Skip to main content

Home/ Sensorica Knowledge/ Group items matching "interactive" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
269More

James Grier Miller, Living Systems (1978) - 0 views

  • reality as an integrated hierarchy of organizations of matter and energy
  • General living systems theory is concerned with a special subset of all systems, the living ones
  • a space is a set of elements which conform to certain postulate
  • ...266 more annotations...
  • s. Euclidean space
  • metric space
  • topological space
  • Physical space is the extension surrounding a point
  • My presentation of a general theory of living systems will employ two sorts of spaces in which they may exist, physical or geographical space and conceptual or abstracted spaces
  • Physical or geographical space
  • Euclidean space
  • distance
  • moving
  • maximum speed
  • objects moving in such space cannot pass through one another
  • friction
  • The characteristics and constraints of physical space affect the action of all concrete systems, living and nonliving.
  • information can flow worldwide almost instantly
  • Physical space is a common space
  • Most people learn that physical space exists, which is not true of many spaces
  • They can give the location of objects in it
  • Conceptual or abstracted spaces
  • Peck order
  • Social class space
  • Social distance
  • Political distance
  • life space
  • semantic space
  • Sociometric space
  • A space of time costs of various modes of transportation
  • space of frequency of trade relations among nations.
  • A space of frequency of intermarriage among ethnic groups.
  • These conceptual and abstracted spaces do not have the same characteristics and are not subject to the same constraints as physical space
  • Social and some biological scientists find conceptual or abstracted spaces useful because they recognize that physical space is not a major determinant of certain processes in the living systems they study
  • interpersonal relations
  • one cannot measure comparable processes at different levels of systems, to confirm or disconfirm cross-level hypotheses, unless one can measure different levels of systems or dimensions in the same spaces or in different spaces with known transformations among them
  • It must be possible, moreover, to make such measurements precisely enough to demonstrate whether or not there is a formal identity across levels
  • fundamental "fourth dimension" of the physical space-time continuum
  • is the particular instant at which a structure exists or a process occurs
  • or the measured or measurable period over which a structure endures or a process continues.
  • durations
  • speeds
  • rates
  • accelerations
  • irreversible unidirectionality of time
  • thermodynamics
  • negentropy
  • "time's arrow."
  • Matter and energy
  • Matter is anything which has mass (m) and occupies physical space.
  • Energy (E) is defined in physics as the ability to do work.
  • kinetic energy
  • potential energy
  • rest mass energy
  • Mass and energy are equivalent
  • Living systems need specific types of matter-energy in adequate amounts
  • Energy for the processes of living systems is derived from the breakdown of molecules
  • Any change of state of matter-energy or its movement over space, from one point to another, I shall call action.
  • It is one form of process.
  • information (H)
  • Transmission of Information
  • Meaning is the significance of information to a system which processes it: it constitutes a change in that system's processes elicited by the information, often resulting from associations made to it on previous experience with it
  • Information is a simpler concept: the degrees of freedom that exist in a given situation to choose among signals, symbols, messages, or patterns to be transmitted.
  • The set of all these possible categories (the alphabet) is called the ensemble or repertoire
  • .) The unit is the binary digit, or bit of information
  • . The amount of information is measured as the logarithm to the base 2 of the number of alternate patterns
  • Signals convey information to the receiving system only if they do not duplicate information already in the receiver. As Gabor says:
  • [The information of a message can] be defined as the 'minimum number of binary decisions which enable the receiver to construct the message, on the basis of the data already available to him.'
  • meaning cannot be precisely measured
  • Information is the negative of uncertainty.
  • information is the amount of formal patterning or complexity in any system.
  • The term marker was used by von Neumann to refer to those observable bundles, units, or changes of matter-energy whose patterning bears or conveys the informational symbols from the ensemble or repertoire.
  • If a marker can assume n different states of which only one is present at any given time, it can represent at most log2n bits of information. The marker may be static, as in a book or in a computer's memory
  • Communication of almost every sort requires that the marker move in space, from the transmitting system to the receiving system, and this movement follows the same physical laws as the movement of any other sort of matter-energy. The advance of communication technology over the years has been in the direction of decreasing the matter-energy costs of storing and transmitting the markers which bear information.
  • There are, therefore, important practical matter-energy constraints upon the information processing of all living systems exerted by the nature of the matter-energy which composes their markers.
  • organization is based upon the interrelations among parts.
  • If two parts are interrelated either quantitatively or qualitatively, knowledge of the state of one must yield some information about the state of the other. Information measures can demonstrate when such relationships exist
  • The disorder, disorganization, lack of patterning, or randomness of organization of a system is known as its entropy (S)
  • the statistical measure for the negative of entropy is the same as that for information
  • entropy becomes a measure of the probability
  • Increase of entropy was thus interpreted as the passage of a system from less probable to more probable states.
  • according to the second law, a system tends to increase in entropy over time, it must tend to decrease in negentropy or information.
  • therefore no principle of the conservation of information
  • The total information can be decreased in any system without increasing it elsewhere
  • but it cannot be increased without decreasing it elsewhere
  • . Making one or more copies of a given informational pattern does not increase information overall, though it may increase the information in the system which receives the copied information.
  • transforms information into negative entropy
  • smallest possible amount of energy used in observing one bit of information
  • calculations of the amount of information accumulated by living systems throughout growth.
  • the concept of Prigogine that in an open system (that is one in which both matter and energy can be exchanged with the environment) the rate of entropy production within the system, which is always positive, is minimized when the system is in a steady state.
  • in systems with internal feedbacks, internal entropy production is not always minimized when the system is in a stationary state. In other words, feedback couplings between the system parameters may cause marked changes in the rate of development of entropy. Thus it may be concluded that the "information flow" which is essential for this feedback markedly alters energy utilization and the rate of development of entropy, at least in some such special cases which involve feedback control. While the explanation of this is not clear, it suggests an important relationship between information and entropy
  • amount of energy actually required to transmit the information in the channel is a minute part of the total energy in the system, the "housekeeping energy" being by far the largest part of it
  • In recent years systems theorists have been fascinated by the new ways to study and measure information flows, but matter-energy flows are equally important. Systems theory is more than information theory, since it must also deal with energetics - such matters as
  • the flow of raw materials through societies
  • Only a minute fraction of the energy used by most living systems is employed for information processing
  • I have noted above that the movement of matter-energy over space, action, is one form of process. Another form of process is information processing or communication, which is the change of information from one state to another or its movement from one point to another over space
  • Communications, while being processed, are often shifted from one matter-energy state to another, from one sort of marker to another
  • transformations go on in living systems
  • One basic reason why communication is of fundamental importance is that informational patterns can be processed over space and the local matter-energy at the receiving point can be organized to conform to, or comply with, this information
  • the delivery of "flowers by telegraph."
  • Matter-energy and information always flow together
  • Information is always borne on a marker
  • . Conversely there is no regular movement in a system unless there is a difference in potential between two points, which is negative entropy or information
  • If the receiver responds primarily to the material or energic aspect, I shall call it, for brevity, a matter-energy transmission; if the response is primarily to the information, I shall call it an information transmission
  • Moreover, just as living systems must have specific forms of matter-energy, so they must have specific patterns of information
  • example
  • example
  • develop normally
  • have appropriate information inputs in infancy
  • pairs of antonyms
  • one member of which is associated with the concept of information (H)
  • the other member of which is associated with its negative, entropy (S)
  • System
  • A system is a set of interacting units with relationships among them
  • .The word "set" implies that the units have some common properties. These common properties are essential if the units are to interact or have relationships. The state of each unit is constrained by, conditioned by, or dependent on the state of other units. The units are coupled. Moreover, there is at least one measure of the sum of its units which is larger than the sum of that measure of its units.
  • Conceptual system
  • Units
  • terms
  • Relationships
  • a set of pairs of units, each pair being ordered in a similar way
  • expressed by words
  • or by logical or mathematical symbols
  • operations
  • The conceptual systems of science
  • observer
  • selects
  • particular sets to study
  • Variable
  • Each member of such a set becomes a variable of the observer's conceptual system
  • conceptual system may be loose or precise, simple or elaborate
  • Indicator
  • an instrument or technique used to measure fluctuations of variables in concrete systems
  • Function
  • a correspondence between two variables, x and y, such that for each value of x there is a definite value of y, and no two y's have the same x, and this correspondence is: determined by some rule
  • Any function is a simple conceptual system
  • Parameter
  • An independent variable through functions of which other functions may be expressed
  • The state of a conceptual system
  • the set of values on some scale, numerical or otherwise, which its variables have at a given instant
  • Formal identity
  • variables
  • varies comparably to a variable in another system
  • If these comparable variations are so similar that they can be expressed by the same function, a formal identity exists between the two systems
  • Relationships between conceptual and other sorts of systems
  • Science advances as the formal identity or isomorphism increases between a theoretical conceptual system and objective findings about concrete or abstracted systems
  • A conceptual system may be purely logical or mathematical, or its terms and relationships may be intended to have some sort of formal identity or isomorphism with units and relationships empirically determinable by some operation carried out by an observer
  • Concrete system
  • a nonrandom accumulation of matter-energy, in a region in physical space-time, which is organized into interacting interrelated subsystems or components.
  • Units
  • are also concrete systems
  • Relationships
  • spatial
  • temporal
  • spatiotemporal
  • causal
  • Both units and relationships in concrete systems are empirically determinable by some operation carried out by an observer
  • patterns of relationships or processes
  • The observer of a concrete system
  • distinguishes a concrete system from unorganized entities in its environment by the following criteria
  • physical proximity of its units
  • similarity of its units
  • common fate of its units
  • distinct or recognizable patterning of its units.
  • Their boundaries are discovered by empirical operations available to the general scientific community rather than set conceptually by a single observer
  • Variable of a concrete system
  • Any property of a unit or relationship within a system which can be recognized by an observer
  • which can potentially change over time, and whose change can potentially be measured by specific operations, is a variable of a concrete system
  • Examples
  • number of its subsystems or components, its size, its rate of movement in space, its rate of growth, the number of bits of information it can process per second, or the intensity of a sound to which it responds
  • A variable is intrasystemic
  • not to be confused with intersystemic variations which may be observed among individual systems, types, or levels.
  • The state of a concrete system
  • its structure
  • represented by the set of values on some scale which its variables have at that instant
  • Open system
  • Most concrete systems have boundaries which are at least partially permeable, permitting sizable magnitudes of at least certain sorts of matter-energy or information transmissions to pass them. Such a system is an open system. In open systems entropy may increase, remain in steady state, or decrease.
  • Closed system
  • impermeable boundaries through which no matter-energy or information transmissions of any sort can occur is a closed system
  • special case
  • No actual concrete system is completely closed
  • In closed systems, entropy generally increases, exceptions being when certain reversible processes are carried on which do not increase it. It can never decrease.
  • Nonliving system
  • the general case of concrete systems, of which living systems are a very special case. Nonliving systems need not have the same critical subsystems as living systems, though they often have some of them
  • Living system
  • a special subset of the set of all possible concrete systems
  • They all have the following characteristics:
  • open systems
  • inputs
  • throughputs
  • outputs
  • of various sorts of matter-energy and information.
  • maintain a steady state of negentropy even though entropic changes occur in them as they do everywhere else
  • by taking in inputs
  • higher in complexity or organization or negentropy
  • than their outputs
  • The difference permits them to restore their own energy and repair breakdowns in their own organized structure.
  • In living systems many substances are produced as well as broken down
  • To do this such systems must be open and have continual inputs of matter-energy and information
  • entropy will always increase in walled-off living systems
  • They have more than a certain minimum degree of complexity
  • They either contain genetic material composed of deoxyribonucleic acid (DNA)
  • or have a charter
  • blueprint
  • program
  • of their structure and process from the moment of their origin
  • may also include nonliving components.
  • They have a decider, the essential critical sub-system which controls the entire system, causing its subsystems and components to interact. Without such interaction under decider control there is no system.
  • other specific critical sub-systems or they have symbiotic or parasitic relationships with other living or nonliving systems
  • Their subsystems are integrated together to form actively self-regulating, developing, unitary systems with purposes and goals
  • They can exist only in a certain environment
  • change in their environment
  • produces stresses
  • Totipotential system
  • capable of carrying out all critical subsystem processes necessary for life is totipotential
  • Partipotential system
  • does not itself carry out all critical subsystem processes is partipotential
  • A partipotential system must interact with other systems that can carry out the processes which it does not, or it will not survive
  • parasitic
  • symbiotic
    • Tiberius Brastaviceanu
       
