Skip to main content

Home/ Sensorica Knowledge/ Group items matching "problem" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
faly77

From Platforms to Neighbourhoods - 0 views

  •  
    One of the biggest problems we see facing communities who want to use digital tools to coordinate is that platforms are the unit of social organization online. The logic of platforms enforces top-down cultural homogeneity on all groups who must submit to this culture in exchange for access to basic tools for coordination.
Kurt Laitner

Value Creating Service Systems: From Service Systems to Digital Lives - 0 views

  •  
    "Service dominant logic suggest that value is always co-created in context of use and experience. Co-creation is not an option (Vargo and Lusch, 2004, 2008). "Moving things along meant a focus on 2 key aspects. philosophy and methods. "An SD logic approach is not one that you can run a survey of attitude, behaviours or intentions. The person is embedded in his actions and practices of value creation. The focus on context means the unit of analysis is in the sociology of real life behaviours. A sociological approach makes methods a problem because we've inherited a world where we have created tools from analysing water in a bucket, not by looking at its behaviour in a river. "GD logic is compelling not only because it is entrenched for over 500 years, but also because you could measure its constructs. GDP, sales, revenues, CPI - they are all constructs of a GD logic society. What SD logic needed was better methods and new constructs. "To that end, and rather ironically, I found an ally in digital technology. Here was a world of sensors and actuators with an enthusiastic community looking for novel ways of deploying them into homes and buildings i.e. the internet-of-things. "I also found, as an ally, the thinking around new economic and business models. Here was another strand of literature largely marginalised by mainstream business literature because it was (the way I interpreted it) taking a systemic view of value proposition, value creation and value capture (ie, change one, change all) and the way the organisation had to be agile and transformed for it - which sat very nicely with SD logic. "Customised products are firm centric. Personalised products are customer initiated and empowering. Personalised products also tend to move the product into becoming platforms to afford co-creation, which advanced the notion of symmetry in value co-creation further. Finally, with the advent of platforms, the economics of 2 or multi-sided markets completed my set of theoretica
  •  
    an interesting starting point for research
Kurt Laitner

The Revolution at hand - Op-Ed - Domus - 0 views

  • Currently, our education prepares us to perform a job — at times any job — that pays us in terms of what we can possess and consume or, in other words, the goods that design and mass production consider to be to our satisfaction — at least partially.
  • We have produced artificial needs for years under this mantra
  • creating almost nonexistent necessities that are readily available and easy to narrate rather than investigating the problems and real needs of people and communities
  • ...13 more annotations...
  • the need for large-scale production is disappearing due to the crystalline democratization of the means of production
  • Mediocrity is obsolete
  • Money has become absurdly limited
  • unable to model the exchanges that serve to give way to a new mode of radically inclusive and more equitable cooperative production
  • design becomes a political tool
  • Innovation and meaning have been restricted, trapped and suffocated by mechanisms of protection, monopolies, patents and copyrights.
  • If you're lucky you will have patrons, not customers. Customers barely exist in the creative world now.
  • Production will occur only when there is a demand — and not a moment before
  • We need a new cultural infrastructure
  • A new distributed network of places of cultural and tangible production must be affirmed. The network will stem from fablabs, makerspaces and hackerspaces — the new factories — around the world, or from ambitious projects like the Italian Bottega 21: initiatives that unite the existing cultural heritage of places and traditions with currently available technologies
  • design itself must be independent from specific materials
  • We will teach students to investigate, discover and create work, products and services that the community needs, rather than merely follow any old curriculum while waiting for a "phantom" labour market to claim them
  • "The question we have to begin to ask ourselves is not 'how do we employ all the people who are rendered obsolete by technology', but 'how can we organize a society around something other than employment?'
Kurt Laitner

