up as many jobs as they had to (this is why in Soviet department stores it took three clerks to sell a piece of meat)
  • working 40 or even 50 hour weeks on paper, but effectively working 15 hours just as Keynes predicted, since the rest of their time is spent organising or attending motivational seminars
  • The ruling class has figured out that a happy and productive population with free time on their hands is a mortal danger
  • The answer clearly isn’t economic: it’s moral and political
  • And, on the other hand, the feeling that work is a moral value in itself, and that anyone not willing to submit themselves to some kind of intense work discipline for most of their waking hours deserves nothing, is extraordinarily convenient for them
  • Hell is a collection of individuals who are spending the bulk of their time working on a task they don’t like and are not especially good at
  • they all become so obsessed with resentment at the thought that some of their co-workers might be spending more time making cabinets
  • It’s not entirely clear how humanity would suffer were all private equity CEOs, lobbyists, PR researchers, actuaries, telemarketers, bailiffs or legal consultants to similarly vanish. (Many suspect it might markedly improve.)
  • plagued with debts and a newborn daughter, ended up, as he put it, “taking the default choice of so many directionless folk: law school
  • Now he’s a corporate lawyer working in a prominent New York firm. He was the first to admit that his job was utterly meaningless, contributed nothing to the world, and, in his own estimation, should not really exist
  • I would not presume to tell someone who is convinced they are making a meaningful contribution to the world that, really, they are not. But what about those people who are themselves convinced their jobs are meaningless?
  • (Answer: if 1% of the population controls most of the disposable wealth, what we call “the market” reflects what they think is useful or important, not anybody else.)
  • should you meet them at parties and admit that you do something that might be considered interesting (an anthropologist, for example), will want to avoid even discussing their line of work entirely
  • This is a profound psychological violence here. How can one even begin to speak of dignity in labour when one secretly feels one’s job should not exist?
  • Yet it is the peculiar genius of our society that its rulers have figured out a way, as in the case of the fish-fryers, to ensure that rage is directed precisely against those who actually do get to do meaningful work
  • in our society, there seems a general rule that, the more obviously one’s work benefits other people, the less one is likely to be paid for it
  • There’s a lot of questions one could ask here, starting with, what does it say about our society that it seems to generate an extremely limited demand for talented poet-musicians, but an apparently infinite demand for specialists in corporate law?
  • Even more perverse, there seems to be a broad sense that this is the way things should b
  • You can see it when tabloids whip up resentment against tube workers for paralysing London during contract disputes: the very fact that tube workers can paralyse London shows that their work is actually necessary, but this seems to be precisely what annoys people
  • It’s even clearer in the US, where Republicans have had remarkable success mobilizing resentment against school teachers, or auto workers (and not, significantly, against the school administrators or auto industry managers who actually cause the problems)
  • It’s as if they are being told “but you get to teach children! Or make cars! You get to have real jobs! And on top of that you have the nerve to also expect middle-class pensions and health care?”
  • If someone had designed a work regime perfectly suited to maintaining the power of finance capital, it’s hard to see how they could have done a better job
  • The remainder are divided between a terrorised stratum of the – universally reviled – unemployed and a larger stratum who are basically paid to do nothing, in positions designed to make them identify with the perspectives and sensibilities of the ruling class (managers, administrators, etc) – and particularly its financial avatars – but, at the same time, foster a simmering resentment against anyone whose work has clear and undeniable social value
Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • Google Apps Script provides you with the ability to build a user interface for displaying or capturing information.
  • Viewing the Available User Interface Elements
  • Your scripts can display the user interface in two ways:
  • ...48 more annotations...
  • from a Spreadsheet
  • from a Site
  • As a stand-alone servlet
  • Deciding Whether to Run a Script from a Spreadsheet or as a Service
  • The built-in code autocomplete functionality in the editor requires you to type the trailing period that follows app.
  • Plan the script. What tasks should the script accomplish?
  • Write down the specific information you want to display to or collect from your users.
  • Draw the user interface
  • Determine what the script and interface should do in response to any user input.
  • Determine the conditions for exiting the script.
  • you need a UiApp application object to contain the user interface elements. After you create the UiApp application object, you can add buttons, dialog boxes, panels, and other elements to the UiApp application object.
  • The general syntax for these operations is as follows:
  • To create a UiApp application object, use the syntax var your_application_object_name = UiApp.createApplication();
  • To create a user interface element and associate it with your UiApp application object, use the syntax var your_ui_element_name= your_application_object_name.createElement_Name();.
  • To add one user interface element to another
  • use the syntax your_ui_element_name1.add(your_ui_element_name2);
  • a button with the text Press Me on it:
  • creates a vertical panel.
  • other kinds of panels
  • pop-up panels, stack panels, focus panels, form panels, and so on.
  • code for displaying your button on the panel:
  • add the panel to the application:
  • nstruct Google Apps Script to display the interface elements:
  • You can create the user interface elements in any order.
  • the display order
  • Creating the elements and adding them to your application are separate steps requiring separate instructions.
  • a short script that does nothing but display a panel with a button on it.
  • You can chain together setter methods
  • sets its title
  • set the size of the object:
  • how to use Grid objects and the setWidget method to create a more complex layout and also how to create text boxes and label them.
  • To make a user interface useful, you need the ability to update a Spreadsheet with information a user enters from the interface.
  • a short script that responds to an action in the interface by updating the Spreadsheet.
  • looping structure in the script to keep the panel displayed and active
  • Server-side means that the actions are performed by a server
  • same script, with functions added that enable the form to be used multiple times before a user chooses to exit.
  • script collects some information from text fields on a panel and writes that information into the Spreadsheet.
  • You can make a script's user interface available to users from inside a Spreadsheet or Site or by running it separately as a service.
  • how to make the user interface as a service.
  • A script that provides a stand-alone user interface must invoke the doGet(e) function or the doPost(e) function for an HTML form submit.
  • A script that provides the user interface from the Spreadsheet invokes doc.show(app).
  • The doGet(e) function takes the argument e, passing in the arguments for the user interface, including the user name of the person invoking the script.
  • After you write the script, you publish it as a service. During the publishing process, you define who has access to the script.
  • In a Google Apps domain, you can publish the script so that only you have access or so that everyone in the domain has access.
  • In a Google consumer account, you can publish the script so that only you have access or so that everyone in the world has access.
  • Updating a Spreadsheet from the User Interface, the user interface is displayed from the Spreadsheet where the script is stored. The following code defines how the user interface is displayed:
  • Here's the skeleton code for displaying a user interface as a stand-alone service:
  • some aspects of the two ways to display a user interface.
Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • how to accomplish some common tasks
  • add a custom menu to a Spreadsheet and link specific functions in your script to menu items
  • the menu items, the functions pops up a message box.
  • ...11 more annotations...
  • you will want the custom menu to be displayed as soon as the Spreadsheet is opened. To do this,include an onOpen function in your script
  • array of objects
  • An array is a collection of elements that works something like a Spreadsheet. Each element in an array can be identified by its location in the array, called an index point.
  • Arrays
  • are zero-based
  • Arrays are a convenient way to store and manipulate data within a computer program or script.
  • Each menu item is placed inside curly braces, and this syntax defines each name-function name pair as an object.
  • After the definition of the menu entries comes the definition of the menu itself:
  • Here's generalized code for creating menu items and a menu.
  • The following code pops up a message box when a user selects a menu item on the new menu:
  • the generalized code
Tiberius Brastaviceanu

