10,000 Matching Annotations
  1. May 2023
    1. This repo is a sample implementation of the protocol underlying the Gravity social network.

      Since it's open and decentralized, anyone can participate; you don't need to go through gravitynet.io or even use this code to do so.

      Beware

  2. bafybeicwxswjcvcix3gm575tdiduh4wkrdd54xjpjxzz54juzectjlnxzi.ipfs.w3s.link bafybeicwxswjcvcix3gm575tdiduh4wkrdd54xjpjxzz54juzectjlnxzi.ipfs.w3s.link
    1. https: //github.com/npfoss/gravity.22
    2. nodes will deliver real-time updates through peers and occasionally provideoffline-updates through the less performant IPNS and IPFS.

      realtime updates offline updates via IPFS

    3. Currently, our system makes a strong assumption on the performance of IPNS

      ?

    4. allowing third parties tocreate a wide variety of social media experiences.

      start with that

    5. Scaling to Billions of Users

      x

    6. Frustrated by the monopoly Facebook has, its practices regarding user privacy, and theimpunity it has enjoyed from transgressions like the Cambridge Analytica scandal, we feltdriven to seek an alternative that could truly replace it and provide an even better experi-ence.

      facebook replacement

    7. support the gamut of social media as well. In addition tosocial networks, we can support personal blogs trivially but would also like to be able to sup-port social media like large forums(e.g Reddit), social gaming(e.g Twitch), video sharing(e.gYoutube), collaborative editing(e.g Wikipedia)

      gamut of social media

      start with that and add focused social networks around shared interests and pursuits

    8. collaborative editing(e.g Wikipedia).

      unbounded

    9. Network AnonymityISPs have the ability to use network activity to discover a user’s friends, whether throughIPFS or direct peer-to-peer. For some users who desire stronger anonymity, this wouldbe undesirable. We would like to investigate the effects of incorporating optional onionencryption(e.g Tor) in our system to mask a user’s network activity.20

      yep

    10. ISPs have the ability to use network activity to discover a user’s friends, whether throughIPFS or direct peer-to-peer.

      ISPs discover friends through network activity

    11. moderators are delegated their roles by the owner

      roles

    12. multi-person groups seems to be smaller thanthe number of friends.

      multi person groups < friends

    13. The average number of Facebook friends is under 400.

      400

    14. third parties can augment posts through meta.json to support reacts

      meta.json

    15. Friend Discovery And RequestsA trade off between user privacy is user discovery.

      tradeoff discovery and requests

    16. user has no reliable way to know when someone else views their profile.

      interpersonal networked communication solves this problem

    17. easy to set state andimplement arbitrary functionality because the method of sending messages is so

      gerneral

    18. We also hide the groups, subscribersa user is a part of to guard against adversaries pinpointing the identity of a user from theidentity of their friends and groups

      pinpoint

    19. lackof a trusted third-party to help recover login information.

      recover login

    20. In a centralized model, users trust a third-party to safely secure their information,granting ownership to the third-party.

      secure information, granting ownership to the third-party

    21. real-time updates with minimal latency.16

      real-time

    22. keychains

      v

    23. Finally,we store one copy of the master key pair encrypted with the new public IPNS key in the”device keys” section of the profile (see figure &).

      master key pair

    24. Multi-Device

      support

    25. key management is hard.

      hard

    26. We decided against implementing any form of traditional access control for groups, suchas having specific admins that may add and remove users. This is because achieving con-sensus and guaranteed access control in a distributed system of untrusted parties is a hardproblem.

      no traditional access control

      hard problem

    27. friends can host all of thenecessary metadata to make sense of each others’ profiles and posts without having to storelarge images or videos.

      separate metadata from body

    28. posts and messages, which we treatthe same underneath and leave the UI to make a distinction given the context.

      UI to make distinction

    29. hash(salt||group-secret)

      salt

    30. sharing content is the bio folder.

      group membership

    31. It is also desirable to only encrypt each post once, insteadof once per person that can see it.

      encrypt once

    32. allows for the system to use different parameter choices and remain compatible.

      different parameter choices

    33. secure identity generation with a proof-of-work to make Sybil attacks expensive.

      secure identity generation

    34. Akasha: Ethereum-Based Social Network. Clean UI, but requires a Chromeextension, Ethereum wallet, and their own cryptocurrency to use it.

      clean ui etherium wallet crypto

    35. sers are forced to take the extra step to grant permissionsfor applications to use data from other applications in order to stitch their social networkstogether.

      stitch together

    36. We desire a system where users have

      complete ownership of their data. Users should have control over who can see what in their profile with fine granularity. For practically every piece of information in your profile, the user can set read permissions. This applies to nicknames, posts, messages, subscribers, who the user subscribes to, etc. But most of all, users should not have to reveal any information to any 3rd party in order to use this social network.

