10,000 Matching Annotations
  1. Jul 2022
  2. arxiv.org arxiv.org
    ()
    22
    1. As encouraged by SFS, users can link other users’ Ob-jects directly into their own Objects (namespace, home, etc).This has the benefit of also creating a web of trust (and sup-ports the old Certificate Authority model)

      web of trust

    2. [12] D. Mazieres and M. F. Kaashoek. Escaping the evilsof centralized control with self-certifying pathnames.In Proceedings of the 8th ACM SIGOPS Europeanworkshop on Support for composing distributedapplications, pages 118–125. ACM, 199
    3. Self-Certified Names
      • Using the naming scheme from SFS 12 , [11]
      • to construct self-certified names,
        • in a cryptographically assigned global mutable namespace
    4. LBFS [?] also usesmutable indices and immutable chunks

      LBFS?

    5. mutable Fossil

      Fossil

    6. Object content addressing constructs a web with
      • significant bandwidth optimizations,
      • untrusted content serving,
      • permanent links, and
      • the ability to make full permanent backups of any object and its references.
    7. data is expensive to move across net-work links

      expensive to move data across network links

    8. Objects are permanent

      objects are permanent

    9. What is required is some way to retrievemutable state at the same path.

      mutable state at the same path

    10. However, IPFS File objects are close enough to Gitthat conversion between the two is possible

      conversion between git and IPFSD is possible

    11. the applications were not designed as infrastructure tobe built upon.
      • not designed as<br /> infrastructure to be built upon =
    12. tens of millions of nodes churn daily [16]

      t 10s of millions of nodes churn daily

    13. BitTorrent [2] deployed largefile distribution systems supporting over 100 million simul-taneous user

      100 million simultaneous users

    14. IPFS has no singlepoint of failure,
      • no single point of failure
      • nodes need not trust each other
    15. IPFScombines a distributed hashtable, an incentivized block ex-change, and a self-certifying namespace
      • distributed hashtable
      • incentivized block exchange
      • self-certifying namespace

    16. ersionedfile systems, blockchains, and even a Permanent We
      • versioned file systems
      • blockchains
      • Permanent Web
    17. eneralized MerkleDAG

      Merkle DAG

    18. high through-put content-addressed block storage model, with content-addressed hyper links
      • high through-put
      • content-addressed
      • block storage model
      • content addressed hyperlinks
    19. exchanging objects within one Gitrepository

      object in one git repository

    20. a sin-gle BitTorrent swarm

      single swarm

    21. connect all computing de-vices with the same system of files

      connect devices same system of files

    22. peer-to-peer dis-tributed file system

      p2p file system

    1. Budo Attitude présente un enchaînemement yangsheng de Yang Jwing Ming70,181 views

    1. Taiji Ball Qigong 1 by Dr Yang, Jwing-Ming (lo res 360p) Tai Chi Ball instruction from YMAA

      x

    1. Dr. Yang, Jwing-Ming classic demonstration of the 108 "Old Yang" taijiquan (low res 360)

      https://bafybeihrtenn6oi4qme4axr4hsr44fmxj4irrnakarmixjjtzbc7f724bq.ipfs.dweb.link/?filename=Dr.%2520Yang-%2520Jwing-Ming%2520classic%2520demonstration%2520of%2520the%2520108%2520Old%2520Yang%2520taijiquan%2520-low%2520res%2520360-.mp4

    1. !- for : - concept - Software Suite

      !- disadvantages : Software Suites

      • Take it or leave it terms
      • app-siloed data
      • sign away rights
      • not able to set control own terms
      • loss of :
        • ownership
        • sovereignty
        • privacy
    2. add-on programs not available for purchase separately.

      add-ons not available to purchase separately

    3. More efficient acquisition process by installing all programs at once, instead of one at a time.

      !- for : suites - IndyWeb

      • efficient acquisition process
      • installing

      !- contrast : Software Suites - vs - Open Software Suites | IndyWeb

      • discovery of adjacent capabilities
      • free choice while strong guarantees for inter(operability|(ex)changeability) permanence of both data and capabilities needed to create/make use of it
    4. synergy and compatibility

      !- for : suites - IndyWeb

      • synergy
      • compatibility
    5. Similar user interface in each program, reducing the learning curve and improving familiarity.

      !- for : suites - IndyWeb

      • similar user interface
      • reduced learning curve
      • familiarity
    1. A software suite[1] (Also known as an application suite) is a collection of computer programs (application software, or programming software) of related functionality, sharing a similar user interface and the ability to easily exchange data with each other.

      collection of software with similar user interface and the ability to easily exchange data

    1. “It’s not the black side. It’s not the white side. It’s the interface. It’s the edge.