Google Apps Script - introduction - 0 views

  • installing and running existing scripts from the Script Gallery
  • Spreadsheet
  • Insert
  • ...27 more annotations...
  • Install
  • Close
  • Choose a script and click Run
  • The onOpen function adds the Finance menu and the menu item Get Stock to the Spreadsheet
  • the onOpen() function
  • code function onOpen() declares the function and its name
  • code between the curly braces is the code that performs actions when you run the onOpen() function
  • the SpreadsheetApp.getActiveSpreadsheet method to obtain a spreadsheet object representing the currently-active spreadsheet.
  • invoking methods on ss, the script can manipulate the currently-active spreadsheet.
  • method is code that is associate exclusively with a class and performs a particular task on objects of that class
  • insert the column headers into the corresponding cells
  • the getRange() method
  • setValue() method
  • identify
  • arguments
  • You use arguments to pass data to a method.
  • String data
  • is in quotation marks
  • line var row = 2; creates a variable row with an initial value of 2
  • a counter
  • while (true) loop
  • if loop
  • if (!symbol) break; causes the script to exit from the while loop when there is no stock symbol in the variable symbol
  • The exclamation point states a negative (not) condition
  • continues to run, incrementing the row each time until it reaches an empty row
  • the break causes the script to exit from the loop and finish.
  • To comment out the code, put two forward slashes at the beginning of each line:
Tiberius Brastaviceanu

Evolving Towards a Partner State in an Ethical Economy - 0 views

  • In the  emerging institutional model of peer production
  • we can distinguish an interplay between three partners
  • a community of contributors that create a commons of knowledge, software or design;
  • ...46 more annotations...
  • There is a clear institutional division of labour between these three players
  • a set of "for-benefit institutions' which manage the 'infrastructure of cooperation'
  • an enterpreneurial coalition that creates market value on top of that commons;
  • Can we also learn something about the politics of this new mode of value creation
  • Is there perhaps a new model of power and democracy co-evolving out of these new social practices, that may be an answer to the contemporary crisis of democracy
  • we are witnessing a new model for the state. A 'P2P' state, if you will.
  • The post-democratic logic of community
  • these communities are not democracies
  • because democracy, and the market, and hierarchy, are modes of allocation of scarce resources
  • Such communities are truly poly-archies and the type of power that is held in them is meritocratic, distributed, and ad hoc.
  • Everyone can contribute without permission, but such a priori permissionlessness is  matched with mechanisms for 'a posteriori'  communal validation, where those with recognized expertise and that are accepted by the community, the so-called 'maintainers' and the 'editors',  decide
  • These decisions require expertise, not communal consensus
  • tension between inclusiveness of participation and selection for excellence
  • allowing for maximum human freedom compatible with the object of cooperation. Indeed, peer production is always a 'object-oriented' cooperation, and it is the particular object that will drive the particular form chosen for its 'peer governance' mechanisms
  • The main allocation mechanism in such project, which replaces the market, the hierarchy and democracy,  is a 'distribution of tasks'
  • no longer a division of labor between 'jobs', and the mutual coordination works through what scientist call 'stigmergic signalling'
  • work environment is designed to be totally open and transparent
  • every participating individual can see what is needed, or not and decide accordingly whether to undertake his/her particular contribution
  • this new model
  • has achieved capacities both for global coordination, and for the small group dynamics that are characteristic of human tribal forms and that it does this without 'command and control'! In fact, we can say that peer production has enabled the global scaling of small-group dynamics.
  • And they have to be, because an undemocratic institution would also discourage contributions by the community of participants.
    • Kurt Laitner
       
      disagree, there are many ways to ethically distribute governance, not just democracy
  • Hence, an increased exodus of productive  capacities, in the form of direct use value production, outside the existing system of monetization, which only operates at its margins.
  • Where there is no tension between supply and demand, their can be no market, and no capital accumulation
  • Facebook and Google users create commercial value for their platforms, but only very indirectly and they are not at all rewarded for their own value creation.
  • Since what they are creating is not what is commodified on the market for scarce goods, there is no return of income for these value creators
  • This means that social media platforms are exposing an important fault line in our system
  • If you did not contribute, you had no say, so engagement was and is necessary.
    • Kurt Laitner
       