      The Exchange fime is a symbiotic system to SENSORICA
  • Fully functioning system
  • when it
  • Partially functioning system
  • it must do its own deciding, or it is not a system
  • Abstracted system
  • Units
  • relationships abstracted or selected by an observer in the light of his interests, theoretical viewpoint, or philosophical bias.
  • Some relationships may be empirically determinable by some operation carried out by the observer, but others are not, being only his concepts
  • Relationships
  • The relationships mentioned above are observed to inhere and interact in concrete, usually living, systems
  • these concrete systems are the relationships of abstracted systems.
  • The verbal usages of theoretical statements concerning abstracted systems are often the reverse of those concerning concrete systems
  • An abstracted system differs from an abstraction, which is a concept
  • representing a class of phenomena all of which are considered to have some similar "class characteristic." The members of such a class are not thought to interact or be interrelated, as are the relationships in an abstracted system
  • Abstracted systems are much more common in social science theory than in natural science.
  • are oriented toward relationships rather than toward the concrete systems
  • spatial arrangements are not usually emphasized
  • their physical limits often do not coincide spatially with the boundaries of any concrete system, although they may.
  • important difference between the physical and biological hierarchies, on the one hand, and social hierarchies, on the other
  • Most physical and biological hierarchies are described in spatial terms
  • we propose to identify social hierarchies not by observing who lives close to whom but by observing who interacts with whom
  • intensity of interaction
  • in most biological and physical systems relatively intense interaction implies relative spatial propinquity
  • To the extent that interactions are channeled through specialized communications and transportation systems, spatial propinquity becomes less determinative of structure.
    • Tiberius Brastaviceanu
       
      This is the case of SENSORICA, built on web-based communication and coordination tools.ย 
  • PARSONS
  • the unit of a partial social system is a role and not the individual.
  • culture
  • cumulative body of knowledge of the past, contained in memories and assumptions of people who express this knowledge in definite ways
  • The social system is the actual habitual network of communication between people.
  • RUESCH
  • A social system is a behavioral system
  • It is an organized set of behaviors of persons interacting with each other: a pattern of roles.
  • The roles are the units of a social system
    • Tiberius Brastaviceanu
       
