10,000 Matching Annotations
  1. May 2023
  2. dev-indy0.fission.app dev-indy0.fission.app
    1. Semantic Engines: An Introduction to Mind Design | 2Taylor & Francis eBookshttps://www.taylorfrancis.com β€Ί chapters β€Ί edit β€Ί sema...Taylor & Francis eBookshttps://www.taylorfrancis.com β€Ί chapters β€Ί edit β€Ί sema...Semantic Engines: An Introduction to Mind Design ; Edition 1st Edition ; First Published 1998 ; Imprint Routledge ; Pages 35 ; eBook ISBN 9780203055045Β ...

    1. How the Actor Model Meets the Needs of Modern, Distributed ...Akkahttps://doc.akka.io β€Ί akka β€Ί typed β€Ί guide β€Ί actors-introAkkahttps://doc.akka.io β€Ί akka β€Ί typed β€Ί guide β€Ί actors-introThe actor model abstraction allows you to think about your code in terms of communication, not unlike the exchanges that occur between people in a largeΒ ...

    1. Actor Model and Knowledge Management Systemsspringer.comhttps://link.springer.com β€Ί chapterspringer.comhttps://link.springer.com β€Ί chapterby I Becerra-Fernandez Β· 2005 Β· Cited by 11 β€” The actor model describes an approach to modeling intelligence in terms of a society of communicating knowledge-based problem exper

    2. An introduction to multi-actor processesUniversitΓ€t OsnabrΓΌckhttps://www.newater.uni-osnabrueck.de β€Ί trainingUniversitΓ€t OsnabrΓΌckhttps://www.newater.uni-osnabrueck.de β€Ί trainingPDFby A Dewulf Β· Cited by 5 β€” Gray (1989) proposed a phase model of multi-actor collaboration, ... organized stakeholder, a social category of people with a specific interest,Β ...

    3. Actors in Collaborationgu.sehttps://gupea.ub.gu.se β€Ί gupea_2077_22135_1gu.sehttps://gupea.ub.gu.se β€Ί gupea_2077_22135_1PDFby M Ponti Β· 2010 Β· Cited by 17 β€” human actors: my computer and actor-network-theory. The former behaved for long ... on Callon's (1986a) model of translation of interests.

    1. Web Highlights is legally represented by "Marius Bongarts - Web & App Development".

      having trouble annotating

      As such, you hereby irrevocably grant us world-wide, perpetual, non-exclusive, royalty-free, assignable, sublicensable, transferable rights to use Your Content for any purpose.

    1. Transform Your Online Research and Highlight Everywhere Tired of browsing your history to find the information you saw yesterday? Don't worry. Our online PDF & Web Highlighter got you covered. Highlight any Website or PDF, create tags, take notes and export your research to HTML, Markdown, and PDF. Share your insights with others and access your highlights from anywhere, at any time.

    1. Web HighlighterProductivityTurn any website into an instant forum, where you can: leave comments, see other people's cursors / what text they're highlighting, and chat with them. Use it to annotate code, highlight online tutorials / books, and discuss people's blogs.

      w

    2. Handpicked no-signup toolsyou can use in 10 secondsnosignup.tools is a curated collection of web-based products that don't require an account or registration.

      x

    1. Dependency injection is a programming technique that makes a class independent of its dependencies. It achieves that by decoupling the usage of an object from its creation. This helps you to follow SOLID's dependency inversion and single responsibility principles.

      we need : class-free objects - not de-coupling but - deep, high resolution, contextual, fine coupling - organic growth of mixed- and matched context emergent extension of - existing permanent evergreen capabilities - mutual emergent extensibility via mix-ins

      Description

      not dependency injection - but mutual tinker-ability of existing capabilities - reflect in the structure what we create symmathesy (mutual learning) as we articulate our intents - Software is a Symmathetic conversation after all - organic integral growth and co-evolution of autonomous, - self explicating. open commons based, peer produced evergreen co-evolutionary capabilities - augmenting cultural co-evolution itself

    1. Contextualize your APM

      It is not the application performance monitoring that needs to be monited but applications themselves be emergent from relevant tinkerable contexts

