10,000 Matching Annotations
  1. May 2023
    1. capture collective value at scale

      // key to that is - scaling - reach - stigmergic symmathetic synthesis - capture self-w(ea|or)th of - in self-directed mutual learnings in - machine supported Personal Learning Work

      • interpersonal
      • re-capitulable with the view to scaling emergent synthesis
      • co-evolutionary
      • asyncronous yet continuous conversational
      • information flows qua value flows
      • that are contiguous with the each particpiant's
      • explorable
      • queryable
      • body of life-longstigmergic mutual learning works
      • where any work item is
      • high resolution addressable
      • amenable to be retrieved fully scaffold-ed
      • within a entire networks of meaningfully bidirectionaly associated complexes

      weaving the - Open - Permanent, - Evergreen - Mutual Learning Commons

    Annotators

    URL

    1. enterprise virtualization
      • built-in web interface you can easily manage
      • VMs and containers,
      • software-defined storage and networking,
      • high-availability clustering, and
      • multiple out-of-the-box tools on a single solution

      // flip all that - radically eliminate complications

    1. share links, images, quick thoughts, and snippets from Substack posts. As well as being lightweight and fun, we hope that Notes will help writers grow their audience and revenue.

      diy

    2. Notes is a new space where you can publish short-form posts and share ideas with other writers and readers on Substack.

      interest based emergent social networks around posts

    1. layout, themes, language and cultural conventions (i.e., internationalization/ localization), widget selection and configuration, and more

      layout, themes, language and cultural conventions (i.e., internationalization/ localization), widget selection and configuration, and more

    1. Material DesignMaterial 3 is the latest version of Google’s open-source design system. Design and build beautiful, usable products with Material 3.

    1. Self-Describing

      support support - sense-making, - meaning-making, and - choice-making

      within and between agents without a priori knowledge of each other's existence.

      Thus holons and holon relationships carry their own descriptions

      in human readable yet machine interpretable forms included

    2. invert the dynamic of the attention economy

      attention is - limbically hijacked in order to sell it to organizations seeking to push their products or services.

    3. all notifications honor the preferences set by the individual.

      honour preferences set by the individual

      They should be able to set their own terms for sharing

    4. Individuals have limited control

      they are confronted with take it or leave it terms - that legalizes the total exploitation of the content they contribute

      along the lines of

      By posting any Contributions, you grant us an unrestricted, unlimited, irrevocable, perpetual, non-exclusive, transferable, royalty-free, fully-paid, worldwide right, and license to: use, copy, reproduce, distribute, sell, resell, publish, broadcast, retitle, store, publicly perform, publicly display, reformat, translate, excerpt (in whole or in part), and exploit your Contributions (including, without limitation, your image, name, and voice) for any purpose, commercial, advertising, or otherwise, to prepare derivative works of, or incorporate into other works, your Contributions, and to sublicense the licenses granted in this section. Our use and distribution may occur in any media formats and through any media channels. This license includes our use of your name, company name, and franchise name, as applicable, and any of the trademarks, service marks, trade names, logos, and personal and commercial images you provide

    1. When you post Contributions, you grant us a license (including use of your name, trademarks,and logos)

      By posting any Contributions, you grant us an unrestricted, unlimited, irrevocable, perpetual, non-exclusive, transferable, royalty-free, fully-paid, worldwide right, and license to: use, copy, reproduce, distribute, sell, resell, publish, broadcast, retitle, store, publicly perform, publicly display, reformat, translate, excerpt (in whole or in part), and exploit your Contributions (including, without limitation, your image, name, and voice) for any purpose, commercial, advertising, or otherwise, to prepare derivative works of, or incorporate into other works, your Contributions, and to sublicense the licenses granted in this section. Our use and distribution may occur in any media formats and through any media channels. This license includes our use of your name, company name, and franchise name, as applicable, and any of the trademarks, service marks, trade names, logos, and personal and commercial images you provide

    1. This attainment was understood as a kind of non-dual state in which one is neither limited to samsara nor nirvana. A being who has reached this kind of nirvana is not restricted from manifesting in the samsaric realms, and yet they remain fully detached from the defilements found in these realms (and thus they can help others).