      key divergence from birth/process citizenship driven democracy
  • ⁃   At the core of value creation are various commons, where the innovations are deposited for all humanity to share and to build on ⁃   These commons are enabled and protected through nonprofit civic associations, with as national equivalent the Partner State, which empowers and enables that social production ⁃   Around the commons emerges a vibrant commons-oriented economy undertaken by different kinds of ethical companies, whose legal structures ties them to the values and goals of the commons communities, and not absentee and private shareholders intent of maximising profit at any cost
  • the citizens deciding on the optimal shape of their provisioning systems.
    • Kurt Laitner
       
      ie value equations..?
  • Today, it is proto-mode of production which is entirely inter-dependent with the system of capital
  • Is there any possibility to create a really autonmous model of peer production, that could create its own cycle of reproduction?
  • contribute
    • Kurt Laitner
       
      defined as?
    • Tiberius Brastaviceanu
       
      "ad hoc": perhaps based on context, needs and everyone's understanding of the situation
  • and whose mission is the support of the commons and its contributors
  • In this way, the social reproduction of commoners would no longer depend on the accumulation cycle of capital, but on its own cycle of value creation and realization
  • Phyles are mission-oriented, purpose-driven, community-supportive entities that operate in the market, on a global scale, but work for the commons.
  • peer production license, which has been proposed by Dmytri Kleiner.
  • Thijs Markus writes  so eloquently about Nike in the Rick Falkvinge blog, if you want to sell $5 shoes for $150 in the West, you better have one heck of a repressive IP regime in place.
  • Hence the need for SOPA/PIPA , ACTA'S and other attempts to criminalize the right to share.
  • An economy of scope exists between the production of two goods when two goods which share a CommonCost are produced together such that the CommonCost is reduced.
  • shared infrastructure costs
  • 2) The current system beliefs that innovations should be privatized and only available by permission or for a hefty price (the IP regime), making sharing of knowledge and culture a crime; let's call this feature, enforced 'artificial scarcity'.
  • 1) Our current system is based on the belief of infinite growth and the endless availability of resources, despite the fact that we live on a finite planet; let's call this feature, runaway 'pseudo-abundance'.
  • So what are the economies of scope of the new p2p age? They come in two flavours: 1) the mutualizing of knowledge and immaterial resources 2) the mutualizing of material productive resources
  • how does global governance look like in P2P civilization?
  • conflicts between contributors
  • are not decided by authoritarian fiat, but by 'negotiated coordination'.
Tiberius Brastaviceanu

How Peer to Peer Communities will change the World - 0 views

  • role of p2p movement
  • historical role
  • horizontalisation of human relationships
  • ...55 more annotations...
  • allowing the free aggregation of individuals around shared values or common value creation
  • a huge sociological shift
  • new life forms, social practices and human institutions
  • emergent communities of practice are developing new social practices that are informed by the p2p paradigm
  • ethical revolution
  • openness
  • participation
  • inclusivity
  • cooperation
  • commons
  • the open content industry in the U.S. to reach one sixth of GDP.
  • political expressions
  • the movement has two wings
  • constructive
  • building new tools and practices
  • resistance to neoliberalism
  • we are at a stage of emergence
  • difficulty of implementing full p2p solutions in the current dominant system
  • At this stage, there is a co-dependency between peer producers creating value, and for-profit firms ‘capturing that value’, but they both need each other.
  • Peer producers need a business ecology to insure the social reproduction of their system and financial sustainability of its participants, and capital needs the positive externalities of social cooperation which flow from p2p collaboration.
  • peer producing communities should create their own ‘mission-oriented’ social businesses, so that the surplus value remains with the value creators, i.e. the commoners themselves, but this is hardly happening now.
  • Instead what we see is a mutual accomodation between netarchical capital on one side, and peer production communities on the other.
  • the horizontal meets the vertical
  • mostly hybrid ‘diagonal’ adaptations
  • For peer producers the question becomes, if we cannot create our own fully autonomous institutions, how can we adapt while maintaining maximum autonomy and sustainability as a commons and as a community.
  • Why p2p have failed to create successful alternatives in some areas?
  • In commons-oriented peer production, where people aggegrate around a common object which requires deep cooperation, they usually have their own infrastructures of cooperation and a ecology combining community, a for-benefit association managing the infrastructure, and for-profit companies operating on the market place; in the sharing economy, where individuals merely share their own expressions, third party platforms are the norm. It is clear that for-profit companies have different priorities, and want to enclose value so that it can be sold on the marketplace. This in fact the class struggle of the p2p era, the struggle between communities and corporations around various issues because of partly differential interests.
  • Even commercially controlled platforms are being used for a massive horizontalisation and self-aggregation of human relationships, and communities, including political and radical groups are effectively using them to mobilize. What’s important is not just to focus on the limitations and intentions of the platform owners, but to use whatever we can to strengthen the autonomy of peer communities.
  • requires a clever adaptation
  • use for our own benefit
  • The fact today is that capital is still capable of marshaling vast financial and material resources, so that it can create,
  • platforms that can easily and quickly offer services, creating network effects
  • without network effects, there is no ‘there’ there, just an empty potential platform.
  • p2p activists should work on both fronts
  • using mainstream platforms for spreading their ideas and culture and reach greater numbers of people, while also developing their own autonomous media ecologies, that can operate independently, and the latter is an engagement for the ‘long haul’, i.e. the slow construction of an alternative lifeworld.
  • The commons and p2p are really just different aspects of the same phenomena; the commons is the object that p2p dynamics are building; and p2p takes place wherever there are commons.
  • So both p2p and the commons, as they create abundant (digital) or sufficient (material) value for the commoners, at the same time create opportunities to create added value for the marketplace. There is no domain that is excluded from p2p, no field that can say, “we wouldn’t be stronger by opening up to participation and community dynamics”. And there is no p2p community that can say, we are in the long term fully sustainable within the present system, without extra resources coming from the market sector.
  • One trend is the distribution of current infrastructures and practices, i.e. introducing crowdsourcing, crowdfunding, social lending, digital currencies, in order to achieve wider participation in current practices. That is a good thing, but not sufficient. All the things that I mention above, move to a distributed infrastructure, but do not change the fundamental logic of what they are doing.
  • we are talking about the distribution of capitalism, not about a deeper change in the logic of our economy.
  • No matter how good you are, no matter how much capital you have to hire the best people, you cannot compete with the innovative potential of open global communities.
  • the p2p dynamics
  • the new networked culture
  • the opposite is also happening, as we outlined above, more and more commons-oriented value communities are creating their own entrepreneurial coalitions. Of course, some type of companies, because of their monopoly positions and legacy systems, may have a very difficult time undergoing that adaptation, in which case new players will appear that can do it more effectively.
  • the corporate form is unable to deal with ecological and sustainability issues, because its very DNA, the legal obligation to enrich the shareholders, makes its strive to lower input costs,  and ignore externalities.
  • we need new corporate structures, a new type of market entity, for which profit is a means, but not an end, dedicated to a ‘benefit‘, a ‘mission’, or the sustenance of a particular community and/or commons.
  • abundance destroys scarcity and therefore markets
  • open design community
  • will inherently design for sustainability
  • for inclusion
  • conceive more distributed forms of manufacturing
  • entrepreneurs attaching themselves to open design projects start working from an entirely different space, even if they still use the classic corporate form. Prevent the sharing of sustainability designs through IP monopolies is also in my view unethical and allowing such patents should be a minimalist option, not a maximalist one.
  • The high road scenario proposes an enlightened government that ‘enables and empowers’ social production and value creation and allows a much smoother transition to p2p models; the low road scenario is one in which no structural reforms take place, the global situation descends into various forms of chaos, and p2p becomes a survival and resilience tactic in extremely difficult social, political and economic circumstances.
  • accelerated end of capitalism
  • Making sure that we get a better alternative is actually the historical task of the p2p movement. In other words, it depends on us!
  • I don’t really think in terms of technological breakthroughs, because the essential one, globally networked collective intelligence enabled by the internetworks, is already behind us; that is the major change, all other technological breakthroughs will be informed by this new social reality of the horizontalisation of our civilisation. The important thing now is to defend and extend our communication and organisation rights, against a concerted attempt to turn back the clock. While the latter is really an impossibility, this does not mean that the attempts by governments and large corporations cannot create great harm and difficulties. We need p2p technology to enable the global solution finding and implementation of the systemic crises we are facing.
Kurt Laitner