      its the edge yin and yang

    2. Strange, transcendental, or transpersonal images.

      transpersonal

    3. neotenizing thing is like the condition of unconsciousness
      • neotenizing
      • condition of unconsciousness
    4. That language—spoken language—is the original code for hacking virtual reality
      • pearl : language is the original code for hacking virtual reality
    5. Description

      https://hyp.is/4Ql_RAN9Ee20q99fHHnUiQ/bafybeidqh6gqrrrpb5zjuw3dl6nc5tvivrkwy37qt6uowmquj4ah6xk7uq.ipfs.dweb.link/dreaming-awake-at-the-end-of-time.mp4

      https://bafybeic5kphwtr4mfvmgiqfotpldimq37qxssvhv55wsonjzzezxx4y5r4.ipfs.dweb.link/?filename=Dreaming%2520Awake%2520at%2520the%2520End%2520of%2520Time%2520-%2520Terence%2520McKenna.pdf

    6. a precondition is a kind of unconsciousness, a kind of drifting, a certain taking your eye off the ball

      drifting

    7. I feel the ambiance of the people and the throb of the Zeitgeist

      ambience

    8. every person hears something different. Which is what is supposed to be going on, you know?

      !- pearl : every personb hears something different - which is what is supposed to be going on

    1. Digitally mediated and augmented human identity approached primarily for psychological, sociological, and ecological health.

      We need to build systems for Augmenting Human Intellect. http://1962paper.org/web.html#annotations:1i1anAwMEeutPrtso0kK7w To realise Engelbart's Dream debuted 60 years ego

      Need to figure out how we can "improve the intellectual effectiveness of the individual human being" and build a People Centred internet, the IndyWeb, that works for the people by the people

      where each individual can be their own autonomous hub, empowered to weave their own networks of people ideas and pursuits, to engage in deep conversations, mutual learning for the benefit of participants, in trusted but verifiable networks of evergreen Autonomous Ambient Digital Spaces through which all can experience the Web as an extension of their Minds. Create an Open Learning/Doing Commons where

      ideas can self-organize, contextualized, their growth is recapitulable and attributable with full provenance not only of contributions but sharing, accelerating co-evolution for Symmathesy.

      This way Augmented Human Identity will take care of itself.

    1. I'm going to give you an overview of what came before the demo in fact I think of it as the real demo it was what Doug himself 00:00:21 called the public debut of a dream and you would think oh well that's got to be the demo that was public but no it was a 1962 research report as is often the case with what Doug leaves us we think 00:00:35 we understand public debut of a dream dream demo no it's this 1962 report and he wrote those words the public debut of a dream and a letter to one of his 00:00:47 intellectual heroes than Eva Bush what he meant was the dream was a conceptual framework completed as a project report for the Air Force Office of Scientific Research

      public debut of a dream

      Description

    1. Human identity: the number one challenge in computer science

      Build system from trust for trust where individuals have autonomous agency in their owned networks of connection to other individuals and self-organizing autonomous communities

      on a people centred internet

    2. identifiers artificially separated from any kind of contextual co-emergence and reciprocity with information exchange in relationships, severely curtailing personal freedoms, both physical and psychological, and eroding long-serving social mechanisms.

      separated from contextual co-emergence

      Autonompus interpersonal connections, conversation

      Put people at the centre of the very architecture.

      We need to build a People Centred internet that works for People

      If you get personal first, autonomous connectivity and sharing in trustful ways evergreen, permanent,

      individual-owned information identity will take care of itself and it will be for our benefit

    3. Joins give the dots their meaning, their contextual relevance, their identity, just as dots give the information exchange direction and potency.

      joins give the dots their meaning

    4. In other words, the dots (the nodes, the people) don’t simply define the joins (the edges, the relationships) as Social Networking 101 might have it. We dot the joins in contextual information exchange just as much as we might be said to join the dots.

      !- for : value prop - IndyWeb

    5. rather than individuals tout court

      individuals tout court

    6. individual autonomy and self-empowerment (Giannopoulou & Wang 2021), it is fundamentally a mutation carrying computer science’s false premise further into community.

      autonomy self-empowerment SSI false promise

  3. bafybeidqh6gqrrrpb5zjuw3dl6nc5tvivrkwy37qt6uowmquj4ah6xk7uq.ipfs.dweb.link bafybeidqh6gqrrrpb5zjuw3dl6nc5tvivrkwy37qt6uowmquj4ah6xk7uq.ipfs.dweb.link
    1. https://www.organism.earth/library/document/dreaming-awake-at-the-end-of-time https://dweb.link/ipfs/bafybeic5kphwtr4mfvmgiqfotpldimq37qxssvhv55wsonjzzezxx4y5r4?filename=Dreaming%2520Awake%2520at%2520the%2520End%2520of%2520Time%2520-%2520Terence%2520McKenna.pdf

    1. “But if I’m right, that the universe has an appetite for novelty, then we are the apple of its eye

      novelty apple of its eye

      Description

    1. The Interplanetary File System (IPFS) —which is a set of protocols to create a content-addressed,peer-to-peer (P2P) filesystem
      • about : IPFS

