Skip to main content

Home/ Sensorica Knowledge/ Group items matching "knowledge" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Tiberius Brastaviceanu

Access control - Wikipedia, the free encyclopedia - 0 views

  • The act of accessing may mean consuming, entering, or using.
  • Permission to access a resource is called authorization.
  • Locks and login credentials are two analogous mechanisms of access control.
  • ...26 more annotations...
  • Geographical access control may be enforced by personnel (e.g., border guard, bouncer, ticket checker)
  • n alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country
  • access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons
  • can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap.
  • Physical access control is a matter of who, where, and when
  • Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.[citation needed] Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked
  • Credential
  • Access control system operation
  • The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input
  • There are three types (factors) of authenticating information:[2] something the user knows, e.g. a password, pass-phrase or PIN something the user has, such as smart card or a key fob something the user is, such as fingerprint, verified by biometric measurement
  • Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios
  • When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked.
  • A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a biometric feature) or some combination of these items. This is known as multi-factor authentication. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.
  • An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list
  • monitor the door position
  • Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the doo
  • Access control topology
  • Access control decisions are made by comparing the credential to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the look-up out from a central host to the edge of the system, or the reader. The predominant topology circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks
  • Access control readers may be classified by the functions they are able to perform
  • and forward it to a control panel.
  • Basic (non-intelligent) readers: simply read
  • Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus.
  • Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers.
  • Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host
  • a built in webservice to make it user friendly
  • Some readers may have additional features such as an LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support
Kurt Laitner

The basic orientation of p2p theory towards societal reform: transforming civil society, the private and the state - 1 views

  • under the ‘leadership’ of corporations and those members of our society who have access to capital.
  • Despite all democratic advances, the state forms have clearly been captured by private interests.
  • in a capitalist system, ‘civil society’ is not directly productive of the goods and services that we need to survive, live and thrive
  • ...22 more annotations...
  • everything that needs to be made, has to be designed through collaborative innovation in the first place
  • continuous interchange and dialogue of citizens as they determine their collective life
  • Both civil society and the notion of citizenship can be criticized for being insufficiently inclusionary, and therefore as ‘mechanisms of exclusion’.
  • consisting of shared depositories of knowledge, code and design; the communities of contributors and users of such commons
  • infrastructures of collaboration, which are managed by a new type of ‘for-benefit associations’
  • democratically governed by all participants and stakeholders in such commons
    • Kurt Laitner
       
      hmm
  • which are not derived or secondary from either the private or state forms.
  • civil society is the locus of the shared abundance of value creation, and the place for the continual dialogue regarding the necessities of common life.
  • democratically decide
    • Kurt Laitner
       
      ? our values need be expressed in every action within the matrix, not just when a 'vote' is held, in fact general democratic 'voting' should probably disappear
  • the ‘common good’ of society as a whole
    • Kurt Laitner
       
      there is no such thing
  • The difference is that the commons where the immaterial value is created are positioned in a field of abundance characteristic for non-rival or anti-rival goods; while the for-benefit associations are responsible for the sometimes contentious allocation of rival infrastructures.
    • Kurt Laitner
       
      !!!
  • Whereas the commons themselves are plurarchies based on permissionless contribution, forking and other rights guaranteeing the diversity of contributions and contributors; the for-benefit associations are democratically governed.
  • true reform of the private sector and the corporate form.
    • Kurt Laitner
       
      really?
  • Under conditions of the rule of capital, for-profit corporations are beholden to work for the interests of the shareholders. This format allows for the accumulation of capital, but also indirectly of political power, through the power of money to influence politics and politicians. For-profit corporations are part of a system of infinite growth and compound interest, must continuously compete with other corporations, and therefore, also minimize costs. For-profit corporations are designed to ignore negative environmental externalities by avoiding to pay the costs associated with them; and to ignore positive social externalities, also by avoiding to pay for them. In terms of sustainability, corporations practice planned obsolescence as a rule, because while the market is a scarcity allocation mechanism, capitalism itself is a scarcity maintenance and creation mechanism. Anti-sustainable practices are systemic and part of the DNA of the for-profit corporation.
  • Under conditions of peer production, design and innovation moves to commons-based communitiies, which lack the incentive for unsustainable design; products are inherently design for sustainability, and the production process itself is designed for openness and distribution.
  • designed to make the commoners and the commons themselves sustainable, by not ‘leaking’ surplus value to external shareholders
  • mission-oriented, community supportive, sustainability-oriented corporate forms, that operate in the marketplace but do not themselves reproduce capitalism.
  • surplus value stays within the commons, allows its autonomous social reproduction, and sustains the commoners
  • ethical mechanism that subsumes profit making under the social goal of strengthening the commons.
  • because commons and their communities are themselves specific, and do not automatically take into account the common good of society as a whole .
  • A Partner State functions center around enabling and empowering social production and abandons some of the paternalistic aspects of the welfare state by focusing on strengthening the possibilities of autonomy.
  • mobilization of social forces to obtain a new social contract
  •  
    Good synopsis of the big picture by Michel
Tiberius Brastaviceanu

