10,000 Matching Annotations
  1. Apr 2023

    Annotators

    1. Our Vision

      Make participants happy - in every interaction and - help bring peace to their digital life.

      Value of user's digital interactions - is personal. -

      We at Sarvalabs bring - personalization - to open networks through - full user ownership and - complete control of - all dimensions of their digital interactions.

      for : IndyWeb Apss

    Annotators

    URL

    1. If we want to create organizations and systems that are designed from Trust for Trust, we need to apply Conway's Law backwards:

      Apply Conway's law backward

    1. “Any organization that designs a system (defined broadly) will produce a design whose structure is a copy of the organization's communication structure.”

      systems designed by organizations mirror the communications patterns

    1. Tesseract Grid​A Tesseract Grid is any formation of Tesseracts that range across multiple participants and their contexts. The grid represents a view that can identify the relationships between multiple participants and across multiple interactions. It is formally represented as 𝜏G.

    2. A Tesseract Lattice is a formation of Tesseracts that coalesce around a participant and their context. The Lattice represents a linkage of account states over time linked by its dynamically evolving context i.e., it holds the account’s latest state as well as the history of its interactions on the network. It provides a cryptographically verifiable view of the latest state of an account and is formally represented as 𝜏L.

    3. CoalescenceThe property of Tesseracts to form patterns and analytical views based on some arbitrary parameters is known as Coalescence.

      Coalesence

      see Scaling Coherence

    1. To act as the fundamental unit of value space, Tesseract holds the outcome of an interaction’s execution. It also holds it holds various information like the latest state of the participant, interaction payloads, consensus, data, and so on. The structure of the Tesseract is as follows:

      ```javascript

      type Tesseract struct { Header TesseractMetadata json:"tesseract_metadata" Body TesseractData json:"tesseract_data" EvidenceData []byte json:"teeseract_evidence" CommitData TesseractCommitData json:"tesseract_last_commit" } ```

    1. Tesseracts persist participant’s context, value, and behavior in the network.

      persists participant's - context - value - behavior

      in the network

    2. MOI persists the latest state of each participant in a separate linked list-like structure called Tesseract Lattice. Each Tesseract Lattice is made up of a cryptographically linked list of Tesseracts that depicts the changes made to the participant’s account from its inception. To know more about how cryptographic security is maintained, please visit the Tesseract section.

      cryptographically linked list

      of Tesseracts

    1. KRAMA is a family of intelligent consensus algorithms required to achieve contextual singularity using Modulated Trust

      intelligent consensus algoriths Mudolated Trust

    2. computation on an open network across heterogenous personalized execution environments. It is a pioneer in Context Unified Compute Architecture (CUCA) for all eligible devices.
      • heterogeneous p[ersonalized execution environments
      • Context unified Computer Architecture
    3. POORNA is a context-aware peer-to-peer overlay network that facilitates fast and reliable communication among nodes in the network. Context-driven capabilities of POORNA also help to achieve Modulated Trust by creating personalized clusters in an optimized manner. It is also responsible for facilitating multi-party computation clusters.

      context aware p2p overlay network

    Annotators

    URL

  2. www.acter.global www.acter.global
    1. when we create this signaling system between us called the conversation you know and how do we you know keep 00:06:52 those conversations going over time

      dream space

      conversations that are continuous without being synchronous eventually

      starting with synchronous ones

      interhumaning

      Description

    1. UX designers,

      UX design conceives of human being using computers as users.

      We need to design for Humans, not users

      HX not UX

      Especially as Information is but people in disguise

    2. easy to find, navigate, and understand. But the experience you provide has to be familiar and coherent across multiple interaction channels, from the Web to smartphones, smartwatches, and beyond.

      easy to find, navigate and understand

    1. what won't work would be a total disaster is 00:15:24 I'm gonna make up a term here API this notion that you have a human programmer that writes against a fixed interface that's exposed by some remote program first of all this requires the programs already know about each other right and when your writings this program in this one's language now they're tied together so the first program can go out and hunt and find other programs that 00:15:49 implement the same service they're tied together if this one's language changes it breaks this one there it's really brittle it doesn't scale and worst of all you have it is basically the machine code problem you have a human doing low-level details that should be taken care of by the machine so I'm pretty confident this never happened we're not gonna have 00:16:12 API's in the future where we are going to have are programs that know how to figure out how to talk to each other and that's going to require programming goals the third big idea that I wanna talk about is spatial representation of information

      https://hyp.is/sfJJkNz7Ee2wLk808A8T7g/opensource.googleblog.com/2023/03/introducing-service-weaver-framework-for-writing-distributed-applications.html

