- May 2023
-
bafybeiccmvn2o4t5kgdydrtwhbu65dafc5etxg5l6mx345ezm2c7ubpmau.ipfs.w3s.link bafybeiccmvn2o4t5kgdydrtwhbu65dafc5etxg5l6mx345ezm2c7ubpmau.ipfs.w3s.link
-
within integral design allnecessary design disciplines start together right from the conceptual design phase
integral concerns
-
Concept: a concept is a notion or proposition without a logical status
concept - notion or proposition - without a logical status
-
A set ofknowledge is therefore a set of propositions, all of which have a logical status
knowledge - propositions - with logical status
-
architects traditionally make designs while engineers optimize and make those designs buildable
architects design
engineers optimize and make it buildable
Integral Software design is the idea that
design and buildability consideration are considered integrated within an exploratory bootstrapping process
and even at the conceptual design space
all possible design choices are explored and reflected upoin
and even their duals
-
-
bafybeif256apzzimba2sy447spztswmldk3d7rj4umbchhghsy4s4xyobe.ipfs.w3s.link bafybeif256apzzimba2sy447spztswmldk3d7rj4umbchhghsy4s4xyobe.ipfs.w3s.link
-
Missions withBusinesses
missions with business
-
CTA Opportunity
-
shape our evolutionary path
-
bond cooperativ I-spaces, without binding us
-
technology in service of life
adopt - open-ended - person-centric architecural framework
invert - power assymetry
scaffold - trust
ratchet - trust and cooperation - // build for trust, from trust( but verify)
foster - interoperavility - co-evolvability - scallability - // scaling reach, participation, synthesis, symmathesy - usability
// intertwingled propositiojnal trailmarked plexes
-
-
Poly-centric / Agent-Centric
emergent
-
Memetic Replicator-Based Evolution
-
Tree of Life
Tree of Life
-
<<Memeplex>>Synthesized Memeplex
synthesized memeplex -
NB - use of stereotypes syntax from UML << >> from UML
-
Scaling Up Cooperation
We already have a self-organizing, self-regulating planetary scale organism The agents in this enterprise include all living beings Our dominant culture has forgotten we are embedded in and an integral part of an inter-connected, inter-related, inter-dependent living organism Our fates are tied together! We need to bring human culture into coherent alignment with Gaia’s Enterprise Architecture Gai a
-
the group actuallybecomes the new organism.
altruistic groups becomes the new organism
-
symbiogenesisSwirl of Competing
Ratcheting Up Biological Cooperation
symbiogenesis
obligate simbionts
see - https://hyp.is/fGYFQuzbEe2T4rOpsZz7zQ/link.springer.com/chapter/10.1007/978-3-540-78826-3_4
-
cooperation and competition
complete
cont compete
mutal-arising
-
PERSON-CENTRIC ARCHITECTUREENTERPRISE ARCHITECTURE AS IF PEOPLE (AND THE PLANET) MATTERED
Person-Centric Architecture
-
-
www.linkedin.com www.linkedin.com
-
Design as a practice includes a unique polarity called, divergence AND convergence, otherwise known as ‘creating choices’ AND ‘making choices.’ Both neutral poles are absolutely necessary for the purpose of intelligent decision making amidst complex problem solving scenarios
-
managing the ‘stability to change’ journey
and back in a spiral
-
three stages or mindsets
- the socialised mind 58%
- self authoring mind 35%
- self transforming mind %1
-
it integrates tacit mindsets and culture with explicit behaviour and processes to inform the design of a mutually interdependent toolkit.
-
Integral Design: 5 Steps, 4 Principles, 3 Mindsets, 2 Practices, 1 Meta Toolkit for Generative Leaders
-
-
medium.com medium.com
-
But in order to appeal to the business culture of process, it was denuded of the mess, the conflict, failure, emotions, and looping circularity that is part and parcel of the creative process. In a few companies, CEOs and managers accepted that mess along with the process and real innovation took place.
real messy loopy circularity innovation
https://miro.medium.com/v2/resize:fit:720/format:webp/1*dPmF_XYPHn8YYrSMleh_Iw.jpeg
4 integral design
-
-
towardsdatascience.com towardsdatascience.com
-
The Art of Prompt Design: Use Clear SyntaxExplore how clear syntax can enable you to communicate intent to language models, and also help ensure that outputs are easy to parse
-
-
edu.gcfglobal.org edu.gcfglobal.org
-
to keep track of who’s seen it.