      That is why we need a role system in SENSORICA
  • On the other hand, the society is an aggregate of social subsystems, and as a limiting case it is that social system which comprises all the roles of all the individuals who participate.
  • What Ruesch calls the social system is something concrete in space-time, observable and presumably measurable by techniques like those of natural science
  • To Parsons the system is abstracted from this, being the set of relationships which are the form of organization. To him the important units are classes of input-output relationships of subsystems rather than the subsystems themselves
  • system is a system of relationship in action, it is neither a physical organism nor an object of physical perception
  • evolution
  • differentiation
  • growth
  • from earlier and simpler forms and functions
  • capacities for specializations and gradients
  • [action] is not concerned with the internal structure of processes of the organism, but is concerned with the organism as a unit in a set of relationships and the other terms of that relationship, which he calls situation
  • Abstracted versus concrete systems
  • One fundamental distinction between abstracted and concrete systems is that the boundaries of abstracted systems may at times be conceptually established at regions which cut through the units and relationships in the physical space occupied by concrete systems, but the boundaries of these latter systems are always set at regions which include within them all the units and internal relationships of each system
  • A science of abstracted systems certainly is possible and under some conditions may be useful.
  • If the diverse fields of science are to be unified, it would be helpful if all disciplines were oriented either to concrete or to abstracted systems.
  • It is of paramount importance for scientists to distinguish clearly between them
52More

Fostering creativity. A model for developing a culture of collective creativity in science - 0 views

  • Scientific progress depends on both conceptual and technological advances, which in turn depend on the creativity of scientists
  • creative processes behind these discoveries rely on mechanisms that are similar across disciplines as diverse as art and science
  • research into the nature of creativity indicates that it depends strongly on the cultural environment
  • ...48 more annotations...
  • create optimal conditions in a research organization with the aim of enhancing the creativity of its scientific staff
  • Creativity has been traditionally associated with art and literature but since the early twentieth century, science has also been regarded as a creative activity
  • Measuring creativity is a challenging task owing to its complex and elusive nature
  • Measurement of brain activity showed that creativity correlates with two brain states: a quiescent, relaxed state corresponding to the inspiration stage, and a much more active state corresponding to the elaboration stage
  • models of creativity
  • have a common feature: they depend on a balance between analytical and synthetic thinking, and usually describe the creative process as a sequence of phases that alternate between these states
  • Most research on creativity has focused on the individual
  • However, more recent studies suggest that creativity also depends strongly on the social and cultural context
  • breakthroughs depended on collaboration and social support
  • social environment in business organizations affects the creativity of their employees
  • Although creative individuals are essential, the strong link with the environment indicates that creativity might be greatly enhanced by generating a culture that supports the creative process.
  • Many of the interviewees repeatedly emphasized three main qualities necessary to be a good scientist: rigorous intellect, the ability to get the job done and the ability to have creative ideas.
  • almost all interviewees characterized their breakthrough moment as an abrupt leap in understanding
  • Although breakthroughs in science depend on such an โ€˜internal' conceptual shift, they also rely on โ€˜external' experimental results. However, most interviewees described their breakthroughs as largely internal:
  • Only two scientists expressed the view that their breakthroughs were purely external events, based on the observation of novel data.
  • intuition
  • must be combined with rational thinking to be effective
  • Although the synthesis of a new concept relies on intuition, which is based on subconscious mental processing, it must be subjected to conscious examination and analysis
  • specific mental skills or attitudes
  • ability to make unexpected connections
  • ability to choose relevant possibilities from an infinite set of irrelevant ones
  • interest in the unknown'
  • enjoyment of the creative process
  • stimulation by interacting with colleagues
  • undoubtedly the most crucial trait for creativity, which thrives on the exchange of ideas
  • The majority felt that the individual and the collective are equally important:
  • what interactions are optimal for creativity
  • The majority of interviewees answered that other people provided them with โ€˜inspiration to do something new'
  • positive feedback after the emergence of a new idea is almost as important as the inspiration that triggered it
  • collective provides the individual with technical expertise
  • Therefore, scientists would value a culture of interaction and mutual inspiration more highly than access to technology, although the latter is essential for their experiments.
  • At the end of the interviews, each scientist was asked to describe the best possible conditions for generating creativity at a research institute.
  • Cross-fertilization is absolutely essential
  • These results indicate strongly that an interactive environment is the single most important factor for stimulating creativity
  • interacting with people doing very different things
  • interacting with colleagues informally
  • interactions within any institution are strongly affected by its organization
  • Several interviewees described โ€˜an open hierarchy' as an important factor for creativity
  • hierarchy is based on genuine respect because people are great scientists, but at the same time they're very approachable and open towards what you have to say
  • These results suggest that the best conditions for scientific creativity come with a free-flowing hierarchy and a highly developed culture of interaction to guarantee the exchange of ideas and inspiration.
  • Furthermore, interdisciplinary interactions lead to the generation of new and unusual ideas
  • Finally, because of the freedom to try new things, these ideas can be tested and eventually generate new insights.
  • Creativity can be described as an emergent phenomenon
  • nonlinear phenomena
  • Emergence depends on dynamic interactions between individual agents within the system
  • The importance of a โ€˜freedom to try new things' and a โ€˜free-flowing hierarchy' further supports the idea that individual components in an emergent system must be able to interact flexibly without central control
  • During the interviews, it became apparent that although a culture of interaction and creativity exists at EMBL, this itself is not often the subject of discussion. The values on which this culture is based are seemingly implicit rather than explicit
  • Potentially, the EMBL culture of interaction could be strengthened further by consciously expressing and discussing the values on which it is based
57More