    1. Turán: Irántól északra, az Aral-tó, az Amu-darja, a Szir-darja és a Kaszpi-tenger mentén elterülő ázsiai sztyep. Ma sivatagos vidék, ősidők óta kulturális terület. 100–200

      turan

    1. Removing context leads to reliance on“universally secure” identifiers based on clean/universal features like biometrics, which oftenraise at least as many concerns as the central-ized protocols they replace

      reliance on - 'universally secure' identifiers - based on clean/universal features like - biometrics - raise as many concerns - as the centralized protocols - they replace

      // they do not replace but enhance

    2. Useful repu-tation requires a level of visibility and interop-erability—one must be able to see and use theinformation provided.

      visibilty and interoperability

    1. Intuition @0xIntuitionData monopolization erodes trust between individuals and corporations. It breeds power imbalances, perpetuates inequalities, and stifles innovation. It's time to prioritize transparency, accountability, and user-centric data management. It's time to level the playing field.

      share sentiment but

    1. The danger is getting stuck with a sub-optimal business model six or nine months down the line that either doesn’t match your ambition or isn’t scalable.

      Just what I thought back in the days when I hear Stve Blank talking about it

      https://substack.com/profile/7177767-gyuri-lajos/note/c-16171951?utm_source=substack&utm_context=first-note-modal

      restack is interesting

      https://www.linkedin.com/posts/gyuri-lajos_gyuri-lajos-on-substack-activity-7064214642704736256-oDDk?utm_source=share&utm_medium=member_desktop

  2. bafybeiccmvn2o4t5kgdydrtwhbu65dafc5etxg5l6mx345ezm2c7ubpmau.ipfs.w3s.link bafybeiccmvn2o4t5kgdydrtwhbu65dafc5etxg5l6mx345ezm2c7ubpmau.ipfs.w3s.link
    1. A set ofknowledge is therefore a set of propositions, all of which have a logical status

      knowledge - propositions - with logical status

    2. architects traditionally make designs while engineers optimize and make those designs buildable

      architects design

      engineers optimize and make it buildable

      Integral Software design is the idea that

      design and buildability consideration are considered integrated within an exploratory bootstrapping process

      and even at the conceptual design space

      all possible design choices are explored and reflected upoin

      and even their duals

  3. bafybeif256apzzimba2sy447spztswmldk3d7rj4umbchhghsy4s4xyobe.ipfs.w3s.link bafybeif256apzzimba2sy447spztswmldk3d7rj4umbchhghsy4s4xyobe.ipfs.w3s.link
    1. CTA Opportunity

      • shape our evolutionary path

      • bond cooperativ I-spaces, without binding us

      • technology in service of life

      adopt - open-ended - person-centric architecural framework

      invert - power assymetry

      scaffold - trust

      ratchet - trust and cooperation - // build for trust, from trust( but verify)

      foster - interoperavility - co-evolvability - scallability - // scaling reach, participation, synthesis, symmathesy - usability

      // intertwingled propositiojnal trailmarked plexes

    2. Scaling Up Cooperation

      We already have a self-organizing, self-regulating planetary scale organism The agents in this enterprise include all living beings Our dominant culture has forgotten we are embedded in and an integral part of an inter-connected, inter-related, inter-dependent living organism Our fates are tied together! We need to bring human culture into coherent alignment with Gaia’s Enterprise Architecture Gai a

    1. Design as a practice includes a unique polarity called, divergence AND convergence, otherwise known as ‘creating choices’ AND ‘making choices.’ Both neutral poles are absolutely necessary for the purpose of intelligent decision making amidst complex problem solving scenarios

      Description

    2. it integrates tacit mindsets and culture with explicit behaviour and processes to inform the design of a mutually interdependent toolkit.

    1. The Art of Prompt Design: Use Clear SyntaxExplore how clear syntax can enable you to communicate intent to language models, and also help ensure that outputs are easy to parse

  4. bafybeide4zlszyxwcbmobfv5xxuhp5d6w4qfvogwsu4auw4p2aag3cv2me.ipfs.w3s.link bafybeide4zlszyxwcbmobfv5xxuhp5d6w4qfvogwsu4auw4p2aag3cv2me.ipfs.w3s.link
    1. Intuition @0xIntuitionYour identity is more than your name and state ID. Your identity is all that you are, all that you have been & all that you could be. Your identity is fluid; prone to change at any moment, for any reason. Identity systems need to be flexible & configurable at the atomic level.9:23 PM · Apr 18, 2023·1,524 Views

    1. PubSub
      • Publishers emit events without knowing who'll receive them, and
      • subscribers listen for events they're interested in.