    37. Peers all have an identity that’s permanent.

      peers permanent ids

    38. provide acompromised form of “decentralization”, or are hard to use.
      • compromised form of "decent4ralization"
      • or hard to use
    39. Facebook provides decent service
      • at extremely high costs
      • disregarding user privacy, common decency
    1. The downside - developers need to know what they want to build ahead of time. It's like getting a box of LEGO but no directions.

      ahead of time

    2. or Passkeys, is a user authentication system that replaces passwords using cryptography. We'll dive more into passkeys, how they work, and how they differ from other passwordless options in this blog post, but first, let's review why developers should consider building passwordless apps.

      or Passkeys, is - a user authentication system that replaces passwords using cryptography.

      passkey - is passwordless option

      why developers should consider - building passwordless apps.

    3. WebAuthn API,

      x

    4. Introducing Passkey Support

    1. WebAuthn API, or Passkeys, is a user authentication system that replaces passwords using cryptography. In this post, we dive into how passkeys work, how they differ from other passwordless options, and why developers should consider building passwordless apps in the first place.

    2. Introducing Passkey Support

      Description

    1. Curious about #complexity? Join the #ComplexityAdventures #basecamp on Saturday, May 27, 2023 - from 15:00 to 18:00 UTC. Meet fellow #adventurers, participate in the guided #session about #EcoTechTones . Everybody is welcome! To register: https://complexityadventures.com

    1. the communitycatalyst is developing models for
      • organizing coalitions and networks of landscape leaders and supporters;
      • supporting coalitions of landscape leaders and supporters to self-organize and create action alliances;
      • hosting dialogues, workshops and other platforms for capacity-strengthening, peer-to-peer learning a earning and discussion;
      • coordinating action to help achieve landscape policy goals; and
      • disseminating ILM tools and establishing critical services needed by landscape partnerships.

      Description

    1. Community Catalyst Sharing knowledge and building connections

      Initiating and supporting - action-oriented - place- and practice-based communities

      passionate about - scaling and mainstreaming - landscape approaches.

      • Through online and in-person dialogues,
      • alliance building and
      • joint learning,

      these communities play a critical role in promoting - landscape approaches by

      influencing decision-makers - locally, - nationally and - globally.

      from : https://hyp.is/Dfaz_vi2Ee2zPHsn9VWOoA/landscapes.global/

    1. Terraso is part of the 1000 Landscapes for 1 Billion People initiative, a global collaboration between EcoAgriculture Partners, Rainforest Alliance, Commonland, Conservation International, the United Nations Development Programme, and Tech Matters encouraging a better way to pursue sustainable development.
    1. BlueskyBuilding a Social Internet

  3. solidproject.org solidproject.org
    1. Fully interoperable standards

      All data in a Solid Pod - is stored and accessed using - standard, open, and interoperable data formats and protocols.

      Solid uses a - common, shared way of describing things and - their relationships to one another - that different applications can understand.

      This gives Solid the unique ability to - - allow different applications to work with the same data.

    2. The last login you'll ever need
    1. Gravity is built on IPFS,

      the InterPlanetary File System, where what matters is the data itself instead of the location it’s stored. When your friend tries to see your posts, all that matters is that someone, somewhere on the internet, is storing your (encrypted) data. No more needing Facebook’s servers to be online to get your own data. As long as someone out there has it, your friend’s device can decrypt it, verify that you sent it, and show your post.

      It doesn’t matter who is storing the data, and you don’t have to trust them, unlike how having an @gmail.com account means you’re stuck with Google reading all of your mail.

      Description

    1. decouple the data itself from the service you use to view and host it, then there’s suddenly a market with near perfect competition

      decoupling data from the service

      used to - view - host - market with near perfect competition

      long tail software

    1. Update (April 2020)

      after implementing a functional PoC,

      I put this down to work on Gather, and make sure the Metaverse is built with these principles in mind.

      to : https://hyp.is/vLlWCvhkEe2U7ldU5P5XNw/gravitynet.io/

    2. isn’t a perfect solution yet.