Is Shame Necessary? | Conversation | Edge - 0 views

  • What is shame's purpose? Is shame still necessary?
  • Shame is what is supposed to occur after an individual fails to cooperate with the group.
  • Whereas guilt is evoked by an individual's standards, shame is the result of group standards. Therefore, shame, unlike guilt, is felt only in the context of other people.
  • ...53 more annotations...
  • Many animals use visual observations to decide whether to work with others.
  • humans are more cooperative when they sense they're being watched.
  • The feeling of being watched enhances cooperation, and so does the ability to watch others. To try to know what others are doing is a fundamental part of being human
  • Shame serves as a warning to adhere to group standards or be prepared for peer punishment. Many individualistic societies, however, have migrated away from peer punishment toward a third-party penal system
  • Shame has become less relevant in societies where taking the law into one's own hands is viewed as a breach of civility.
  • Many problems, like most concerning the environment, are group problems. Perhaps to solve these problems we need a group emotion. Maybe we need shame.
  • Guilt prevails in many social dilemmas
  • It is perhaps unsurprising that a set of tools has emerged to assuage this guilt
  • Guilt abounds in many situations where conservation is an issue.
  • The problem is that environmental guilt, though it may well lead to conspicuous ecoproducts, does not seem to elicit conspicuous results.
  • The positive effect of idealistic consumers does exist, but it is masked by the rising demand and numbers of other consumers.
  • Guilt is a valuable emotion, but it is felt by individuals and therefore motivates only individuals. Another drawback is that guilt is triggered by an existing value within an individual. If the value does not exist, there is no guilt and hence no action
  • Getting rid of shaming seems like a pretty good thing, especially in regulating individual behavior that does no harm to others. In eschewing public shaming, society has begun to rely more heavily on individual feelings of guilt to enhance cooperation.
  • five thousand years ago, there arose another tool: writing
  • Judges in various states issue shaming punishments,
  • shaming by the state conflicts with the law's obligation to protect citizens from insults to their dignity.
  • What if government is not involved in the shaming?
  • Is this a fair use of shaming? Is it effective?
  • Shaming might work to change behavior in these cases, but in a world of urgent, large-scale problems, changing individual behavior is insignificant
  • vertical agitation
  • Guilt cannot work at the institutional level, since it is evoked by individual scruples, which vary widely
  • But shame is not evoked by scruples alone; since it's a public sentiment, it also affects reputation, which is important to an institution.
  • corporate brand reputation outranked financial performance as the most important measure of success
  • shame and reputation interact
  • in our early evolution we could gauge cooperation only firsthand
  • Shaming, as noted, is unwelcome in regulating personal conduct that doesn't harm others. But what about shaming conduct that does harm others?
  • why we learned to speak.1
  • Language
  • The need to accommodate the increasing number of social connections and monitor one another could be
  • allowed for gossip, a vector of social information.
  • in cooperation games that allowed players to gossip about one another's performance, positive gossip resulted in higher cooperation.
  • Of even greater interest, gossip affected the players' perceptions of others even when they had access to firsthand information.
  • Human society today is so big that its dimensions have outgrown our brains.
  • What tool could help us gossip in a group this size?
  • We can use computers to simulate some of the intimacy of tribal life, but we need humans to evoke the shame that leads to cooperation. The emergence of new toolsโ€” language, writing, the Internetโ€”cannot completely replace the eyes. Face-to-face interactions, such as those outside Trader Joe's stores, are still the most impressive form of dissent.
  • what is stopping shame from catalyzing social change? I see three main drawbacks:
  • Today's world is rife with ephemeral, or "one-off," interactions.
  • Research shows, however, that if people know they will interact again, cooperation improves
  • Shame works better if the potential for future interaction is high
  • In a world of one-off interactions, we can try to compensate for anonymity with an image score,
  • which sends a signal to the group about an individual's or institution's degree of cooperation.
  • Today's world allows for amorphous identities
  • It's hard to keep track of who cooperates and who doesn't, especially if it's institutions you're monitoring
  • Shaming's biggest drawback is its insufficiency.
  • Some people have no shame
  • shame does not always encourage cooperation from players who are least cooperative
  • a certain fraction of a given population will always behave shamelessly
  • if the payoff is high enough
  • There was even speculation that publishing individual bankers' bonuses would lead to banker jealousy, not shame
  • shame is not enough to catalyze major social change
  • This is why punishment remains imperative.
  • Even if shaming were enough to bring the behavior of most people into line, governments need a system of punishment to protect the group from the least cooperative players.
  • Today we are faced with the additional challenge of balancing human interests and the interests of nonhuman life.
  •  
    The role of non-rational mechanisms in convergence - social emotions like shame and guiltย 
99More

Beyond Blockchain: Simple Scalable Cryptocurrencies - The World of Deep Wealth - Medium - 0 views