    1. Koronatanu Dr. Bistey Zsuzsa elΕ‘adΓ‘sa I. rΓ©sz

      ha nem szerezzΓΌk vissza az emlΓ©kezΓ©s kΓ©pessΓ©gΓ©t akkor elveszΓΌnk

      elszΓ‘nt almatermelΕ‘k

      agyafΓΊrt vΓ‘llalkozΓ³k

    1. he 00:04:04 other thing about the Ickes curve is the actual complexity part of the Ickes might be a lot lower might actually be a 00:04:15 tiny part of the Ickes and perhaps we could call the the other part of it from that nice little thing down there up to where the Ickes is we could call that 00:04:29 complications so complications are basically noise bad technique old technique human bumbling inability to 00:04:44 get on learning curves you name it's a whole bunch of factors

      complications not complexity

      Description

      need to be slayers of layers

      https://indylab1.fission.app/hyp?slayers

    1. Working towards a commons-based attention-saving tech ecosystem, building one 'product' at a time

      commons-based attention-saving system

    1. Why do they call it spelunking?We borrowed "spelunker" from Latin "spelunca," which in turn derives from Greek "spelynx." When you get to the bottom of things, you find that both the Latin and Greek words mean "cave." Although "spelunker" might sound neat, be careful: some cave-exploring enthusiasts prefer the term "caver."Apr 11, 2023

      why

    1. Forward compatibility primarily ensures that an existing IT system is able to operate with subsequent releases of itself. This compatibility is planned out during the system design phase. Typically, to support forward compatibility, the hardware/software must also be backward compatible.

    1. Knowledge obtained from the web or other resources needs to be contextualized, personalized, and reorganized, filtering misconceptions.

      // this applies to information per se leading to * reconceptualization of information iteself such that

      1. attributed to source individual human being(s)
      2. full recapitulable provenance, evergreen permanence
      3. structured in universal ways as associative complexes
      4. Findable, Accessible, Interoperable, Reusable
      5. self-organizing, autopoietic
      6. shared and presented in self-described evergreen morphic ways

      given that we have a concept that is best referred to

      as in-formation that flows in emergent human trust networks

      that we fashion for ourselves as human being articulating our Tacit awareness

      scaling synthesis recapitulating in the ontogeny of learning the filogeny of co-evolving emergent knowledge as hyperknowledge

      scaling reach through time with the ability to find through global search work that mathces our current focal awareness and attention

      in stigmergic symmathesy (mutual learning)

      in a form that allows interpersonal sharing

      to in-form and shape US

    1. To really know one’s self is to be able to give a complete speech about the conditions of one’s being, and this involves speaking about God

      condition of one's being

      in the sense that whatever is real is reasonable in the sense of confoming to the condotions of it's being

      and whatever is reasonable can become real

    2. Gnosticism and Hermeticism both believe that a divine β€œspark” is implanted in man, and that man can come to know God.

      man can come to know God

  3. bafybeif256apzzimba2sy447spztswmldk3d7rj4umbchhghsy4s4xyobe.ipfs.w3s.link bafybeif256apzzimba2sy447spztswmldk3d7rj4umbchhghsy4s4xyobe.ipfs.w3s.link
    1. CTA Opportunity

      • shape our evolutionary path

      • bond cooperativ I-spaces, without binding us

      • technology in service of life

      adopt - open-ended - person-centric architecural framework

      invert - power assymetry

      scaffold - trust

      ratchet - trust and cooperation - // build for trust, from trust( but verify)

      foster - interoperavility - co-evolvability - scallability - // scaling reach, participation, synthesis, symmathesy - usability

      // intertwingled propositiojnal trailmarked plexes

    2. Scaling Up Cooperation

      We already have a self-organizing, self-regulating planetary scale organism The agents in this enterprise include all living beings Our dominant culture has forgotten we are embedded in and an integral part of an inter-connected, inter-related, inter-dependent living organism Our fates are tied together! We need to bring human culture into coherent alignment with Gaia’s Enterprise Architecture Gai a

    1. Arbuscular mycorrhizal fungi are obligate symbionts that obtain all their carbon from the plant they colonise but have to find other resources through soil exploration.

      obligate symbiont

    1. have one identity per deviceβ€Šβ€”β€Šthis means you have to have different identities for each computer you have.

      one identity per device

    2. Patchwork which sidesteps these problems
      • everyone has a diary
      • can make a photocopy of friend's diary
      • to send a messager leave a message in the diary encrypted with the key that the only the friend has
      • reading a friend's diary, messages that one can read is meant for one
    3. using email for direct communication, you’re probably facing some well known problems

      email problems -spam, - provider lockin, - privacy, and - reliability (doesn’t work without the internet).