      • to : 27

      about : IPFS

    2. Content-based addressing is where the content itself isused to create an address which is then used to retrievesaid content from the network

      content itself is used to create an address

      used to retrieve said content from the network

    3. [27] J. Benet, “IPFS: Content addressed, versioned, p2pfile system,” arXiv preprint arXiv:1407.3561, vol. (Draft3), 2014.
      • from :
    4. [26] R. Mört, Content Based Addressing : The case formultiple Internet service providers. 2012.
    5. addressing content bylocation is problematic, such as duplication of storage,inefficient use of bandwidth, invalid/dead links (link rot),centralized control, and authentication issues

      !- pitfalls : location addressing

      • duplication of storage
      • inefficient bandwidth usage
      • link rot
      • centralized control
      • authentication issues
    6. routed to a specific endpoint based onprior knowledge (e.g. the domain name or IP address)

      routed prior knowledge

    7. location-based addressing
      • it
    8. clients (users) communicating toendpoints (hosts or servers).

      clients users endpoints hosts or servers

      master slave

    9. , it is not possible to model everysystem as a CRD

      not possible to model every system as a CRDT

      !- hypothesis :

      • Logs + CRDT + Content Addressing
      • sufficient for people-centred interpersonal constellation
    10. “counter”-basedtime-stamps to provide partial ordering.

      "counter"-based time-stamps

      partial ordering

    11. Cryptographically linked events can also represent aclock

      cryptographically linked events as clocks

    12. one peer’s concept of “now” is notnecessarily the same as anothe

      peer's concept of "now"

    13. local timestampscan’t be used to determine “global” event causality

      local timestamps

      "global" event causality

    14. CRDTs can provide an alternative to log-basedconsensus

      CRDTs alternative to log-based consensus

    15. A conflict-free replicated data type (CRDT)assures eventual consistency through optimisticreplication
      • about : CRDT
    16. many distributed systemsare now designed to provide availability and partitiontolerance by trading consistency for eventual consistency.

      availability and partition tolerance

      trading consistency for eventual consistency

    17. partition tolerance

      the system continues to operate despite an arbitrary number of messages being dropped [or delayed] by the network

    18. availability

      every request receives a [possibly out-of-date] non-error response

    19. consistency

      every read receives the most recent write or an error

    20. deterministic resolution strategy can be insufficient incases with complicated data structures or complicatednetwork topologies.

      determi

    21. multi-writer systems,

      conflict resolution CRDT

    22. The flexible event-based structure enables client applications to deriveadvanced applications states, including queryablematerialized views, and custom CRDTs

      event based structure

      advanced application states

      custom CRDTs

    23. push-based synchronization that iscommon in distributed protocols

      push-based synchronization

      distributed protocols

    24. pull-based replica synchronization

      !- concept : pull based replica synchronization

      !- idea : pull based syndication

    25. build a network for user-siloed data

      !- for : value prop - IndyLoom

      • Personal first, Interpersonal companion to https://idealoom.org/
      • Why not Individual owned data https://perkeep.org/
      • build network of user-siloed IndyWeb Apps
      • that are not only designed to operate on data that
      • is owned and kept by the individuals
      • on their own(ed) devices
      • but are amenable to be processed by any other IndyWebApps that individuals choose to make use of.
      • IndyWeb Apps do not treat individual as users (losers)
      • but empower individuals to indwell in their
        • own(ed)
        • autonomous digital spaces.
      • Share and collaborate with others on their own terms and chosen means that promote high degree of inter(operability|exchangebaility) not only of data that matters to them but the very capabilities that they use..
      • By construction both their data and the capabilities are EverGreen.

      held by the individual !- concept : user-siloed data

    26. D. Betts, J. Dominguez, G. Melnik, F. Simonazzi, andM. Subramanian, Exploring CQRS and Event Sourcing:A Journey into High Scalability, Availability, andMaintainability with Windows Azure, 1st ed. Microsoftpatterns & practices, 2013
    27. [12] Martin Fowler, “CQRS,” martinfowler.com, Jul. 14,2011. https://martinfowler.com/bliki/CQRS.html(accessed Sep. 20, 2019).
    28. 13] M. Fowler, “Event Sourcing,” martinfowler.com. https://martinfowler.com/eaaDev/EventSourcing.html(accessed Sep. 19, 2019).
    29. command queryresponsibility segregation (CQRS) patterns [7]

      !- jargon : CQRS

  4. bafkreihamvi36ritwbgfwtvtgmxigxqa4jia2wt7jjdytpl66jbuwlboki.ipfs.dweb.link bafkreihamvi36ritwbgfwtvtgmxigxqa4jia2wt7jjdytpl66jbuwlboki.ipfs.dweb.link
    1. Content Based Addressing: The case for multiple Internetservice providersBachelor's thesisRobert Mörtrmort@kth.se
    2. As soon as there is morethan one request for the same content there is a gain in using CCNx rather than HTTP for contenttransfer.

      more than one request gain

  5. bafkreihghrd4kauazniloonb2bjrvg7yr6yykpcmegyukzdxdumuuhco6u.ipfs.dweb.link bafkreihghrd4kauazniloonb2bjrvg7yr6yykpcmegyukzdxdumuuhco6u.ipfs.dweb.link
    1. The Boundar

      thread traverses the boundary

    2. XML

      can and did mislead us to ignore real issues

    3. Harvest & Yield

      near realtime messages can be lost

      as there are strong guarantees to be able to get complete results for designated time periods