  • I clarify the core elements of cryptocurrency and outline a different approach to designing such currencies rooted in biomimicry
  • This post outlines a completely different strategy for implementing cryptocurrencies with completely distributed chains
  • Rather than trying to make one global, anonymous, digital cash
  • ...95 more annotations...
  • we are interested in the resilience that comes from building a rich ecosystem of interoperable currencies
  • What are the core elements of a modern cryptocurrency?
  • Digital
  • Holdings are electronic and only exist and operate by virtue of a communityโ€™s agreement about how to interpret digital bits according to rules about operation and accounting of the currency.
  • Trustless
  • donโ€™t have to trust a 3rd party central authority
  • Decentralized
  • Specifically, access, issuance, transaction accounting, rules & policies, should be collectively visible, known, and held.
  • Cryptographic
  • This cryptographic structure is used to enable a variety of people to host the data without being able to alter it.
  • Identity
  • there must be a way to associate these bits with some kind of account, wallet, owner, or agent who can use them
  • Other things that many take for granted in blockchains may not be core but subject to decisions in design and implementation, so they can vary between implementations
  • It does not have to be stored in a synchronized global ledger
  • does not have to be money. It may be a reputation currency, or data used for identity, or naming, etc
  • Its units do not have to be cryptographic tokens or coins
  • It does not have to protect the anonymity of users, although it may
  • if you think currency is only money, and that money must be artificially scarce
  • Then you must tackle the problem of always tracking which coins exist, and which have been spent. That is one approachโ€Šโ€”โ€Šthe one blockchain takes.
  • You might optimize for anonymity if you think of cryptocurrency as a tool to escape governments, regulations, and taxes.
  • if you want to establish and manage membership in new kinds of commons, then identity and accountability for actions may turn out to be necessary ingredients instead of anonymity.
  • In the case of the MetaCurrency Project, we are trying to support many use cases by building tools to enable a rich ecosystem of communities and current-sees (many are non-monetary) to enhance collective intelligence at all scales.
  • Managing consensus about a shared reality is a central challenge at the heart of all distributed computing solutions.
  • If we want to democratize money by having cryptocurrencies become a significant and viable means of transacting on a daily basis, I believe we need fundamentally more scalable approaches that donโ€™t require expensive, dedicated hardware just to participate.
  • We should not need system wide consensus for two people to do a transaction in a cryptocurrency
  • Blockchain is about managing a consensus about what was โ€œsaid.โ€ Ceptr is about distributing a consensus about how to โ€œspeak.โ€
  • how nature gets the job done in massively scalable systems which require coordination and consistency
  • Replicate the same processes across all nodes
  • Empower every node with full agency
  • Hold this transformed state locally and reliably
  • Establish protocols for interaction
  • Each speaker of a language carries the processes to understand sentences they hear, and generate sentences they need
  • we certainly donโ€™t carry some kind of global ledger of everything thatโ€™s ever been said, or require consensus about what has been said
  • Language IS a communication protocol we learn by emulating the processes of usage.
  • Dictionaries try to catch up when the usage
  • there is certainly no global ledger with consensus about the state of trillions of cells. Yet, from a single zygoteโ€™s copy of DNA, our cells coordinate in a highly decentralized manner, on scales of trillions, and without the latency or bottlenecks of central control.
  • Imagine something along the lines of a Java Virtual Machine connected to a distributed version of Github
  • Every time this JVM runs a program it confirms the hash of the code it is about to execute with the hash signed into the code repository by its developers
  • This allows each node that intends to be honest to be sure that theyโ€™re running the same processes as everyone else. So when two parties want to do a transaction, and each can have confidence their own code, and the results that your code produces
  • Then you treat it as authoritative and commit it to your local cryptographically self-validating data store
  • Allowing each node to treat itself as a full authority to process transactions (or interactions via shared protocols) is exactly how you empower each node with full agency. Each node runs its copy of the signed program/processes on its own virtual machine, taking the transaction request combined with the transaction chains of the parties to the transaction. Each node can confirm their counterpartyโ€™s integrity by replaying their transactions to produce their current state, while confirming signatures and integrity of the chain
  • If both nodes are in an appropriate state which allows the current transaction, then they countersign the transaction and append to their respective chains. When you encounter a corrupted or dishonest node (as evidenced by a breach of integrity of their chainโ€Šโ€”โ€Špassing through an invalid state, broken signatures, or broken links), your node can reject the transaction you were starting to process. Countersigning allows consensus at the appropriate scale of the decision (two people transacting in this case) to lock data into a tamper-proof state so it can be stored in as many parallel chains as you need.
  • When your node appends a mutually validated and signed transaction to its chain, it has updated its local state and is able to represent the integrity of its data locally. As long as each transaction (link in the chain) has valid linkages and countersignatures, we can know that it hasnโ€™t been tampered with.
  • If you can reliably embody the state of the node in the node itself using Intrinsic Data Integrity, then all nodes can interact in parallel, independent of other interactions to maximize scalability and simultaneous processing. Either the node has the credits or it doesnโ€™t. I donโ€™t have to refer to a global ledger to find out, the state of the node is in the countersigned, tamper-proof chain.
  • Just like any meaningful communication, a protocol needs to be established to make sure that a transaction carries all the information needed for each node to run the processes and produce a new signed and chained state. This could be debits or credits to an account which modify the balance, or recoding courses and grades to a transcript which modify a Grade Point Average, or ratings and feedback contributing to a reputation score, and so on.
  • By distributing process at the foundation, and leveraging Intrinsic Data Integrity, our approach results in massive improvements in throughput (from parallel simultaneous independent processing), speed, latency, efficiency, and cost of hardware.
  • You also donโ€™t need to incent people to hold their own recordโ€Šโ€”โ€Šthey already want it.
  • Another noteworthy observation about humans, cells, and atoms, is that each has a general โ€œcontainerโ€ that gets configured to a specific use.
  • Likewise, the Receptors weโ€™ve built are a general purpose framework which can load code for different distributed applications. These Receptors are a lightweight processing container for the Ceptr Virtual Machine Host
  • Ceptr enables a developer to focus on the rules and transactions for their use case instead of building a whole framework for distributed applications.
  • how units in a currency are issued
  • Most people think that money is just money, but there are literally hundreds of decisions you can make in designing a currency to target particular needs, niches, communities or patterns of flow.
  • Blockchain cryptocurrencies are fiat currencies. They create tokens or coins from nothing
  • These coins are just โ€œspoken into beingโ€
  • the challenging task of
  • ensure there is no counterfeiting or double-spending
  • Blockchain cryptocurrencies are fiat currencies
  • These coins are just โ€œspoken into beingโ€
  • the challenging task of tracking all the coins that exist to ensure there is no counterfeiting or double-spending
  • You wouldnโ€™t need to manage consensus about whether a cryptocoin is spent, if your system created accounts which have normal balances based on summing their transactions.
  • In a mutual credit system, units of currency are issued when a participant extends credit to another user in a standard spending transaction
  • Alice pays Bob 20 credits for a haircut. Aliceโ€™s account now has -20, and Bobโ€™s has +20.
  • Alice spent credits she didnโ€™t have! True
  • Managing the currency supply in a mutual credit system is about managing credit limitsโ€Šโ€”โ€Šhow far people can spend into a negative balance
  • Notice the net number units in the system remains zero
  • One elegant approach to managing mutual credit limits is to set them based on actual demand.
  • concerns about manufacturing fake accounts to game credit limits (Sybil Attacks)
  • keep in mind there can be different classes of accounts. Easy to create, anonymous accounts may get NO credit limit
  • What if I alter my code to give myself an unlimited credit limit, then spend as much as I want? As soon as you pass the credit limit encoded in the shared agreements, the next person you transact with will discover youโ€™re in an invalid state and refuse the transaction.
  • If two people collude to commit an illegal transaction by both hacking their code to allow a normally invalid state, the same still pattern still holds. The next person they try to transact with using untampered code will detect the problem and decline to transact.
  • Most modern community currency systems have been implemented as mutual credit,
  • Hawala is a network of merchants and businessmen, which has been operating since the middle ages, performing money transfers on an honor system and typically settling balances through merchandise instead of transferring money
  • Letโ€™s look at building a minimum viable cryptocurrency with the hawala network as our use case
  • To minimize key management infrastructure, each hawaladarโ€™s public key is their address or identity on the network. To join the network you get a copy of the software from another hawaladar, generate your public and private keys, and complete your personal profile (name, location, contact info, etc.). You call, fax, or email at least 10 hawaladars who know you, and give them your IP address and ask them to vouch for you.
  • Once 10 other hawaladars have vouched for you, you can start doing other transactions because the protocol encoded in every node will reject a transaction chain that doesnโ€™t start with at least 10 vouches
  • seeding your information with those other peers so you can be found by the rest of the network.
  • As described in the Mutual Credit section, at the time of transaction each party audits the counterpartyโ€™s transaction chain.
  • Our hawala crypto-clearinghouse protocol has two categories of transactions: some used for accounting and others for routing. Accounting transactions change balances. Routing transactions maintain network integrity by recording information about hawaladar
  • Accounting Transactions create signed data that changes account balances and contains these fields:
  • The final hash of all of the above fields is used as a unique transaction ID and is what each of party signs with their private keys. Signing indicates a party has agreed to the terms of the transaction. Only transactions signed by both parties are considered valid. Nodes can verify signatures by confirming that decryption of the signature using the public key yields a result which matches the transaction ID.
  • Routing Transactions sign data that changes the peers list and contain these fields:
  • As with accounting transactions, the hash of the above fields is used as the transactionโ€™s unique key and the basis for the cryptographic signature of both counterparties.
  • Remember, instead of making changes to account balances, routing transactions change a nodeโ€™s local list of peers for finding each other and processing.
  • a distributed network of mutual trust
  • operates across national boundaries
  • everyone already keeps and trusts their own separate records
  • Hawaladars are not anonymous
  • โ€œdouble-spendingโ€
  • It would be possible for someone to hack the code on their node to โ€œforgetโ€ their most recent transaction (drop the head of their chain), and go back to their previous version of the chain before that transaction. Then they could append a new transaction, drop it, and append again.
  • After both parties have signed the agreed upon transaction, each party submits the transaction to separate notaries. Notaries are a special class of participant who validate transactions (auditing each chain, ensuring nobody passes through an invalid state), and then they sign an outer envelope which includes the signatures of the two parties. Notaries agree to run high-availability servers which collectively manage a Distributed Hash Table (DHT) servicing requests for transaction information. As their incentive for providing this infrastructure, notaries get a small transaction fee.
  • This approach introduces a few more steps and delays to the transaction process, but because it operates on independent parallel chains, it is still orders of magnitude more efficient and decentralized than reaching consensus on entries in a global ledger
  • millions of simultaneous transactions could be getting processed by other parties and notaries with no bottlenecks.
  • There are other solutions to prevent nodes from dropping the head of their transaction chain, but the approach of having notaries serve out a DHT solves a number of common objections to completely distributed accounting. Having access to reliable lookups in a DHT provides a similar big picture view that you get from a global ledger. For example, you may want a way to look up transactions even when the parties to that transaction are offline, or to be able to see the net system balance at a particular moment in time, or identify patterns of activity in the larger system without having to collect data from everyone individually.
  • By leveraging Intrinsic Data Integrity to run numerous parallel tamper-proof chains you can enable nodes to do various P2P transactions which donโ€™t actually require group consensus. Mutual credit is a great way to implement cryptocurrencies to run in this peered manner. Basic PKI with a DHT is enough additional infrastructure to address main vulnerabilities. You can optimize your solution architecture by reserving reserve consensus work for tasks which need to guarantee uniqueness or actually involve large scale agreement by humans or automated contracts.
  • It is not only possible, but far more scalable to build cryptocurrencies without a global ledger consensus approach or cryptographic tokens.
  •  
    Article written by Arthur Brook, founder of Metacurrency project and of Ceptr.
47More