      But if you want a

      • full social networking experience
      • to bond online and
      • keep in touch with your friends and family

      without having to worry about that personal stuff getting * leaked, * sold, * stolen, or * lost… * It seems like there isn’t a perfect solution yet. -

    3. Status

      a mobile crypto hub for interacting with Ethereum apps,

      • very polished and has a lot of thought put into it
      • storing cryptocurrency messaging.
      • The messaging security is great,
      • send each encrypted message to everyone else on the network,
      • which obviously does not scale.

      Description

    4. long version of the benefits
    5. Decentralized

    6. Finding new people and content is harder when no central

      need not only FAIR data

      FAIR capabilities

      FAIR social network

    7. Appeal: BLOCKCHAIN!
      • uncensorable,
      • permanent, and can
      • reward content
    8. “ActivityPub” is not the name of any service you can join, it’s the convention

      x

    9. switching is still a pain

      because you - have to transfer your contacts and - tell all of your friends to use your new identity - (like an email address, ActivityPub id, etc.).

    10. lot of options

      Deciding is hard, - as a new user,

      it is a - large commitment - don’t know how to evaluate.

    11. No one controls the whole network!

      no central control of the whole network

    12. So You Want to Leave FacebookA survey of social networks, from Signal to Scuttlebutt
    1. Today’s language models are more sophisticated than ever, but they still struggle with the concept of negation. That’s unlikely to change anytime soon.
    2. Chatbots Don’t Know What Stuff Isn’t

      closed world logic negation

    1. Only You Can Stop an AI Apocalypse (betterwithout.ai) 85 points by pidge 3 months ago | hide | past | favorite | 120 comments

    1. https://blog.solcial.io/english/one-chance-to-change-the-world/

      for FAIR social Netwowork =

    2. The birth of a fair social network .t3_w2z5h0._2FCtq-QzlfuN-SwVMUZMM3 { --postTitle-VisitedLinkColor: #9b9b9b; --postTitleLink-VisitedLinkColor: #9b9b9b; --postBodyLink-VisitedLinkColor: #989898; } The road will be mastered by the walking one. Likewise, the u/Solcialofficial team was not afraid to start developing a fair social network at such a difficult time. How the idea of ​​Solcial came to be read in the blog. This is a very interesting story.

    1. current social networks suck

      suck - become corrupted - by a centralized authority that - feels they know what is best for the users. - take the profit, - silence as they wish, and - are accountable to no one!

      We as a team felt - there needed to be an alternative.

    2. we only get One Chance to Change the World.

    1. the scaled-up servers are only for the other clients (web, mobile, streaming).

    2. The architecture of Mastodon

    1. Software-Defined Networking (SDN) is typically ignored in the Web 3.0 space
    2. ledgers can be blockchains, smart contract platforms or dApp platforms. This is the area that seeded the broader ‘web 3.0’ movement

      seeded web 3 movement

    3. use combinations of technologies to solve their customers’ problems.

      combinations

      mutual arising

    4. The Convergence Alliance

      for - Collaborative Technology Alliance (CTA)

    5. vertically and horizontally integrate

      integrate

    6. OSI model to integrate these new protocols and networks in the broader technology industry

    7. the task of evolving and simultaneously realising such a vision is simply too colossal to be done in isolation

      cannot be done in isolation

      every app embodies a constellations of capabilities born of design choices across all and more elements in the stack

    8. think of our portfolio in terms of a literal stack of highly synergistic technologies now framed as ‘The Convergence Stack’.

      stack

    1. Software-defined networkingWikipediahttps://en.wikipedia.org › wiki › Software-defined_net...Wikipediahttps://en.wikipedia.org › wiki › Software-defined_net...Software-defined networking (SDN) technology is an approach to network management that enables dynamic, programmatically efficient network configuration in ...‎History · ‎SDN Control Plane · ‎SDN Data Plane · ‎Applications