      This pattern allows for - better scalability and - modularity. - enables asynchronous messaging between services

    2. Event Sourcing
      • keep journal of live events
      • store events representing changes
      • provide complete history
      • better auditing
      • time travel debugging
      • replay events for analytic purposes
  5. dev-indy0.fission.app dev-indy0.fission.app
    1. Semantic Engines: An Introduction to Mind Design | 2Taylor & Francis eBookshttps://www.taylorfrancis.com › chapters › edit › sema...Taylor & Francis eBookshttps://www.taylorfrancis.com › chapters › edit › sema...Semantic Engines: An Introduction to Mind Design ; Edition 1st Edition ; First Published 1998 ; Imprint Routledge ; Pages 35 ; eBook ISBN 9780203055045 ...

    1. How the Actor Model Meets the Needs of Modern, Distributed ...Akkahttps://doc.akka.io › akka › typed › guide › actors-introAkkahttps://doc.akka.io › akka › typed › guide › actors-introThe actor model abstraction allows you to think about your code in terms of communication, not unlike the exchanges that occur between people in a large ...

    1. Actor Model and Knowledge Management Systemsspringer.comhttps://link.springer.com › chapterspringer.comhttps://link.springer.com › chapterby I Becerra-Fernandez · 2005 · Cited by 11 — The actor model describes an approach to modeling intelligence in terms of a society of communicating knowledge-based problem exper

    2. An introduction to multi-actor processesUniversität Osnabrückhttps://www.newater.uni-osnabrueck.de › trainingUniversität Osnabrückhttps://www.newater.uni-osnabrueck.de › trainingPDFby A Dewulf · Cited by 5 — Gray (1989) proposed a phase model of multi-actor collaboration, ... organized stakeholder, a social category of people with a specific interest, ...

    3. Actors in Collaborationgu.sehttps://gupea.ub.gu.se › gupea_2077_22135_1gu.sehttps://gupea.ub.gu.se › gupea_2077_22135_1PDFby M Ponti · 2010 · Cited by 17 — human actors: my computer and actor-network-theory. The former behaved for long ... on Callon's (1986a) model of translation of interests.

    1. Web Highlights is legally represented by "Marius Bongarts - Web & App Development".

      having trouble annotating

      As such, you hereby irrevocably grant us world-wide, perpetual, non-exclusive, royalty-free, assignable, sublicensable, transferable rights to use Your Content for any purpose.

    1. Transform Your Online Research and Highlight Everywhere Tired of browsing your history to find the information you saw yesterday? Don't worry. Our online PDF & Web Highlighter got you covered. Highlight any Website or PDF, create tags, take notes and export your research to HTML, Markdown, and PDF. Share your insights with others and access your highlights from anywhere, at any time.

    1. Web HighlighterProductivityTurn any website into an instant forum, where you can: leave comments, see other people's cursors / what text they're highlighting, and chat with them. Use it to annotate code, highlight online tutorials / books, and discuss people's blogs.

      w

    2. Handpicked no-signup toolsyou can use in 10 secondsnosignup.tools is a curated collection of web-based products that don't require an account or registration.

      x

    1. Dependency injection is a programming technique that makes a class independent of its dependencies. It achieves that by decoupling the usage of an object from its creation. This helps you to follow SOLID's dependency inversion and single responsibility principles.

      we need : class-free objects - not de-coupling but - deep, high resolution, contextual, fine coupling - organic growth of mixed- and matched context emergent extension of - existing permanent evergreen capabilities - mutual emergent extensibility via mix-ins

      Description

      not dependency injection - but mutual tinker-ability of existing capabilities - reflect in the structure what we create symmathesy (mutual learning) as we articulate our intents - Software is a Symmathetic conversation after all - organic integral growth and co-evolution of autonomous, - self explicating. open commons based, peer produced evergreen co-evolutionary capabilities - augmenting cultural co-evolution itself

    1. Contextualize your APM

      It is not the application performance monitoring that needs to be monited but applications themselves be emergent from relevant tinkerable contexts