-
-
bafybeibm76plgjyhjnjvavnf7ydbvrjfqxia3lrongan5kymgrb5ummg3m.ipfs.w3s.link bafybeibm76plgjyhjnjvavnf7ydbvrjfqxia3lrongan5kymgrb5ummg3m.ipfs.w3s.link
-
Minimal Compelling Technology Demonstrator
-
-
bafybeide4zlszyxwcbmobfv5xxuhp5d6w4qfvogwsu4auw4p2aag3cv2me.ipfs.w3s.link bafybeide4zlszyxwcbmobfv5xxuhp5d6w4qfvogwsu4auw4p2aag3cv2me.ipfs.w3s.link
-
Kairotic FlowArchetypal Phases and Roles
Kariotic Flow
-
Kairotic FlowArchetypal Phases and RolesKylie Stedman Gomeskylie@presenceofmine.com.au
-
-
www.swifdoo.com www.swifdoo.com
-
Chrome extension called Twitter Print Styles
-
How to Save a Twitter Thread as a PDF
long tail software
-
-
twitter.com twitter.com
-
Intuition @0xIntuitionYour identity is more than your name and state ID. Your identity is all that you are, all that you have been & all that you could be. Your identity is fluid; prone to change at any moment, for any reason. Identity systems need to be flexible & configurable at the atomic level.9:23 PM · Apr 18, 2023·1,524 Views
-
-
discord.com discord.com
-
Evolving Usernames on Discord
from
-
-
-
PubSub
- Publishers emit events without knowing who'll receive them, and
- subscribers listen for events they're interested in.
This pattern allows for - better scalability and - modularity. - enables asynchronous messaging between services
-
Leader Election.
- one node is responsible for specific task
- avoid conflict
- ensure consistency
-
Event Sourcing
- keep journal of live events
- store events representing changes
- provide complete history
- better auditing
- time travel debugging
- replay events for analytic purposes
-
-
Top 7 Most-Used Distributed System Patterns
-
-
github.com github.com
-
Building Great Web Apps Build upon your knowledge of web development to create ‘lick-able’ modern web applications
-
-
-
Building a Whiteboard with React and Canvas API. Part 1: First steps.
-
-
www.rdegges.com www.rdegges.com
-
subresource integrity
-
Cache API is this Google tutorial.
to - cache api
-
-
developer.mozilla.org developer.mozilla.org
-
Subresource Integrity
guaranteed by IPFS
-
-
web.dev web.dev
-
-
The Cache API: A quick guideLearn how to use the Cache API to make your application data available offline.
-
-
www.amp-what.com www.amp-what.com
-
🧭\01f9ed🧭🧭"\uD83E\uDDED"U+1f9ed%F0%9F%A7%ADcompassmagneticnavigationorienteering
🧭
-
-
www.amp-what.com www.amp-what.com
-
🗫\01f5eb🗫🗫"\uD83D\uDDEB"U+1f5eb%F0%9F%97%ABthree speech bubblesconference
🗫
-
-
www.amp-what.com www.amp-what.com
-
🗞\01f5de🗞🗞"\uD83D\uDDDE"U+1f5de%F0%9F%97%9Erolled-up newspaperpaper
🗞
-
📰\01f4f0📰📰"\uD83D\uDCF0"U+1f4f0%F0%9F%93%B0newspaperpaper
📰
-
-
www.txwatson.com www.txwatson.com
-
Abjectionist Party promotes policies that unconditionally support the life, autonomy, and dignity of all people.
life autonomy dignity
-
the smallest possible scale – that of the individual
smallest possible scale
for - scaling reach
-
Memetics is the study of how ideas grow and spread, from the perspective of evolutionary science.