    1. Software-defined networkingWikipediahttps://en.wikipedia.org › wiki › Software-defined_net...Wikipediahttps://en.wikipedia.org › wiki › Software-defined_net...Software-defined networking (SDN) technology is an approach to network management that enables dynamic, programmatically efficient network configuration in ...‎History · ‎SDN Control Plane · ‎SDN Data Plane · ‎Applicationssoftware defined networking tutorialsoftware-defined networking examplesoftware-defined networking ciscosoftware-defined networking layerssoftware-defined networking pdfsoftware defined networking pptPeople also search for(function(){var uer=false;var eid='z9PoV';(function(){var a=google.c.wh0,b=google.c.frt,c=google.c.frvt,d=google.c.whu;var e=uer,f=Date.now(),g=google.c.sxs?"load2":"load";if(google.timers&&google.timers[g].t){var h=0;if(eid){var k=document.getElementById(eid);k&&(h=Math.floor(k.getBoundingClientRect().top+window.pageYOffset))}b&&google.tick(g,"frt",f);c&&google.tick(g,"frvt",f);google.tick(g,"frts",f);h&&google.c.e(g,"frtp",String(h));d&&!google.c.wh&&(google.c.wh=Math.floor(window.innerHeight||document.documentElement.clientHeight));var l=google.c.wh,m;m=a&&!l?!1:h>=l;for(var n=document.getElementsByTagName("img"),p=0,q=void 0;q=n[p++];)google.c.setup(q,!0,h);google.c.bofr= !1;m&&google.c.ubr(!1,f,h,!e)};}).call(this);})();

    1. Plant-it Notes:

      Compostable post-its - with seeds embedded - so that after you finish your visioning session - you bury them in the backyard and - watch your ideas literally blossom into flowers and food! 🌱

    1. The Promised Land of Event SourcingThe Honest Coderhttps://thehonestcoder.com › BlogThe Honest Coderhttps://thehonestcoder.com › BlogDec 5, 2022 — The guide you should read before starting with Event Sourcing. ... private readonly List<Event> _events = new List<Event>();.

    1. RCS chatbot using Node.jsGitHubhttps://github.com › rodrigokamada › chatbot-rcsGitHubhttps://github.com › rodrigokamada › chatbot-rcsApplication example using JavaScript and Node.js where a simple chatbot will be implemented using the ZENVIA platform to integrate with RCS (Rich ...
    1. simple chatbot will be implemented using the ZENVIA platform

      integrate with = RCS (Rich Communication Services - OpenWeatherMap platform to integrate with meteorological data in order to test some

      RCS features such as - sending and receiving text and image messages and - sharing location.

    2. RCS chatbot using Node.js

      Rich Communication Services

    1. A new economic engine for culture

      for : substack, reshare

    2. for : substack, reshare

    3. writers were rewarded for building trust with readers rather than making viral content.

      trust instead of just viral content

    4. readers and writers, rather than the companies that want to sell them stuff, were the customers.

      readers writers the customers

    1. an important part of a new economic engine for culture.
    2. Now live for all: Substack NotesA way to share posts and short-form content on Substack

      social network around substack posts weven with integral annotations

      reshare

    3. help posts find a valuable audience of writers and readers

      posts find audience

      interesting affordance

    4. Notes can become a powerful driver of subscriptions

      driver for subscriptions

    5. share links, images, quick thoughts, and snippets from Substack posts. As well as being lightweight and fun, we hope that Notes will help writers grow their audience and revenue.

      diy

    6. Notes is a new space where you can publish short-form posts and share ideas with other writers and readers on Substack.

      interest based emergent social networks around posts

    1. Restacks allow writers and readers to reshare posts, notes, and comments with their subscribers in Notes. You can restack someone else’s post on Substack with or without your own text. To restack, click the circle-arrow icon wherever you see a post, note, or comment worth sharing.

      This is what integrating web annotations into the IndyWeb can facilitate i n a People Centered, Evergreen Interestbase interpersonal network across/over the web without being tied down to any web silo!

      Description

    2. A guide to growth and collaboration on Substack NotesHow to engage with others and promote your publication

      substack reshare

    1. Live app: https://vitriol.coVitriol is an open source distributed publishing app which works in the browser without extensions or servers to set up, thanks to OrbitDB[1] and IPFS[2].

      vitriol

    1. alliance for a Portable Communities Protoco

      from this perpective Networked Autnonomous Organsatoions can emerge through the allieances that are formed by addressing the original problem not as a protocvol development task

      but ensuring ways and means that existing siloed information soures and social networks can be made to play nicely with the emergent indyNetWork powered indyviduals and communities

    2. How can online communities be persistent, composable, and application-independent?

      @loveolv proposed that

      “indynao” may be good name for portable communities protocol https://t.me/c/1546064989/3

      spent the last four months in retro and then forward refactor the existing prototype of the IndyNet/Web/Hub/Lab to meet the needs of the wider community