      What he is saying is that IT is a total disaster. He does not say, that it is deliberate, but 60, 50 years ago there were all the germs if the ideas that we needed. In 85 I went back to 20 years earlier. doing some computing archeology to find them. A better future had been invented back then. Those ideas were already buried under detritus and the worse is better. I am sorry to say, but they were right, There is a good way of going about things and there is the mess we are in. I admire the subtle way he is conveying the message, that our present is a total insanity

      while computer's capacity grows exponentially we are engineering to waste human brain power units at exponentially growing ways. We are building APIs which is insane

      Programming today is the opposite of diamond mining. In diamond mining you dig up a lot of dirt to find a small bit of value. With programming you start with the value, the real intention, and bury it in a bunch of dirt. - Charles Simonyi

      bret victor

    1. separation of concerns built into the Service Weaver framework. On one end, we have the programming framework, used for application development. On the other end, we have various deployer implementations, one per deployment environment.

      separation of concerns - programming framework - deployer implementations 0 one per deployment environment

    2. decoupling the process of writing the application from runtime considerations

      decoupling - the process of writing the application - from runtime consideration

      for : Intentional Software

    1. the physicist had abstracted from the perceivable 00:20:53 world the perceivable world is real it's not an imagination the red apple is there and it's red and we perceive it but to the physicist the red apple has 00:21:07 become a rescorpitant a thing of the mind

      red apple

      abstracted fromn thge perceivable

      became a res cogitant

      Descartes

    2. call it the middle plateau because that's where you do the exorcism 00:09:31 you you actually communicate with the demonic world from the intermediary realm so he knew how to access that realm and 00:09:45 had done it many many times in in his exorcisms

      middle plateau

      exorcism

    3. when people take psychedelics do you think that they somehow access this intermediary realm absolutely i have no doubt about it 00:08:43 and all i can say is it's a terribly terribly dangerous thing to do because it's real and the entities that inhabit 00:08:56 it are also real

      psychedellic real

    4. in the orthodox church 00:07:51 there is a certain reference to what they call the aerial world so they recognize it they recognize that it's a dangerous place 00:08:03 because believe it or not demons is not a medieval superstition it's a reality they are there unfortunately and that is a native realm so to speak

      orthodox church - aerial worlde - demaons - not s medieval superstition it;s a reality

    5. the intermediary is a realm that is subject to the condition of time 00:06:50 but not of space and in ancient in the ancient world that intermediary realm was fairly well known to the 00:07:02 the great philosophers and spiritual figures but the knowledge of this intermediary domain has almost completely vanished in 00:07:14 the western world

      intermediary realm - subject to the condition of time - but not of space - well knon to spiritual figures - vanished completely in western world

    6. i classify it as an icon 00:04:07 and an icon of course is a way of presenting metaphysical truth in a very simple 00:04:20 abbreviated visual form so i think we should keep it two-dimensional and uh try to understand the 00:04:35 ontology which it expresses i i have a sense that this icon was really known in ancient times i have a feeling that for example the 00:04:48 students in plato's academy were somehow acquainted with that icon it was never written down so far as i know but 00:05:02 it's i don't consider it an invention i i consider it an icon that is simply there and very helpful if we try to understand 00:05:14 the ultimate ontology of the cosmos because the cosmos has three parts a center an intermediary realm 00:05:28 and the conservation and the circumference

      icon ontology

      presenting metphysical truth - abbreviated visual form - two dimensional - understand the ontology it expresses - plato's academy acquainted - simly there - helpfull try to understand the - ultimate ontology of the cosmos - center, intermediary realm and circumference