Asia Times Online :: Nondominium - the Caspian solution - 0 views

  • A Caspian partnership The proposal is that the littoral states should form a Caspian Foundation legal entity, and commit to that entity all existing rights in respect of the use, and the fruits of use (usufruct), of the Caspian Sea, and everything on it, in it, or under it. The Caspian Foundation would act as custodian or steward and the nations would have agreed governance rights of veto. This negative or passive veto right of stewardship is very different from conventional property rights of absolute ownership and temporary use under condominium. Moreover, it does not have the active power of control held under common law by a trustee on behalf of beneficiaries, and the legal complexities and management conflicts which go with it. The Caspian Foundation would be a subscriber to a Caspian Partnership framework agreement between the nations, investors of money or money's worth, and a consortium of service providers. This Caspian Partnership would not be yet another international organization, with everything that goes with that. It would not own anything, employ anyone or contract with anyone: it would simply be an associative framework agreement within which Caspian nations self-organize to the common purpose of the sustainable development of the Caspian Sea.
  • Nondominium - the Caspian solution By Chris Cook Twenty-first century problems cannot be solved with 20th century solutions. Nowhere is that saying so true as in territorial disputes where oil and gas are involved. The riches of the Caspian Sea have been the subject of dispute for years, and relatively simple - but still intractable - binary issues between Iran and Russia are now multiplied by the conflicting claims of what are now five littoral Caspian nations: Azerbaijan, Iran; Kazakhstan; Russia and Turkmenistan. Their claims relate not just to rights on the Caspian Sea surface, but to rights in the sea, and above all to the rights to the treasures that lie under it. There are two 20th century legal approaches: international law //ad information var tf_adModel = "FEV"; var tf_adType = "InBannerVideo"; var tf_commonLocation = "http://cdnx.tribalfusion.com/media/common/expand/"; //leave this variable as it is var tf_cookieFlash = "http://cdnx.tribalfusion.com/media/common/TFSObj_v2s"; var tf_isExpansionHandle = true; var tf_floatAdScriptPath = "http://cdnx.tribalfusion.com/media/common/floating/TF_FloatAdLibrary.js"; var tf_zoomFlash = "http://cdnx.tribalfusion.com/media/common/floating/TFScale_v1"; var tf_banner = { "flag" : "inBanner", "width" : 300, "height" : 250, "widthExpanded" : 600, "heightExpanded" : 450, "widthFloating" : 950, "heightFloating" : 570, "iWin" : [ ], "flashFile" : "http://cdnx.tribalfusion.com/media/4523336/Glow_Banner_Square_Template_V201", extraFlashVars:"tf_showPanelonLoad=true&tf_phase2=false", "video_expand" : "http://cdnx.tribalfusion.com/media/4523336/video.flv", "imageFile" : "http://cdnx.tribalfusion.com/media/4523336/300.jpg", "video" : "http://cdnx.tribalfusion.com/media/4523336/video.flv", "clickTag" : "http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=tf&c=20&mc=click&pli=8816678&PluID=0&ord=619093658", "clickTag1" : "http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=tf&c=20&mc=click&pli=8816678&PluID=0&ord=619093658", "clickTag2" : "http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=tf&c=20&mc=click&pli=8816678&PluID=0&ord=619093658", "socialNetworks" : [ ], "video_expand_start" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=0pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_midpoint" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=50pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_firstQuartile" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=25pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_thirdQuartile" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=75pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_complete" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=100pcLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_mute" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=MuteLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_unmute" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=UnmuteLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_pause" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=PauseLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_rewind" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=RewindLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_resume" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=ResumeLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_replay" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=ReplayLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_fullscreen" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=FSLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "video_expand_close" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=VCloseLive&ord=619093658&custom1=Video_Expand&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;vo:@video_order@;ph:@phase@", "clickTag_tracking" : "http://a.tribalfusion.com/insights/impression?client=554133&campaign=AdvilEN.AB.CAN.EB.FFG.300_V15(4765995)&mediaSource=fireflyvideo&creative=300x250&event=ClickLive&ord=619093658&custom1=Save 3 Now(Click Tag)&custom2=buyID:8493362;mediaID:4765995;ord:619093658;td:@TIMEDIFFERENCE@;adspaceId:26181;ph:@phase@", "clickTag1_tracking" : "http:
  • A Caspian partnership The proposal is that the littoral states should form a Caspian Foundation legal entity, and commit to that entity all existing rights in respect of the use, and the fruits of use (usufruct), of the Caspian Sea, and everything on it, in it, or under it. The Caspian Foundation would act as custodian or steward and the nations would have agreed governance rights of veto. This negative or passive veto right of stewardship is very different from conventional property rights of absolute ownership and temporary use under condominium. Moreover, it does not have the active power of control held under common law by a trustee on behalf of beneficiaries, and the legal complexities and management conflicts which go with it. The Caspian Foundation would be a subscriber to a Caspian Partnership framework agreement between the nations, investors of money or money's worth, and a consortium of service providers. This Caspian Partnership would not be yet another international organization, with everything that goes with that. It would not own anything, employ anyone or contract with anyone: it would simply be an associative framework agreement within which Caspian nations self-organize to the common purpose of the sustainable development of the Caspian Sea.
  • ...1 more annotation...
  • A Caspian partnership The proposal is that the littoral states should form a Caspian Foundation legal entity, and commit to that entity all existing rights in respect of the use, and the fruits of use (usufruct), of the Caspian Sea, and everything on it, in it, or under it. The Caspian Foundation would act as custodian or steward and the nations would have agreed governance rights of veto. This negative or passive veto right of stewardship is very different from conventional property rights of absolute ownership and temporary use under condominium. Moreover, it does not have the active power of control held under common law by a trustee on behalf of beneficiaries, and the legal complexities and management conflicts which go with it. The Caspian Foundation would be a subscriber to a Caspian Partnership framework agreement between the nations, investors of money or money's worth, and a consortium of service providers. This Caspian Partnership would not be yet another international organization, with everything that goes with that. It would not own anything, employ anyone or contract with anyone: it would simply be an associative framework agreement within which Caspian nations self-organize to the common purpose of the sustainable development of the Caspian Sea.
Kurt Laitner