Co-Creating as Disruption to the Dominant Cultural Framework » Wirearchy - 0 views

  • more open people processes
  • Participative processes like Open Space, World Cafes, Unconferences, Peer Circles
  • Barcamps, Wordcamps, Govcamps, Foo Camps, Unconferences, high-end celebrity-and-marketing-and venture-capital ‘experience’ markets, new cultural and artistic festivals with technology-and-culture-making themes
  • ...45 more annotations...
  • maker faires
  • community-and-consensus building, organizing for activism and fundraising
  • The impetus behind this explosion is both technological and sociological
  • Technological
  • information technology and the creation and evolution of the Internet and the Web
  • appearance, development and evolution of social tools, web services, massive storage, and the ongoing development of computer-and-smart-devices development
  • Sociological
  • People are searching for ways to find others with similar interests and motivations so that they can engage in activities that help them learn, find work, grow capabilities and skills, and tackle vexing social and economic problems
  • get informed and take action
  • Developing familiarity and practice with open and collaborative processes
  • play and work together
  • rules about self-management, operate democratically, and produce results grounded in ownership and the responsibilities that have been agreed upon by the ‘community’
  • The relationships and flows of information can be transferred to online spaces and often benefit from wider connectivity.
  • Today, our culture-making activities are well engaged in the early stages of cultural mutation
  • What’s coming along next ?  “Smart” devices and Internet everywhere in our lives ?  Deep(er) changes to the way things are conceived, carried out, managed and used ?  New mental models ?  Or, will we discover real societal limits to what can be done given the current framework of laws, institutions and established practices with which people are familiar and comfortable ?
  • Shorter cycle-based development and release
  • Agile development
  • It is clear evidence that the developmental and learning dynamics generated by continuous or regular feedback loops are becoming the norm in areas of activity in which change and short cycles of product development are constants.
  • The Internet of Things (IoT)
  • clothes, homes, cars, buildings, roads, and a wide range of other objects that have a place in peoples’ daily life activities
  • experiencing major growth, equally in terms of hardware, software and with respect to the way the capabilities are configured and used
  • The IoT concept is being combined with the new-ish concepts of Open Data and Big Data
  • ethical, political and social impact policy decisions
  • that key opportunities associated with widespread uptake of the IoT are derived from the impact upon peoples’ activities and lives
  • ‘we’ are on our way towards more integrated eco-systems of issues, people and technologies
  • participation and inclusion enabled by interconnectedness are quickly becoming the ‘new rules’
  • What the Future May Hold
  • the ‘scenario planning’ approach
  • world’s politics, economics, anthropology, technology, psychology, sociology and philosophy
  • A scenario planning exercise carried out by the Rockefeller Foundation
  • Clearly these early (and now not-so-weak) signals and patterns tell us that the core assumptions and principles that have underpinned organized human activities for most of the past century
  • are being changed by the combinations and permutations of new, powerful, inexpensive and widely accessible information-processing technologies
  • The short description of each scenario reinforces the perception that we are both individually and collectively in transition from a linear, specialized, efficiency-driven paradigm towards a paradigm based on continuous feedback loops and principles of participation, both large and small in scope.
  • cultural ‘mutation’
  • Wirearchy
  • a dynamic two-way flow of power and authority based on knowledge, trust, credibility and a focus on results, enabled by interconnected people and technology.
  • the role of social media and smart mobile devices in the uprisings in Egypt, Libya and elsewhere in the Middle East
  • The roots of organizational development (OD) are in humanistic psychology and sociology action and ethnographic and cybernetic/ socio-technical systems theory.  It’s a domain that emerged essentially as a counter-balance to the mechanistic and machine-metaphor-based core assumptions about the organized activities in our society.
  • Organizational development principles are built upon some basic assumptions about human motivations, engagement and activities.
  • Participative Work Design – The Six Criteria
  • in recent years created models that help clarify how to evaluate and respond to the continuous turbulence and ambiguity generated by participating in interconnected flows of information.
  • contexts characterized by either Simple, Complicated or Chaotic dynamics (from complexity theory fundamentals). Increasingly, Complexity is emerging as a key definer of the issues, problems and opportunities faced by our societies.
  • peer-to-peer movement(s) unfolding around the world
  • Co-creating in a wide range of forms, processes and purpose may become an effective and important antidote to the spreading enclosure of human creative activity.
  • But .. the dominant models of governance, commercial ownership and the use and re-use of that which is co-created by people are going to have to undergo much more deep change in order to disrupt the existing paradigm of proprietary commercial creation and the model of socio-economic power that this paradigm enables and carries today.
Tiberius Brastaviceanu