    4. Conclusions

      message-passing clusters

      People acting as agents, hubs to themselves in their owned networks

    5. Constant evolution (internet time)

      Need Evergreen combination of data and capabilities

      both available together within specific time periods

      auto archiving

      and auto upgrade chains

      Time series with predefined granuality is permanent

    6. Harvest Options
      • ignore lost nodes
      • pair up nodes
      • n-member replica groups

      auto-sharding

      dynamic replica groups

    7. Can’t do pass--byby--reference (pointers)reference (poin

      This is the key

      we can pass content addreses = act as shared memory to named data

      • for : concept - Networked Collaborative Memory systems
    8. Symptom of a deeper problem

      yeah need a people centred interpersonal computing paradigm powered by anti-databses, nbamed data networks

      the data that us shared is out there

      while echa participants have autoinbomous, redundant durable evergreen redundant storage (mutual backup) intight knit trusted networks of people build on trust fgor trust

    9. The CAP Theorem

      !- contrast : People centred, InterPersonal Constellations

      can have Consistency, Availability

      since all data shared is available in the network and is owned by and controlled by contributors partition tolerance is a given

      need to centre on discoverability and reach

    10. ACID vs. BASE

      SBMS ACID

      !- contrast : People centred, InterPersonal Constellations - atomicity - isolation - (eventual) consistency - durability

      achievable

      no need to forfeit Consistency and Isolation

    11. Persistent State is HARD
      • Classic DS focus on the computation, not the data

        • this is WRONG, computation is the easy partt
      • Data centers exist for a reason

        • can’t have consistency or availability without them
      • Other locations are for caching only:

      • proxies, basestations, set-top boxes, desktops

        • phones, PDAs ...
      • Distributed systems can’t ignore location

      • for : concept - Constellations

      • constellations for provisioning
      • persistence
      • communication
      • platforms
    1. ACID properties

      !- concept :ACID - atomicity - Consistency - Isolation - Durability

      for transactions

      relax to informatioin exchange

    1. Growing older is a privilege not everyone gets, so it seems rather perverse to be an (old) grump about it.

      "Growing older is indeed a privilege not every one gets"

    1. h e f o r m a l notation became known as B N F -standing for "Backus N o r m a l F o r m , " or "Backus N a u r F o r m " torecognize the further contributions by Peter N a u r of Denmark.

      Backus's work alongside John Allen's Anatomy of Lisp book discussing Syntax Directed Translation, and Abelson and Sussman's Structure and Interpretation of Computer Programs inspired my PhD on "Language-Oriented Programming in Meta-Lisp" at Leeds University.

      Revisiting this paper allows me to articulate on the margin the ideas relating to a revival of Simomnyi;s intentional software, based on the recognition that Software is a conversation about intents and a matter of Mutual Learning Symmathesy.

      The original motivation for managing complexity by maintaining referential transparency and intellectual manageability over the past two decades, inspired by the works of Douglas Engelbart, Ted Nelson, Alan Kay and Ward Cunningham, evolved into the recognition of the need to developing means that augment the intellectual effectiveness of the individual human being and bootstrap collaboration co-creation of co-evolution of man-computer symbiotic systems.

    2. Can Programming Be Liberated from the vonNeumann Style? A Functional Style and ItsAlgebra of Programs

      When will programming be liberated from the von Neuman Style? When programming itself will be obsoleted. The end of programming is nigh.

      I despair at the the ephemerality of the Web

      It is utterly broken

      We need IPFS

      https://indylab1.fission.app/hyp?von%20neumann

    3. only one state transition occurs per major com-putation.

      one state transition per major computation

      instead of state need to consider information spaces make the intent/purpose of transition in intentional digital information spaces articulated through "thought vectors" in concept space, that are themselves are presentable in forms that conducive to human comprehension yet are machine processable

    4. inability to effectively use powerful combining forms forbuilding new programs from existing ones
      • claim: inability to use effectively powerful combining forms for building new "programs?" from existing ones.

      It is not programs we want

    5. division of programming into aworld of expressions and a world o f statements,

      world of expressions with referential transparency

      and statements

    6. r close coupling o f semantics tostate transitions,

      coupling of semantics to state transition

      there is more to program than semantics

      *it is all about intent and intended behaviour a matter of digital experience and habitability of the system for individual human beings with an intent, a purpose, a task to be accomplished"

    7. Programming

      "Programming" as Simonyi pointed out:

      Programming today is the opposite of diamond mining. In diamond mining you dig up a lot of dirt to find a small bit of value. With programming you start with the value, the real intention, and bury it in a bunch of dirt. - Charles Simonyi https://hyp.is/YWmmNM6ZEeuV7xf1-U7Q1g/www.quotemaster.org/qcfd525f5b7bc2370751ba06007edecbb