Google Apps Script - introduction - 0 views

  • control over Google products
  • can access and control Google Spreadsheets and other products
  • scripts
  • ...44 more annotations...
  • run directly on Google servers in order to provide direct access to the products they control.
  • can also use Google Apps Script from Google Sites
  • Google Apps Script Template Gallery
  • Google Apps Script Blog
  • guide contains the information you need to use Google Apps Script, a server-side scripting language, based on JavaScript, that runs on Google's servers alongside Google Apps
  • enable varying degrees of interactivity among the applications
  • easy enough to use that you don't have to be a programmer to create scripts.
  • use it to automate complex tasks within Google Apps
  • You don't have to be a programmer to use Google Apps Script
  • A script is a series of instructions you write in a computer language to accomplish a particular task. You type in the instructions and save them as a script. The script runs only under circumstances you define.
  • The Google Apps Script API provides a set of objects. You can use these objects and their associates methods to access Google Docs and Spreadsheets, Gmail, Google Finance, and other Google applications.
  • To run a script, you must first add the script to a Google Spreadsheet or Google Site using the Script Editor.
  • You can retrieve information from a wide selection of Google Apps and Services and from external sources, including web pages and XML sources. You can use Google Apps Script to create email, spreadsheets, pages on Google Sites, and files in the Google Docs Document List.
  • The instructions in a script are grouped into functions.
  • objects
  • methods
  • for such tasks
  • Create pages on a Google Site
  • Customize a Spreadsheet
  • Send email based on information in a Spreadsheet
  • You can manipulate
  • numeric
  • financial
  • string
  • an XML document
  • controlling data in the following applications
  • Spreadsheets
  • Google Document List
  • Contacts
  • Calendar
  • Sites
  • Google Maps
  • create and display interactive user interface elements
  • interact with relational database management systems
  • create folders, subfolders, and files in the Google Docs document list
  • access to user, session, and browser information
  • access to web services
  • extract data from XML documents and then manipulate that data
  • obtain translations of text from one language to another
  • send email
  • UrlFetch services
  • encode and decode strings and format dates
  • store properties on a per-script and per-user basis
  • create, delete and update contact information for individuals and for groups in Google Contacts
1More

When Cities Run Themselves | WOUB - 0 views

  •  
    Machines talking to machines No doubt that the Olympics will have a profound effect in shaping London's future. By the time the Games begin, for instance, it will have Europe's largest free WiFi zone, with the city's iconic red phone booths converted, fittingly, into hotspots. But another opportunity London landed earlier this month could have just as much impact, perhaps more. A company called Living PlanIt announced that it will begin testing its "Urban Operating System" in the Greenwich section of the city. What does that mean? Put simply, London would have its own operating system, much as your PC runs on Windows or your Mac runs on Apple's IOS. This ties into the latest hot buzz phrase, "the internet of things," which describes a world where machines talk to other machines. No human interaction required. So, for a city, this means sensors in buildings would connect to sensors in water treatment plants which would connect to sensors in stoplights. It would be one gigantic, computerized urban nervous system, which a lot of experts think is the only way cities can survive a future when they'll contain more than two out of every three people on Earth. Based on what sensors reveal about the location and movement of humans in a section of a city, for instance, buildings will automatically adjust their temperatures, streetlights will dim or brighten, water flow will increase or slow. Or, in the event of a disaster, emergency services would have real-time access to traffic data, trauma unit availability, building blueprints. And soon enough, our smart phones will be able to tap in to the Urban OS. So will our household appliances. This is not some 21st century analogue of the personal jet pack. The Urban OS is the driving force behind a smart city being built from the ground up in northern Portugal. Construction is scheduled to be completed in three years; eventually it will have about 150,000 residents. It will also have more than 100 million sen
1More

You'll Never Guess How The Unusual Vaavud Wind Meter Wirelessly Connects To Your Phone ... - 1 views

  •  
    interesting method of interacting with the smart phone
41More

Value network - Wikipedia - 0 views

  • a business analysis perspective
  • describes
  • resources within and between businesses
  • ...38 more annotations...
  • nodes in a value network represent people
  • nodes are connected by interactions that represent tangible and intangible deliverables
  • Value networks exhibit interdependence
  • Companies have both internal and external value networks.[1]
  • customers or recipients, intermediaries, stakeholders, complementary, open innovation networks and suppliers
  • key activities
  • processes and relationships that cut across internal boundaries
  • Value is created through exchange and the relationships between roles
  • F&S's value networks consists of these components
  • customers
  • Some service the customers all use, and enables interaction between the customers
  • service
  • contracts that enables access to the service
  • the network formed by phone users
  • example
  • example
  • car insurance company
  • how a company understands itself
  • value creation process
  • value creating system
  • all stakeholders co-produce value
  • systematic social innovation
  • strategy as
  • the Value Network to emerge as a mental model
  • Verna Allee defines value networks [5] as any web of relationships that generates both tangible and intangible value through complex dynamic exchanges between two or more individuals, groups or organizations. Any organization or group of organizations engaged in both tangible and intangible exchanges can be viewed as a value network, whether private industry, government or public sector.
  • Allee developed Value network analysis, a whole systems mapping and analysis approach to understanding tangible and intangible value creation among participants in an enterprise system
  • participants, transactions and tangible and intangible deliverables that together form a value network.
  • knowledge
  • benefits
  • favors
  • know-how
  • policy
  • planning
  • process
  • biological organisms, including humans, function in a self-organizing mode internally and externally
  • no central โ€œbossโ€ to control this dynamic activity
  • The purpose of value networks is to create the most benefit for the people involved in the network (5)
    • Tiberius Brastaviceanu
       
      Verna starts with relationships. I think this is wrong. Perceived value and how to get ย to it determines the type of relationships we forge with other people with whom we robeย shoulders.ย ย 
34More

Dark Intellectual Property. Why We Need a Kickstarter for Patents - 0 views

  • โ€œdark IP,โ€ the intellectual property (IP) that remains on the shelf: undiscovered, unexplored, untapped
  • our ability to catch so much in the net by dragging the surface (to use Mike Bergmanโ€™s analogy) actually still misses the invisible wealth of what lies beneath.
  • But dark IP is different than the other hidden-depths knowledge since itโ€™s also unfair. Because taxpayers paid for much of the research โ€” whether basic understanding with long-term benefits or more applied research with shorter-term benefits โ€” that now lies collecting dust on university shelves.
  • ...31 more annotations...
  • the people of the United States spent an average of nearly $40 billion every year supporting institutional research
  • 65 percent of invention disclosure bundles remain, on average, unlicensed and unused โ€ฆ each year.
  • โ€โ€ฆthe street finds its own uses for things.โ€
  • most of the IP (much of which we paid for) isnโ€™t actually on the street, where entrepreneurial folks can do something with it.
  • the overworked and understaffed tech transfer offices
  • their models
  • Thereโ€™s not necessarily room for exploration and discovery
  • byzantine bureaucracy of large organizations
  • But letโ€™s face it, thereโ€™s also the hoarding and the overprotecting
  • So much IP is generated that itโ€™s far too much for any one entity to ever make sense of
  • very few people are aware of โ€” let alone able to access โ€” an invention outside the social circle of its inventors, the scientific community involved, or even the โ€œcrowdโ€ thatโ€™s sometimes harnessed in open innovation
  • we need new ways of democratizing it
  • Not democratizing the IP itself โ€” institutions should still own and generate profits from the intellectual property theyโ€™ve created โ€” but democratizing the ways in which we allow this IP to be discovered and licensed.
  • idea contests
  • marketplaces
  • competitions to find uses for on-the-shelf IP
  • missing out on the transformative potential of what technology can do here
  • promoting new ways of interacting around intellectual property
  • Marblar, where Iโ€™m an advisor
    • Tiberius Brastaviceanu
       