Value network - Wikipedia - 0 views

  • a business analysis perspective
  • describes
  • resources within and between businesses
  • ...38 more annotations...
  • nodes in a value network represent people
  • nodes are connected by interactions that represent tangible and intangible deliverables
  • Value networks exhibit interdependence
  • Companies have both internal and external value networks.[1]
  • customers or recipients, intermediaries, stakeholders, complementary, open innovation networks and suppliers
  • key activities
  • processes and relationships that cut across internal boundaries
  • Value is created through exchange and the relationships between roles
  • F&S's value networks consists of these components
  • customers
  • Some service the customers all use, and enables interaction between the customers
  • service
  • contracts that enables access to the service
  • the network formed by phone users
  • example
  • example
  • car insurance company
  • how a company understands itself
  • value creation process
  • value creating system
  • all stakeholders co-produce value
  • systematic social innovation
  • strategy as
  • the Value Network to emerge as a mental model
  • Verna Allee defines value networks [5] as any web of relationships that generates both tangible and intangible value through complex dynamic exchanges between two or more individuals, groups or organizations. Any organization or group of organizations engaged in both tangible and intangible exchanges can be viewed as a value network, whether private industry, government or public sector.
  • Allee developed Value network analysis, a whole systems mapping and analysis approach to understanding tangible and intangible value creation among participants in an enterprise system
  • participants, transactions and tangible and intangible deliverables that together form a value network.
  • knowledge
  • benefits
  • favors
  • know-how
  • policy
  • planning
  • process
  • biological organisms, including humans, function in a self-organizing mode internally and externally
  • no central “boss” to control this dynamic activity
  • The purpose of value networks is to create the most benefit for the people involved in the network (5)
    • Tiberius Brastaviceanu
       
      Verna starts with relationships. I think this is wrong. Perceived value and how to get  to it determines the type of relationships we forge with other people with whom we robe shoulders.  
Tiberius Brastaviceanu

Dark Intellectual Property. Why We Need a Kickstarter for Patents - 0 views

  • “dark IP,” the intellectual property (IP) that remains on the shelf: undiscovered, unexplored, untapped
  • our ability to catch so much in the net by dragging the surface (to use Mike Bergman’s analogy) actually still misses the invisible wealth of what lies beneath.
  • But dark IP is different than the other hidden-depths knowledge since it’s also unfair. Because taxpayers paid for much of the research — whether basic understanding with long-term benefits or more applied research with shorter-term benefits — that now lies collecting dust on university shelves.
  • ...31 more annotations...
  • the people of the United States spent an average of nearly $40 billion every year supporting institutional research
  • 65 percent of invention disclosure bundles remain, on average, unlicensed and unused … each year.
  • ”…the street finds its own uses for things.”
  • most of the IP (much of which we paid for) isn’t actually on the street, where entrepreneurial folks can do something with it.
  • the overworked and understaffed tech transfer offices
  • their models
  • There’s not necessarily room for exploration and discovery
  • byzantine bureaucracy of large organizations
  • But let’s face it, there’s also the hoarding and the overprotecting
  • So much IP is generated that it’s far too much for any one entity to ever make sense of
  • very few people are aware of — let alone able to access — an invention outside the social circle of its inventors, the scientific community involved, or even the “crowd” that’s sometimes harnessed in open innovation
  • we need new ways of democratizing it
  • Not democratizing the IP itself — institutions should still own and generate profits from the intellectual property they’ve created — but democratizing the ways in which we allow this IP to be discovered and licensed.
  • idea contests
  • marketplaces
  • competitions to find uses for on-the-shelf IP
  • missing out on the transformative potential of what technology can do here
  • promoting new ways of interacting around intellectual property
  • Marblar, where I’m an advisor
    • Tiberius Brastaviceanu
       
      The guy is not entirely for open innovation but proposes an intermediary model to democratize the use of IP
  • This turns off the average entrepreneur, who doesn’t have the patience and bandwidth to engage in all the unnecessary overhead of searching, browsing, and licensing IP.
  • Many small startups don’t even bother with IP
  • Another missing piece is ways of allowing the crowd to interact with each other and decide which technologies should be licensed
  • bidding wars
    • Tiberius Brastaviceanu
       
      competitive dynamic for acquiring IP and using it effectively. This doesn't solve the problem, because some companies will still buy it for defensive purposes or block others from using it, unlike with truly open innovation. 
  • Most of the examples I listed above haven’t changed much over the past decade or broken into the mainstream.
  • why not a Kickstarter for IP?
  • Such a website would bring together not just funds and transactions, but communities — with their attendant feedback mechanisms — that are interested in creating something novel around unused patents.
  • such a model would help get the ideas of a few into the minds of many.
  • open up the currently closed shelf to virtual browsing
  • inventions are not only ‘filed’ or ‘granted’ but ‘browsed’ or ‘licensed’.
« First ‹ Previous 41 - 46 of 46
Showing 20 items per page