study of how ideas grow
-
-
dev-indy0.fission.app dev-indy0.fission.app
-
MemeticEngines
memetic engines - improvement on the notion of "Semantic Engines"
where as what we need is - Symmathetic Engines
see - symmathesy
-
-
www.taylorfrancis.com www.taylorfrancis.com
-
Semantic Engines: An Introduction to Mind Design DOI link for Semantic Engines: An Introduction to Mind DesignSemantic Engines: An Introduction to Mind DesignByJohn Haugeland
-
-
www.google.co.uk www.google.co.uk
-
Semantic Engines: An Introduction to Mind Design | 2Taylor & Francis eBookshttps://www.taylorfrancis.com › chapters › edit › sema...Taylor & Francis eBookshttps://www.taylorfrancis.com › chapters › edit › sema...Semantic Engines: An Introduction to Mind Design ; Edition 1st Edition ; First Published 1998 ; Imprint Routledge ; Pages 35 ; eBook ISBN 9780203055045 ...
-
google - search - "mind design" "semantic engines"
for - "memetic engines"
-
-
www.visual-thinking-workshop.com www.visual-thinking-workshop.com
-
About Your Trainer
-
-
www.visual-thinking-workshop.com www.visual-thinking-workshop.com
-
which are not linear but pictorial
-
-
-
www.youtube.com www.youtube.com
-
So what I learned is that the more servers you add the more serverless it is.
insanity at scale
-
Serverless was a big mistake... says Amazon
-
-
doc.akka.io doc.akka.io
-
How the Actor Model Meets the Needs of Modern, Distributed Systems
-
-
www.google.com www.google.com
-
How the Actor Model Meets the Needs of Modern, Distributed ...Akkahttps://doc.akka.io › akka › typed › guide › actors-introAkkahttps://doc.akka.io › akka › typed › guide › actors-introThe actor model abstraction allows you to think about your code in terms of communication, not unlike the exchanges that occur between people in a large ...
-
-
www.google.com www.google.com
-
Actor Model and Knowledge Management Systemsspringer.comhttps://link.springer.com › chapterspringer.comhttps://link.springer.com › chapterby I Becerra-Fernandez · 2005 · Cited by 11 — The actor model describes an approach to modeling intelligence in terms of a society of communicating knowledge-based problem exper
-
An introduction to multi-actor processesUniversität Osnabrückhttps://www.newater.uni-osnabrueck.de › trainingUniversität Osnabrückhttps://www.newater.uni-osnabrueck.de › trainingPDFby A Dewulf · Cited by 5 — Gray (1989) proposed a phase model of multi-actor collaboration, ... organized stakeholder, a social category of people with a specific interest, ...
-
Actors in Collaborationgu.sehttps://gupea.ub.gu.se › gupea_2077_22135_1gu.sehttps://gupea.ub.gu.se › gupea_2077_22135_1PDFby M Ponti · 2010 · Cited by 17 — human actors: my computer and actor-network-theory. The former behaved for long ... on Callon's (1986a) model of translation of interests.
-
-
web-highlights.com web-highlights.com
-
Web Highlights is legally represented by "Marius Bongarts - Web & App Development".
having trouble annotating
As such, you hereby irrevocably grant us world-wide, perpetual, non-exclusive, royalty-free, assignable, sublicensable, transferable rights to use Your Content for any purpose.
-
-
web-highlights.com web-highlights.com
-
Transform Your Online Research and Highlight Everywhere Tired of browsing your history to find the information you saw yesterday? Don't worry. Our online PDF & Web Highlighter got you covered. Highlight any Website or PDF, create tags, take notes and export your research to HTML, Markdown, and PDF. Share your insights with others and access your highlights from anywhere, at any time.
-
-
webhighlighter.com webhighlighter.com
-
Web HighlighterThe annotation layer for the webDiscuss any page in real time
-
-
www.nosignup.tools www.nosignup.tools
-
Web HighlighterProductivityTurn any website into an instant forum, where you can: leave comments, see other people's cursors / what text they're highlighting, and chat with them. Use it to annotate code, highlight online tutorials / books, and discuss people's blogs.
w
-
Handpicked no-signup toolsyou can use in 10 secondsnosignup.tools is a curated collection of web-based products that don't require an account or registration.