Crowding Out - P2P Foundation - 1 views

  • The curve indicates that while workers will initially chose to work more when paid more per hour, there is a point after which rational workers will choose to work less
    • Kurt Laitner
       
      in other words, people are financially motivated until they are financially secure, then other motivations come in
  • "leaders" elsewhere will come and become your low-paid employees
  • At that point, the leaders are no longer leaders of a community, and they turn out to be suckers after all, working for pittance, comparatively speaking
    • Kurt Laitner
       
      so part of the dynamic is that everyone is paid fairly, if not there is the feeling of exploitation
  • ...36 more annotations...
  • under certain structural conditions non-price-based production is extraordinarily robust
    • Kurt Laitner
       
      which are... abundance?
  • There is, in fact, a massive amount of research that supports the idea that when you pay people to do something for you, they stop enjoying it, and distrust their own motivations. The mysterious something that goes away, and that “Factor X” even has a name: intrinsic motivation.
    • Kurt Laitner
       
      the real question though is why, and whether it is the paying them that is the problem, or perhaps how that is determined, and who else gets what on what basis..  if you have to have them question the fairness of the situation, they will likely check out
  • giving rewards to customers can actually undermine a company’s relationship with them
  • It just is not so easy to assume that because people behave productively in one framework (the social process of peer production that is Wikipedia, free and open source software, or Digg), that you can take the same exact behavior, with the same exact set of people, and harness them to your goals by attaching a price to what previously they were doing in a social process.
  • Extrinsic rewards suggest that there is actually an instrumental relationship at work, that you do the activity in order to get something else
  • If you pay me for it, it must be work
    • Kurt Laitner
       
      only because a dichotomy of work and play exists in western culture
  • It’s what we would call a robust effect. It shows up in many contexts. And there’s been considerable testing to try to find out exactly why it works. A major school of thought is that there is an “Overjustification Effect.” (http://kozinets.net/archives/133)
    • Kurt Laitner
       
      yes, why is key
  • interesting examples of an effect called crowding
  • Offering financial rewards for contributions to online communities basically means mixing external and intrinsic motivation.
  • A good example is children who are paid by their parents for mowing the family lawn. Once they expect to receive money for that task, they are only willing to do it again if they indeed receive monetary compensation. The induced unwillingness to do anything for free may also extend to other household chores.
  • Once ‘gold-stars’ were introduced as a symbolic reward for a certain amount of time spent practicing the instrument, the girl lost all interest in trying new, difficult pieces. Instead of aiming at improving her skills, her goal shifted towards spending time playing well-learned, easy pieces in order to receive the award (Deci with Flaste 1995)
    • Kurt Laitner
       
      this is a more troubling example, as playing the harder pieces is also practicing - I would take this as a more complex mechanism at work - perhaps the reinterpretation by the girl that all playing was considered equal, due to the pricing mechanism, in which case the proximal solution would be to pay more for more complex pieces, or for levels of achievement - the question remains of why the extrinsic reward was introduced in the first place (unwillingness to practice as much as her parents wanted?) - which would indicate intrinsic motivation was insufficient in this case
  • Suddenly, she managed to follow the prescription, as her own (intrinsic) motivation was recognized and thereby reinforced.
    • Kurt Laitner
       
      or perhaps the key was to help her fit the medication into her day, which she was having trouble with...
  • The introduction of a monetary fine transforms the relationship between parents and teachers from a non-monetary into a monetary one
    • Kurt Laitner
       