    1. The change that CQRS introduces is to split

      no need to split if you have available dynamically everything you ever need to extract from a uniform graph model that is self-explicating buy using 'shapes'

      after all everything articulated as "thought vectors in concept space"

      or rather

      "intent vectors in digital spaces"

    2. This structure of multiple layers of representation

      slay those layers

      https://indylab1.fission.app/hyp?slay%20layers

      Description

    3. If you're using a Domain Model, then this is usually the conceptual representation of the domain. You typically also make the persistent storage as close to the conceptual model as you can.

      all you need is a metaricular establishment of meta conceptual/intentional models in terms of which domains, intent, interpretations and transformation themselves can be ellucidated, organized and necessary mappings organized

      provide persistence mechanisms matching each conceived required interaction collaboration scaling provisionming alternatives. this is possible if you adopt a people-centred viewpoint, after all at the end of the day any system will be used by individuals so put them and their needs at the centre of all architecyure for all computer systyems we build

      stop creating data as people in disguise*

    4. Developers typically build their own conceptual model which they use to manipulate the core elements of the model.

      let us articulate conceptual/intentional models and their processing explicitly in a form that is intellectually manageable and ipso facto amenable to arbitrary interpretations and transformations

    5. each of which is a different representation.

      why oh why oh why should we change representation

      change in representation requires new mechanisms to be established for each, why

      we need a universal uniform way of making sense, articulating processes by making explicit (in a uniform way) the intent the purpose and the required mappings

    6. users

      users are losers

      we are concerned wit individual human beings augmented by machine capabilities

    7. As this occurs we begin to see multiple representations of information.

      need uniform, self-explicative organization of information# universal representation that gives us the ability to create intentional presentations control surfaces and affordances that are co-evolvable with the growth of understanding as we explore (problem) domains of interest and intents

    8. even infer data

      infer data

      complex manipulation in the aid of discovery and comprehension sense making, articulation

      MVC breaks down when the primary goal of information processing is to discover create evolve models

    9. collapsing multiple records into one, or forming virtual records by combining information for different places

      collapsing multiple records

      comnbining information

      synthesis

    10. CRUD datastore

      *data store is a concept that separates information model and intentional model and consistent writing(

      The alter native is to have a fully auditrailed attrtibuted tranistional record of all meaningful states with explicit indication about the nature og transitions. This is critical when information is gathered as we grow understanding of a system

    11. beware that for most systems CQRS adds risky complexity.
    1. Identity by Presence

      Wow

      searched for 'individual congtrolled identity' and found this

      idcubed.org

    2.  This short video from the MIT Open Mustard Seed Project describes the idea of an Identity by Presence.
    3. is working with the World Economic Forum to build frameworks for the use of personal date to create both social and economic value.)

      surely personal data

      personal data is an oxymoron if you consider with Jaron Larnier that "information is but people in disguise"

    1. social ecosystem of trusted, self-healing digital institutions.

      !- constrast that with - building on live interpersonal trust

      • video : https://bafybeiesxz7b4osoyc7v3oiue6f3dvjbdxayeymjc6mljmpk3zbwdkcmvi.ipfs.dweb.link/?filename=Open%2520Mustard%2520Seed%2520Intro%2520identity%2520by%2520presence.mp4

    2. empowering individuals to assert greater control over their data, onlineidentities and authentication, and in so doing, enable them to design and deploy a new generation of trusted digital institutions and services globally.

      !- contrast that with : - empowering individuals to own, in perpetuity their data and identities and digital spaces and capabilities s that are build from trust for trust

    1. Individual Controlled Identity by Presence systems are low cost to deploy and manage andare easily retrofitted to existing systems

      !- about : concept - individual-controlled identity

      presence systems - to : https://hyp.is/BgP1GgD8Ee2wRdf3mH71qw/cscoxk.wordpress.com/2014/12/

    Annotators

    1. ISKO UK Meetup June 2022 - Why graphs? The limits of hierarchical thinking53 views53 viewsJun 21, 2022

    1. “stealth mode” is a bad idea.
      • claim :
    2. Imagine, for example, that you were thinking of starting Netflix back when it was founded in 1997.

      neflix 1997

    3. But the reality is that ideas do matter,

      C- ideas do matter

    4. The idea maze

    1. navigating the idea maze, and form your own conclusions about the claims, questions, and trails between them.

      navigating the idea maze =

  6. Local file Local file
    1. pure XMLtextual encoding formats prove to be limiting under several point of view

      !- claim : XML textual encoding format is limiting to say the list

    2. Toward textual encoding based on RDF

    Annotators

    1. Google Translate is nothing but the robo-sum of human intelligence and skilled labor. “Digital information,” Lanier writes, “is really just people in disguise.”  

      Digital Information is really just people in disguise

      Description

    1. What Turned Jaron Lanier Against the Web? The digital pioneer and visionary behind virtual reality has turned against the very culture he helped create

      Description

    1. Identity by Presence – A Privacy and Cost Nightmare

      identity by presence

    1. !- search - brave : the rise of devops

      Description

    2. The rise of the DevOps mindset - Stack Overflow Blog stackoverflow.blog › home › the rise of the devops mindset
      • search : the rise of devops

      10 July 2020 - DevOps has become one of those buzzwords with many conflicting definitions. What’s for certain is it’s on the rise. In our 2020 developer Survey, around 80% of the respondents believed that DevOps is at least somewhat important. We take a look at the phenomenon, some definitions, and talk ...