x
-
-
www.similarsitesearch.com www.similarsitesearch.com
-
10 Alternative Sites Like SimilarSiteSearch to Find Similar Websites
-
-
www.google.co.uk www.google.co.uk
-
Dependency injection is a programming technique that makes a class independent of its dependencies. It achieves that by decoupling the usage of an object from its creation. This helps you to follow SOLID's dependency inversion and single responsibility principles.
we need : class-free objects - not de-coupling but - deep, high resolution, contextual, fine coupling - organic growth of mixed- and matched context emergent extension of - existing permanent evergreen capabilities - mutual emergent extensibility via mix-ins
not dependency injection - but mutual tinker-ability of existing capabilities - reflect in the structure what we create symmathesy (mutual learning) as we articulate our intents - Software is a Symmathetic conversation after all - organic integral growth and co-evolution of autonomous, - self explicating. open commons based, peer produced evergreen co-evolutionary capabilities - augmenting cultural co-evolution itself
-
Dependency Injection with Code Examples - StackifyStackifyhttps://stackify.com › dependency-injectionStackifyhttps://stackify.com › dependency-injection
the problem is summed up in the domain name :stackify
https://hyp.is/6LMTSvCUEe2p6nOS-NOIwQ/stackify.com/dependency-injection/
-
search - dependency injection
-
-
-
Contextualize your APM
It is not the application performance monitoring that needs to be monited but applications themselves be emergent from relevant tinkerable contexts
-
-
-
Design Patterns Explained – Dependency Injection with Code Examples By: Thorben | March 3, 2023
-
-
subconscious.substack.com subconscious.substack.com
-
Trustless protocols are better than trustful ones
-
-
bafybeihubrufdhocrbwyi4ap2656zis3lkjvtoss4ben2ryuycdnoxamjq.ipfs.w3s.link bafybeihubrufdhocrbwyi4ap2656zis3lkjvtoss4ben2ryuycdnoxamjq.ipfs.w3s.link
-
A delejtű-emberekről beszélek, ami nyilvánvaló, az érzékenyekről s az értelmes szomorúakró
delejtű emberekről beszélek
-
-
www.youtube.com www.youtube.com
-
Koronatanu Dr. Bistey Zsuzsa előadása I. rész
ha nem szerezzük vissza az emlékezés képességét akkor elveszünk
elszánt almatermelők
agyafúrt vállalkozók
-
-
www.youtube.com www.youtube.com
-
he 00:04:04 other thing about the Ickes curve is the actual complexity part of the Ickes might be a lot lower might actually be a 00:04:15 tiny part of the Ickes and perhaps we could call the the other part of it from that nice little thing down there up to where the Ickes is we could call that 00:04:29 complications so complications are basically noise bad technique old technique human bumbling inability to 00:04:44 get on learning curves you name it's a whole bunch of factors
complications not complexity
need to be slayers of layers
https://indylab1.fission.app/hyp?slayers
-
-
medium.com medium.com
-
The biggest trap for philanthropy in a complex world is funding simple but wrong ‘solutions’
-
-
www.linkedin.com www.linkedin.com
-
The biggest trap for philanthropy in a complex world is funding simple but wrong ‘solutions’
-
-
www.linkedin.com www.linkedin.com
-
Kylie Stedman Gomes 2nd degree connection 2nd Working on transitioning to a better world and helping others doing the same
-
Working towards a commons-based attention-saving tech ecosystem, building one 'product' at a time
commons-based attention-saving system
-
spelunking-style
search - it
-
-
www.google.com www.google.com
-
Why do they call it spelunking?We borrowed "spelunker" from Latin "spelunca," which in turn derives from Greek "spelynx." When you get to the bottom of things, you find that both the Latin and Greek words mean "cave." Although "spelunker" might sound neat, be careful: some cave-exploring enthusiasts prefer the term "caver."Apr 11, 2023
why
-
search - spelunking-style
-
-
bafybeieecjyrinkpels76g3rxiwdnmlpd4ox4dnczep7kk4nhfkkmidf5a.ipfs.w3s.link bafybeieecjyrinkpels76g3rxiwdnmlpd4ox4dnczep7kk4nhfkkmidf5a.ipfs.w3s.link
-
stackoverflow.com stackoverflow.com
-
How to export slides to HTML/PDF/DOC in google slides API
convert google slides
-
-
www.techopedia.com www.techopedia.com
-
from - search : "forward compatibility"
-
Forward compatibility primarily ensures that an existing IT system is able to operate with subsequent releases of itself. This compatibility is planned out during the system design phase. Typically, to support forward compatibility, the hardware/software must also be backward compatible.
