10,000 Matching Annotations
  1. Dec 2023
  2. bafybeigwamkgvdko4mmfacg2hiy4tjiojqxtdi7sbdd3xqlpc4zbaeovym.ipfs.w3s.link bafybeigwamkgvdko4mmfacg2hiy4tjiojqxtdi7sbdd3xqlpc4zbaeovym.ipfs.w3s.link
    1. how littlemost people, including managers and leaders of these industries know about knowledge: what it is,why it is important, and how ever more rapidly changing technology is changing the way wepersonally use knowledge as individuals and in our organizations and society.

      the way way individuals and organization use knowledge

    2. a nearly incomprehensible chaos of competingand incommensurable paradigms in epistemology

      a nearly incomprehensible chaos of competing and incommensurable paradigms in epistemology - (objective vs personal knowledge), - resource vs environment view in organization theory - individual vs social, critical, alternative - knowledge creation in organization: cognitivism vs connectionism vs autopoiesis

      >>> Need to establish organic growth path between individual and organizational externalization of interintellect

      where even the individual knowledge work is an instance of collaborative work conversations with past self

    3. Hypertext provides the best way to build a cognitive Web

      Hypertext provides the best way to build - a cognitive Web<br /> - >>> MindPlex Nexialitic Symmanthetic reticulate evolutionary Synthesys

      connecting personal cognition with objective artefacts of knowledge. Most of the queries and resulting links available to me as I am writing would equally be available to readers - impossible when dealing with paper documentation, so I could explicitly show my sources for ideas and evidence

    4. usinesses and organizations are livingentities in their own rights and have cognitive capabilities that transcend the sum of theirindividual human members

      individual human

    5. ince the growth of the “personal” computer three decades ago, thesetools have given people “post-human” cognitive abilities - orders of magnitude beyond anythingconceivable to previous generations outside science fiction

      personal computer

      >>> Need InterPersonal Computing

    6. to formhierarchical organizations of several layers down to the individual humans comprisingthem

      individual human

      recursive down to the individual

    7. The first three episodes flowed logically from exploring concepts of knowledge andtechnology as they involve individual people. However, as will become apparent there is nosimple transition from looking at how technological revolutions have changed the cognition ofindividual humans to looking at how technologies have affected the nature of humansocioeconomic organizations

      individua humans

    1. Organizational Autopoiesis and Knowledge Management Twelfth International Conference on Information Systems Development – Methods & Tools, Theory & Practice, Melbourne, Australia, August 25-27, 2003

      xxx

    1. ORGANIZATIONAL AUTOPOIESIS AND KNOWLEDGEMANAGEMENT

      presents a biological view of knowledge and organizations formulated to provide a framework for understanding organizational knowledge and organizational knowledge management systems.

    1. Autopoietic Theory

      Derived from the Greek words auto, meaning 'self' and poiesis, meaning 'creation', autopoietic systems are ones that are comprised of self-creating processes. In other words, networks or relationships between components that are self-referential and create the complexity of living organisms.

    1. Symbiogenesis (endosymbiosis)

      Symbiogenesis (endosymbiosis) is a special form of symbiosis whereby an organism lives inside another, different organism. Symbiogenesis is thought to be very important in the origin and evolution of eukaryotes. Eukaryotic organelles, such as mitochondria, have been theorized to have been originated from cell-invaded bacteria living inside another cell.[11][12]

      Man-Machine symbiogenesis of the the Digital Noosphere

    2. Reticulate evolution, or network evolution

      for - ontogeny recapitulates phylogeny - indranet

      for - big idea - Augmenting Articulation in through reticulate co-evolution

      Reticulate evolution, or network evolution is the - origination of a lineage through

      the partial merging of - two ancestor lineages,

      leading to relationships better described by a - phylogenetic network than a - bifurcating tree.[1]

      Reticulate patterns can be found in the - phylogenetic reconstructions of biodiversity lineages obtained by comparing the characteristics of organisms.

      in scaling symmanthetic synthesis, salience and reach

      the ontogeny of novel synthesis retains the connection through verifiable provenance to the co-evolution, the philogeny of all the ideas that are present in the reticulate nexus in a complete nexus that can be captured in hypermap that IS the terriotry[2]

      Reticulation processes can potentially be convergent and divergent at the same time. [3]