Forget the Foundations - In These Times - 0 views

  • Their “actions” didn’t involve writing grant proposals, discussing their concerns with a board of directors or contacting state agencies. They tested water samples themselves, and, in 1979, produced a study revealing high levels of radioactive contamination, a high percentage of pregnancies complicated by excessive bleeding or terminated in abortion and large numbers of children born with birth defects. Despite their work, the Centers for Disease Control and Indian Health Services discredited the study, and WARN wasn’t vindicated until the South Dakota School of Mines substantiated their claims that same year.
  • But unlike Erin Brockovich, this tale of local activists fighting against faceless institutions doesn’t have a happy ending: The Nuclear Regulatory Commission simply raised the level of “acceptable contamination,” and Indian Health Services started providing bottled water in one area. Congress authorized a new water pipeline to the reservation in 2002–only to have the funding diverted by the financial demands of the wars in Iraq and Afghanistan.
  • who defer responsibility onto do-nothing organizations, only later to complain about their lack of agency
  • ...12 more annotations...
  • that foundations perpetuate First World interests and free-market capitalism, thus preserving many of the problems radical activists wish to eradicate, such as the unregulated concentration of wealth.
  • Foundations were created in the early 20th century by multimillionaire robber barons, such as John D. Rockefeller and Andrew Carnegie, to evade corporate and estate taxes.
  • foundations divert money away from the collective tax base
  • who are more interested in supporting milquetoast reformers than social-justice organizations
  • federal and state funding for education and healthcare has shrunk
  • This is a culture of noblesse oblige, Ahn writes, where the “privileged are obliged to help those less fortunate, without examining how that wealth was created or the dangerous implications of conceding such power to the wealthy.”
  • is the power those with money wield over community leaders.
  • consequently realigning their interests (i.e., maintaining their jobs) with maintaining the system
  • This allegiance keeps community leaders from challenging the root causes of social inequities–the social-change work–at the same time that they pedal to keep up by providing for the needs of individuals devastated by institutional exploitation.
  • Kivel concedes this is valuable work, but points out the inherent injustice of this paradigm: “When temporary shelter becomes a substitute for permanent housing, emergency food a substitute for a decent job … we have shifted our attention from the redistribution of wealth to the temporary provision of social services to keep people alive.”
  • University of Southern California Professor Ruth Wilson Gilmore urges contemporary grassroots activists to stop seeking a “pure way of doing things.” “Many are looking for an organizational structure and a resource capability that will somehow be impervious to co-optation,”
  • transitioning from foundation support to a volunteer collective reliant solely on grassroots dollars
Tiberius Brastaviceanu