      absolutely, in some sense the guilt of being late is replaced by a rationalization that you are paying them - it is still a rationalization, and parents in this case need to be reminded that staff have lives too to reinforce the moral suasion
  • "The effects of external interventions on intrinsic motivation have been attributed to two psychological processes: (a) Impaired self-determination. When individuals perceive an external intervention to reduce their self-determination, they substitute intrinsic motivation by extrinsic control. Following Rotter (1966), the locus of control shifts from the inside to the outside of the person affected. Individuals who are forced to behave in a specific way by outside intervention, feel overjustified if they maintained their intrinsic motivation. (b) Impaired self-esteem. When an intervention from outside carries the notion that the actor's motivation is not acknowledged, his or her intrinsic motivation is effectively rejected. The person affected feels that his or her involvement and competence is not appreciated which debases its value. An intrinsically motivated person is taken away the chance to display his or her own interest and involvement in an activity when someone else offers a reward, or commands, to undertake it. As a result of impaired self-esteem, individuals reduce effort.
    • Kurt Laitner
       
      these are finally very useful - so from (a) as long as self determination is maintained (actively) extrinsic reward should not shut down intrinsic motivation AND (b) so long as motivations are recognized and reward dimensions OTHER THAN financial continue to operate, extrinsic reward should not affect intrinsic motivation
  • External interventions crowd-out intrinsic motivation if the individuals affected perceive them to be controlling
    • Kurt Laitner
       
      emphasis on "if" and replacing that with "in so far as"
  • External interventions crowd-in intrinsic motivation if the individuals concerned perceive it as supportive
    • Kurt Laitner
       
      interesting footnote
  • In that case, self-esteem is fostered, and individuals feel that they are given more freedom to act, thus enlarging self-determination
    • Kurt Laitner
       
      so effectively a system needs to ensure it is acting on all dimensions of reward, or at least those most important to the particular participant, ego (pride, recognition, guilt reduction, feeling needed, being helpful, etc), money (sustenance, beyond which it is less potent), meaning/purpose etc.  If one ran experiments controlling for financial self sufficiency, then providing appreciation and recognition as well as the introduced financial reward, they might yield different results
  • cultural categories that oppose marketplace modes of behavior (or “market logics”) with the more family-like modes of behavior of caring and sharing that we observe in close-knit communities (”community logics”)
    • Kurt Laitner
       
      are these learned or intrinsic?
  • this is labor, this is work, just do it.
    • Kurt Laitner
       
      except that this cultural meme is already a bias, not a fact
  • When communal logics are in effect, all sorts of norms of reciprocity, sacrifice, and gift-giving come into play: this is cool, this is right, this is fun
    • Kurt Laitner
       
      true, and part of our challenge then is to remove this dichotomy
  • So think about paying a kid to clean up their room, paying parishioners to go to church, paying people in a neighborhood to attend a town hall meeting, paying people to come out and vote. All these examples seem a little strange or forced. Why? Because they mix and match the communal with the market-oriented.
    • Kurt Laitner
       
      and perhaps the problem is simply the conversion to money, rather than simply tracking these activities themselves (went to church 50 times this year!, helped 50 orphans get families!) (the latter being more recognition than reward
  • Payment as disincentive. In his interesting book Freakonomics, economist Steven Levitt describes some counterintuitive facts about payment. One of the most interesting is that charging people who do the wrong thing often causes them to do it more, and paying people to do the right thing causes them to do it less.
    • Kurt Laitner
       
      and tracking them causes them to conform to cultural expectations
  • You direct people _away_ from any noble purpose you have, and instead towards grubbing for dollars
    • Kurt Laitner
       
      and we are left with the challenge, how to work to purpose but still have our scarce goods needs sufficiently provided for?  it has to be for love AND money
  • When people work for a noble purpose, they are told that their work is highly valued. When people work for $0.75/hour, they are told that their work is very low-valued
    • Kurt Laitner
       
      so pay them highly for highly valued labour, and don't forget to recognize them as well... no?
  • you're going to have to fight your way through labour laws and tax issues all the way to bankruptcy
    • Kurt Laitner
       
      this is a non argument, these are just interacting but separate problems, use ether or bitcoin, change legislation, what have you
  • Market economics. If you have open content, I can copy your content to another wiki, not pay people, and still make money. So by paying contributors, you're pricing yourself out of the market.
    • Kurt Laitner
       
      exactly, so use commonsource, they can use it all they want, but they have to flow through benefit (provide attribution, recognition, and any financial reward must be split fairly)
  • You don't have to pay people to do what they want to do anyways. The labour cost for leisure activities is $0. And nobody is going to work on a wiki doing things they don't want to do.
    • Kurt Laitner
       
      wow, exploitative in the extreme - no one can afford to do work for free, it cuts into paid work, family time etc.  if they are passionate about something they will do it for free if they cannot get permission to do it for sustenance, but they still need to sustain themselves, and they are making opportunity cost sacrifices, and if you are in turn making money off of this you are an asshole.. go ahead look in the mirror and say "I am an asshole"
  • No fair system. There's simply no fair, automated and auditable way to divvy up the money
    • Kurt Laitner
       
      this is an utter cop out - figure out what is close enough to fair and iterate forward to improve it, wow
  • too complicated to do automatically. But if you have a subjective system -- have a human being evaluate contributions to an article and portion out payments -- it will be subject to constant challenges, endless debates, and a lot of community frustration.
    • Kurt Laitner
       
      yes to the human evaluation part, but "it's too complicated" is disingenuous at the least
  • Gaming the system. People are really smart. If there's money to be made, they'll figure out how to game your payment system to get more money than they actually deserve
    • Kurt Laitner
       
      yes indeed, so get your metrics right, and be prepared to adjust them as they are gamed - and ultimately, as financial penalties are to BP, even if some people game the system, can we better the gaming of the capitalist system.. it's a low bar I know
  • They'll be trying to get as much money out of you as possible, and you'll be trying to give as little as you can to them
    • Kurt Laitner
       
      it doesn't have to be this way, unless you think that way already
  • If you can't convince people that working on your project is worth their unpaid time, then there's probably something wrong with your project.
    • Kurt Laitner
       
      wow, talk about entrepreneurial taker attitude rationalization
  • People are going to be able to sense that -- it's going to look like a cover-up, something sleazy
    • Kurt Laitner
       
      and getting paid for others free work isn't sleazy, somehow...?
  • Donate.
    • Kurt Laitner
       
      better yet, give yourself a reasonable salary, and give the rest away
  • Thank-you gifts
    • Kurt Laitner
       
      cynical.. here have a shiny bobble you idiot
  • Pay bounties
    • Kurt Laitner
       
      good way to get people to compete ineffectively instead of cooperating on a solution, the lottery mechanism is evil
  •  
    while good issue are brought up in this article, the solutions offered are myopic and the explanations of the observed effects not satisfying
Tiberius Brastaviceanu