    7. symbolic representation of the integral cosmos which is tripartite 00:06:06 and the the easiest way to explain why this tripartite is because man himself is tripartite corpus animal of the latin words

      tripirtate - corpus - animus - spiritus

      // interesting miss subtitling animus spiritus turns into animal

    1. TrailokyaLiterally means "three worlds" It can also refer to "three spheres," "three planes of existence," "three realms" and "three regions." Conceptions of three worlds appear in Hinduism and Jainism, as well as early Buddhist texts.  en.wikipedia.org

    2. Tribhuvana, Tri-bhuvana: 16 definitionswisdomlib.org›definition/tribhuvanaThe Kathāsaritsāgara (‘ocean of streams of story’), mentioning Tribhuvana, is a famous Sanskrit epic story revolving around prince Naravāhanadatta and his quest to become the emperor of the vidyādharas (celestial beings).

      search : tribhuvana triple world sanskrit

    1. Tribhuvana (त्रिभुवन) refers to the “three worlds”, according to the Manthānabhairavatantra, a vast sprawling work that belongs to a corpus of Tantric texts concerned with the worship of the goddess Kubjikā.—Accordingly, “ The sacred seat Jāla is the Unmanifest. It is well placed in the southern quarter. [...] The sacred seat (i.e. maṭha?) Ūṣma, very fierce, is pure in heaven and on the earth. The gesture is Vikārālyā, which removes the fear of phenomenal existence. Conjoined with the (secret) language and the Choma, this is the unstruck sound of Jālāvvā. Well known as the Vidyā, the three worlds bow to it [i.e., tribhuvana-namita]. Accomplished, divine, with six faces, giving supreme bliss, the guardian of the field is called ‘Jaya’. I praise the sacred seat Jāla, revered by the gods, which is divided into sixteen divisions”.

      tribhuvana

      the Unmanifest

    1. One account for all applications

      No Account for applications

      Grant Access to Apps to IndyViduals own(ed) Information Spaces as needed for mutual benefit

      for : Scaling Reach@indy0

    1. our mission

      mission - Harnessing and connecting - proven and new web technologies - for sustainability initiatives.

      an association of Internet platforms with the aim of - working together more effectively - for eco-social change.

    1. This book uses LISP as a means for relatingtopics which normally get treated in several separate courses. The point is notthat we can do this in LISP, but rather that it is natural to do it in LISP.

      natural to relate technical material = in LISP =

    1. Introducing Service Weaver: A Framework for Writing ...The Keywordhttps://opensource.googleblog.com › 2023/03 › introd...The Keywordhttps://opensource.googleblog.com › 2023/03 › introd...Mar 1, 2023 — We are excited to introduce Service Weaver, an open source framework for building and deploying distributed applications.

    1. The Problem With Google's MissionState Of Digitalhttps://www.stateofdigital.com › Articles › BusinessState Of Digitalhttps://www.stateofdigital.com › Articles › BusinessAug 12, 2015 — Google's mission is to make the world's information accessible and useful. But has the way it's gone about this damaged the creation of new ...

    1. Don't be evilWikipediahttps://en.wikipedia.org › wiki › Don't_be_evilWikipediahttps://en.wikipedia.org › wiki › Don't_be_evil"Don't be evil" is a phrase used in Google's corporate code of conduct, which it also formerly preceded as a motto. Following Google's corporate ...

    1. Avidyā (अविद्या) is a Vedic Sanskrit word, and is a compound of "a" and "vidya", meaning "not vidya". The word vidya is derived from the Sanskrit root Vid, which means "to know, to perceive, to see, to understand". Therefore, avidya means to "not know, not perceive, not understand".

      Avidia

    1. ⊛ (CIRCLED ASTERISK OPERATOR) utf-8 character icon CIRCLED ASTERISK OPERATOR is one of the 256 characters in the Mathematical Operators Unicode subset.

      circle asterisk

    1. the universities 00:12:56 expanding and attracting into the university system people who were not these autistic types

      nature of - the genius ~ is - people ~ with - outlier high intelligence - can readily comprehend things - moderately low agreeableness, readiness to offend - obsessed with - the truth you - systematizing - don't allow anything to stand in the way of your pursuit of the truth - hence low in empathy - autismbasically or autistic traits anyway - not caring about other people's feelings - even if caring wouldn't be able to anticipate what they would be - low in - conscientiousness and impulse control - not rule following - think outside the box - think the unthinkable - like - god didn't create the species quite separately - // delight in novelty bearing gestalt switch

      expanding and attracting into the university system - people who were not these autistic types

      so this is very important you get some people that might come up with a brilliant idea but they would never present it or they would vacillate about presenting it because of the 00:13:45 offense it would cause the genius isn't like that um and the other thing is that uh you have to be knowing

      because if you're high in conscientiousness you're rule following you know you cover within the lines you 00:13:57 follow the rules if you're low in conscientiousness then you think outside the bo6