    1. Second, containers are self-documenting. During the old process of manually provisioning infrastructure and environments,

      containers automate and document provisioning

    2. DevOps brings the agile focus on communication and collaboration between developers and the operations team, giving the post-code software process the same responsiveness that the coding process has.

      bring responsiveness to post-code software processes

    1. : concerned with events existing in a limited time period and ignoring historical antecedents
      • define : synchronic
    1. History and Etymology for synchrony synchron(ous) + -y entry 2 Note: As a linguistic term borrowed from French synchronie, it was introduced along with synchronique synchronic by Ferdinand de saussure; see note at diachrony.
      • history, etymology : synchrony
    1. borrowed from French diachronie, from dia- dia- + Greek chrónos "time, duration" (of obscure origin) + French -ie -y entry 2 Note: Term introduced, along with the adjective diachronique, by Ferdinand de saussure in the posthumously published Cours de linguistigue générale (Lausanne/Paris, 1916), compiled from lecture notes by his students. See also synchronic, synchrony.
      • is : history, etymology
    1. borrowed from French diachronique, from diachronie diachrony + -ique -ic entry 1
      • is : etymology
    2. : of, relating to, or dealing with phenomena (as of language or culture) as they occur or change over a period of time
      • is : definition
    1. a year’s worth of my own writing had been suddenly blocked from being read on the internet by an expired certificate.

      expired certificate

    2. rapid, unpredictable cycles of creation, dissemination, and destruction

      cycles of creation dissemination and destruction

    3. living amid an unprecedented availability of information, and of the unprecedented unavailability of that same information.

      unprecedented availability/unavailability of the same information

    4. the fear that one’s work will be stolen, and the fear that one’s work will be lost.

      stolen or lost

    1. convergence: a deeper mutual understanding of issues, enabling community-scale collaboration

      x

    2. !- for : IndyLoom

      all annotations are created from the perspective of IndyLoom

      !- do how : - italicize the text that is intended to be part of the discussion about the topic designated with the ClueMark clue:

      '!- for : IndyWeb'

      !- for : ClueMark - stub: - ClueMark comprise a sequence of TrailMark Terms separated by a hyphen '-' the end of that sequence is marked syntactically by a colon ':' optinally followd by the name of a target node in the indyvidual's MindGraph

    3. reinvent the practice of group conversations

      !- for : IndyLoom

      reinvent conversations by making them People Centred, rooted in the individuals own networked thinking shared and co-created through trusted inter personal collaboration

    1. memory systems

      !- for : associative recall, -auto

      !- for : What's in a Name

      !- for : auto-associative search, auto associative search

      !- for : associative memory - is powered by searches for shapes, patterns of connections in a graph with possibly matching terms in the associated contents

      • *names for nodes in MindGraph can inf act be search strings, or alternatively can have their own declared collection of auto-associative and associative search terms"
    1. Programming today is the opposite of diamond mining. In diamond mining you dig up a lot of dirt to find a small bit of value. With programming you start with the value, the real intention, and bury it in a bunch of dirt. - Charles Simonyi
      • auto associative search terms : simonyi diamond mining

      !- gloss : auto associative terms - x - x programming

    1. Now I would like to read to you from the footnote to Howl, Allen Ginsberg's famous poem, that for many people embodied at the time what it meant to be engaged in this new literary project. So, this is footnote to 00:07:28 Howl:

      Footnote to Howl Holy

    2. So, that's one small way in the language that they practiced tried to imitate the experience that they were immersing themselves in

      art imitates life

      language imitates experience

      The Computer Arts imitates Creation itself

      while

      creating boundless spaces of shared digital experience

      in that sense Terrence McKena's notion of

      Language as the original Virtual Reality

      comes to be realized

    3. language has to be wrenched out of its conventions; syntax can be set aside; 00:14:31 language needs to move at the speed of experience

      language move speed experience

    4. Embarrassment tells us we're in the presence of the excess,

      embarrassment presence excess

    5. Embarrassment is thematized in On the Road, and it's assigned what I think is a very interesting provenance.

      embarrassment thematized provenance

    6. all the ecstasies that come from that embodiment

      ecstasies embodiment

    7. the source of the poetry is that holy, lived experience

      source poetry holy lived experience

    8. Everything is holy!

      Howl Holy

    9. Professor Amy Hungerford:

      Amy Hungerford

    10. The Golden Bough; I have used especially the two volumes Adonis, Attis, Osiris

      The Golden Bough

    11. So, first I want to read to you the footnote to T.S. Eliot's The Wasteland. Now The Wasteland was the first poem to have footnotes, and you have to ask yourself: what do you have to think the poem is in 00:05:24 order to think that it needs footnotes?

      footnotes

    12. 9. Jack Kerouac, On the Road (cont.)