The Baffler - 0 views

  • This tendency to view questions of freedom primarily through the lens of economic competition, to focus on the producer and the entrepreneur at the expense of everyone else, shaped O’Reilly’s thinking about technology.
  • the O’Reilly brand essence is ultimately a story about the hacker as hero, the kid who is playing with technology because he loves it, but one day falls into a situation where he or she is called on to go forth and change the world,
  • His true hero is the hacker-cum-entrepreneur, someone who overcomes the insurmountable obstacles erected by giant corporations and lazy bureaucrats in order to fulfill the American Dream 2.0: start a company, disrupt an industry, coin a buzzword.
  • ...139 more annotations...
  • gospel of individualism, small government, and market fundamentalism
  • innovation is the new selfishness
  • mastery of public relations
  • making it seem as if the language of economics was, in fact, the only reasonable way to talk about the subject
  • memes are for losers; the real money is in epistemes.
  • “Open source software” was also the first major rebranding exercise overseen by Team O’Reill
  • It’s easy to forget this today, but there was no such idea as open source software before 1998; the concept’s seeming contemporary coherence is the result of clever manipulation and marketing.
  • ideological cleavage between two groups
  • Richard Stallman
  • Free Software Foundation, preoccupied with ensuring that users had rights with respect to their computer programs. Those rights weren’t many—users should be able to run the program for any purpose, to study how it works, to redistribute copies of it, and to release their improved version (if there was one) to the public
  • “free software.”
  • association with “freedom” rather than “free beer”
  • copyleft
  • profound critique of the role that patent law had come to play in stifling innovation and creativity.
  • Plenty of developers contributed to “free software” projects for reasons that had nothing to do with politics. Some, like Linus Torvalds, the Finnish creator of the much-celebrated Linux operating system, did so for fun; some because they wanted to build more convenient software; some because they wanted to learn new and much-demanded skills.
  • Stallman’s rights-talk, however, risked alienating the corporate types
  • he was trying to launch a radical social movement, not a complacent business association
  • By early 1998 several business-minded members of the free software community were ready to split from Stallman, so they masterminded a coup, formed their own advocacy outlet—the Open Source Initiative—and brought in O’Reilly to help them rebrand.
  • “open source”
  • The label “open source” may have been new, but the ideas behind it had been in the air for some time.
  • In those early days, the messaging around open source occasionally bordered on propaganda
  • This budding movement prided itself on not wanting to talk about the ends it was pursuing; except for improving efficiency and decreasing costs, those were left very much undefined.
  • extremely decentralized manner, using Internet platforms, with little central coordination.
  • In contrast to free software, then, open source had no obvious moral component.
  • “open source is not particularly a moral or a legal issue. It’s an engineering issue. I advocate open source, because . . . it leads to better engineering results and better economic results
  • While free software was meant to force developers to lose sleep over ethical dilemmas, open source software was meant to end their insomnia.
  • Stallman the social reformer could wait for decades until his ethical argument for free software prevailed in the public debate
  • O’Reilly the savvy businessman had a much shorter timeline: a quick embrace of open source software by the business community guaranteed steady demand for O’Reilly books and events
  • The coup succeeded. Stallman’s project was marginalized. But O’Reilly and his acolytes didn’t win with better arguments; they won with better PR.
  • A decade after producing a singular vision of the Internet to justify his ideas about the supremacy of the open source paradigm, O’Reilly is close to pulling a similar trick on how we talk about government reform.
  • much of Stallman’s efforts centered on software licenses
  • O’Reilly’s bet wa
  • the “cloud”
  • licenses would cease to matter
  • Since no code changed hands
  • So what did matter about open source? Not “freedom”
  • O’Reilly cared for only one type of freedom: the freedom of developers to distribute software on whatever terms they fancied.
  • the freedom of the producer
  • who must be left to innovate, undisturbed by laws and ethics.
  • The most important freedom,
  • is that which protects “my choice as a creator to give, or not to give, the fruits of my work to you, as a ‘user’ of that work, and for you, as a user, to accept or reject the terms I place on that gift.”
  • O’Reilly opposed this agenda: “I completely support the right of Richard [Stallman] or any individual author to make his or her work available under the terms of the GPL; I balk when they say that others who do not do so are doing something wrong.”
  • The right thing to do, according to O’Reilly, was to leave developers alone.
  • According to this Randian interpretation of open source, the goal of regulation and public advocacy should be to ensure that absolutely nothing—no laws or petty moral considerations—stood in the way of the open source revolution
  • Any move to subject the fruits of developers’ labor to public regulation
  • must be opposed, since it would taint the reputation of open source as technologically and economically superior to proprietary software
  • the advent of the Internet made Stallman’s obsession with licenses obsolete
  • Many developers did stop thinking about licenses, and, having stopped thinking about licenses, they also stopped thinking about broader moral issues that would have remained central to the debates had “open source” not displaced “free software” as the paradigm du jour.
  • Profiting from the term’s ambiguity, O’Reilly and his collaborators likened the “openness” of open source software to the “openness” of the academic enterprise, markets, and free speech.
  • “open to intellectual exchange”
  • “open to competition”
  • “For me, ‘open source’ in the broader sense means any system in which open access to code lowers the barriers to entry into the market”).
  • “Open” allowed O’Reilly to build the largest possible tent for the movement.
  • The language of economics was less alienating than Stallman’s language of ethics; “openness” was the kind of multipurpose term that allowed one to look political while advancing an agenda that had very little to do with politics