    2. midwits but who want to be there because it's prestigious and those people will put power and prestige and whatever ahead of truth and therefore you get a kind of priestly cycle of universities 00:09:47 whereby the university then goes into decline

      midwits priestly cycle

    3. people become less and less neurotic as 00:07:40 they get older less and less mentally unstable apart from a dip in their late teens early 20s where they become more mentally unstable

      mentally unstable late teens early twenties

    4. cautious essentialism we have to be able to define our terms up to a point we have 00:03:21 to be able to break up reality into chunks which allow correct predictions to be made but to understand that those chunks into which we break up reality to a certain extent are subjective but only 00:03:34 to a certain extent

      cautious essentialism

    5. essentialism is focused around defining our words and understanding the true nature of things in the platonic world of forms

      essentialism

    1. identity is defined by a life history.

      digital life defined by event history

      event driven digital life history

      for : Self Sovereign Virtual Identity

      for Autonomous Digital Life

    2. What's wrong with digital identity today

      what's wrong with : digital IDs - hard to get a digital identity - easily spoofed and insecure

    3. balance between ease of online registration and verifying a person to a high level of assurance

      balance between - easy of online registration - verifying a person to a high level of assurance

    4. Organizations and the identity industry need to break out of the point solution mindset. A digital identity now needs to encompass an ongoing, dynamic way of representing an individual, and associated entities.

      break out of : point solution mindset

      digital identity - need to - encompass - ongoing dynamic way of representing and individual - and associated entitites

    1. the emergence of virtual identities, which are identities that people assume online and in virtual worlds

      virtual identities - that - people assume online - in virtual worlds

      // in Autonomous Human Centered Digital Spaces IndyWeb =

    1. Virtual Identity - an overview | ScienceDirect TopicsScienceDirecthttps://www.sciencedirect.com › topics › psychology › vi...ScienceDirecthttps://www.sciencedirect.com › topics › psychology › vi...Virtual Identity. Such virtual identities, or online identities, are social identities assumed or presented by persons in computer-mediated communication ...

    2. Virtual Identity - Crunchbase Company Profile & FundingCrunchbasehttps://www.crunchbase.com › organization › virtual-i...Crunchbasehttps://www.crunchbase.com › organization › virtual-i...

    3. See results aboutVirtual Identity AGMedia companyMedia companyOnline identityInternet identity, also online identity, online personality or ...

      to : https://hyp.is/xd_T5thBEe2VCx_W0-SPLw/www.google.com/search?sxsrf=APwXEddNoHsWgdT6WzJS5TsNxos5KLaHIg:1681200209089&q=Online+identity&si=AMnBZoGn39e0tI_t2dCPKQ2j8QBKDHso0GZnCtfIMxO7bEcZSdN2qEhjqs4QZztULuEPgr7Kryz2r7GQJLd51Fp3qsPORA3rD0aC1pp_xcjC_D1VRS8hw15z1rx_afQ4JqmpF80JRdTiPxAX1rqt1KnO0CswycW7P1eHXwPYOTgQbqBWRxFzmEQ=&sa=X&ved=2ahUKEwjSxYjqrqH-AhUUrKQKHX3SC-UQ6RN6BAg0EAE

    1. Virtual Identity

      <svg xmlns="http://www.w3.org/2000/svg" width="128" height="128" viewBox="0 0 128 128" fill="none"><rect x="1" y="105" width="22" height="22" rx="3" stroke="#743794" stroke-width="2"></rect><rect x="0.5" y="78.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="0.5" y="52.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="0.5" y="26.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="26.5" y="104.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="26.5" y="78.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="26.5" y="52.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="26.5" y="26.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="52.5" y="104.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="52.5" y="78.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="52.5" y="52.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="52.5" y="26.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="52.5" y="0.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="78.5" y="104.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="78.5" y="78.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="78.5" y="52.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="78.5" y="26.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="78.5" y="0.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="105" y="105" width="22" height="22" rx="3" stroke="#743794" stroke-width="2"></rect><rect x="104.5" y="78.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="104.5" y="52.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="104.5" y="26.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="105" y="1" width="22" height="22" rx="3" stroke="#743794" stroke-width="2"></rect></svg>