      The guy is not entirely for open innovation but proposes an intermediary model to democratize the use of IP
  • This turns off the average entrepreneur, who doesnโ€™t have the patience and bandwidth to engage in all the unnecessary overhead of searching, browsing, and licensing IP.
  • Many small startups donโ€™t even bother with IP
  • Another missing piece is ways of allowing the crowd to interact with each other and decide which technologies should be licensed
  • bidding wars
    • Tiberius Brastaviceanu
       
      competitive dynamic for acquiring IP and using it effectively. This doesn't solve the problem, because some companies will still buy it for defensive purposes or block others from using it, unlike with truly open innovation.ย 
  • Most of the examples I listed above havenโ€™t changed much over the past decade or broken into the mainstream.
  • why not a Kickstarter for IP?
  • Such a website would bring together not just funds and transactions, but communities โ€” with their attendant feedback mechanisms โ€” that are interested in creating something novel around unused patents.
  • such a model would help get the ideas of a few into the minds of many.
  • open up the currently closed shelf to virtual browsing
  • inventions are not only โ€˜filedโ€™ or โ€˜grantedโ€™ but โ€˜browsedโ€™ or โ€˜licensedโ€™.
80More

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
40More

Welcome to the new reputation economy (Wired UK) - 1 views

  • banks take into account your online reputation alongside traditional credit ratings to determine your loan
  • headhunters hire you based on the expertise you've demonstrated on online forums
  • reputation data becomes the window into how we behave, what motivates us, how our peers view us and ultimately whether we can or can't be trusted.
  • ...37 more annotations...
  • At the heart of Movenbank is a concept call CRED.
  • The difference today is our ability to capture data from across an array of digital services. With every trade we make, comment we leave, person we "friend", spammer we flag or badge we earn, we leave a trail of how well we can or can't be trusted.
  • An aggregated online reputation having a real-world value holds enormous potential
  • peer-to-peer marketplaces, where a high degree of trust is required between strangers; and where a traditional approach based on disjointed information sources is currently inefficient, such as recruiting.
  • opportunity to reinvent the way people found jobs through online reputation
  • "It's not about your credit, but your credibility," King says.
  • But this wealth of data raises an important question -- who owns our reputation? Shouldn't our hard-earned online status be portable? If you're a SuperHost on Airbnb, shouldn't you be able to use that reputation to, say, get a loan, or start selling on Etsy?
  • "People are currently underusing their networks and reputation," King says. "I want to help people to understand and build their influence and reputation, and think of it as capital they can put to good use."
  • Social scientists have long been trying to quantify the value of reputation.
  • Using functional magnetic resonance imaging, the researchers monitored brain activity
  • "The implication of our study is that different types of reward are coded by the same currency system." In other words, our brains neurologically compute personal reputation to be as valuable as money.
  • Personal reputation has been a means of making socioeconomic decisions for thousands of years. The difference today is that network technologies are digitally enabling the trust we used to experience face-to-face -- meaning that interactions and exchanges are taking place between total strangers.
  • Trust and reputation become acutely important in peer-to-peer marketplaces such as WhipCar and Airbnb, where members are taking a risk renting out their cars or their homes.
  • When you are trading peer-to-peer, you can't count on traditional credit scores. A different measurement is needed. Reputation fills this gap because it's the ultimate output of how much a community trusts you.
  • Welcome to the reputation economy, where your online history becomes more powerful than your credit history.
  • Presently, reputation data doesn't transfer between verticals.
  • A wave of startups, including Connect.Me, TrustCloud, TrustRank, Legit and WhyTrusted, are trying to solve this problem by designing systems that correlate reputation data. By building a system based on "reputation API" -- a combination of a user's activity, ratings and reviews across sites -- Legit is working to build a service that gives users a score from zero to 100. In trying to create a universal metric for a person's trustworthiness, they are trying to "become the credit system of the sharing economy", says Jeremy Barton, the 27-year-old San Francisco-based cofounder of Legit.
  • His company, and other reputation ventures, face some big challenges if they are to become, effectively, the PayPal of trust. The most obvious is coming up with algorithms that can't be easily gamed or polluted by trolls. And then there's the critical hurdle of convincing online marketplaces not just to open up their reputation vaults, but create a standardised format for how they frame and collect reputation data. "We think companies will share reputation data for the same reasons banks give credit data to credit bureaux," says Rob Boyle, Legit cofounder and CTO. "It is beneficial for one company to give up their slice of reputation data if in return they get access to the bigger picture: aggregated data from other companies."
  • PeerIndex, Kred and Klout,
  • are measuring social influence, not reputation. "Influence measures your ability to drag someone into action,"
  • "Reputation is an indicator of whether a person is good or bad and, ultimately, are they trustworthy?"
  • Early influence and reputation aggregators will undoubtedly learn by trial and error -- but they will also face the significant challenge of pioneering the use of reputation data in a responsible way. And there's a challenge beyond that: reputation is largely contextual, so it's tricky to transport it to other situations.
  • Many of the ventures starting to make strides in the reputation economy are measuring different dimensions of reputation.
  • reputation is a measure of knowledge
  • a measure of trust
  • a measure of propensity to pay
  • measure of influence
  • Reputation capital is not about combining a selection of different measures into a single number -- people are too nuanced and complex to be distilled into single digits or binary ratings.
  • It's the culmination of many layers of reputation you build in different places that genuinely reflect who you are as a person and figuring out exactly how that carries value in a variety of contexts.
  • The most basic level is verification of your true identity
  • reliability and helpfulness
  • do what we say we are going to do
  • respect another person's property
  • trusted to pay on time
  • we will be able to perform a Google- or Facebook-like search and see a picture of a person's behaviour in many different contexts, over a length of time. Slivers of data that have until now lived in secluded isolation online will be available in one place. Answers on Quora, reviews on TripAdvisor, comments on Amazon, feedback on Airbnb, videos posted on YouTube, social groups joined, or presentations on SlideShare; as well as a history and real-time stream of who has trusted you, when, where and why. The whole package will come together in your personal reputation dashboard, painting a comprehensive, definitive picture of your intentions, capabilities and values.
  • idea of global reputation
  • By the end of the decade, a good online reputation could be the most valuable currency in your possession.
2More

Unifying the Value Universe | OnTheSpiral - 0 views

  • The inability to quantify tangible value makes symmetric exchange difficult, but within the context of long term relationships, symmetric exchange becomes unnecessary.
  • The key to unifying these disparate definitions is understanding that the attention economy as an inherently unstable domain.  Both types of contributors use the same mechanism (attention) to parlay their contributions into interactions belonging to an adjacent quadrant.
7More

Key management - Wikipedia, the free encyclopedia - 1 views

  • Key management
  • his includes dealing with the generation, exchange, storage, use, and replacement of keys.
  • Key management concerns keys at the user level, either between users or systems.
  • ...4 more annotations...
  • This is in contrast to key scheduling; key scheduling typically refers to the internal handling of key material within the operation of a cipher.
  • it involves system policy, user training, organizational and departmental interactions, and coordination between all of these elements.
  • Public Key Infrastructure (PKI)
  • A public key infrastructure is a type of key management system that uses hierarchical digital certificates to provide authentication, and public keys to provide encryption. PKIs are used in World Wide Web traffic, commonly in the form of SSL and TLS.
1More