    1. Koronatanu Dr. Bistey Zsuzsa előadása I. rész

      ha nem szerezzük vissza az emlékezés képességét akkor elveszünk

      elszánt almatermelők

      agyafúrt vállalkozók

    1. he 00:04:04 other thing about the Ickes curve is the actual complexity part of the Ickes might be a lot lower might actually be a 00:04:15 tiny part of the Ickes and perhaps we could call the the other part of it from that nice little thing down there up to where the Ickes is we could call that 00:04:29 complications so complications are basically noise bad technique old technique human bumbling inability to 00:04:44 get on learning curves you name it's a whole bunch of factors

      complications not complexity

      Description

      need to be slayers of layers

      https://indylab1.fission.app/hyp?slayers

    1. Working towards a commons-based attention-saving tech ecosystem, building one 'product' at a time

      commons-based attention-saving system

    1. Why do they call it spelunking?We borrowed "spelunker" from Latin "spelunca," which in turn derives from Greek "spelynx." When you get to the bottom of things, you find that both the Latin and Greek words mean "cave." Although "spelunker" might sound neat, be careful: some cave-exploring enthusiasts prefer the term "caver."Apr 11, 2023

      why

    1. Forward compatibility primarily ensures that an existing IT system is able to operate with subsequent releases of itself. This compatibility is planned out during the system design phase. Typically, to support forward compatibility, the hardware/software must also be backward compatible.

    1. Knowledge obtained from the web or other resources needs to be contextualized, personalized, and reorganized, filtering misconceptions.

      // this applies to information per se leading to * reconceptualization of information iteself such that

      1. attributed to source individual human being(s)
      2. full recapitulable provenance, evergreen permanence
      3. structured in universal ways as associative complexes
      4. Findable, Accessible, Interoperable, Reusable
      5. self-organizing, autopoietic
      6. shared and presented in self-described evergreen morphic ways

      given that we have a concept that is best referred to

      as in-formation that flows in emergent human trust networks

      that we fashion for ourselves as human being articulating our Tacit awareness

      scaling synthesis recapitulating in the ontogeny of learning the filogeny of co-evolving emergent knowledge as hyperknowledge

      scaling reach through time with the ability to find through global search work that mathces our current focal awareness and attention

      in stigmergic symmathesy (mutual learning)

      in a form that allows interpersonal sharing

      to in-form and shape US

    1. Arbuscular mycorrhizal fungi are obligate symbionts that obtain all their carbon from the plant they colonise but have to find other resources through soil exploration.

      obligate symbiont

    1. have one identity per device — this means you have to have different identities for each computer you have.

      one identity per device

    2. Patchwork which sidesteps these problems
      • everyone has a diary
      • can make a photocopy of friend's diary
      • to send a messager leave a message in the diary encrypted with the key that the only the friend has
      • reading a friend's diary, messages that one can read is meant for one
    3. using email for direct communication, you’re probably facing some well known problems

      email problems -spam, - provider lockin, - privacy, and - reliability (doesn’t work without the internet).

    1. A reputation system's vulnerability to a Sybil attack depends on how cheaply identities can be generated, the degree to which the reputation system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity, and whether the reputation system treats all entities identically
      • cost of identity generation (needs to be high)
      • active chain of trust
    1. Sybil attackWikipediahttps://en.wikipedia.org › wiki › Sybil_attackWikipediahttps://en.wikipedia.org › wiki › Sybil_attackThe Sybil attack in computer security is an attack wherein a reputation system is subverted by creating multiple identities. A reputation system's vulnerability ...

    1. The cartel tested their bulbs and fined manufacturers for bulbs that lasted more than 1,000 hours. A 1929 table listed the amount of Swiss francs paid that depended on the exceeding hours of lifetime.[8]

      ingenuity

    1. “You never change things by fighting the existing reality.To change something, build a new model that makes the existing model obsolete.”

    1. modelling an experimenter and experimental procedure algorithmically imposes a limit on what can be measured with equipment. Indeed, the theorems suggest a new form of uncertainty principle for our knowledge of physical quantities measured in simple physical experiments.

      nice

    1. SW Lee · 1999 — engross themSeves in phiOSophy for the Sake Of piOSOphy. That pragmatism Sought to emphaSze the historcal and Socal. ImSons of phiOSOphy

      search

    2. An Application of John Dewey's Symbiotic Rationalitykoreascience.or.krhttps://koreascience.or.kr › article › JAKO199915...koreascience.or.krhttps://koreascience.or.kr › article › JAKO199915...PDFby SW Lee · 1999 — engross themSeves in phiOSophy for the Sake Of piOSOphy. That pragmatism Sought to emphaSze the historcal and Socal. ImSons of phiOSOphy in the Indst

      piOSOphy

    1. Warmspace is more than a product or company. It is a movement to reconnect people to humanity. It is family and community. It’s a place that anyone can call home. No matter the culture, race, sexual orientation, social class, age, and beliefs, it’s a place for anyone to feel valid, seen, and belong.