      Largely infouenced by engaging with th eCTA Collabathon exploring in some depth

      • Hylo
      • Nao
      • MAP and
      • Baby steps to SSO

      // From that perpective and learnings - it is clear it is possible to - elaborate the Indy concept - such that it can enrich and complete and even inte(grate|roperate) - accross all these initiatives as a proposed Kernel for Collaborative Tech

      // such that - individuals can exist on the web - in their own(ed) right, in their own terms, - as autonomous, permanent, evergreen indy actors - establish meaninfu/purposeful interpersonal connections and shared Spaces - co-create communities that are - born - permanent, - composable and application independent

      // IndyX is Not a protocol but - a composition/convergence of commons-based, - peer produced/extensible/tinkerable - constellations of - born interoperable, interchangeable, composable - capabilities

      based on a Holistic Integral Kernel for<br /> - Personal first, - Interpersonal Networked Work and boundariless - "overweb" yet - permanent, evergreen co-evolution not only of informations flows but producing/bootstrapping the very capabilty flows developed in the long tail software at the edges that are needed to creat those in-form-ation flows themselves

      that Flips thecurrent Web and haver all the properties that we need to ultimately co-crete and co-evolve Networked Autonomous Organisms

    3. Portable Communities

      // alternatively - self-created evergreen open commons based

    4. cryptographic webs of trust,
    5. capture collective value at scale

      // key to that is - scaling - reach - stigmergic symmathetic synthesis - capture self-w(ea|or)th of - in self-directed mutual learnings in - machine supported Personal Learning Work

      • interpersonal
      • re-capitulable with the view to scaling emergent synthesis
      • co-evolutionary
      • asyncronous yet continuous conversational
      • information flows qua value flows
      • that are contiguous with the each particpiant's
      • explorable
      • queryable
      • body of life-longstigmergic mutual learning works
      • where any work item is
      • high resolution addressable
      • amenable to be retrieved fully scaffold-ed
      • within a entire networks of meaningfully bidirectionaly associated complexes

      weaving the - Open - Permanent, - Evergreen - Mutual Learning Commons

    Annotators

    URL

    1. Web of trust

      // next level - leverage cryptography, DHTs - to weave interpersonal/community webs of trusts

      // flip that too make keys ephemeral contextual dynamically generated

    1. enterprise virtualization
      • built-in web interface you can easily manage
      • VMs and containers,
      • software-defined storage and networking,
      • high-availability clustering, and
      • multiple out-of-the-box tools on a single solution

      // flip all that - radically eliminate complications

    2. proxmox

    1. Own a piece of SubstackHelp build a new economic engine for culture

    1. Introducing Substack NotesUnlocking the power of the subscription network

    1. Everything Ventured, Nothing Gained

      yes

    2. The Rot Economy

      Everything ventured nothing gained

    1. decouples information navigation choices from presentation choices

      decouple navigation choices from presentation

      // morphic anyone

    2. layout, themes, language and cultural conventions (i.e., internationalization/ localization), widget selection and configuration, and more

      layout, themes, language and cultural conventions (i.e., internationalization/ localization), widget selection and configuration, and more

    3. presentation choices

      x

    4. avigating the graph is possible with a very small number of primitive actions

      small number of primitive affordances

    5. open-ended in both the information and capabilities

      open ended

      both in terms of information and capabilities

      // co-evolutionary

    6. introduce new types of information and actions

      introduce - new types of information and actions

      // self-describing interpreatable

    7. self-organizing human agents

      suggest - human actors

    8. the design space is closed

      closed vs open information spaces

    9. User Interface (UI) vs. Human Interface (HI)

      UI vs HI

    10. Application-centric vs. Human-Centric

      application vs human centric

    11. DAHN's design concept is introduced in the following figure:

    12. Dynamic, Adpative, Holon Navigator

    13. dimensional beings with rich, highly textured lives. In keeping with the principles of Primacy-of-the-Individualand Technology Serves Life, the MAP
    1. Material DesignMaterial 3 is the latest version of Google’s open-source design system. Design and build beautiful, usable products with Material 3.

    1. Self-Describing

      support support - sense-making, - meaning-making, and - choice-making

      within and between agents without a priori knowledge of each other's existence.

      Thus holons and holon relationships carry their own descriptions

      in human readable yet machine interpretable forms included

    2. Omni-Centric

      each holon is the root of its own holoarchy

    3. Every Relationship is Reciprocal

      interconnectedness of all

    4. invert the dynamic of the attention economy

      attention is - limbically hijacked in order to sell it to organizations seeking to push their products or services.