    1. Software solutions that last

      <svg xmlns="http://www.w3.org/2000/svg" width="128" height="128" viewBox="0 0 128 128" fill="none"><rect x="1" y="105" width="22" height="22" rx="3" stroke="#743794" stroke-width="2"></rect><rect x="0.5" y="78.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="0.5" y="52.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="0.5" y="26.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="26.5" y="104.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="26.5" y="78.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="26.5" y="52.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="26.5" y="26.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="52.5" y="104.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="52.5" y="78.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="52.5" y="52.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="52.5" y="26.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="52.5" y="0.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="78.5" y="104.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="78.5" y="78.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="78.5" y="52.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="78.5" y="26.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="78.5" y="0.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="105" y="105" width="22" height="22" rx="3" stroke="#743794" stroke-width="2"></rect><rect x="104.5" y="78.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="104.5" y="52.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="104.5" y="26.5" width="23" height="23" rx="3.5" stroke="#743794"></rect><rect x="105" y="1" width="22" height="22" rx="3" stroke="#743794" stroke-width="2"></rect></svg>

    1. Our online identity is all the information we leave on the Internet. It's our digital footprint, with such details as our email address, date of birth, bank details, and even our purchasing habits on online stores. Online identity goes beyond what we do online. It also verifies that we are who we say we are.

      gloss : online identity - all the information we leave on the Internet - digital footprint

      details - email address - date of birth - bank details - purchasing habits - online identity goes beyond what we do online - verifies that we are who we say we are

    1. Event-driven transactions based on configurable rules

      event driven transaction based on configurable rules

      // do all that in an InterPersonal People Centered setting Self-sovereign Virtual Progressive Identity built from human Trust for Trust

      empowering individuals and groups to share theyr Autonomous Digital Life

      https://diglife.com/

    1. Self-sovereign identity: 3 key questions SSI is on the extreme end of the digital identity spectrum. Its focus is putting control back in the hands of you, the user. But SSI is not the only way to skin a cat.

    1. Induction of Augmented Transition NetworksWileyhttps://onlinelibrary.wiley.com › doi › pdfWileyhttps://onlinelibrary.wiley.com › doi › pdfby JR Anderson · 1977 · Cited by 177 — INDUCTION OF AUGMENTED TRANSITION NETWORKS. 131 somewhat novel, it does not require any major new principles. Another differ-.

      introduction 1977

    1. a validation language for RDF

      contrast : a validation language for RDF - with : the ability - organize information as a self-organizing human wreitable/comprehendable yet machine readable intentional Mark In Notation, called TrailMarks

    1. RDF Shape Rule Languagehttps://www.w3.org › WoT › demos › shrl › sh...https://www.w3.org › WoT › demos › shrl › sh...PDFA rule graph defining a set of shapes is applied to a data graph ... Rule 1 states that it defines a shape and matches RDF nodes that have.

      rule graph defining a set of shapes

      for validating data

      contrast with : TrailMarks - create term graph to articulate intentional conceptualization of information on the fly as people create them

    1. the anatomy of a knowledge asset
      • asset graph (RDF)
      • queried SPARQL
      • Unique Asset Locator
      • ownership record NFT
      • immutability Proofs

      decentralized knowledge graph (dkg) operations - create - get - update - transfer

      chain of custody - vs - participant custody chains of contributions

    2. as these things as knowledge assets get created get connected uh they're also ready to power AI enhanced search and applications

      ready to power AI enhanced search

      • what is exactly empowered here?
      • are we feeding the I with Knowledge
      • or empower people with enhanced search capabilities? Description
    3. decentralized knowledge graph and uh kind of uh the key thing the key uh concept around knowledge assets

      Knowledge Assets - a new resource for the Internet - ownable - discoverable - Integrity - Data privacy - Structured 0 Composable

    1. It provides a more streamlined version of ArchiveWeb.page system without requiring a custom extension or desktop app!

      without requiring - custom extension - desktop app

    1. I'm not sure if Blockchain truly will save the world, but I'm certain it can save AI..

      Quite right, with AI in ascendance sure can destroy it

    2. Whoever solves for '*' will have the whole of humanity thanking them. And will probably make a ton of money in the process...