-
-
nlnet.nl nlnet.nl
-
Search engine for the Interplanetary File System
ipfs search
-
-
library.iated.org library.iated.org
-
Knowledge obtained from the web or other resources needs to be contextualized, personalized, and reorganized, filtering misconceptions.
// this applies to information per se leading to * reconceptualization of information iteself such that
- attributed to source individual human being(s)
- full recapitulable provenance, evergreen permanence
- structured in universal ways as associative complexes
- Findable, Accessible, Interoperable, Reusable
- self-organizing, autopoietic
- shared and presented in self-described evergreen morphic ways
given that we have a concept that is best referred to
as in-formation that flows in emergent human trust networks
that we fashion for ourselves as human being articulating our Tacit awareness
scaling synthesis recapitulating in the ontogeny of learning the filogeny of co-evolving emergent knowledge as hyperknowledge
scaling reach through time with the ability to find through global search work that mathces our current focal awareness and attention
in stigmergic symmathesy (mutual learning)
in a form that allows interpersonal sharing
to in-form and shape US
-
-
www.marxists.org www.marxists.org
-
Hegel is not a philosopher. He is no lover or seeker of wisdom — he believes he has found it.
Oh yes he did
-
Hegel and the Hermetic Tradition
x
-
Hegel as Hermetic Thinker
long suspected, but here it is
-
God as hovering strangely between transcendence and immanence.
hovering between transcendece and immanence proalities upheld
-
“he who knows himself knows all things in himself.”
cosmic consciousness
inflation
-
To really know one’s self is to be able to give a complete speech about the conditions of one’s being, and this involves speaking about God
condition of one's being
in the sense that whatever is real is reasonable in the sense of confoming to the condotions of it's being
and whatever is reasonable can become real
-
Reason inherent in the world
beyond rational
like mutual arising
not irrational
-
Nor does Gnosticism hold that God somehow needs man to know
gnosticism deny human dignity
-
Gnosticism involves an absolutely negative account of creation
negative account of creation
-
Gnosticism and Hermeticism both believe that a divine “spark” is implanted in man, and that man can come to know God.
man can come to know God
-
-
link.springer.com link.springer.com
-
Arbuscular mycorrhizal fungi are obligate symbionts that obtain all their carbon from the plant they colonise but have to find other resources through soil exploration.
obligate symbiont
-
mutualistic symbiosis
mutalistic symbiosis
-
-
-
The Hidden Networks: Onion Routing, TOR, Lokinet, I2P, Freenet
-
-
handbook.scuttlebutt.nz handbook.scuttlebutt.nz
-
have one identity per device — this means you have to have different identities for each computer you have.
one identity per device
-
Patchwork is currently only built for desktops and laptops (no phones)
no phone
-
no-one can even tell who you were messaging
-
swing by known ‘pubs’ (like public houses on the internet) and catch up on gossip there.
pubs on the internet
-
this gossip is cryptographically 99.9999999% impossible to fake
gossip impossible to fake
-
Patchwork which sidesteps these problems
- everyone has a diary
- can make a photocopy of friend's diary
- to send a messager leave a message in the diary encrypted with the key that the only the friend has
- reading a friend's diary, messages that one can read is meant for one
-
using email for direct communication, you’re probably facing some well known problems
email problems -spam, - provider lockin, - privacy, and - reliability (doesn’t work without the internet).
-
Gossiping Securely is the new Email
-
-
en.wikipedia.org en.wikipedia.org
-
Sock puppet account
-
-
en.wikipedia.org en.wikipedia.org
-
without necessarily knowing the correspondence of identities to local entities
correspondance
-
A reputation system's vulnerability to a Sybil attack depends on how cheaply identities can be generated, the degree to which the reputation system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity, and whether the reputation system treats all entities identically
- cost of identity generation (needs to be high)
- active chain of trust
-
have a chain of trust linking
- chain of trust
-
-
-
www.google.com www.google.com
-
Sybil attackWikipediahttps://en.wikipedia.org › wiki › Sybil_attackWikipediahttps://en.wikipedia.org › wiki › Sybil_attackThe Sybil attack in computer security is an attack wherein a reputation system is subverted by creating multiple identities. A reputation system's vulnerability ...