    5. all notifications honor the preferences set by the individual.

      honour preferences set by the individual

      They should be able to set their own terms for sharing

    6. individuals also determine whether, what and how others can share information with them.

      Pull-rather-than-Push

    7. Collaboration, cooperation, and co-creation rely on transparent sharing of information

      transparency

    8. The rights of an individual to their own identity

      unalienable

    9. Individuals have limited control

      they are confronted with take it or leave it terms - that legalizes the total exploitation of the content they contribute

      along the lines of

      By posting any Contributions, you grant us an unrestricted, unlimited, irrevocable, perpetual, non-exclusive, transferable, royalty-free, fully-paid, worldwide right, and license to: use, copy, reproduce, distribute, sell, resell, publish, broadcast, retitle, store, publicly perform, publicly display, reformat, translate, excerpt (in whole or in part), and exploit your Contributions (including, without limitation, your image, name, and voice) for any purpose, commercial, advertising, or otherwise, to prepare derivative works of, or incorporate into other works, your Contributions, and to sublicense the licenses granted in this section. Our use and distribution may occur in any media formats and through any media channels. This license includes our use of your name, company name, and franchise name, as applicable, and any of the trademarks, service marks, trade names, logos, and personal and commercial images you provide

    10. If an individual interacts with multiple such applications
      • information about them gets
      • fragmented
      • into each databases
    11. primacy of the application over the individual

      primacy of - applications - over - the individual

    12. primacy of the invidual

    1. When you post Contributions, you grant us a license (including use of your name, trademarks,and logos)

      By posting any Contributions, you grant us an unrestricted, unlimited, irrevocable, perpetual, non-exclusive, transferable, royalty-free, fully-paid, worldwide right, and license to: use, copy, reproduce, distribute, sell, resell, publish, broadcast, retitle, store, publicly perform, publicly display, reformat, translate, excerpt (in whole or in part), and exploit your Contributions (including, without limitation, your image, name, and voice) for any purpose, commercial, advertising, or otherwise, to prepare derivative works of, or incorporate into other works, your Contributions, and to sublicense the licenses granted in this section. Our use and distribution may occur in any media formats and through any media channels. This license includes our use of your name, company name, and franchise name, as applicable, and any of the trademarks, service marks, trade names, logos, and personal and commercial images you provide

    1. This attainment was understood as a kind of non-dual state in which one is neither limited to samsara nor nirvana. A being who has reached this kind of nirvana is not restricted from manifesting in the samsaric realms, and yet they remain fully detached from the defilements found in these realms (and thus they can help others).

    2. bodhisatva is a person who is on the path towards bodhi ('awakening') or Buddhahood.

    1. active bodhicitta (bodhiprasthanacitta) which consists of actually practicing the path in line with one's intent

      active

    2. bodhicitta as an immanent inner awakening

      immanent inner awakening

    1. Turán: Irántól északra, az Aral-tó, az Amu-darja, a Szir-darja és a Kaszpi-tenger mentén elterülő ázsiai sztyep. Ma sivatagos vidék, ősidők óta kulturális terület. 100–200

      turan

    1. Removing context leads to reliance on“universally secure” identifiers based on clean/universal features like biometrics, which oftenraise at least as many concerns as the central-ized protocols they replace

      reliance on - 'universally secure' identifiers - based on clean/universal features like - biometrics - raise as many concerns - as the centralized protocols - they replace

      // they do not replace but enhance

    2. principle of minimum disclosure and contextualintegrity.
      • minimum disclosure
      • contextual integrity
    3. Useful repu-tation requires a level of visibility and interop-erability—one must be able to see and use theinformation provided.

      visibilty and interoperability

    4. Collective Intelligence Project

      microsoft

    5. ETHICS OF DECENTRALIZEDSOCIAL TECHNOLOGIES:

      from

    1. Intuition @0xIntuitionData monopolization erodes trust between individuals and corporations. It breeds power imbalances, perpetuates inequalities, and stifles innovation. It's time to prioritize transparency, accountability, and user-centric data management. It's time to level the playing field.

      share sentiment but

    1. The danger is getting stuck with a sub-optimal business model six or nine months down the line that either doesn’t match your ambition or isn’t scalable.
    2. Don't Rush Outside the BuildingWithout First Stress Testing Your Business Model

    1. Deconstruct Your Business Model on a Lean Canvas