      I think the sweet spot, the only hope for Humanity is

      to create loops of autnonomy and agency for People as Human Actors first class Netizens,

      who could if they want to put machines and blockain in the Loop for their purpose, not serving the interest of

      operators of machines

    3. Blockchain as "The Trust Engine",

      BlockChain as "The Trust Engine" is for empowering machines to operate as trusted but verifyiable parties

      Could we just for once empower People First!

      Use the power of crytpography to build trust between people

      empower them to weave their own networks of trusts, for trusts, for the people by the people?

    4. We need to engineer-in TRUST to, at a minimum, the Internet. In reality, EVERYTHING!

      Yes in DEED

      Built from trust for Trust

      InterPersonal Networked Human Collaboration

      Open, commons based, Peerproduced, evergreen, trustful, but verifiable constellations for

    1. Lay his Sword by his Side Oh, could we do with this World of Ours The Wine-cup is Circling The Dream of those Days From this Hour the Pledge is Given Silence is in our Festal Halls . NATIONAL AIRS . . Introductory Music .... Greek Air Flourish the Trumpet

      for - circling the dream

    1. charles kettering who said that a problem not fully understood is unsolvable and a 00:01:29 problem that is fully understood is half solved

      charles kettering

      problem - not fully understood is unsolvable - fully understood is half solved

      possibly miss remembered

      well stated is not fully understood even if we solve as problem it does not mean that we fully understand

      it may be a viable conceptualization or at least generative leading to a solution

      itself may not even be well stated but on the path to developing improved formulations possibly carving up new concepts on the way

      should we say heuristically adequate?

      but it may be well stated in the sense that the statement may lead to eventual solution

      that in itself is a retrospective validation of the statement

      well stated is much less than fully understood

      see

    Annotators

    URL

    1. Good + Cheap

      not impossible

      if you switch to commons based, autonomous, peer produced, Cosmo Local Poduction/Services with decen(ralized) peer to peer value flows

      for - Cheating the Iron Triangle of Service/Production

    2. The iron triangle of service: good, fast, cheap — pick two. You can never have all three, as the saying goes.

      for : the iron triangle of service

    1. The Big Lie of “Good, Fast, Cheap” | by Benek Lisefski - Mediummedium.comhttps://medium.com › swlh › the-big-l...medium.comhttps://medium.com › swlh › the-big-l... · Oldal lefordítása2021. szept. 8. — The iron triangle of service: good, fast, cheap — pick two. You can never have all three, as the saying goes. Venn diagram of good, fast, cheap ...

    1. most evolutionary developmental lines are dead ends but somehow we broke free of that by ceasing to be defined by the 00:15:29 physical body which is the stuff upon which Evolution works and placing between ourselves and our environment a new thing 00:15:42 called culture we began to mediate Evolution you know Evolution says uh the infirm the idiot 00:15:52 the lame Must Die culture says we have different values about this maybe yes maybe no but we will decide Evolution says you know you must be a 00:16:06 scattered species nomadic and moving across the surface of the planet like an animal culture says no we have strategies for food sequestration and common defense and we will build cities 00:16:21 and so forth

      cultural evolution

    1. Difficulties with real numbers as infinite decimals ( I) | Real numbers + limits Math Foundations 91 24K views 10 years ago Math Foundations

    1. how can phenomenal properties give rise to intentionality is due to the fact that theadherents of phenomenal intentionality are also prone to endorse the tight conceptualconnection or coincidence of the concepts of the two properties. Just like the inten-tionalists, they are inclined to think that the phenomenal quality of an experience is,in other reading, nothing else but the intentional content (or the content and someother intentional properties) of the experience, since both can be characterized as ‘theway the world seems to us’.14

      phenomenal properties give rise to intentionality

      phenomenal quality of an experience

      is

      intentional content

    Annotators