      0:40 not a call for revolution 1;00 language that itself is a kind of experience

      the original virtual reality see McKenna

      18:50 experience through

    1. What is a Personal Knowledge Graph?

      What is a Personal Knowledge Graph?

      Here's the answer of @AshleighNFaith

      https://youtu.be/gca8hGR5Mao

      What is your answer? @AlanMorrison @pacoid @namedgraph @maribelacosta @cathal @TrailMarks

    1. Business Persons' Guide to: What is a Personal Knowledge Graph? In 10 minutes or less

      Description

    1. revolutionary “starfish,” which rely on the power of peer relationships.

      power of peer relationships

    2. If you cut off a spider’s leg, it’s crippled; if you cut off its head, it dies. But if you cut off a starfish’s leg it grows a new one, and the old leg can grow into an entirely new starfish.

      star fish leg grows a new start fish

    3. The Starfish and the Spider: The Unstoppable Power of Leaderless Organizations

    1. By making information available across peer networks, traditional hierarchical structures are often rendered obsolete.

      peer networks vs hierarchical structures

    2. The way the web works will shape how we see the world – and how we organize ourselves in society

      the way the web works

    1. the first major existing chat platform to switch to natively speaking Matrix!

      major chat platfo0rm natively speaking matrix

    2. Welcoming Gitter to Matrix!2020-09-30 — General — Matthew Hodgson

      Description

    1. Exciting news: Gitter is joining @element_hq and entering the @matrixdotorg community!

      Exciting news: Gitter is joining @element_hq and entering the @matrixdotorg community! 🚀

      Looking forward to bridging with the wider decentralised Matrix network & bringing Matrix magic to Gitter like E2EE, VoIP, and the Matrix API!

      Read more here:

    1. nod in the direction of "doing the right thing." 

      "do the right thing" when combined with power

      tend to do evil things while pretending to be "for the greater good"

      the road to totalitarianism" of high tech

    2. a new initiative that he says is meant to "make the online world a place worth being in."
      • for : value prop - IndyWeb

      make the online space worth being in

    3. The Internet Is Broken and Tim Berners-Lee, the Man Who Invented the World Wide Web, Thinks He Has a Plan to Fix ItIn an op-ed, the World Wide Web's founder is championing a new vision for how the internet should work. Will it matter at all?Shape

    1. a web that gives much more power to the individual.
      • for : IndyWeb

      a web that gives much more power to the individual.

    2. Philippe Duchesne @pduchesne Jun 24 10:39 Is anyone familiar with the International Data Spaces initiative (https://internationaldataspaces.org/) ? On paper it is very similar in intent to Solid, and appears to be backed by a lot of academic and industrial partners. Has anyone more insights ?
    3. It's a strange approach, but it means that if you change service providers but keep the same DID, all your old data URIs are still valid.
      • for : IndyWeb
        • exchangeability of
          • service
          • surface
        • providers

      make service providers exchangeable!

    4. In order for machines to understand what we mean we need to refer each part of what we say to a machine readable definition so that the machine knows the difference between a music:rock concert and a geology:rock climb. Hence vocabularies defining what things mean.

      vocabularies define what we mean

    5. Jeff Zucker @jeff-zucker Jun 23 03:02 @amingst:matrix.org - it's a difference in philosophy - instead of AI gathering information about the world, analyzing it according to non-transparent algorithms, and spitting back to us the part it wants us to see, we prefer to let humans say what things mean and machines can follow along. In order for machines to understand what we mean we need to refer each part of what we say to a machine readable definition so that the machine knows the difference between a music:rock concert and a geology:rock climb. Hence vocabularies defining what things mean. And too - imagine the difference between 1,000 databases, each with their own table and column labeling system - no interoperability. Compared to 1,000 linked data sources all using related vocabularies - interoperable.