Bret Victor - Inventing on Principle on Vimeo - 0 views

  •  
    Very good design work, a new tool opening new possibilities
20More

Goodbye, Dilbert: 'The Rise of the Naked Economy' ยป Knowledge@Wharton - 2 views

  • โ€œteamingโ€: bringing together a team of professionals for a specific task
  • The old cubicle-based, static company is increasingly being replaced by a more fluid and mobile model: โ€œthe constant assembly, disassembly, and reassembly of people, talent, and ideas around a range of challenges and opportunities.โ€
  • Therefore, the new economy and its โ€œseminomadic workforceโ€ will require โ€œnew places to gather, work, live, and interact.โ€
  • ...17 more annotations...
  • The consumer electronics company Plantronics, for example, knowing that on any given day 40% of its workforce will be working elsewhere, designed its corporate campus to only 60% capacity
  • Their joint enterprise, NextSpace, became their first venture into what they call โ€œcoworking,โ€ or the creation of โ€œshared collaborative workspaces.โ€
  • also nurtures what the authors call โ€œmanaged serendipityโ€ โ€” ad hoc collaboration between people with diverging but complementary skills
  • the number of coworking spaces worldwide has shot up from 30 in 2006 to 1,130 in 2011
  • someone needs to keep an eye on the big picture, to โ€œconnect the dots.โ€
  • workspaces are designed on a flexible, on-demand and as-needed basis
  • Coonerty and Neuner found that the most productive collaborations tended to pair highly specialized experts with big-picture thinkers
  • they were struck by the number of entrepreneurs and freelancers working at coffee shops in the area
  • Business Talent Group
  • Clients get the specialized help they need at a cost below that of a full-time employee or traditional consulting firm, and specialists are well compensated and rewarded with flexible schedules and a greater degree of choice about which projects to take.
  • This has produced a new market dynamic in which the headhunter of yesteryear has been replaced by โ€œtalent brokersโ€ who connect highly specialized talent with companies on a project-by-project basis
  • Matthew Mullenweg, doesnโ€™t have much faith in traditional office buildings or corporate campuses: โ€œI would argue that most offices are full of people not working.โ€
  • On the other hand, Mullenweg is a big believer in face-to-face collaboration and brainstorming, and flies his teams all over the globe to do so.
  • He also set up an informal workspace in San Francisco called the Lounge
  • Additionally, a 2010 Kauffman-Rand study worried that employer-based health insurance, by discouraging risk-taking, will be an ongoing drag on entrepreneurship
  • the problem of payroll taxes for freelancers
  • up to 44% of independent workers encounter difficulty getting paid fully for their work
1More

New Business Models - 48 hours of creating the future - Google+ - 0 views

  •  
    Sensorica mentioned at about 55 minutes mark (just after) - note that while many presenters not that interesting, Leif and Cliff at the beginning and again Leif and Cliff at the end made some interesting points, and in particular Leif Edvinsson very much in line with value networks thinking and alternative value flows - I think a fruitful interaction with Leif could result from inviting him into Sensorica
38More

The Energy Efficiency of Trust & Vulnerability: A Conversation | Switch and Shift - 0 views

  • trusting people because of who they are personally vs. who they are professionally
  • also need to trust systems
  • our own resources
  • ...34 more annotations...
  • How much we need to trust others depends on the context,
  • how much we trust ourselves,
  • our ability to understand the context we are in
  • When we trust, we re-allocate that energy and time to getting things done and making an impact
  • the more information and/or experience we have, the better we can decide whether or not to trust
  • Trust is a tool to assess and manage (reduce and/or increase) risk, depending on the situation.
  • Trusting someone implies making oneself more vulnerable
  • When we donโ€™t trust, we exert a lot of energy to keep up our guard, to continually assess and verify.  This uses a lot of energy and time.
  • If the alternative is worse, we might opt for no trust
  • As we let ourselves be vulnerable, we also leave ourselves more open to new ideas, new ways of thinking which leads to empathy and innovation.
  • the more we can focus on the scope and achievement of our goals
  • trusting is efficientโ€ฆ.and effective
  • Being vulnerable is a way to preserve energy
  • It lets us reallocate our resources to what matters and utilize our skills and those around us to increase effectivenessโ€ฆimpact.
  • If we are working together, we need to agree on the meaning of โ€˜doneโ€™.  When are we done, what does that look like?
  • โ€œControl is for Beginnersโ€
  • Strategic sloppiness is a way to preserve energy
  • Build on the same shared mental models
  • use the same language
  • As the ability to replicate something has become more of a commodity, we are increasingly seeing that complex interactions are the way to create โ€˜value from differenceโ€™ (as opposed to โ€˜value from samenessโ€™).
  • allow for larger margins of error in our response and our acceptance of others
  • higher perfection slows down the tempo
  • We canโ€™t minimize the need to be effective.
  • Efficient systems are great at dealing with complicated things โ€“ things that have many parts and sequences, but they fall flat dealing with complex systems, which is most of world today.
  • make sure we hear and see the same thing (reduce buffers around our response)
  • timing
  • intuition
  • judgment
  • experience
  • ability to look at things from many different perspective
  • to discover, uncover, understand and empathize is critical
  • focus on meaning and purpose for work (outcomes) instead of just money and profit (outputs)
  • When we have a common goal of WHY we want to do something, we are better able to trust
  • When we never do the same thing or have the same conversation twice, it becomes much more important to figure out why and what we do than how we do it (process, which is a given)
  •  
    spot on conversation on *trust, I see creating a trustful environment quickly among strangers as a key capability of an OVN, we need to quickly get past the need to protect and verify and move on to making purpose and goals happen
30More

Collaboration Is Misunderstood and Overused - Andrew Campbell - Harvard Business Review - 0 views

  • managers in different functions or different business units seem surprisingly reluctant to work together
  • Jealousies, misunderstandings and enmity seem more common than collaboration
  • Why does collaboration fail? There are lots of reasons. Collaboration can be time-consuming. It creates risks for the participants. Competing objectives can be hard to resolve
  • ...27 more annotations...
  • people confuse collaboration with teamwork.
    • Tiberius Brastaviceanu
       
      "Competing objectives can be hard to resolve", well, this is what happens when you try to create a culture of collaboration within an overarching competitive environment.
  • Teams are created when managers need to work closely together to achieve a joint outcome.
  • actions are interdependent
  • committed to a single result
  • joint decisions
  • cautious about taking unilateral action
  • someone with the authority to resolve disputes
  • Team members may dislike
  • each other
  • But with a good leader they can still perform.
  • Collaborators face a different challenge
  • they often also have competing goals
  • the shared goal is usually only a small part of their responsibilities
  • collaborators cannot rely on a leader to resolve differences
  • collaborators cannot walk away from each other, when they disagree.
  • a collaborative relationship
  • is a form of customer-supplier relationship in which the participants have all the difficulties of contracting with each other without the power to walk away if the other party is being unreasonable or insensitive.
  • my advice is to avoid relying on a collaborative relationship except in the rare cases when a company objective is important enough to warrant some collaborative action but not so important as to warrant a dedicated team.
  • collaboration requires emotional engagement
  • respect
  • first-among-equals
  • creatively bargain
  • other over costs and benefits.
  • don't think of it as a permanent solution
  • collaborative relationship
  • transition to an easier form of interaction
1 - 20 of 31 Next ›
Showing 20 items per page