      Reticulate evolution indicates the lack of independence between two evolutionary lineages.[1]

      Reticulation affects survival, fitness and speciation rates of species

    1. verbrare

      verb RARE /rɪˈtɪkjʊleɪt/

      divide or mark (something) in such a way as to - resemble a net or network.

      usage.example

      • "the numerous canals and branches of the river reticulate the flat alluvial plain" adjectiveBOTANY•ZOOLOGY
  3. bafybeid2x24x7kmo6a6t45ssd7gousoyyht562z4rsgpkx5o75tolauow4.ipfs.w3s.link bafybeid2x24x7kmo6a6t45ssd7gousoyyht562z4rsgpkx5o75tolauow4.ipfs.w3s.link
    1. computer augmented personalKnowledge Architectures

      >>> clear case of reiification bias What we referred to as Knowledge Architectures

      today we like to see as a mutual arising as Autnonomous Networks - people - info-structures - com(munication|putational) - web3Native - infra-structure

    2. individual learners

      >> update WikiNizer was envisioned as a vehicle of personal knowledge work that is federated in and anchored in conceptipedia a federated gobal concept space

      ten yeas later we are going interpersonal multiplayer autononomous collaboration

      symmathesy Open Mutual Learning Commons

    3. Representing the process of the growth in our personalknowledge

      Representing the process of the growth - in our personal knowledge, and

      sharing the emerging conceptual structures that - emerge within problem solving contexts,

      is a major task for - individual learners, and - a critical coaching and tutoring problem.

      Knowledge obtained from the web or other resources needs to be - personalized, - reorganized, and - contextualized,

      in order to - filter our misconceptions.

      Visualization of information about - ‘Things’ and - their conceptual organization - help us with problem definition, - and consequently their solution.

      WikiNizeR

      is a Personal knowledge Management tool - which represents and organizes - “associative complexes” within - computer augmented - personal Knowledge Architectures

    1. IPFS Connect Istanbul 2023: A decentralized social graph made with IPNS with Guo Liu

      IPFS Connect Istanbul 2023: A decentralized social graph made with IPNS

      Guo Liu

    1. Welcome to the workshop! 👋 We'll be hacking on an app that transmogrifies avatars sending them to a new, odd dimension where you can summon them anywhere across the Dweb. The completed workshop will include transmogrify and summon views:

      Description

    2. Fission Dwebcamp Brazil Workshop 2023

      Welcome to the workshop! 👋

      We'll be hacking on an app that transmogrifies avatars sending them to a new, odd dimension where you can summon them anywhere across the Dweb.

      The completed workshop will include tr

      ansmogrify and summon views:

    1. Signal Statistics: Usage, Revenue, & Key Facts

      July 28, 2023 by Ravpreet Kaur in Brand Statistics | Reader Disclosure

      The Signal app has attracted some major buzz recently.

      When WhatsApp’s updated privacy policy called for its users to accept that it would share user data with its parent company – Facebook, millions of users shifted to Signal in the quest for a secure messaging platform.

    1. twitter:image

      A URL to a unique image representing the content of the page. You should not use a generic image such as your website logo, author photo, or other image that spans multiple pages. Images for this Card support an aspect ratio of 2:1 with minimum dimensions of 300x157 or maximum of 4096x4096 pixels. Images must be less than 5MB in size. JPG, PNG, WEBP and GIF formats are supported. Only the first frame of an animated GIF will be used. SVG is not supported

    1. Man is the measure of all things

      Man is the measure of all things

      "Man is the measure of all things: of things which are, that they are, and of things which are not, that they are not".

    1. "Man IS the measure of everything"

      Man is the measure of all things

      "Man is the measure of all things: of things which are, that they are, and of things which are not, that they are not".

    1. Context deadline exceeded - What to do?

      In Golang, the "context deadline exceeded" error typically occurs when an operation exceeds the context deadline. This article is a troubleshooting guide for this error and its possible causes.