    1. A reputation system's vulnerability to a Sybil attack depends on how cheaply identities can be generated, the degree to which the reputation system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity, and whether the reputation system treats all entities identically
      • cost of identity generation (needs to be high)
      • active chain of trust
    1. Sybil attackWikipediahttps://en.wikipedia.org β€Ί wiki β€Ί Sybil_attackWikipediahttps://en.wikipedia.org β€Ί wiki β€Ί Sybil_attackThe Sybil attack in computer security is an attack wherein a reputation system is subverted by creating multiple identities. A reputation system's vulnerabilityΒ ...

    1. The cartel tested their bulbs and fined manufacturers for bulbs that lasted more than 1,000 hours. A 1929 table listed the amount of Swiss francs paid that depended on the exceeding hours of lifetime.[8]

      ingenuity

    1. β€œYou never change things by fighting the existing reality.To change something, build a new model that makes the existing model obsolete.”

    1. modelling an experimenter and experimental procedure algorithmically imposes a limit on what can be measured with equipment. Indeed, the theorems suggest a new form of uncertainty principle for our knowledge of physical quantities measured in simple physical experiments.

      nice

    1. SW Lee Β· 1999 β€” engross themSeves in phiOSophy for the Sake Of piOSOphy. That pragmatism Sought to emphaSze the historcal and Socal. ImSons of phiOSOphy

      search

    2. An Application of John Dewey's Symbiotic Rationalitykoreascience.or.krhttps://koreascience.or.kr β€Ί article β€Ί JAKO199915...koreascience.or.krhttps://koreascience.or.kr β€Ί article β€Ί JAKO199915...PDFby SW Lee Β· 1999 β€” engross themSeves in phiOSophy for the Sake Of piOSOphy. That pragmatism Sought to emphaSze the historcal and Socal. ImSons of phiOSOphy in the Indst

      piOSOphy

    1. Warmspace is more than a product or company. It is a movement to reconnect people to humanity. It is family and community. It’s a place that anyone can call home. No matter the culture, race, sexual orientation, social class, age, and beliefs, it’s a place for anyone to feel valid, seen, and belong.

  4. embodimentofpurereason.wordpress.com embodimentofpurereason.wordpress.com
    1. Actors communicate with each other by

      0 sending asynchronous messages. - Those messages are stored in other actors' mailboxes until they're processed.

    2. An actor is the primitive unit of computation. It’s the thing that receives a message and does some kind of computation based on it

      primitive unit of computation

    1. the ultimate source of intelligibility and the inexhaustibleness of reality

      ultimate source of intelligibility

      the inexhaustibleness of reality

    1. It does not regard creation as a part of God’s being, or as β€œcompleting” God. Nor does Gnosticism hold that God somehow needs man to know Him.
      • creation completes God
      • God needs man to know him.
    1. The revealing module pattern is basically a cool trick invented to make something module-like in an ES5 environment. If you are in an environment where you can use ES6 modules, you should use those instead.

      for : ES6 Module vs Revealing Module Pattern

    1. underscore-cased module file names because we can directly use these names for namespace imports (without any translation):

      underscore-cased module file names because they can be used for variable names without translation

    1. Content Specification

      A Given specifications for desired content (written in a special high-level content-analysis language), the view generator will display only those statements that have the desired content. One can test for the existence of simple strings, or logical combinations thereof, or for such things as having the word "memory" within four words of the word ''allocation".

    2. a user may ask to be taken to its

      all these can readily be accomploshed

      in a rich text viewer/editor with the ability to mark regions search and rich text editing of HTML

      lowering the barrier of entry

    3. constructingspecial views of the material beginning with that passage

      In normal, off-line document studying, a person often does the first type of operation, but the second is like - a scissors-and-staple job and - is rarely done just to aid one's studying.

    4. We have come to write all

      write all of - our documentation, - notes, - reports, and - proposals

      according to these conventions, because of the resulting increase in - our ability to study and - manipulate them

      during - composition, - modification, and - usage.

      Our programming systems also incorporate the conventions.

      We have found it to be fairly universal that - after an initial period of negative reaction in reading explicitly structured material, - one comes to prefer it to material printed in the normal form

    5. significant manipulations are mademuch easier by the structuring conventions
      • conception
      • stipulation
      • execution

      made easier - by the structuring conventions

    6. naming and linking, when added to the basic hierarchical form,yields a general structuring capability that is quite flexible.