  • highlight the competitive advantages of openness.
  • the availability of source code for universal examination soon became the one and only benchmark of openness
  • What the code did was of little importance—the market knows best!—as long as anyone could check it for bugs.
  • The new paradigm was presented as something that went beyond ideology and could attract corporate executives without losing its appeal to the hacker crowd.
  • What Raymond and O’Reilly failed to grasp, or decided to overlook, is that their effort to present open source as non-ideological was underpinned by a powerful ideology of its own—an ideology that worshiped innovation and efficiency at the expense of everything else.
  • What they had in common was disdain for Stallman’s moralizing—barely enough to justify their revolutionary agenda, especially among the hacker crowds who were traditionally suspicious of anyone eager to suck up to the big corporations that aspired to dominate the open source scene.
  • linking this new movement to both the history of the Internet and its future
  • As long as everyone believed that “open source” implied “the Internet” and that “the Internet” implied “open source,” it would be very hard to resist the new paradigm
  • Telling a coherent story about open source required finding some inner logic to the history of the Internet
  • “If you believe me that open source is about Internet-enabled collaboration, rather than just about a particular style of software license,”
  • everything on the Internet was connected to everything else—via open source.
  • The way O’Reilly saw it, many of the key developments of Internet culture were already driven by what he called “open source behavior,” even if such behavior was not codified in licenses.
  • No moralizing (let alone legislation) was needed; the Internet already lived and breathed open source
  • apps might be displacing the browser
  • the openness once taken for granted is no more
  • Openness as a happenstance of market conditions is a very different beast from openness as a guaranteed product of laws.
  • One of the key consequences of linking the Internet to the world of open source was to establish the primacy of the Internet as the new, reinvented desktop
  • This is where the now-forgotten language of “freedom” made a comeback, since it was important to ensure that O’Reilly’s heroic Randian hacker-entrepreneurs were allowed to roam freely.
  • Soon this “freedom to innovate” morphed into “Internet freedom,” so that what we are trying to preserve is the innovative potential of the platform, regardless of the effects on individual users.
  • Lumping everything under the label of “Internet freedom” did have some advantages for those genuinely interested in promoting rights such as freedom of expression
  • Forced to choose between preserving the freedom of the Internet or that of its users, we were supposed to choose the former—because “the Internet” stood for progress and enlightenment.
  • infoware
  • Yahoo
  • their value proposition lay in the information they delivered, not in the software function they executed.
  • The “infoware” buzzword didn’t catch on, so O’Reilly turned to the work of Douglas Engelbart
  • to argue that the Internet could help humanity augment its “collective intelligence” and that, once again, open source software was crucial to this endeavor.
  • Now it was all about Amazon learning from its customers and Google learning from the sites in its index.
  • The idea of the Internet as both a repository and incubator of “collective intelligence”
  • in 2004, O’Reilly and his business partner Dale Dougherty hit on the idea of “Web 2.0.” What did “2.0” mean, exactly?
  • he primary goal was to show that the 2001 market crash did not mean the end of the web and that it was time to put the crash behind us and start learning from those who survived.
  • Tactically, “Web 2.0” could also be much bigger than “open source”; it was the kind of sexy umbrella term that could allow O’Reilly to branch out from boring and highly technical subjects to pulse-quickening futurology
  • O’Reilly couldn’t improve on a concept as sexy as “collective intelligence,” so he kept it as the defining feature of this new phenomenon.
  • What set Web 2.0 apart from Web 1.0, O’Reilly claimed, was the simple fact that those firms that didn’t embrace it went bust
  • find a way to harness collective intelligence and make it part of their business model.
  • By 2007, O’Reilly readily admitted that “Web 2.0 was a pretty crappy name for what’s happening.”
  • O’Reilly eventually stuck a 2.0 label on anything that suited his business plan, running events with titles like “Gov 2.0” and “Where 2.0.” Today, as everyone buys into the 2.0 paradigm, O’Reilly is quietly dropping it
  • assumption that, thanks to the coming of Web 2.0, we are living through unique historical circumstances
  • Take O’Reilly’s musings on “Enterprise 2.0.” What is it, exactly? Well, it’s the same old enterprise—for all we know, it might be making widgets—but now it has learned something from Google and Amazon and found a way to harness “collective intelligence.”
  • tendency to redescribe reality in terms of Internet culture, regardless of how spurious and tenuous the connection might be, is a fine example of what I call “Internet-centrism.”
  • “Open source” gave us the “the Internet,” “the Internet” gave us “Web 2.0,” “Web 2.0” gave us “Enterprise 2.0”: in this version of history, Tim O’Reilly is more important than the European Union
  • For Postman, each human activity—religion, law, marriage, commerce—represents a distinct “semantic environment” with its own tone, purpose, and structure. Stupid talk is relatively harmless; it presents no threat to its semantic environment and doesn’t cross into other ones.
  • Since it mostly consists of falsehoods and opinions
  • it can be easily corrected with facts
  • to say that Tehran is the capital of Iraq is stupid talk
  • Crazy talk, in contrast, challenges a semantic environment, as it “establishes different purposes and assumptions from those we normally accept.” To argue, as some Nazis did, that the German soldiers ended up far more traumatized than their victims is crazy talk.
  • For Postman, one of the main tasks of language is to codify and preserve distinctions among different semantic environments.
  • As he put it, “When language becomes undifferentiated, human situations disintegrate: Science becomes indistinguishable from religion, which becomes indistinguishable from commerce, which becomes indistinguishable from law, and so on.
  • pollution
  • Some words—like “law”—are particularly susceptible to crazy talk, as they mean so many different things: from scientific “laws” to moral “laws” to “laws” of the market to administrative “laws,” the same word captures many different social relations. “Open,” “networks,” and “information” function much like “law” in our own Internet discourse today.