    2. Context deadline exceeded - What to do?

      failed to resolve /ipns/k51qzi5uqu5dkshg32cadv6zp5r6wrzdqwm6xd3z3wrot7jlgzv3e3wn1454vb/2023-12-03/2023-indy0-net.ipns.localhost_10_hyp_facet_aiframe.html/: context deadline exceeded

      Description

    1. Peers who trust each other can exchange cryptographic keys, and securely share their petnames, building up webs of trust. Once you’ve exchanged keys, you can securely share updates to your address book as often as you like.

      building up web of trust =

      cheating zooko's triangle

    1. But tonight I realized that you can indeed use BitCoin to square Zooko’s triangle. Here’s how it works

      Square Zooko's triangle

      for : zooko triangle

    1. Mozilla Development Network

      Documenting web technologies, including CSS, HTML, and JavaScript, since 2005.

      >> Still can't get the landing page right. Looks ok in firefox though <<

    1. signal Protocol The Signal Protocol (formerly known as the TextSecure Protocol) is a non-federated cryptographic protocol that provides end-to-end encryption for voice and instant messaging conversations

    2. The protocol provides confidentiality

      The protocol provides confidentiality, integrity, authentication, participant consistency, destination validation, forward secrecy, post-compromise security (aka future secrecy), causality preservation,

      • message unlinkability

      , message repudiation, participation repudiation, and asynchronicity.[18]

      It does not provide anonymity preservation and - requires servers

      for the relaying of messages and storing of public key material.[18]

    1. Welcome to ODD SDK!

      ODD SDK is Fission's true local-first, edge computing stack.

      ODD SDK empowers you to build fully distributed web applications with auth and storage without needing a complex backend. To learn more, check out the ODD SDK docs.

    1. Introduction | ODD SDK Docs

      The ODD SDK empowers developers to build fully distributed web applications without needing a complex back-end.

  4. Nov 2023
    1. IPFS Connect Istanbul 2023: IPVM - Bringing Wasm-Based Edge Compute to IPFS

      [docdrop](IPFS Connect Istanbul 2023: IPVM - Bringing Wasm-Based Edge Compute to IPFS

      15 views 22 Nov 2023 The advent of TCP/IP and the web produced an explosion of innovation by radically lowering the barrier to entry to connect over the network. Thanks to new technical and social innovations, we now have the building blocks for the next generation of open services: location-free verifiable data and computation.

      Verifiable computation opens the door to content-addressed function invocations, results, and workflows. This radically lowers the complexity of historical architectures (e.g. the LAMP stack), networked, and distributed systems. Not only is this easier to reason about, it also (paradoxically) enables superlinear scaling: the more it gets used, the more efficient it becomes!

      This talk presents UCAN Invocations and the Interplanetary VM (IPVM). Code in this model can run anywhere (even offline), respects data privacy, and services interoperate seamlessly out of the box without pre-negotiation. Since computation doesn't happen in a vacuum, we will also describe how the workflow planner interacts with existing services and how to lift them into this seamless paradigm.) 15 views 22 Nov 2023 The advent of TCP/IP and the web produced an explosion of innovation by radically lowering the barrier to entry to connect over the network. Thanks to new technical and social innovations, we now have the building blocks for the next generation of open services: location-free verifiable data and computation.

      Verifiable computation opens the door to content-addressed function invocations, results, and workflows. This radically lowers the complexity of historical architectures (e.g. the LAMP stack), networked, and distributed systems. Not only is this easier to reason about, it also (paradoxically) enables superlinear scaling: the more it gets used, the more efficient it becomes!

      This talk presents UCAN Invocations and the Interplanetary VM (IPVM). Code in this model can run anywhere (even offline), respects data privacy, and services interoperate seamlessly out of the box without pre-negotiation. Since computation doesn't happen in a vacuum, we will also describe how the workflow planner interacts with existing services and how to lift them into this seamless paradigm.

    2. IPFS Connect Istanbul 2023: IPVM - Bringing Wasm-Based Edge Compute to IPFS

      15 views 22 Nov 2023 The advent of TCP/IP and the web produced an explosion of innovation by radically lowering the barrier to entry to connect over the network. Thanks to new technical and social innovations, we now have the building blocks for the next generation of open services: location-free verifiable data and computation.

      Verifiable computation opens the door to content-addressed function invocations, results, and workflows. This radically lowers the complexity of historical architectures (e.g. the LAMP stack), networked, and distributed systems. Not only is this easier to reason about, it also (paradoxically) enables superlinear scaling: the more it gets used, the more efficient it becomes!

      This talk presents UCAN Invocations and the Interplanetary VM (IPVM). Code in this model can run anywhere (even offline), respects data privacy, and services interoperate seamlessly out of the box without pre-negotiation. Since computation doesn't happen in a vacuum, we will also describe how the workflow planner interacts with existing services and how to lift them into this seamless paradigm.