      instead of AI gathering information about the world

      let let humans say what things mean and machines can follow along

    6. let humans say what things mean and machines can follow along

      let humans say what they mean

      mark their intents in a form that machines can help to realize

    1. hy Data Sovereignty Data Spaces Global Standard We The Association GAIA-X IDS in Europe Board Head Office Members Become a Member Get access to Jive Make Use Cases Open Source Working Groups Launch Coalition Communities Projects Hubs Liaisons Use Reference Architecture IDS Components Certification IDS Reference Testbed DIN SPEC Adopt Data Space Radar Implementation Partners Education Essential Services Publications Most Important Documents About IDSA Membership IDS Ram White papers Position papers Studies & external papers Scientific Publications Magazines Why Data Sovereignty Data Spaces Global Standard We The Association GAIA-X IDS in Europe Board Head Office Members Become a Member Get access to Jive Make Use Cases Open Source Working Groups Launch Coalition Communities Projects Hubs Liaisons Use Reference Architecture IDS Components Certification IDS Reference Testbed DIN SPEC Adopt Data Space Radar Implementation Partners Education Essential Services Publications Most Important Documents About IDSA Membership IDS Ram White papers Position papers Studies & external papers Scientific Publications Magazines Why Data Sovereignty Data Spaces Global Standard We The Association GAIA-X IDS in Europe Board Head Office Members Become a Member Get access to Jive Make Use Cases Open Source Working Groups Launch Coalition Communities Projects Hubs Liaisons Use Reference Architecture IDS Components Certification IDS Reference Testbed DIN SPEC Adopt Data Space Radar Implementation Partners Education Essential Services Publications Most Important Documents About IDSA Membership IDS Ram White papers Position papers Studies & external papers Scientific Publications Magazines |  News, Blog, Events Blog News Fairs & Events IDSA Events & Live Sessions Archive Newsletter Registration Press JOBS Why Data Sovereignty Data Spaces Global Standard We The Association GAIA-X IDS in Europe Board Head Office Members Become a Member Get access to Jive Make Use Cases Open Source Working Groups Launch Coalition Communities Projects Hubs Liaisons Use Reference Architecture IDS Components Certification IDS Reference Testbed DIN SPEC Adopt Data Space Radar Implementation Partners Education Essential Services Publications Most Important Documents About IDSA Membership IDS Ram White papers Position papers Studies & external papers Scientific Publications Magazines |  News, Blog, Events Blog News Fairs & Events IDSA Events & Live Sessions Archive Newsletter Registration Press JOBS Why Data Sovereignty Data Spaces Global Standard We The Association GAIA-X IDS in Europe Board Head Office Members Become a Member Get access to Jive Make Use Cases Open Source Working Groups Launch Coalition Communities Projects Hubs Liaisons Use Reference Architecture IDS Components Certification IDS Reference Testbed DIN SPEC Adopt Data Space Radar Implementation Partners Education Essential Services Publications Most Important Documents About IDSA Membership IDS Ram White papers Position papers Studies & external papers Scientific Publications Magazines News, Blog, Events News Blog Fairs & Events IDSA Events & Live Sessions Archive Newsletter Registration Press JOBS Why Data Sovereignty Data Spaces Global Standard We The Association GAIA-X IDS in Europe Board Head Office Members Become a Member Get access to Jive Make Use Cases Open Source Working Groups Launch Coalition Communities Projects Hubs Liaisons Use Reference Architecture IDS Components Certification IDS Reference Testbed DIN SPEC Adopt Data Space Radar Implementation Partners Education Essential Services Publications Most Important Documents About IDSA Membership IDS Ram White papers Position papers Studies & external papers Scientific Publications Magazines News, Blog, Events News Blog Fairs & Events IDSA Events & Live Sessions Archive Newsletter Registration Press JOBS   setREVStartSize({c: 'rev_slider_1_1',rl:[1280,1024,980,480],el:[900],gw:[1280],gh:[900],type:'hero',justify:'',layout:'fullwidth',mh:"0"});if (window.RS_MODULES!==undefined && window.RS_MODULES.modules!==undefined && window.RS_MODULES.modules["revslider11"]!==undefined) {window.RS_MODULES.modules["revslider11"].once = false;window.revapi1 = undefined;if (window.RS_MODULES.checkMinimal!==undefined) window.RS_MODULES.checkMinimal()} INTERNATIONAL DATA SPACES The future of the data economy is here

      Given that data is but people in disguise

      all businesses ultimately aimed at serving individual human needs so somewhere in the chain people will appear

      we need autonomous emergent people centred interpersonal spaces

    1. Terry A. Davis This is Terry A. Davis. The guy single-handedly, from scratch wrote:An entire operating system (TempleOS)Different tools and demo games for his operating system2D Graphics library3D Graphics libraryHis own assemblerA bootloaderA compiler for his own C-like Programming language (Holy C)Multiple file formats and many more

    Annotators

    URL

    1. The development in product-lines is divided into domain engineering andapplication engineering.

      PLA divided into domain engineering and application engineering

      within a fixed architecture

      consider domain engineering based on universal meta models for data and intents, surfaces, affordances (work)flows

      sound like domain engineering concerns itself cross application modelling concerns within an emergent singular architecture

      make the intentional domain model itself self-hosting extensible re-(usable|mixable) co-evolvable and instead of developing a PLA allow multiplicity of constellations for constructing spaces of interest that supports desired levels of scales and collaboration patterns

      domain engineering is reconceptualized as comprised of two parts: instance first, discursive conversational articulation of

      • domains of interest
      • holonic heterarchies of muuallyu arising of intents / workflows of interest

      application engineering then becomes a process of realizing constructing spaces for the domain etc of interest and instead of specializing the constellation of interest extend it in suitable ways supporting large scale emergent reuse

    2. Development strategies based on product-lines have proven to be adequatefor achieving large-scale software reuse and reduced time-to-market

      large scale software resuse and born interoperability

    3. product-linearchitecture (PLA)

      PLA

    4. An MDA Approach for Variability Managementin Product-Line EngineeringAndr ́e L. Santos1*, Ant ́onia Lopes1, and Kai Koskimies2

      MDA approach

    Annotators