  • For Korzybski, the world has a relational structure that is always in flux; like Heraclitus, who argued that everything flows, Korzybski believed that an object A at time x1 is not the same object as object A at time x2
  • Our language could never properly account for the highly fluid and relational structure of our reality—or as he put it in his most famous aphorism, “the map is not the territory.”
  • Korzybski argued that we relate to our environments through the process of “abstracting,” whereby our neurological limitations always produce an incomplete and very selective summary of the world around us.
  • nothing harmful in this per se—Korzybski simply wanted to make people aware of the highly selective nature of abstracting and give us the tools to detect it in our everyday conversations.
  • Korzybski developed a number of mental tools meant to reveal all the abstracting around us
  • He also encouraged his followers to start using “etc.” at the end of their statements as a way of making them aware of their inherent inability to say everything about a given subject and to promote what he called the “consciousness of abstraction.”
  • There was way too much craziness and bad science in Korzybski’s theories
  • but his basic question
  • “What are the characteristics of language which lead people into making false evaluations of the world around them?”
  • Tim O’Reilly is, perhaps, the most high-profile follower of Korzybski’s theories today.
  • O’Reilly openly acknowledges his debt to Korzybski, listing Science and Sanity among his favorite books
  • It would be a mistake to think that O’Reilly’s linguistic interventions—from “open source” to “Web 2.0”—are random or spontaneous.
  • There is a philosophy to them: a philosophy of knowledge and language inspired by Korzybski. However, O’Reilly deploys Korzybski in much the same way that the advertising industry deploys the latest findings in neuroscience: the goal is not to increase awareness, but to manipulate.
  • O’Reilly, of course, sees his role differently, claiming that all he wants is to make us aware of what earlier commentators may have overlooked. “A metaphor is just that: a way of framing the issues such that people can see something they might otherwise miss,
  • But Korzybski’s point, if fully absorbed, is that a metaphor is primarily a way of framing issues such that we don’t see something we might otherwise see.
  • In public, O’Reilly modestly presents himself as someone who just happens to excel at detecting the “faint signals” of emerging trends. He does so by monitoring a group of überinnovators that he dubs the “alpha geeks.” “The ‘alpha geeks’ show us where technology wants to go. Smart companies follow and support their ingenuity rather than trying to suppress it,
  • His own function is that of an intermediary—someone who ensures that the alpha geeks are heard by the right executives: “The alpha geeks are often a few years ahead of their time. . . . What we do at O’Reilly is watch these folks, learn from them, and try to spread the word by writing down (
  • The name of his company’s blog—O’Reilly Radar—is meant to position him as an independent intellectual who is simply ahead of his peers in grasping the obvious.
  • “the skill of writing is to create a context in which other people can think”
  • As Web 2.0 becomes central to everything, O’Reilly—the world’s biggest exporter of crazy talk—is on a mission to provide the appropriate “context” to every field.
  • In a fascinating essay published in 2000, O’Reilly sheds some light on his modus operandi.
  • The thinker who emerges there is very much at odds with the spirit of objectivity that O’Reilly seeks to cultivate in public
  • meme-engineering lets us organize and shape ideas so that they can be transmitted more effectively, and have the desired effect once they are transmitted
  • O’Reilly meme-engineers a nice euphemism—“meme-engineering”—to describe what has previously been known as “propaganda.”
  • how one can meme-engineer a new meaning for “peer-to-peer” technologies—traditionally associated with piracy—and make them appear friendly and not at all threatening to the entertainment industry.
  • O’Reilly and his acolytes “changed the canonical list of projects that we wanted to hold up as exemplars of the movement,” while also articulating what broader goals the projects on the new list served. He then proceeds to rehash the already familiar narrative: O’Reilly put the Internet at the center of everything, linking some “free software” projects like Apache or Perl to successful Internet start-ups and services. As a result, the movement’s goal was no longer to produce a completely free, independent, and fully functional operating system but to worship at the altar of the Internet gods.
  • Could it be that O’Reilly is right in claiming that “open source” has a history that predates 1998?
  • Seen through the prism of meme-engineering, O’Reilly’s activities look far more sinister.
  • His “correspondents” at O’Reilly Radar don’t work beats; they work memes and epistemes, constantly reframing important public issues in accordance with the templates prophesied by O’Reilly.
  • Or take O’Reilly’s meme-engineering efforts around cyberwarfare.
  • Now, who stands to benefit from “cyberwarfare” being defined more broadly? Could it be those who, like O’Reilly, can’t currently grab a share of the giant pie that is cybersecurity funding?
  • Frank Luntz lists ten rules of effective communication: simplicity, brevity, credibility, consistency, novelty, sound, aspiration, visualization, questioning, and context.
  • Thus, O’Reilly’s meme-engineering efforts usually result in “meme maps,” where the meme to be defined—whether it’s “open source” or “Web 2.0”—is put at the center, while other blob-like terms are drawn as connected to it.
  • The exact nature of these connections is rarely explained in full, but this is all for the better, as the reader might eventually interpret connections with their own agendas in mind. This is why the name of the meme must be as inclusive as possible: you never know who your eventual allies might be. “A big part of meme engineering is giving a name that creates a big tent that a lot of people want to be under, a train that takes a lot of people where they want to go,”
  • News April 4 mail date March 29, 2013 Baffler party March 6, 2013 Žižek on seduction February 13, 2013 More Recent Press I’ve Seen the Worst Memes of My Generation Destroyed by Madness io9, April 02, 2013 The Baffler’s New Colors Imprint, March 21, 2013
  • There is considerable continuity across O’Reilly’s memes—over time, they tend to morph into one another.
1 - 20 of 24 Next ›
Showing 20 items per page