    3. 15 views 22 Nov 2023 The advent of TCP/IP and the web produced an explosion of innovation by radically lowering the barrier to entry to connect over the network. Thanks to new technical and social innovations, we now have the building blocks for the next generation of open services: location-free verifiable data and computation.

      Verifiable computation opens the door to content-addressed function invocations, results, and workflows. This radically lowers the complexity of historical architectures (e.g. the LAMP stack), networked, and distributed systems. Not only is this easier to reason about, it also (paradoxically) enables superlinear scaling: the more it gets used, the more efficient it becomes!

      This talk presents UCAN Invocations and the Interplanetary VM (IPVM). Code in this model can run anywhere (even offline), respects data privacy, and services interoperate seamlessly out of the box without pre-negotiation. Since computation doesn't happen in a vacuum, we will also describe how the workflow planner interacts with existing services and how to lift them into this seamless paradigm.

    4. This talk presents UCAN Invocations and the Interplanetary VM (IPVM).

      This talk presents UCAN Invocations and the Interplanetary VM (IPVM). Code in this model can run anywhere (even offline), respects data privacy, and services interoperate seamlessly out of the box without pre-negotiation. Since computation doesn't happen in a vacuum, we will also describe how the workflow planner interacts with existing services and how to lift them into this seamless paradigm.

    5. Verifiable computation opens the door to

      Verifiable computation opens the door to - content-addressed function invocations, - results, and - workflows.

      >= Based on such protocols we could add human beings, (universal) users as - first class autonomous verifiable Actors (UCAN zero knowledge proofs) - with native intel(igen|e|lec|)t - forming their own(ed) InterPersonal multiplayer collaborative networks of trust, as the third element connecting

      universal virtual hyperdocuments for long term evergreen - info- structures - hypermedia

      universal machines and computer agents responsible for

      universal machines as - communication - infra- structures

      <<

      This radically lowers the complexity of historical architectures (e.g. the - LAMP stack), - networked, and distributed systems.

      decouple the articulation of effective intent intentional software from implementation architectural concerns and make them

      >= composed of fully exchangeable mechanisms for specific needs constellations and workloads This is possible since with IP* protocols now possible to envisage a new cosmology of computing in the cryptocosm

      <<

      Not only is this - easier to reason about,

      it also (paradoxically) enables - superlinear scaling: - the more it gets used, - the more efficient it becomes!

    6. The advent of TCP/IP and the web produced

      The advent of TCP/IP and the web produced - an explosion of innovation by

      radically lowering the barrier to entry to - connect over the network.

      Thanks to new technical and social innovations, we now have - the building blocks for the next generation of

      open services: - location-free - verifiable data and - computation.

    1. IPFS Connect Istanbul 2023: Event based Mutability on IPFS

      10 views 22 Nov 2023 Understand the core principles and primitives that enable you to build mutable applications on top of IPFS. Get a sneak peak of Ceramic API, which makes building really easy.

      Description

    1. Recording (last talk of the day): https://www.youtube.com/live/bsIPIb5ega8?feature=share

      Title: Lessons learnt & the future of DAOs Summary (long): RnDAO started 18 months ago with the intention of researching and practicing DAOing by bridging learnings across Web3, Academia, and previous experiments in progressive organisation. This talk will present a summary of our mistakes, learnings, and visions for the future of DAOs and organisations at large.

    1. ​We must start with end-programmer programming

      ​We must start with end-programmer programming - to achieve end-user programming,

      - where users can
      
      • spin up personalized apps
        • without knowing how to code.

      With end-programmer programming, software engineers can build - folk applications, integrations, and mini-apps - to customize - their experience interacting with third-party software.

    2. ​We must start with end-programmer programming to achieve end-user programming, where users can spin up personalized apps without knowing how to code. With end-programmer programming, software engineers can build folk applications, integrations, and mini-apps to customize their experience interacting with third-party software.

      Description

      local ipfs

    3. EP04: End-Programmer Programming with Steve Krouse of Val Town - The Causal Islands Podcast

      Description EP04: End-Programmer Programming with Steve Krouse of Val Town - The Causal Islands Podcast local ipfs

    1. GUILE (GNU's Ubiquitous Intelligent Language for Extension)

      Description

      is a - library implementation of the Scheme programming language, written in C. - GUILE provides a machine-independent execution platform that can be linked in as a library during the building of extensible programs.