-
search - sybil resistant
-
-
stackoverflow.com stackoverflow.com
-
Can urls contain dots in the path part?
yes
-
-
en.wikipedia.org en.wikipedia.org
-
The cartel tested their bulbs and fined manufacturers for bulbs that lasted more than 1,000 hours. A 1929 table listed the amount of Swiss francs paid that depended on the exceeding hours of lifetime.[8]
ingenuity
-
-
www.goodreads.com www.goodreads.com
-
― Buckminster Fuller
fuller
-
“You never change things by fighting the existing reality.To change something, build a new model that makes the existing model obsolete.”
-
-
www.academia.edu www.academia.edu
-
to settle the parameters of the experimental equipmentand (b) to accomplish the experiment to the desired accuracy.
settle parameters
-
modelling an experimenter and experimental procedure algorithmically imposes a limit on what can be measured with equipment. Indeed, the theorems suggest a new form of uncertainty principle for our knowledge of physical quantities measured in simple physical experiments.
nice
-
-
en.wikipedia.org en.wikipedia.org
-
throw it back on the compost heap of language to recycle and revitalize it.
-
-
www.tsfx.edu.au www.tsfx.edu.au
-
Department of Piosophy, Univeristy ofAllahabad India
Piosophy india
-
-
www.google.com www.google.com
-
SW Lee · 1999 — engross themSeves in phiOSophy for the Sake Of piOSOphy. That pragmatism Sought to emphaSze the historcal and Socal. ImSons of phiOSOphy
search
-
search - piosophy
-
An Application of John Dewey's Symbiotic Rationalitykoreascience.or.krhttps://koreascience.or.kr › article › JAKO199915...koreascience.or.krhttps://koreascience.or.kr › article › JAKO199915...PDFby SW Lee · 1999 — engross themSeves in phiOSophy for the Sake Of piOSOphy. That pragmatism Sought to emphaSze the historcal and Socal. ImSons of phiOSOphy in the Indst
piOSOphy
-
-
www.etymonline.com www.etymonline.com
-
pious (adj.)mid-15c., "having or intended to show faith in and reverence for the Supreme Being,"
Piosophy not theosophy
-
-
www.etymonline.com www.etymonline.com
-
piety (n.)
from loving kindness
piosophy
-
-
bafybeieioeskrvqzljn73hlehsg3vizm7mxxabejyocgaxiqkk2iix74wa.ipfs.w3s.link bafybeieioeskrvqzljn73hlehsg3vizm7mxxabejyocgaxiqkk2iix74wa.ipfs.w3s.link
-
Augmenting Tacit Awareness
-
Augmenting Tacit Awareness
-
-
-
apps like Warm Space)
Warm Space
-
-
warmspace.io warmspace.io
-
Warmspace is more than a product or company. It is a movement to reconnect people to humanity. It is family and community. It’s a place that anyone can call home. No matter the culture, race, sexual orientation, social class, age, and beliefs, it’s a place for anyone to feel valid, seen, and belong.
-
-
embodimentofpurereason.wordpress.com embodimentofpurereason.wordpress.com
-
Intersubjectivity: Kant and Hegel in the Phenomenological Tradition
intersubjetcivity
-
-
www.brianstorti.com www.brianstorti.com
-
unit of code with a mailbox and an internal state
x
-
process (that is basically how Erlang calls its actors)
erlang calls its actors process
-
Fault tolerance
"let it crash"
-
Actors communicate with each other by
0 sending asynchronous messages. - Those messages are stored in other actors' mailboxes until they're processed.