Dark Intellectual Property. Why We Need a Kickstarter for Patents - 0 views

  • “dark IP,” the intellectual property (IP) that remains on the shelf: undiscovered, unexplored, untapped
  • our ability to catch so much in the net by dragging the surface (to use Mike Bergman’s analogy) actually still misses the invisible wealth of what lies beneath.
  • But dark IP is different than the other hidden-depths knowledge since it’s also unfair. Because taxpayers paid for much of the research — whether basic understanding with long-term benefits or more applied research with shorter-term benefits — that now lies collecting dust on university shelves.
  • ...31 more annotations...
  • the people of the United States spent an average of nearly $40 billion every year supporting institutional research
  • 65 percent of invention disclosure bundles remain, on average, unlicensed and unused … each year.
  • ”…the street finds its own uses for things.”
  • most of the IP (much of which we paid for) isn’t actually on the street, where entrepreneurial folks can do something with it.
  • the overworked and understaffed tech transfer offices
  • their models
  • There’s not necessarily room for exploration and discovery
  • byzantine bureaucracy of large organizations
  • But let’s face it, there’s also the hoarding and the overprotecting
  • So much IP is generated that it’s far too much for any one entity to ever make sense of
  • very few people are aware of — let alone able to access — an invention outside the social circle of its inventors, the scientific community involved, or even the “crowd” that’s sometimes harnessed in open innovation
  • we need new ways of democratizing it
  • Not democratizing the IP itself — institutions should still own and generate profits from the intellectual property they’ve created — but democratizing the ways in which we allow this IP to be discovered and licensed.
  • idea contests
  • marketplaces
  • competitions to find uses for on-the-shelf IP
  • missing out on the transformative potential of what technology can do here
  • promoting new ways of interacting around intellectual property
  • Marblar, where I’m an advisor
    • Tiberius Brastaviceanu
       
      The guy is not entirely for open innovation but proposes an intermediary model to democratize the use of IP
  • This turns off the average entrepreneur, who doesn’t have the patience and bandwidth to engage in all the unnecessary overhead of searching, browsing, and licensing IP.
  • Many small startups don’t even bother with IP
  • Another missing piece is ways of allowing the crowd to interact with each other and decide which technologies should be licensed
  • bidding wars
    • Tiberius Brastaviceanu
       
      competitive dynamic for acquiring IP and using it effectively. This doesn't solve the problem, because some companies will still buy it for defensive purposes or block others from using it, unlike with truly open innovation. 
  • Most of the examples I listed above haven’t changed much over the past decade or broken into the mainstream.
  • why not a Kickstarter for IP?
  • Such a website would bring together not just funds and transactions, but communities — with their attendant feedback mechanisms — that are interested in creating something novel around unused patents.
  • such a model would help get the ideas of a few into the minds of many.
  • open up the currently closed shelf to virtual browsing
  • inventions are not only ‘filed’ or ‘granted’ but ‘browsed’ or ‘licensed’.
Kurt Laitner

The Link Economy and Creditright - Geeks Bearing Gifts - Medium - 3 views

  • Online, content with no links has no value because it has no audience
  • News Commons used Repost as the basis of a content- and audience-sharing network among dozens of sites big and small in the state’s new ecosystem
  • Huffington Post and Twitter can get thousands of writers — including me — to make content for free because it brings us audience and attention.
  • ...25 more annotations...
  • Consider an alternative to syndication. I’ll call it reverse syndication. Instead of selling my content to you, what say I give it to you for free? Better yet, I pay you to publish it on your site. The condition: I get to put my ad on the content. I will pay you a share of what I earn from that ad based on how much audience you bring me.
  • That model values the creation of the audience
  • If content could travel with its business model attached, we could set it free to travel across the web, gathering recommendations and audience and value as it goes
  • She searched Google for “embeddable article” and up came Repost.us, already created by entrepreneur and technologist John Pettitt. Repost very cleverly allowed embeddable articles to travel with the creator’s own brand, advertising, analytics, and links.
  • First, he found that the overlap in audience between a creator’s and an embedder’s sites generally ran between 2 and 5 percent. That is to say, the embedders brought a mostly new audience to the creator’s content.
  • Instead, Pettitt found that click-through ran amazingly high: 5 to 7 percent — and these were highly qualified clicks of people who knew what they were going to get on the other side of a link
  • I call this creditright. We need a means to attach credit to content for those who contribute value to it so that each constituent has the opportunity to negotiate and extract value along the chain, so that each can gain permission to take part in the chain, and so that behaviors that benefit others in the chain can be rewarded and encouraged
    • Kurt Laitner
       