      Install the guile package - if you'd like to add - extensibility to programs that you are developing.

    2. GUILE (GNU's Ubiquitous Intelligent Language for Extension) is a

      library implementation of the Scheme programming language, written in C. GUILE provides a machine-independent execution platform that can be linked in as a library during the building of extensible programs. Install the guile package if you'd like to add extensibility to programs that you are developing.

    1. The FAIR principles

      The FAIR data principles are a set of guiding principles to make data Findable, Accessible, Interoperable and Reusable, so that data can be found, understood and reused by others.

  5. www.oxfordreference.com www.oxfordreference.com
    1. meaning snarf

      cryptpad link

      for - concept : FAIR snarf

      copy parts of a web page for personal use and share it in you own personal networks of collaborateors for the purpose of learning and discussion

      This is also meant to be not only within the limits of FAIR use but more importantly to make content of personal interest that is lokced up in silos, requiring sign up and sign in so that it is un FAIR

      liberating such content by snarfing and personal archiving for the purpose of interpersonal sharing

      wouod render the content FAIR

      • Findable
      • Accessibale
      • Interoperable
      • Reusable

      at Dunbar Scale thorugh personal sharing

  6. k51qzi5uqu5dkshg32cadv6zp5r6wrzdqwm6xd3z3wrot7jlgzv3e3wn1454vb.ipns.localhost:48084 k51qzi5uqu5dkshg32cadv6zp5r6wrzdqwm6xd3z3wrot7jlgzv3e3wn1454vb.ipns.localhost:48084
    1. Introducing Content+AI

      People + Context + Content > Content + AI

      where Context is Situated Alive Evergreen with full recapitulable history of co-laborations and coevolution

    1. Rather than users and applications needing
      • Rather than users and applications

      needing to include - the entirety of the data in a payload,

      • they can

      just reference - the CID of the data itself.

    2. without having to worry about

      without having to worry about whether - the data they care about is controlled by someone else.

      autonomous means of named evergreen info-communications-infra structures connecting people, that are owned and controlled by the people for the people

    3. weaving the Open Mutual Indy Learning Commons: The IndyWeb as

      augmented externalization of the co-evolution of human interintellect

      meaning/intent-fully linked info structures organized by self-explicating personal first interlayed meta-structures

    1. Lao-cï TAO TÖ KING Tőkei Ferenc fordítása Forrás: Kínai filozófia, Ókor, Második kötet, Akadémiai Kiadó, Budapest, 1964, 17-54. oldal A kínai szavak magyar tudományos átírásban szerepelnek.

      TAO TE KING

  7. k51qzi5uqu5dkshg32cadv6zp5r6wrzdqwm6xd3z3wrot7jlgzv3e3wn1454vb.ipns.localhost:48084 k51qzi5uqu5dkshg32cadv6zp5r6wrzdqwm6xd3z3wrot7jlgzv3e3wn1454vb.ipns.localhost:48084
    1. We reserve the right to terminate the Services

      We reserve the right to terminate the Services at our sole discretion or to transfer operation of the Services to a third party or smart contract. Prior to termination or transfer, - we will provide 90 days’ notice to users via email

      to allow users enough time to make arrangements if any (e.g. remote pinning to their own IPFS node, remote pinning to another service, or preparing to manage the renewal of their Filecoin deals on their own).

    1. QmRw4WBZZBQAuMsGgascJBT74HeUruqUu1BGE3J3U4QCBg

      http://bafybeibvmo3hj53qznfqyobcmysnsmc6iyb6zzvwterg3gtrykfknyr2t4.ipfs.localhost:48084/

    Annotators

    URL

    Annotators

    URL

    1. Dialog is a work-in-progress

      Dialog is a work-in-progress - strongly eventually consistent data store

      that combines - content-addressable storage, - the rich distributed query semantics of Datalog, and - the flexible security model of cryptrees.

      It builds off of existing ideas from the WebNative SDK - to empower developers - to build new types of local-first applications.

    1. Every actor is attached to exactly one mailbox

      In a Human Actor Model every individual will have many mailboxes corresponding to the connections they establish with others