      naming and linking plus hiearachy

    7. The convention is that the first word of a statement will be treated asthe name for that statement, if it is enclosed in parentheses

      naming is all

    8. 1C2B

      As an experiment with this concept, we adopted some years ago - the convention of organizing all information into hierarchical structures, - // what we need is Associative Complexes or Plexes that themselves are created using TrailMarks as structure Clues to capture, make explicit the intent/meaning/factet/context of meaningful units of content as we write to enhance comprehension, re-use, re-mix both by humans and machines - with provisions for arbitrary cross-referencing among the elements of a hierarchy. - // clues allow self-explicating means of bi-directional cross referencing, transclusion - // highresolution addressing using permanent anchors

    9. Douglas C. Engelbart. Study for the Development of Human Augmentation Techniques. Final Report
      • meta-circular
      • report on NLS in NLS

      // Perfect way to introduce, compare NLS's Augmented Writing with TrailMarks Mark In Notation and structuring with listicles

    10. 1C2B1

      The principal manifestation of this hierarchical structure is the breaking up of text into - arbitrary segments called "statements," - // not arbitrary but intentionally, meaningfully chunks, ,supporting better, faster, comprehension - each of which bears a number showing its serial location in the text and - its "level" in an ''outline" of the text

    11. 1C2A

      With the view that the symbols one works with are supposed to represent a - mapping of one's associated concepts, and further that - one's concepts exist in a - "network" of relationships - as opposed to - the essentially linear form of : actual printed records,

      it was decided that the concept-manipulation aids - derivable from real-time computer support

      could be appreciably enhanced by - structuring conventions - that would make explicit (for both the user and the computer) - : the various types of network relationships among concepts.

    12. 1C1 Our working information is organized into files, with flexible means for setting upindices and directories and for moving files in and out of storage. Each file is itselfhighly structured in its internal organization.1C1A The specific structure of a given file is determined by the user, and is animportant part of his conceptual and study-manipulate treatment of the file.1C2 The introduction of explicit "structuring" to our working information stems from avery basic feature of our conceptual framework (Engelbart, 1963) regarding means foraugmenting human intellect.

      Our working information is - organized into files, - with flexible means for setting up - indices and directories and - for moving files in and out of storage.

      Each file is itself - highly structured in its internal organization.

      The specific structure of a given file is - determined by the user, and - is an important part of his - conceptual and - study-manipulate treatment of the file.

      The introduction of explicit "structuring" to our working information stems from - a very basic feature of our conceptual framework (Engelbart, 1963) regarding means for augmenting human intellect.

    13. One-handed typing with the handset is slower than two-handedtyping with the standard keyboard. However, working with one hand on thehandset and one on the mouse, the coordinated interspersion of controlcharacters and short literal strings from one hand with mouse-controlactions by the other yields considerable advantage in speed and smoothness

      advantage of five key handset

    1. Peer to Peer interoperability hub that turns web apps into "servers" It relies on pluggable decent(ralized) self-sovereign identity and peer to peer messaging systems OrbitGraph, ScuttleButt or HyperKnowledge

    1. The new version was written in Tree Meta andcompiled directly to binary by the metacompiler; as a resultit is much cleaner than the old version.

      new MOL

    2. The new Tree Meta compiler-compiler has an extended syntax,as compared to the old one, and is consequently moreflexible and powerful

      Tree-Meta Compiler

  5. Apr 2023
    1. What is the Nature of Reality? - Plato's Idealism ... - YouTubeYouTubehttps://www.youtube.com β€Ί watchYouTubehttps://www.youtube.com β€Ί watch37:53THE LOGIC DIALOGUES (1): Metaphysics of Adjacency (w/ Layman Pascal). Cadell Last. Cadell Last. β€’. β€’. 1.1K views 4 months agoΒ ...YouTube Β· Prof G Β· Oct 4, 2020

    1. treat the global name system as a way to bootstrap our petname address book. Once bootstrapped, we can continue to securely gossip names within our web of trust, even after the global name system fails.

      !- bootstrap : Named People's Networks

      • bootstrap our petname address book
      • global name system
      • securely gossip names within our web of trust
      • even after the global name system fails

      // powering human cultural co-evolution in the digital age we need opne commons based peer produced softwae in the long tail that is evergreen, permanent, forward compatible

      take the long view and thus endure

      so that culture can endure

    1. web 3 forward compatibility as a nice bonus when the stuff is in a decentralized network and it's content addressable you can reference it using you know standard ipfs libraries

      web3

      forward compatibility

      • content addressing
      • transparent link preservation
      • = forward compatible
    1. there's something incredibly powerful about the ability to create things that are more valuable the more 00:06:17 share they are

      sounds like knowledge itself

  6. inst-fs-iad-prod.inscloudgate.net inst-fs-iad-prod.inscloudgate.net