      so *net basically, or OVN contributory value accounting
  • Each creator’s ads traveled with its content — though that wasn’t necessarily optimal, because an ad for a North Jersey hairdresser wouldn’t perform terribly well with South Jersey readers brought in through embedding.
  • key factor in its failure: Repost could find many sites willing and eager to make their content embeddable. It didn’t find enough sites to embed the content.
  • But the embedders got nothing aside from the free use of content — content that was just a link away anyway
  • Our ultimate problem in media is that we do not have sufficient technical and legal frameworks for alternate business models.
  • That formula was the key insight behind Google: that links to content are a signal of its value; thus, the more links to a page from sites that themselves have more links, the more useful, relevant, or valuable that content is likely to be
  • Silicon Valley’s: Those people are your fans who are bringing value to you by sending you audiences and by contributing their creativity, and you’d be wise to build your businesses around making it easier, not harder, for them to get and share your content when and how they want it.
  • And so, we came to agree that we need new technological and legal frameworks flexible enough to enable multiple models to support creativity.
  • Hollywood’s side: People who download our content without buying it or who remix it without our permission — and the platforms that facilitate these behaviors — are stealing from us and must be stopped and punished.
  • Imagine you are a songwriter. You hear a street poet and her words inspire you to write a song about her, quoting her in the piece. You go to a crowdfunding platform — Kickstarter, Indiegogo, or Patreon — to raise money for you to go into the studio and perform and distribute your song. Another songwriter comes along and remixes it, making a new version and also sampling from others’ songs. Both end up on YouTube and Soundcloud, on iTunes and Google Play. Audience members discover and share the songs. A particularly popular artist shares the remixed version on Twitter and Facebook and it explodes. A label has one of its stars record it. The star appears on TV performing it. A movie studio includes that song in a soundtrack. There are many constituents in that process: the subject, the songwriter, the patrons, the fans, the remixer, the distributor, the label, the star, the show, the studio, and the platforms. Each contributed value.
  • Each may want to recognize value — but not all will want cash. There are other currencies in play: The poet may want credit and fame; the songwriter may want to sell concert tickets; the patrons may want social capital for discovering and supporting a new artist; the remixer may want permission to remix; the platforms may want a cut of sales or of subscription revenue; the show may want audience and advertising; the studio will want a return on its investment and risk.
  • I’ve suggested they would be wiser to seek another currency from Google: data about the users, helping build better services for readers and advertisers and thus better businesses
  • We will need a way to attach metadata to content, recording and revealing its source and the contributions of others in the chain of continuing creation and distribution.
  • We need a marketplace to measure and value their contributions and a means to negotiate rewards and permissions
  • We need payment structures to handle multiple currencies: data as well as money
  • And we need a legal framework to allow the flexible exploration of new models, some of which we cannot yet imagine.
  • It took many more years for society to develop principles of free speech to balance the economic and political interests of those who would attempt to control a new tool of speech.
  • We must reimagine the business of media and news from the first penny, asking where value is created, who contributes to it, where it resides, and how to extract it
  • Thus, we need new measures of value
mayssamd

Open Contracting Partnership: open, fair & efficient public contracting - 2 views

  •  
    Open contracting is about publishing and using open, accessible and timely information on public contracting to engage citizens and businesses to fix problems and deliver results.
Kurt Laitner

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
« First ‹ Previous 41 - 50 of 50
Showing 20 items per page