-
needs to store them somewhere while it’s processing another message.
store messages mailbox
-
Messages are sent asynchronously
asunchronous messages
-
everything is an actor and they need to have addresses so one actor can send a message to another.
address
-
actor can maintain a private state
private state
-
actors are completely isolated from each other and they will never share memory
isolated
-
An actor is the primitive unit of computation. It’s the thing that receives a message and does some kind of computation based on it
primitive unit of computation
-
-
wiki.p2pfoundation.net wiki.p2pfoundation.net
-
broader understanding of human and ecological history.
human ecological history
-
p2p/commons theorist is to ground the ebb and flow of commons practices and institutions
p2p/commons theorist
-
-
bafybeigdwsuwf76z2sablbhswgndfprcefty4kooce2mzzm63vvdn5p6vy.ipfs.w3s.link bafybeigdwsuwf76z2sablbhswgndfprcefty4kooce2mzzm63vvdn5p6vy.ipfs.w3s.link
-
every.to every.to
-
Twitter’s Killer App: Real-Time Search Anyone can search the past, but only Twitter can unearth the present
-
-
www.utf8icons.com www.utf8icons.com
-
⟏
-
⟏ Squared Logical Or
⟏
-
-
docdrop.org docdrop.org
-
the ultimate source of intelligibility and the inexhaustibleness of reality
ultimate source of intelligibility
the inexhaustibleness of reality
-
emanation
x
-
emanation of mind
emanation of mind
-
emergence without top-down emanation
emanation top down
kind of final cause
-
-
dev-indy0.fission.app dev-indy0.fission.app
-
the One is completed by man’s contemplation of it.
- gnosticism denies this
-
It does not regard creation as a part of God’s being, or as “completing” God. Nor does Gnosticism hold that God somehow needs man to know Him.
- creation completes God
- God needs man to know him.
-
-
www.crunchbase.com www.crunchbase.com
-
Organization Intentional Software
-
-
blogs.microsoft.com blogs.microsoft.com
-
Microsoft to acquire Intentional Software to expand future productivity capabilities Apr 18, 2017
microsoft acquire intentional
-
-
www.utf8icons.com www.utf8icons.com
-
🧙 Mage
🧙
for : trailmmark - intentmark
-
-
www.utf8icons.com www.utf8icons.com
-
⚛ Atom Symbol
⚛
- for : trailmark : innovation
-
-
dominictarr.com dominictarr.com
-
True Name
for : module - pub
-
-
handbook.scuttlebutt.nz handbook.scuttlebutt.nz
-
Identity
in scuttle but
-
-
handbook.scuttlebutt.nz handbook.scuttlebutt.nz
-
Gossip
Gossip
-
Should I follow multiple pubs?
should
-
Gossiping Securely is the new Email
The new Email
-
-
stackoverflow.com stackoverflow.com
-
The revealing module pattern is basically a cool trick invented to make something module-like in an ES5 environment. If you are in an environment where you can use ES6 modules, you should use those instead.
for : ES6 Module vs Revealing Module Pattern
-
-
exploringjs.com exploringjs.com
-
for : ES6 Module vs Revealing Module Pattern
-
We can use import() to load this module on demand
load module on demand
-
underscore-cased module file names because we can directly use these names for namespace imports (without any translation):
underscore-cased module file names because they can be used for variable names without translation
-
clear rules for translating dash-cased file names to camel-cased JavaScript variable names.
dash-case to camelCase
-
Modules
-
-
bafybeicvi67bcmaofxtj7ywizmdy6ob4jwxxlmnbygzdauvfptgojoogjq.ipfs.dweb.link bafybeicvi67bcmaofxtj7ywizmdy6ob4jwxxlmnbygzdauvfptgojoogjq.ipfs.dweb.link
-
holding a collection of "frozen" statements.
// to have those things in front of the writer as composing
-
Content Specification
A Given specifications for desired content (written in a special high-level content-analysis language), the view generator will display only those statements that have the desired content. One can test for the existence of simple strings, or logical combinations thereof, or for such things as having the word "memory" within four words of the word ''allocation".
-
a user may ask to be taken to its
all these can readily be accomploshed
in a rich text viewer/editor with the ability to mark regions search and rich text editing of HTML
lowering the barrier of entry
-
Our control procedures makethis essentially as quick and simple as a direct-screen selection.
direct screen slection
-
constructingspecial views of the material beginning with that passage
In normal, off-line document studying, a person often does the first type of operation, but the second is like - a scissors-and-staple job and - is rarely done just to aid one's studying.
-
We have come to write all
write all of - our documentation, - notes, - reports, and - proposals
according to these conventions, because of the resulting increase in - our ability to study and - manipulate them
during - composition, - modification, and - usage.
Our programming systems also incorporate the conventions.
We have found it to be fairly universal that - after an initial period of negative reaction in reading explicitly structured material, - one comes to prefer it to material printed in the normal form
-
significant manipulations are mademuch easier by the structuring conventions
- conception
- stipulation
- execution
made easier - by the structuring conventions
-
The basic validity
approach established
-
there are means for suppressing the special formatting in the final printout
means of suppressing
-
structuring conventions are expected to evolve relatively rapidly
// not so rapidly I guess
-
naming and linking, when added to the basic hierarchical form,yields a general structuring capability that is quite flexible.
naming and linking plus hiearachy
-
see(spec)
reference to statment
-
The convention is that the first word of a statement will be treated asthe name for that statement, if it is enclosed in parentheses
naming is all
-
the "name" of B
what is is that name?
-
1C2B
As an experiment with this concept, we adopted some years ago - the convention of organizing all information into hierarchical structures, - // what we need is Associative Complexes or Plexes that themselves are created using TrailMarks as structure Clues to capture, make explicit the intent/meaning/factet/context of meaningful units of content as we write to enhance comprehension, re-use, re-mix both by humans and machines - with provisions for arbitrary cross-referencing among the elements of a hierarchy. - // clues allow self-explicating means of bi-directional cross referencing, transclusion - // highresolution addressing using permanent anchors
-
Douglas C. Engelbart. Study for the Development of Human Augmentation Techniques. Final Report
- meta-circular
- report on NLS in NLS
// Perfect way to introduce, compare NLS's Augmented Writing with TrailMarks Mark In Notation and structuring with listicles
-
1C Structure of Files
Structure of Files
-
1C2B1
The principal manifestation of this hierarchical structure is the breaking up of text into - arbitrary segments called "statements," - // not arbitrary but intentionally, meaningfully chunks, ,supporting better, faster, comprehension - each of which bears a number showing its serial location in the text and - its "level" in an ''outline" of the text
-
1C2A
With the view that the symbols one works with are supposed to represent a - mapping of one's associated concepts, and further that - one's concepts exist in a - "network" of relationships - as opposed to - the essentially linear form of : actual printed records,
it was decided that the concept-manipulation aids - derivable from real-time computer support
could be appreciably enhanced by - structuring conventions - that would make explicit (for both the user and the computer) - : the various types of network relationships among concepts.
-
1C1 Our working information is organized into files, with flexible means for setting upindices and directories and for moving files in and out of storage. Each file is itselfhighly structured in its internal organization.1C1A The specific structure of a given file is determined by the user, and is animportant part of his conceptual and study-manipulate treatment of the file.1C2 The introduction of explicit "structuring" to our working information stems from avery basic feature of our conceptual framework (Engelbart, 1963) regarding means foraugmenting human intellect.
Our working information is - organized into files, - with flexible means for setting up - indices and directories and - for moving files in and out of storage.
Each file is itself - highly structured in its internal organization.
The specific structure of a given file is - determined by the user, and - is an important part of his - conceptual and - study-manipulate treatment of the file.
The introduction of explicit "structuring" to our working information stems from - a very basic feature of our conceptual framework (Engelbart, 1963) regarding means for augmenting human intellect.
-
-
gitlab.com gitlab.com
-
Peer to Peer interoperability hub that turns web apps into "servers" It relies on pluggable decent(ralized) self-sovereign identity and peer to peer messaging systems OrbitGraph, ScuttleButt or HyperKnowledge
-
-
129.69.211.95 129.69.211.95
-
The new version was written in Tree Meta andcompiled directly to binary by the metacompiler; as a resultit is much cleaner than the old version.
new MOL
-
The new Tree Meta compiler-compiler has an extended syntax,as compared to the old one, and is consequently moreflexible and powerful
Tree-Meta Compiler
-
-
scholar.google.hu scholar.google.hu
-
search
Study for the Development of Human Augmentation Techniques. Final Report 1968
-